CN110011896B - Data processing method and device, computing equipment and storage medium - Google Patents

Data processing method and device, computing equipment and storage medium Download PDF

Info

Publication number
CN110011896B
CN110011896B CN201811314102.5A CN201811314102A CN110011896B CN 110011896 B CN110011896 B CN 110011896B CN 201811314102 A CN201811314102 A CN 201811314102A CN 110011896 B CN110011896 B CN 110011896B
Authority
CN
China
Prior art keywords
shared
data
sharing request
sharing
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811314102.5A
Other languages
Chinese (zh)
Other versions
CN110011896A (en
Inventor
张萌
唐志慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811314102.5A priority Critical patent/CN110011896B/en
Publication of CN110011896A publication Critical patent/CN110011896A/en
Priority to TW108128465A priority patent/TWI706359B/en
Priority to PCT/CN2019/108023 priority patent/WO2020093806A1/en
Application granted granted Critical
Publication of CN110011896B publication Critical patent/CN110011896B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/066Format adaptation, e.g. format conversion or compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a data processing method and device, a computing device and a storage medium, wherein the method is applied to a first application terminal, and comprises the following steps: receiving a first sharing request for generating data to be shared, wherein the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end; generating a first sharing request of the data to be shared and sending the first sharing request to the second application end; determining that the first sharing request of the data to be shared is intercepted by the second application end; and generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule, and after the first sharing request of the data to be shared is intercepted, automatically recognizing and intercepting and switching a generation mode of the sharing request to generate the second sharing request of the data to be shared so as to break through the interception.

