CN110035183A - Information sharing method and terminal - Google Patents

Information sharing method and terminal Download PDF

Info

Publication number
CN110035183A
CN110035183A CN201910324178.4A CN201910324178A CN110035183A CN 110035183 A CN110035183 A CN 110035183A CN 201910324178 A CN201910324178 A CN 201910324178A CN 110035183 A CN110035183 A CN 110035183A
Authority
CN
China
Prior art keywords
target information
rule
information
target
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910324178.4A
Other languages
Chinese (zh)
Other versions
CN110035183B (en
Inventor
采光伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910324178.4A priority Critical patent/CN110035183B/en
Publication of CN110035183A publication Critical patent/CN110035183A/en
Application granted granted Critical
Publication of CN110035183B publication Critical patent/CN110035183B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present invention provides a kind of information sharing method and terminal, is related to technical field of information processing, and the information sharing method is applied to terminal, comprising: receives user and shares target information to the first input of target object;In response to first input, the sharing rule for the target object is obtained;According to the sharing rule, the target information is handled.Accidentally shared by the above-mentioned means, the present invention can be avoided target information to target object, can preferably protect the privacy of user.

Description

Information sharing method and terminal
Technical field
The present embodiments relate to technical field of information processing more particularly to a kind of information sharing method and terminals.
Background technique
Today's society, people's lives increasingly be unable to do without mobile phone, and the use of social tool is also more and more frequently in mobile phone It is numerous.When user uses social tool, some awkward or serious things of consequence can often occur, such as: a user is carrying out When information is shared, accidentally the private information sharing of oneself has been arrived in company's jumpbogroup of work unit, and user originally It is intended to be shared with hail fellow.
For above situation, most of social tools in the prior art provide revocation function, that is, after information transmission Preset time period in (such as in two minutes), user can cancel this information of sharing, and still, user does not realize at all To when sending out wrong information, alternatively, can be led when user is more than that preset time period (can not cancel this information) just recognizes to send out wrong information Breath is write accidentally to be shared.
Thus, how to avoid information from accidentally being shared, is a technical problem to be solved urgently.
Summary of the invention
The embodiment of the present invention provides a kind of information sharing method and terminal, is accidentally shared with to solve information in the prior art Problem.
In order to solve the above technical problems, the present invention is implemented as follows:
In a first aspect, being applied to terminal the embodiment of the invention provides a kind of information sharing method, comprising:
User is received to share target information to the first input of target object;
In response to first input, the sharing rule for the target object is obtained;
According to the sharing rule, the target information is handled.
Second aspect, the embodiment of the invention also provides a kind of terminals, comprising:
Receiving module shares target information to the first input of target object for receiving user;
Module is obtained, for obtaining the sharing rule for the target object in response to first input;
Processing module, for handling the target information according to the sharing rule.
The third aspect the embodiment of the invention also provides a kind of terminal, including processor, memory and is stored in described deposit On reservoir and the computer program that can run on the processor, the computer program are realized when being executed by the processor The step of above-mentioned information sharing method.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium Computer program is stored on storage media, the computer program realizes the step of above-mentioned information sharing method when being executed by processor Suddenly.
In embodiments of the present invention, it when user shares target information to target object, obtains be directed to target pair first The sharing rule of elephant, handles target information further according to the sharing rule, can be avoided target information and accidentally shared to mesh Object is marked, the privacy of user can be preferably protected.
Detailed description of the invention
Fig. 1 is the information sharing method flow diagram of the embodiment of the present invention one;
Fig. 2 is the structural schematic diagram of the terminal of the embodiment of the present invention two;
Fig. 3 is the structural schematic diagram of the terminal of the embodiment of the present invention three;
The hardware structural diagram of Fig. 4 terminal of each embodiment to realize the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention Attached drawing, the technical solution of the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is this hair Bright a part of the embodiment, instead of all the embodiments.Based on described the embodiment of the present invention, ordinary skill Personnel's every other embodiment obtained, shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is the flow diagram of the information sharing method of the embodiment of the present invention one, this method is applied to Terminal, comprising:
Step 11: receiving user and share target information to the first input of target object;
Step 12: in response to first input, obtaining the sharing rule for the target object;
Step 13: according to the sharing rule, the target information being handled.
Using information sharing method provided in an embodiment of the present invention, it can be avoided target information and accidentally shared to target pair As can preferably protect the privacy of user.
Wherein, target application can be social application (such as: wechat, QQ, microblogging), and target object can be user in mesh Good friend, group or sharing interface (such as: wechat circle of friends or micro-blog group) in mark application.