Description

Data processing method and device, computing equipment and storage medium
Technical Field
The present application relates to the field of computer data processing technologies, and in particular, to a data processing method and apparatus, a computing device, and a storage medium.
Background
The main role of the squeakpassword is to market, reach a wider range of users. When a user acts as a sharing executor, in the process of sharing the squeak password, the sharing medium may not support or even intercept the sharing behavior for various reasons, but the target application and the sharing user still have the requirement of continuing sharing, thus causing a conflict.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a data processing method and apparatus, a computing device, and a storage medium, so as to solve technical defects in the prior art.
In a first aspect, an embodiment of the present specification discloses a data processing method, which is applied to a first application end, and the method includes:
receiving a first sharing request for generating data to be shared, wherein the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end;
generating a first sharing request of the data to be shared and sending the first sharing request to the second application end;
determining that the first sharing request of the data to be shared is intercepted by the second application end;
and generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule.
In a second aspect, an embodiment of the present specification discloses a data processing method, which is applied to a second application end, and the method includes:
receiving a first sharing request of data to be shared, which is generated by a first application end and takes the first application end as a sharing target;
analyzing the first sharing request of the data to be shared, and determining whether to intercept the first sharing request of the data to be shared;
and under the condition that the first sharing request of the data to be shared is determined to be subjected to intercepting operation, executing intercepting operation on the first sharing request of the data to be shared.
In a third aspect, an embodiment of the present specification discloses a data processing apparatus, which is applied to a first application end, and the apparatus includes:
the device comprises a first receiving module, a second receiving module and a first sharing module, wherein the first sharing module is configured to receive a first sharing request for generating data to be shared, the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end;
the first generation module is configured to generate a first sharing request of the data to be shared and send the first sharing request to the second application end;
the first intercepting module is configured to determine that a first sharing request of the data to be shared is intercepted by the second application end;
the second generation module is configured to generate a second sharing request of the data to be shared, which takes the second application terminal as a sharing target, according to a preset generation rule.
In a fourth aspect, an embodiment of the present specification discloses a data processing apparatus, which is applied to a second application, and the apparatus includes:
the third receiving module is configured to receive a first sharing request of the data to be shared, which is generated by the first application end and takes the third application end as a sharing target;
the first analysis module is configured to analyze the first sharing request of the data to be shared and determine whether to intercept the first sharing request of the data to be shared;
the third intercepting module is configured to perform intercepting operation on the first sharing request of the data to be shared under the condition that the intercepting operation is determined to be performed on the first sharing request of the data to be shared.
In a fifth aspect, embodiments of the present specification disclose a computing device comprising a memory, a processor, and computer instructions stored on the memory and executable on the processor, wherein the processor implements the instructions when executing the instructions, and the instructions implement the steps of the data processing method as described above when executed by the processor.
In a sixth aspect, the present specification discloses a computer readable storage medium, which stores computer instructions, and when the instructions are executed by a processor, the instructions implement the steps of the data processing method as described above.
The application provides a data processing method and device, a computing device and a storage medium, wherein the method is applied to a first application terminal, and comprises the following steps: receiving a first sharing request for generating data to be shared, wherein the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end; generating a first sharing request of the data to be shared and sending the first sharing request to the second application end; determining that the first sharing request of the data to be shared is intercepted by the second application end; and generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule, and after the first sharing request of the data to be shared is intercepted, automatically recognizing and intercepting and switching a generation mode of the sharing request to generate the second sharing request of the data to be shared so as to break through the interception.
Drawings
FIG. 1 is a block diagram of a computing device provided in one or more embodiments of the present description;
FIG. 2 is a flow diagram of a data processing method provided by one or more embodiments of the present description;
FIG. 3 is a flow diagram of a data processing method provided by one or more embodiments of the present description;
FIG. 4 is a flow diagram of a data processing method provided by one or more embodiments of the present description;
FIG. 5 is a schematic block diagram of a data processing apparatus according to one or more embodiments of the present disclosure;
fig. 6 is a schematic structural diagram of a data processing apparatus according to one or more embodiments of the present disclosure.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of implementation in many different ways than those herein set forth and of similar import by those skilled in the art without departing from the spirit of this application and is therefore not limited to the specific implementations disclosed below.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