It is broadcast to prevent target information from being misinformated, preparatory interception mechanism can be used, specifically, of the invention some excellent Select in embodiment, sharing rule include it is default intercept rule, it is described regular according to sharings, to the target information into Row is handled
In the case where the target information meets the default interception rule, forbid sending the target information.Institute It states in the case that target information is unsatisfactory for the default interception rule, the target information can be shared to the target pair As.
That is, if the target information that user wants to share is to meet the default information for intercepting rule and intercepting, to mesh Mark information is intercepted, and otherwise, passes through the sharing of the target information.
In the embodiment of the present invention, presets and intercept there are many rules, be exemplified below.
As one of optional embodiment: the default interception rule includes that preset time intercepts rule, described It includes the first time range for forbidding sharing to the target object target information that preset time, which intercepts regular, and/or, permit Perhaps share the second time range of the target information to the target object;
It is described the target information meet the default interception it is regular in the case where, forbid sending the target information packet It includes:
Do not allowing (namely forbidding) described according to the first time range and/or second time range judgement In the case that target information is shared to the target object, forbid sending the target information.Optionally, according to described first The case where time range and/or second time range judgement allow to share the target information to the target object Under, the target information is shared to the target object.
For example, a user is set in advance in the working time (working day 9:00-12:00 and 13:00-17:00) and forbids The group's (i.e. target object is the group that works in the social application) that works in a social application shares any information, if the user is one Workaday 10:00 shares target information to work group, then the target information will be directly intercepted, if the user is at this Workaday 20:00 shares target information to work group, then shares the target information to work group.
As another optional embodiment: the default interception rule includes that predetermined keyword intercepts rule, described It includes the keyword for forbidding sharing to the target object that predetermined keyword, which intercepts rule,;
It is described the target information meet the default interception it is regular in the case where, forbid sending the target information packet It includes:
Judge whether the target information includes the keyword;
If the target information includes the keyword, forbid sending the target information.If the target information is not wrapped (any) described keyword is included, the target information can be shared to the target object.
For example, forbidding the keyword shared to the target object is to be related to a series of keywords of "pornography, gambling and drug abuse and trafficking", if mesh It marks including any keyword in the series keyword in information, then the target information is directly intercepted, if target information is not wrapped All series keywords are included, which is shared to target object.
Wherein, keyword can be the default keyword of terminal, such as: terminal has preset a series of keys when leaving the factory Word can preferably prevent sensitive information from being misinformated and broadcast.Keyword can also be preset by user, can preferably meet user Demand, it is more flexible and convenient.
Optionally, target information meet preset time intercept rule or predetermined keyword intercept rule intercept and to its into In the case that row intercepts, without interception prompting.
That is, if target information meets, preset time intercepts rule or predetermined keyword intercepts rule, directly intercepts The target information does not carry out any prompt to the user for sharing the target information.
As another optional embodiment: the default interception rule includes opening to share prompt;
It is described the target information meet the default interception it is regular in the case where, forbid sending the target information packet It includes:
Display inquiry frame is to ask the user whether that confirmation shares the target information to the target object;
If receiving user confirms this second input shared, in response to second input, by the target information Share to the target object;Otherwise, (namely forbidding sending) described target information is intercepted.
Specifically, user can define whether to open and share prompt for target object in target application.If user's needle To a target object, opens and share prompt, then user every time shares target information to the target object, can all show inquiry Frame asks the user whether that determination shares the target information to the target object.If user confirms this sharing, by the target Otherwise information, which is shared to the target object, intercepts the target information.To can preferably avoid information from accidentally being shared.
In the other embodiment of the present invention, above-mentioned preset time intercepts rule, predetermined keyword intercepts rule and opens Sharing prompt can be applied in combination, and can also exist simultaneously above-mentioned three kinds default two kinds intercepted in rule, or even deposit simultaneously In above-mentioned three kinds of rules.The terminal is shared the target information to the first input of the target object receiving Afterwards, need to judge respectively whether the target information meets the default interception rule being applied in combination, if met therein any One, then forbid sending the target information, only all can just send the target information in ungratified situation.
The target information that user is shared with target object may be related to the privacy of user, in order to avoid the privacy of user It is leaked, in other preferred embodiments of the invention, the sharing rule includes default privacy rule, the default privacy Rule includes at least one default privacy keyword;It is described regular according to the sharing, processing packet is carried out to the target information It includes:
In the case where the target information includes the default privacy keyword, privacy operations are executed.