First, the noun terms to which one or more embodiments of the present invention relate are explained.
The password: a communication password, which is recognized by an application, is assigned to allow data exchange between applications. It includes four elements: sharing a media application, opening a target application, sharing an executive user and sharing a user.
In the present application, a data processing method and apparatus, a computing device and a storage medium are provided, which are described in detail in the following embodiments one by one.
Fig. 1 is a block diagram illustrating a configuration of a computing device 100 according to an embodiment of the present specification. The components of the computing device 100 include, but are not limited to, memory 110 and processor 120. The processor 120 is coupled to the memory 110 via a bus 130 and a database 150 is used to store data.
The computing device 100 also includes AN access device 140, the access device 140 enabling the computing device 100 to communicate via one or more networks 160, examples of which include a Public Switched Telephone Network (PSTN), a local area network (L AN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the Internet the access device 140 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as AN IEEE802.11 Wireless local area network (W L AN) wireless interface, a Global microwave Internet Access (Wi-MAX) interface, AN Ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a Bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the other components of the computing device 100 described above and not shown in FIG. 1 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 1 is for purposes of example only and is not limiting as to the scope of the description. Those skilled in the art may add or replace other components as desired.
Computing device 100 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 100 may also be a mobile or stationary server.
Wherein the processor 120 may perform the steps of the method shown in fig. 2. Fig. 2 is a schematic flow chart diagram illustrating a data processing method according to an embodiment of the present specification, applied to a first application, the method including steps 202 to 208.
Step 202: receiving a first sharing request for generating data to be shared, wherein the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end.
In one or more embodiments of the present specification, the data to be shared is data to be shared with other users, for example, a product sold in a certain shopping website; the first sharing request is a request for sharing data to be shared with other users, for example, a request for sharing a certain sales product in a certain shopping website with other users, such as a squeaky password.
In practical applications, the first application may be an application program of a certain shopping website or a certain payment application program, and the second application may be an application program of a certain instant messaging, and the like.
When the data processing method is applied to a first application terminal, a first sharing request for generating data to be shared is received, namely the first application terminal receives a first sharing request for generating data to be shared by taking a second application terminal as a sharing target.
Step 204: and generating a first sharing request of the data to be shared and sending the first sharing request to the second application terminal.
In one or more embodiments of the present disclosure, after receiving a first sharing request for generating data to be shared, the first application terminal generates the first sharing request for the data to be shared, and sends the first sharing request for the data to be shared to a sharing target, that is, the second application terminal.
In one or more embodiments of the present specification, a first sharing request for the data to be shared may be generated according to a first preset condition and sent to a second application. The first preset condition includes but is not limited to generating a first sharing request of the data to be shared with a specified length and a specified check bit from a fixed dictionary of the sharing request of the data to be shared.
When the first application end is a certain payment application program and the second application end is a certain instant messaging application program, generating a first sharing request of the data to be shared and sending the first sharing request to the second application end comprises the following steps: the payment application program selects a section of combination of characters, numbers or special characters with specified length and specified check bits from a preset sharing request generation dictionary of the fixed adding friend according to a first preset condition to generate a sharing request of the adding friend under the condition of receiving a sharing request for generating the adding friend, and sends the generated sharing request of the adding friend to the instant messaging application program.
Step 206: and determining that the first sharing request of the data to be shared is intercepted by the second application terminal.
In one or more embodiments of the present disclosure, the first application may automatically identify whether the first sharing request of the data to be shared is intercepted by the second application. Namely, if the first application end detects that the first sharing request of the data to be shared sent to the second application end meets a second preset condition, it is determined that the first sharing request of the data to be shared is intercepted by the second application end.
The second preset condition includes, but is not limited to, that the number of users operated by the first share request of the data to be shared satisfies a time decay curve within a specified time period from the sharing of the first share request of the data to be shared to the second application. That is, the number of users operated by the first sharing request of the data to be shared is always reduced in the time period from the sharing of the first sharing request of the data to be shared to the second application.
Taking the first application end as a payment application program and the second application end as an instant messaging application program as an example, determining that the first sharing request of the data to be shared is intercepted by the second application end includes:
the payment application program of the nethong A receives the sharing request of the added friend generated by the nethong A, the payment application program of the nethong A generates the sharing request of the added friend according to a first preset condition and then sends the sharing request of the added friend to the instant messaging application program of the nethong A, after a user in the instant messaging application program of the nethong A receives the sharing request of the added friend, the user generally copies and pastes the sharing request of the added friend to the payment application program of the user to add the nethong A as the friend, if the sharing request of the added friend is shared by the nethong A under normal conditions, 30 friends are added into the friend by the payment application program of the user per hour, but after the sharing request of the added friend by the nethong A in one hour, the number of people who add the friend per hour is 2 or no person adds the friend, the payment application of the scarlet a may determine that the sharing request of the added friend of the scarlet a is intercepted by the instant messaging application.
Step 208: and generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule.
In one or more embodiments of the present specification, the preset generation rule includes, but is not limited to, performing semantic rewrite on the first sharing request of the data to be shared.
And generating a second sharing request of the data to be shared with the second application terminal as a sharing target according to a preset generation rule, namely, rewriting the first sharing request of the data to be shared with the semantics into the second sharing request of the data to be shared with the second application terminal as the sharing target.
In one or more embodiments of the present specification, the data processing method further includes:
receiving a second sharing request for generating the data to be shared;
and sending a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target.
Namely, the first application terminal generates and sends a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target, under the condition that the first application terminal receives the second sharing request of the data to be shared again.
In one or more embodiments of the present disclosure, the first sharing request and the second sharing request of the data to be shared have the same sharing content, and the data formats are different.
For example, the data to be shared is a skirt of a certain shopping website, and both the generated first sharing request and the generated second sharing request are requests for sharing the skirt, but the data composition forms of the first sharing request and the second sharing request are different.
In one or more embodiments of the present disclosure, in a case that a first sharing request of data to be shared generated by a first application is intercepted by a second application, the data processing method may automatically recognize the interception of the second application and generate a new second sharing request of the data to be shared according to a preset generation rule, and in a case that it is determined that the second sharing request of the data to be shared is not intercepted by the second application, receive and analyze a second sharing request of the data to be shared returned by the second application to determine the data to be shared, so that the sharing request of the data to be shared breaks through the interception of the second application.
In practical application, if the second sharing request is still intercepted by the second application, after the first application recognizes the interception, the third sharing request of the data to be shared, which takes the second application as a sharing target, is generated again according to a preset generation rule until the generated sharing request is not intercepted by the second application, so that the data to be shared can be shared through the second application.
Wherein the processor 120 may perform the steps of the method shown in fig. 3. Fig. 3 is a schematic flow chart showing a data processing method according to an embodiment of the present specification, applied to a second application, the method including steps 302 to 306.
Step 302: receiving a first sharing request of data to be shared, which is generated by a first application end and takes the first application end as a sharing target.
Step 304: analyzing the first sharing request of the data to be shared, and determining whether to intercept the first sharing request of the data to be shared.
In one or more embodiments of the present specification, analyzing the first sharing request of the data to be shared includes:
and determining that the first sharing request of the data to be shared contains sensitive characters or determining that the first application end belongs to a blacklist preset by the second application end.
In practical application, there may be other factors that cause the second application to intercept the sharing request of the data to be shared generated by the first application, and there is no enumeration here.
Step 306: and under the condition that the first sharing request of the data to be shared is determined to be subjected to intercepting operation, executing intercepting operation on the first sharing request of the data to be shared.
In one or more embodiments of the present specification, the data processing method further includes:
receiving a second sharing request of the data to be shared, which is generated by the first application end and takes the second application end as a sharing target;
analyzing the second sharing request of the data to be shared, and determining whether to intercept the second sharing request of the data to be shared;
and returning the second sharing request of the data to be shared to the first application terminal under the condition of determining that the second sharing request of the data to be shared does not intercept operation.
In one or more embodiments of the present disclosure, for the explanation of the first application end, the second application end, the data to be shared, the first sharing request of the data to be shared, and the second sharing request, reference may be made to the above-mentioned embodiments, which are not described herein again.
In one or more embodiments of the present specification, a second application receives a first sharing request of data to be shared, which is generated by a first application and is targeted for sharing, and then analyzes the first sharing request of the data to be shared, and intercepts the first sharing request of the data to be shared when the first sharing request of the data to be shared does not meet a receiving and sharing condition of the second application, so that the first application generates a second sharing request of the data to be shared, which meets the receiving and sharing condition of the second application, and receives the second sharing request of the data to be shared and transmits the second sharing request of the data to be shared back to the first application when the second sharing request of the data to be shared meets the receiving and sharing condition of the second application; the second application end analyzes and intercepts the sharing request of the data to be shared which does not meet the conditions, so that the sharing request of the data to be shared which has potential safety hazards or sensitive information can be prevented from being shared, and the user experience is improved.
Referring to fig. 4, a data processing method according to one or more embodiments of the present disclosure will be described with reference to a first application as a sharing target application and a second application as a sharing medium application, including steps 402 to 434.
Step 402: the sharing target application program of the user A receives a first sharing request which is sent by the user A and used for generating the added friends.
Step 404: and the sharing target application program of the user A sends the first sharing request for adding the friend to a processing system of the user A.
Step 406: the processing system of the user a sharing the target application program generates a first sharing request for adding friends, with the length of 20 and the check bit of 111, according to a preset dictionary.
Step 408: and the processing system of the sharing target application program of the user A feeds back the first sharing request of the added friend to the user A.
Step 410: the sharing medium application program of the user A receives and analyzes the first sharing request of the added friends shared by the user A.
Step 412: and the sharing medium application program of the user A intercepts the first sharing request of the added friend under the condition that the first sharing request of the added friend is determined not to meet the sharing condition.
Step 414: the processing system of the sharing target application program of the user A automatically detects whether the first sharing request of the added friend is intercepted by the sharing medium application program of the user A.
Step 416: the processing system of the sharing target application program of the user A generates a second sharing request with the same semantic meaning as the first sharing request of the added friend under the condition that the first sharing request of the added friend is automatically detected to be intercepted by the sharing medium application program of the user A.
In practical application, the sharing target application program updates the sharing request of the added friend once at intervals, so that the latest sharing request of the added friend is fed back to the user every time the sharing target application program receives the sharing request of the added friend, repeated interception of the sharing medium application program is avoided, and the working efficiency is improved.
In addition, after the sharing target application program recognizes that the sharing medium application program is intercepted, the sharing target application program can update the current sharing request for adding friends, can also update the sharing requests for other data to be shared on the sharing target application program, and can be set according to actual requirements.
Step 418: and the sharing target application program of the user A receives the second sharing request of the user A for generating the added friend again.
Step 420: and the sharing target application program of the user A sends the second sharing request for adding the friend to the processing system of the user A.
Step 422: and the sharing target application program of the user A feeds back the second sharing request for adding the friend, which is generated by the processing system of the user A, to the user A.
Step 424: and the sharing medium application program of the user A receives and analyzes a second sharing request of the user A for adding the friend.
Step 426: the sharing media application of user a determines that the second sharing request to add a friend to user a is not intercepted.
Step 428: and sharing the second sharing request of the friend added by the user A to the own sharing user by the sharing medium application program of the user A under the condition of determining that the second sharing request of the friend added is not intercepted.
Step 430: and the sharing user receives a second sharing request of adding the friend, which is shared by the user A, through the sharing medium application program of the sharing user.
Step 432: and the sharing user sends a second sharing request for adding the friend, shared by the user A, to the own processing system through the own sharing medium application program.
Step 434: and the processing system of the sharing target application program of the sharing user analyzes the second sharing request of the added friend shared by the user A, and the processing system of the sharing target application program of the sharing user adds the user A as the friend under the condition that the processing system of the sharing target application program of the sharing user analyzes that the second sharing request is the request of adding the friend.
In one or more embodiments of the present disclosure, the data processing method may automatically recognize interception of a sharing media application and generate a new second sharing request for adding a friend when a first sharing request for adding a friend, generated by a sharing target application, is intercepted by the sharing media application, and receive and analyze a second sharing request for adding a friend, returned by the sharing media application of a sharing user, to use an adding user a as a friend when it is determined that the second sharing request for adding a friend is not intercepted by the sharing media application, so that adding of a friend can be also achieved when the sharing request for adding a friend, generated by the sharing target application, is intercepted by the sharing media application.
Referring to fig. 5, one or more embodiments of the present specification provide a data processing apparatus applied to a first application, the apparatus including:
a first receiving module 502, configured to receive a first sharing request for generating data to be shared, where the first sharing request takes a second application as a sharing target, and the second application is different from the first application;
a first generating module 504, configured to generate a first sharing request of the data to be shared and send the first sharing request to the second application;
a first interception module 506, configured to determine that the first sharing request of the data to be shared is intercepted by the second application;
the second generating module 508 is configured to generate a second sharing request of the data to be shared, which takes the second application terminal as a sharing target, according to a preset generating rule.
Optionally, the apparatus further comprises:
a second receiving module configured to receive a second sharing request for generating the data to be shared;
the first sending module is configured to send a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target.
Optionally, the first generating module 504 is further configured to:
and generating a first sharing request of the data to be shared according to a first preset condition and sending the first sharing request to a second application terminal.
Optionally, the first intercepting module 506 is further configured to:
if the first sharing request of the data to be shared sent to the second application terminal is detected to meet a second preset condition, the first sharing request of the data to be shared is determined to be intercepted by the second application terminal.
Optionally, the apparatus further comprises:
the second intercepting module is configured to receive and analyze a second sharing request of the data to be shared, which is returned by the second application terminal, to determine the data to be shared, under the condition that it is determined that the second sharing request of the data to be shared is not intercepted by the second application terminal.
In one or more embodiments of the present disclosure, the data processing apparatus may automatically recognize interception of the second application terminal and generate a new second sharing request of the data to be shared according to a preset generation rule when a first sharing request of the data to be shared, generated by the first application terminal, is intercepted by the second application terminal, and receive and analyze a second sharing request of the data to be shared, returned by the second application terminal, to determine the data to be shared, so that the sharing request of the data to be shared breaks through the interception of the second application terminal.
Referring to fig. 6, one or more embodiments of the present specification provide a data processing apparatus, applied to a second application, the apparatus including:
a third receiving module 602, configured to receive a first sharing request of data to be shared, which is generated by a first application and takes itself as a sharing target;
a first analysis module 604, configured to analyze the first sharing request of the data to be shared, and determine whether to perform an interception operation on the first sharing request of the data to be shared;
a third intercepting module 606 configured to, under a condition that it is determined that an intercepting operation is performed on the first sharing request of the data to be shared, perform an intercepting operation on the first sharing request of the data to be shared.
Optionally, the first analysis module 604 is further configured to:
and determining that the first sharing request of the data to be shared contains sensitive characters or determining that the first application end belongs to a blacklist preset by the second application end.
Optionally, the apparatus further comprises:
the fourth receiving module is configured to receive a second sharing request of the data to be shared, which is generated by the first application end and takes the fourth application end as a sharing target;
the second analysis module is configured to analyze the second sharing request of the data to be shared and determine whether to intercept the second sharing request of the data to be shared;
and the return module is configured to return the second sharing request of the data to be shared to the first application terminal under the condition that the second sharing request of the data to be shared is determined not to be intercepted.
In one or more embodiments of the present specification, a second application receives a first sharing request of data to be shared, which is generated by a first application and is targeted for sharing, and then analyzes the first sharing request of the data to be shared, and intercepts the first sharing request of the data to be shared when the first sharing request of the data to be shared does not meet a receiving and sharing condition of the second application, so that the first application generates a second sharing request of the data to be shared, which meets the receiving and sharing condition of the second application, and receives the second sharing request of the data to be shared and transmits the second sharing request of the data to be shared back to the first application when the second sharing request of the data to be shared meets the receiving and sharing condition of the second application; the second application end analyzes and intercepts the sharing request of the data to be shared which does not meet the conditions, so that the sharing request of the data to be shared which has potential safety hazards or sensitive information can be prevented from being shared, and the user experience is improved.
An embodiment of the present application further provides a computer readable storage medium, which stores computer instructions, and the instructions, when executed by a processor, implement the steps of the data processing method as described above.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium belongs to the same concept as the technical solution of the data processing method, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the data processing method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present application disclosed above are intended only to aid in the explanation of the application. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the application and the practical application, to thereby enable others skilled in the art to best understand and utilize the application. The application is limited only by the claims and their full scope and equivalents.