That is, the target information that user shares touches default privacy rule, then privacy operations are executed.To prevent Only the privacy of user is leaked.Specifically, may determine that whether target information includes being related to the keyword of privacy of user, namely it is pre- If privacy keyword;If the target information includes default privacy keyword, determination needs to be implemented privacy operations, otherwise, it determines It does not need to execute privacy operations.
Keyword in particular to privacy of user can be payment cipher, login password and the wage income of user Equal keywords, user can set according to actual needs, more flexible and convenient.If user is shared with the target of target object Information includes being related to the keyword of privacy of user, then needs to be implemented privacy operations, is leaked to avoid the privacy of user.
In the embodiment of the present invention, there are many modes that execute privacy operations, illustrates separately below.
As one of optional embodiment: the execution privacy operations include:
The target information is encrypted, the target information after encryption is shared to the target object; The encryption includes: mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment.
It specifically, can be using mosaic processing, out-of-order processing, a variety of encryptions such as obscure processing and/or coded treatment Mode target information is encrypted (such as: in target information keyword or canonical information do the encryption process), then Encrypted target information is shared to target object again, thus the content of target information can not by human eye Direct Recognition, even if Target information is accidentally shared, other people can not also understand the meaning of the target information, to protect the privacy of user.
As another optional embodiment: the execution privacy operations include:
In the case where sharing the target information to the target object, generate for prompting to recall the target Information recalls prompt information;
That is, sharing target information to target object, post mechanism can be used, target information is prevented Misinformation is broadcast.The mode of remedying may include generating to recall prompt information, recall target information to remind.
Specifically, described generate for prompting the prompt information of recalling for recalling the target information to include:
Prompt information is recalled described in display;And/or
Prompt information is recalled to described in default good friend transmission, the default good friend has the power for cancelling the target information Limit.
Prompt information is recalled that is, can show, i.e., to the user's alarm for accidentally sharing target information, reminds the user Target information is recalled in time.
It can also be sent to the default good friend for the permission for having revocation target information and recall prompt information, remind default good friend Recall target information.That is, user can authorize default good friend's rights of rescission to limit, after user shares certain target information, not intentionally It is wrong target object (such as: work group) to know hair, preset good friend (such as default good friend is in the work group as target object, Namely default good friend is the group members of work group) target information this time shared of discovery and it is not suitable for sharing to target object, in advance If good friend can directly cancel this target information.
Preferably, it is described to default good friend send described in recall prompt information after, further includes:
In the case where detecting that the target information has been withdrawn, display is used to indicate what the target information was withdrawn Notification information.
That is, if default good friend has recalled user and has shared to the target information of target object, by removing for default good friend Reversion is notice to user.
Preferably, the reception user shares target information to before the first input of target object, further includes:
It receives user to input the revocation priority assignation of the default good friend, be inputted in response to the revocation priority assignation, The revocation permission of the default good friend is set.That is, user needs to authorize revocation permission to default good friend in advance.This presets good friend The member of the target object.
As another optional embodiment: the execution privacy operations include:
In the case where sharing the target information to the target object, multiple presupposed informations are shared to described Target object.
That is, sharing target information to target object, using post mechanism, target information is prevented to misinformate Sowing time, the mode of remedying can also include multiple presupposed informations are shared to target object, such as: a large amount of circulations are shared multiple default Information directly will a large amount of multiple default letters alternatively, in the case that the quantity of the pre-set presupposed information of user is very big Breath is shared to target object, thus, other people are it is seen that newest a large amount of presupposed informations, the user accidentally to share strive for recalling Time needed for the target information.
In the other embodiment of the present invention, three kinds of above-mentioned privacy operations can be applied in combination, and preferably be used to mention by generation Show that the privacy operations for recalling prompt information for recalling the target information are shared with by multiple presupposed informations to the target object Privacy operations be applied in combination.
Referring to Fig. 2, Fig. 2 is the structural schematic diagram of the terminal of the embodiment of the present invention two, which includes:
Receiving module 21 shares target information to the first input of target object for receiving user;
Module 22 is obtained, for obtaining the sharing rule for the target object in response to first input;
Processing module 23, for handling the target information according to the sharing rule.
Terminal provided in an embodiment of the present invention can be avoided target information and accidentally be shared to target object, can preferably be protected Protect the privacy of user.
Optionally, the sharing rule includes default interception rule;
The processing module 23 is used to forbid sending in the case where the target information meets the default interception rule The target information.
Optionally, the default interception rule includes that preset time interception rule and predetermined keyword intercept in rule extremely Few one kind;It includes forbidding sharing to the target object first time model of the target information that the preset time, which intercepts rule, It encloses, and/or, allow to share to the target object the second time range of the target information;The predetermined keyword intercepts Rule includes the keyword for forbidding sharing to the target object;
The processing module 23 is used in the default interception rule include that the preset time intercepts rule and according to institute Stating first time range and/or second time range judgement does not allow to share the target information to the target object In the case where, forbid sending the target information;
The processing module 23 is used to include the case where that the predetermined keyword intercepts rule in the default interception rule Under, judge whether the target information includes the keyword;If the target information includes the keyword, forbid sending institute State target information.
Optionally, the sharing rule includes default privacy rule, and the default privacy rule includes that at least one is default Privacy keyword;
The processing module 23 is used to execute hidden in the case where the target information includes the default privacy keyword Private operation.
Optionally, the processing module 23 is for executing at least one of following privacy operations:
The target information is encrypted, the target information after encryption is shared to the target object; The encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target Information recalls prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to described Target object.
Optionally, the processing module 23 for show it is described recall prompt information, and/or, for being sent out to default good friend Prompt information is recalled described in sending, the default good friend has the permission for cancelling the target information.
Optionally, the processing module 23 is also used in the case where detecting that the target information has been withdrawn, display It is used to indicate the notification information that the target information is withdrawn.
Preferably, the terminal 20 further include:
Determining module inputs the revocation priority assignation of the default good friend for receiving user, in response to the revocation Priority assignation input, is arranged the revocation permission of the default good friend.
Terminal provided in an embodiment of the present invention can be realized each process in the corresponding embodiment of the method for Fig. 1, to avoid It repeats, which is not described herein again.
Referring to FIG. 3, Fig. 3 is the structural schematic diagram of the terminal of the embodiment of the present invention three, which includes processor 31, Memory 32 is stored in the computer program that can be run on memory 32 and on the processor 31, the computer program quilt Processor 31 realizes following steps when executing:
User is received to share target information to the first input of target object;
In response to first input, the sharing rule for the target object is obtained;
According to the sharing rule, the target information is handled.
The terminal of the embodiment of the present invention can be avoided target information and accidentally be shared to target object, can preferably protect use The privacy at family.
Optionally, the sharing rule includes default interception rule;Computer program can also be real when being executed by processor 31 Existing following steps:
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information meets the default interception rule, forbid sending the target information.
Optionally, the default interception rule includes that preset time interception rule and predetermined keyword intercept in rule extremely Few one kind;It includes forbidding sharing to the target object first time model of the target information that the preset time, which intercepts rule, It encloses, and/or, allow to share to the target object the second time range of the target information;The predetermined keyword intercepts Rule includes the keyword for forbidding sharing to the target object;Computer program can also be achieved as follows when being executed by processor 31 Step:
It is described in the target information in the case where the default interception rule includes that the preset time intercepts rule In the case where meeting the default interception rule, forbid sending the target information include:
Do not allow according to the first time range and/or second time range judgement by the target information point In the case where enjoying to the target object, forbid sending the target information;
It is described to believe in the target in the case where the default interception rule includes that the predetermined keyword intercepts rule Breath meet default interceptions it is regular in the case where, forbid sending the target information include:
Judge whether the target information includes the keyword;
If the target information includes the keyword, forbid sending the target information.
Optionally, the sharing rule includes default privacy rule, and the default privacy rule includes that at least one is default Privacy keyword;Computer program can also be achieved following steps when being executed by processor 31:
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information includes the default privacy keyword, privacy operations are executed.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
The execution privacy operations include at least one of:
The target information is encrypted, the target information after encryption is shared to the target object; The encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target Information recalls prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to described Target object.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
It is described to generate for prompting the prompt information of recalling for recalling the target information to include:
Prompt information is recalled described in display;And/or
Prompt information is recalled to described in default good friend transmission, the default good friend has the power for cancelling the target information Limit.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