Claims (10)

1. A data processing method, applied to a first application, the method comprising:
receiving a first sharing request for generating data to be shared, wherein the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end;
generating a first sharing request of the data to be shared and sending the first sharing request to the second application end;
if it is detected that the first sharing request of the data to be shared sent to the second application end meets a second preset condition, determining that the first sharing request of the data to be shared is intercepted by the second application end, wherein the second preset condition includes that the first sharing request of the data to be shared is shared to the second application end within a specified time, the number of operated users of the first sharing request of the data to be shared meets a time decay curve, that is, the first sharing request of the data to be shared is shared to the second application end within the specified time, and the number of operated users of the first sharing request of the data to be shared is always reduced;
and generating a second sharing request of the data to be shared, which takes the second application terminal as a sharing target, according to a preset generation rule, wherein the preset generation rule comprises the same semantic rewriting of the first sharing request of the data to be shared.
2. The method of claim 1, further comprising:
receiving a second sharing request for generating the data to be shared;
and sending a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target.
3. The method according to claim 1, wherein generating the first sharing request of the data to be shared and sending the first sharing request to the second application comprises:
and generating a first sharing request of the data to be shared according to a first preset condition and sending the first sharing request to a second application terminal.
4. The method of claim 2, further comprising:
and under the condition that the second sharing request of the data to be shared is not intercepted by the second application terminal, receiving and analyzing the second sharing request of the data to be shared returned by the second application terminal so as to determine the data to be shared.
5. A data processing apparatus, applied to a first application, the apparatus comprising:
the device comprises a first receiving module, a second receiving module and a first sharing module, wherein the first sharing module is configured to receive a first sharing request for generating data to be shared, the first sharing request takes a second application end as a sharing target, and the second application end is different from the first application end;
the first generation module is configured to generate a first sharing request of the data to be shared and send the first sharing request to the second application end;
the first intercepting module is configured to determine that a first sharing request of the data to be shared is intercepted by a second application terminal if it is detected that the first sharing request of the data to be shared sent to the second application terminal meets a second preset condition, where the second preset condition includes that the number of users who operate the first sharing request of the data to be shared meets a time decay curve within a time period specified by the second application terminal, that is, the number of users who operate the first sharing request of the data to be shared is always reduced within the time period specified by the second application terminal;
the second generation module is configured to generate a second sharing request of the data to be shared, which takes the second application terminal as a sharing target, according to a preset generation rule, wherein the preset generation rule includes that the first sharing request of the data to be shared is subjected to semantic rewriting.
6. The apparatus of claim 5, further comprising:
a second receiving module configured to receive a second sharing request for generating the data to be shared;
the first sending module is configured to send a second sharing request of the data to be shared, which is generated according to a preset generation rule and takes the second application terminal as a sharing target.
7. The apparatus of claim 5, wherein the first generating module is further configured to:
and generating a first sharing request of the data to be shared according to a first preset condition and sending the first sharing request to a second application terminal.
8. The apparatus of claim 6, further comprising:
the second intercepting module is configured to receive and analyze a second sharing request of the data to be shared, which is returned by the second application terminal, to determine the data to be shared, under the condition that it is determined that the second sharing request of the data to be shared is not intercepted by the second application terminal.
9. A computing device comprising a memory, a processor and computer instructions stored on the memory and executable on the processor, wherein the processor when executing the instructions implements the steps of the method of any one of claims 1 to 4 when executed by the processor.
10. A computer-readable storage medium storing computer instructions, which when executed by a processor, perform the steps of the method of any one of claims 1 to 4.
CN201811314102.5A 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium Active CN110011896B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811314102.5A CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium
TW108128465A TWI706359B (en) 2018-11-06 2019-08-12 Data processing method and device, computing equipment and storage medium
PCT/CN2019/108023 WO2020093806A1 (en) 2018-11-06 2019-09-26 Data processing method and apparatus, and computing device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811314102.5A CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110011896A CN110011896A (en) 2019-07-12
CN110011896B true CN110011896B (en) 2020-07-28