It is described to default good friend send described in recall prompt information after, detecting what the target information had been withdrawn In the case of, display is used to indicate the notification information that the target information is withdrawn.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
The reception user shares target information to before the first input of target object, further includes:
It receives user to input the revocation priority assignation of the default good friend, be inputted in response to the revocation priority assignation, The revocation permission of the default good friend is set.
The terminal can be realized each process of above- mentioned information sharing method embodiment, and can reach identical technology effect Fruit, to avoid repeating, which is not described herein again.
A kind of hardware structural diagram of Fig. 4 terminal of each embodiment to realize the present invention, the terminal 400 include but not It is limited to: radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, the components such as user input unit 407, interface unit 408, memory 409, processor 410 and power supply 411.This field Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 4, and terminal may include than illustrating more More or less component perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal includes But be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 410 share target information to target pair for controlling the reception user of user input unit 407 The first input of elephant;In response to first input, the sharing rule for the target object is obtained;It is advised according to the sharing Then, the target information is handled.
The terminal of the embodiment of the present invention can be avoided target information and accidentally be shared to target object, can preferably protect use The privacy at family.
It should be understood that the embodiment of the present invention in, radio frequency unit 401 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 410 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 401 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 401 can also by wireless communication system and network and other set Standby communication.
Terminal provides wireless broadband internet by network module 402 for user and accesses, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 403 can be received by radio frequency unit 401 or network module 402 or in memory 409 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 403 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 400 executes.Sound Frequency output unit 403 includes loudspeaker, buzzer and receiver etc..
Input unit 404 is for receiving audio or video signal.Input unit 404 may include graphics processor (Graphics Processing Unit, GPU) 4041 and microphone 4042, graphics processor 4041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 406.Through graphics processor 4041, treated that picture frame can be deposited Storage is sent in memory 409 (or other storage mediums) or via radio frequency unit 401 or network module 402.Mike Wind 4042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 401 is converted in the case where telephone calling model.
Terminal 400 further includes at least one sensor 405, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 4061, and proximity sensor can close display panel when terminal 400 is moved in one's ear 4061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 405 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared sensor etc., details are not described herein.
Display unit 406 is for showing information input by user or being supplied to the information of user.Display unit 406 can wrap Display panel 4061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 4061.
User input unit 407 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 407 include touch panel 4071 and other Input equipment 4072.Touch panel 4071, also referred to as touch screen, collect user on it or nearby touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 4071 or near touch panel 4071 Operation).Touch panel 4071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 410, receives processor 410 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 4071.In addition to touch panel 4071, user input unit 407 can also include other input equipments 4072. Specifically, other input equipments 4072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 4071 can be covered on display panel 4061, when touch panel 4071 is detected at it On or near touch operation after, send processor 410 to determine the type of touch event, be followed by subsequent processing device 410 according to touching The type for touching event provides corresponding visual output on display panel 4061.Although in Fig. 4, touch panel 4071 and display Panel 4061 is the function that outputs and inputs of realizing terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of terminal is realized so that touch panel 4071 and display panel 4061 is integrated, is not limited herein specifically It is fixed.
Interface unit 408 is the interface that external device (ED) is connect with terminal 400.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module Etc..Interface unit 408 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 400 or can be used for terminal 400 and external device (ED) it Between transmit data.
Memory 409 can be used for storing software program and various data.Memory 409 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 409 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 410 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 409, and call and be stored in memory 409 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 410 may include one Or multiple processing units;Preferably, processor 410 can integrate application processor and modem processor, wherein application processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 410.
Terminal 400 can also include the power supply 411 (such as battery) powered to all parts, it is preferred that power supply 411 can be with It is logically contiguous by power-supply management system and processor 410, thus by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
In addition, terminal 400 includes some unshowned functional modules, details are not described herein.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above- mentioned information sharing method embodiment, and energy when the computer program is executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (15)

1. a kind of information sharing method is applied to terminal characterized by comprising
User is received to share target information to the first input of target object;
In response to first input, the sharing rule for the target object is obtained;
According to the sharing rule, the target information is handled.
2. the method according to claim 1, wherein sharing rule includes default interception rule;
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information meets the default interception rule, forbid sending the target information.
3. according to the method described in claim 2, it is characterized in that, the default interception rule includes that preset time intercepts rule At least one of rule is intercepted with predetermined keyword;It includes forbidding to the target object point that the preset time, which intercepts rule, The first time range of the target information is enjoyed, and/or, when allowing to share the second of the target information to the target object Between range;It includes the keyword for forbidding sharing to the target object that the predetermined keyword, which intercepts rule,;
It is described to meet in the target information in the case where the default interception rule includes that the preset time intercepts rule In the case where the default interception rule, forbid sending the target information include:
According to the first time range and/or second time range judgement do not allow to share the target information to In the case where the target object, forbid sending the target information;
It is described full in the target information in the case where the default interception rule includes that the predetermined keyword intercepts rule In the case that foot default interceptions is regular, forbid sending the target information include:
Judge whether the target information includes the keyword;
If the target information includes the keyword, forbid sending the target information.
4. described pre- the method according to claim 1, wherein sharing rule includes default privacy rule If privacy rule includes at least one default privacy keyword;
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information includes the default privacy keyword, privacy operations are executed.
5. according to the method described in claim 4, it is characterized in that, the execution privacy operations include at least one of:
The target information is encrypted, the target information after encryption is shared to the target object;It is described Encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target information Recall prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to the target Object.
6. according to the method described in claim 5, it is characterized in that, described generate for prompting to recall removing for the target information Returning prompt information includes:
Prompt information is recalled described in display;And/or
Prompt information is recalled to described in default good friend transmission, the default good friend has the permission for cancelling the target information.
7. according to the method described in claim 6, it is characterized in that, it is described to default good friend send described in recall prompt information it Afterwards, further includes:
In the case where detecting that the target information has been withdrawn, display is used to indicate the notice that the target information is withdrawn Information.
8. a kind of terminal characterized by comprising
Receiving module shares target information to the first input of target object for receiving user;
Module is obtained, for obtaining the sharing rule for the target object in response to first input;
Processing module, for handling the target information according to the sharing rule.
9. terminal according to claim 8, which is characterized in that the sharing rule includes default interception rule;
The processing module is used to forbid sending the mesh in the case where the target information meets the default interception rule Mark information.
10. terminal according to claim 9, which is characterized in that the default interception rule includes that preset time intercepts rule Then at least one of rule is intercepted with predetermined keyword;It includes forbidding to the target object that the preset time, which intercepts rule, Share the first time range of the target information, and/or, allow to share the second of the target information to the target object Time range;It includes the keyword for forbidding sharing to the target object that the predetermined keyword, which intercepts rule,;
The processing module is used in the default interception rule include that the preset time intercepts rule and according to described first Not the case where time range and/or second time range judgement do not allow to share the target information to the target object Under, forbid sending the target information;
The processing module is used for the judgement in the case where the default interception rule includes that the predetermined keyword intercepts rule Whether the target information includes the keyword;If the target information includes the keyword, forbid sending the target Information.
11. terminal according to claim 8, which is characterized in that the sharing rule includes default privacy rule, described pre- If privacy rule includes at least one default privacy keyword;
The processing module is used to execute privacy behaviour in the case where the target information includes the default privacy keyword Make.
12. terminal according to claim 11, which is characterized in that the processing module is for executing in following privacy operations At least one of:
The target information is encrypted, the target information after encryption is shared to the target object;It is described Encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target information Recall prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to the target Object.
13. terminal according to claim 12, which is characterized in that the processing module is for showing that described recall prompts letter Breath, and/or, for prompt information is recalled described in default good friend transmission, the default good friend to have the revocation target information Permission.
14. terminal according to claim 13, which is characterized in that the processing module is also used to detecting the target In the case that information has been withdrawn, display is used to indicate the notification information that the target information is withdrawn.
15. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place The computer program run on reason device is realized when the computer program is executed by the processor as appointed in claim 1 to 7 The step of information sharing method described in one.
CN201910324178.4A 2019-04-22 2019-04-22 Information sharing method and terminal Active CN110035183B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910324178.4A CN110035183B (en) 2019-04-22 2019-04-22 Information sharing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910324178.4A CN110035183B (en) 2019-04-22 2019-04-22 Information sharing method and terminal