Family

ID=67164890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811314102.5A Active CN110011896B (en) 2018-11-06 2018-11-06 Data processing method and device, computing equipment and storage medium

Country Status (3)

Country Link
CN (1) CN110011896B (en)
TW (1) TWI706359B (en)
WO (1) WO2020093806A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011896B (en) * 2018-11-06 2020-07-28 阿里巴巴集团控股有限公司 Data processing method and device, computing equipment and storage medium
CN111966506B (en) * 2020-07-22 2024-03-22 招联消费金融股份有限公司 Content sharing method based on different application programs and computer equipment
CN112632418A (en) * 2020-12-16 2021-04-09 北京达佳互联信息技术有限公司 Password sharing method and device, electronic equipment and storage medium
CN113011165B (en) * 2021-03-19 2024-06-07 支付宝(中国)网络技术有限公司 Method, device, equipment and medium for identifying blocked keywords

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340424A (en) * 2010-07-21 2012-02-01 ***通信集团山东有限公司 Bad message detection method and bad message detection device
CN106682226A (en) * 2017-01-05 2017-05-17 珠海市魅族科技有限公司 Method, system and terminal for opening share link
CN106789566A (en) * 2016-12-12 2017-05-31 任子行网络技术股份有限公司 Different IM application messages sharing methods and system based on mobile phone operating system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8010615B2 (en) * 2008-12-31 2011-08-30 International Business Machines Corporation Instant messaging multilingual configuration
CN104142788A (en) * 2013-05-10 2014-11-12 中国电信股份有限公司 Terminal application sharing method and intelligent terminal
JP6306606B2 (en) * 2013-11-18 2018-04-04 珠海金山網絡遊戯科技有限公司 File sharing method, apparatus and mobile device
US10122660B2 (en) * 2015-03-27 2018-11-06 MINDBODY, Inc. Contextual mobile communication platform
CN105049319B (en) * 2015-05-25 2018-09-18 腾讯科技(深圳)有限公司 Good friend's adding method and system, client and server
WO2017124312A1 (en) * 2016-01-20 2017-07-27 马岩 Wechat-based shared information sharing method and system
CN107180049B (en) * 2016-03-11 2020-12-18 阿里巴巴集团控股有限公司 Searching method and device
CN107301224B (en) * 2017-06-19 2020-05-12 阿里巴巴集团控股有限公司 Information sharing method and device
CN107391587A (en) * 2017-06-23 2017-11-24 努比亚技术有限公司 Link is shared and access method, server, terminal and computer-readable storage medium
CN108307393A (en) * 2017-08-21 2018-07-20 腾讯科技(深圳)有限公司 Network flow resource sharing method, device, system and storage medium
CN108427751A (en) * 2018-03-13 2018-08-21 深圳乐信软件技术有限公司 A kind of short chain connects jump method, device and electronic equipment
CN110011896B (en) * 2018-11-06 2020-07-28 阿里巴巴集团控股有限公司 Data processing method and device, computing equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340424A (en) * 2010-07-21 2012-02-01 ***通信集团山东有限公司 Bad message detection method and bad message detection device
CN106789566A (en) * 2016-12-12 2017-05-31 任子行网络技术股份有限公司 Different IM application messages sharing methods and system based on mobile phone operating system
CN106682226A (en) * 2017-01-05 2017-05-17 珠海市魅族科技有限公司 Method, system and terminal for opening share link

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"吱口令在哪里打开?支付宝"我的吱口令"怎么用?";sunkist380;《百度经验https://jingyan.***.com/article/59703552ce6c9f8fc00740d5.html》;20160112;正文第1-3页 *
"微信用生命拦截敬业福 吓得马云连换几十版吱口令";财视传媒;《搜狐网,https://www.sohu.com/a/57740498_131976》;20160202;正文第2-3页 *
财视传媒."微信用生命拦截敬业福 吓得马云连换几十版吱口令".《搜狐网,https://www.sohu.com/a/57740498_131976》.2016,正文第2-3页. *

Also Published As

Publication number Publication date
TWI706359B (en) 2020-10-01
TW202018637A (en) 2020-05-16
WO2020093806A1 (en) 2020-05-14
CN110011896A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110011896B (en) Data processing method and device, computing equipment and storage medium
KR102107560B1 (en) Method, device, terminal, and server for verifying security of service operation
US20190166216A1 (en) Information pushing method and device
AU2017258821A1 (en) An automatic reply method, device, apparatus, and storage medium
US11244153B2 (en) Method and apparatus for processing information
CN110750222A (en) Printing method, printing device, computer equipment and storage medium
EP3667517A1 (en) Natural language processing method and apparatus
CN107634947A (en) Limitation malice logs in or the method and apparatus of registration
CN111949324A (en) Distributed serial number generation method and device
CN109299946B (en) Payment process processing method and device
CN107391277A (en) Information processing method and device
CN109241249B (en) Method and device for determining burst problem
EP3879418A1 (en) Identity verification method and device
CN111177536A (en) Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device
CN110933070A (en) User identification method, system, equipment and computer readable storage medium
CN113487322B (en) Data processing method and system
US9384270B1 (en) Associating user accounts with source identifiers
CN113422739B (en) Data transmission method, sending end and data transmission system
CN115422270A (en) Information processing method and device
CN115001776A (en) Data processing system and method
CN112328937B (en) Information delivery method and device
CN111782684B (en) Distribution network electronic handover information matching method and device
CN110020728B (en) Service model reinforcement learning method and device
KR20210116223A (en) Apparatus and Method of Artificial Intelligence-based Virtual Consultation Service
CN113949585A (en) Credit-based information identifier generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.