Publications (2)

Publication Number Publication Date
CN110035183A true CN110035183A (en) 2019-07-19
CN110035183B CN110035183B (en) 2021-10-12

Family

ID=67239711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910324178.4A Active CN110035183B (en) 2019-04-22 2019-04-22 Information sharing method and terminal

Country Status (1)

Country Link
CN (1) CN110035183B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510557A (en) * 2020-04-14 2020-08-07 维沃移动通信有限公司 Content processing method and electronic equipment
CN111752893A (en) * 2019-10-16 2020-10-09 北京京东尚科信息技术有限公司 Data sharing method and device, storage medium and computer system
CN112527533A (en) * 2020-12-24 2021-03-19 网易(杭州)网络有限公司 Method and device for processing publication information and electronic terminal
CN113840035A (en) * 2021-09-28 2021-12-24 维沃移动通信(杭州)有限公司 Information sharing method and device, electronic equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140344948A1 (en) * 2011-12-05 2014-11-20 International Business Machines Corporation Automated Management of Private Information
CN105630855A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 File sharing method, file sharing system and terminal
CN105681166A (en) * 2016-01-27 2016-06-15 网易传媒科技(北京)有限公司 Information sharing method and device
CN105991670A (en) * 2015-01-28 2016-10-05 中兴通讯股份有限公司 Data sharing method and device and terminal
US20170019364A1 (en) * 2015-07-14 2017-01-19 International Business Machines Corporation Determining potential sharing of private data associated with a private network domain to improve data security
CN106527929A (en) * 2016-10-31 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Picture information hiding method and apparatus
CN108846295A (en) * 2018-07-11 2018-11-20 北京达佳互联信息技术有限公司 Sensitive information filter method, device, computer equipment and storage medium
CN109547330A (en) * 2018-11-20 2019-03-29 维沃移动通信有限公司 A kind of information sharing method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140344948A1 (en) * 2011-12-05 2014-11-20 International Business Machines Corporation Automated Management of Private Information
CN105991670A (en) * 2015-01-28 2016-10-05 中兴通讯股份有限公司 Data sharing method and device and terminal
CN105630855A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 File sharing method, file sharing system and terminal
US20170019364A1 (en) * 2015-07-14 2017-01-19 International Business Machines Corporation Determining potential sharing of private data associated with a private network domain to improve data security
CN105681166A (en) * 2016-01-27 2016-06-15 网易传媒科技(北京)有限公司 Information sharing method and device
CN106527929A (en) * 2016-10-31 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Picture information hiding method and apparatus
CN108846295A (en) * 2018-07-11 2018-11-20 北京达佳互联信息技术有限公司 Sensitive information filter method, device, computer equipment and storage medium
CN109547330A (en) * 2018-11-20 2019-03-29 维沃移动通信有限公司 A kind of information sharing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752893A (en) * 2019-10-16 2020-10-09 北京京东尚科信息技术有限公司 Data sharing method and device, storage medium and computer system
CN111510557A (en) * 2020-04-14 2020-08-07 维沃移动通信有限公司 Content processing method and electronic equipment
CN112527533A (en) * 2020-12-24 2021-03-19 网易(杭州)网络有限公司 Method and device for processing publication information and electronic terminal
CN113840035A (en) * 2021-09-28 2021-12-24 维沃移动通信(杭州)有限公司 Information sharing method and device, electronic equipment and readable storage medium
CN113840035B (en) * 2021-09-28 2023-03-21 维沃移动通信(杭州)有限公司 Information sharing method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN110035183B (en) 2021-10-12

Similar Documents

Publication Publication Date Title
CN107608514A (en) Information processing method and mobile terminal
CN109918930A (en) A kind of information protecting method and terminal device
CN110035183A (en) Information sharing method and terminal
CN108491123A (en) A kind of adjusting application program image target method and mobile terminal
CN109697494A (en) A kind of graphic code display methods and terminal device
CN109194818A (en) A kind of information processing method and terminal
CN109145552A (en) Information ciphering method and terminal device
CN108629171A (en) A kind of unread message processing method and terminal
CN108280337A (en) A kind of message protection method and mobile terminal
CN110188524A (en) Information ciphering method, information decryption method and terminal
CN110149628A (en) A kind of information processing method and terminal device
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN109753350A (en) A kind of method for managing resource and terminal device
CN110336805A (en) Network access management method and mobile terminal
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN109740312A (en) A kind of application control method and terminal device
CN109815679A (en) Right management method and mobile terminal
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN109522741A (en) A kind of application program permission reminding method and its terminal device
CN109067979A (en) A kind of reminding method and mobile terminal
CN110457921A (en) Right management method and terminal device
CN109062492A (en) A kind of application access method and terminal
CN109753776A (en) A kind of method, apparatus and mobile terminal of information processing
CN108848240A (en) A kind of protecting information safety method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant