CN110035183A - Information sharing method and terminal - Google Patents
Information sharing method and terminal Download PDFInfo
- Publication number
- CN110035183A CN110035183A CN201910324178.4A CN201910324178A CN110035183A CN 110035183 A CN110035183 A CN 110035183A CN 201910324178 A CN201910324178 A CN 201910324178A CN 110035183 A CN110035183 A CN 110035183A
- Authority
- CN
- China
- Prior art keywords
- target information
- rule
- information
- target
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present invention provides a kind of information sharing method and terminal, is related to technical field of information processing, and the information sharing method is applied to terminal, comprising: receives user and shares target information to the first input of target object;In response to first input, the sharing rule for the target object is obtained;According to the sharing rule, the target information is handled.Accidentally shared by the above-mentioned means, the present invention can be avoided target information to target object, can preferably protect the privacy of user.
Description
Technical field
The present embodiments relate to technical field of information processing more particularly to a kind of information sharing method and terminals.
Background technique
Today's society, people's lives increasingly be unable to do without mobile phone, and the use of social tool is also more and more frequently in mobile phone
It is numerous.When user uses social tool, some awkward or serious things of consequence can often occur, such as: a user is carrying out
When information is shared, accidentally the private information sharing of oneself has been arrived in company's jumpbogroup of work unit, and user originally
It is intended to be shared with hail fellow.
For above situation, most of social tools in the prior art provide revocation function, that is, after information transmission
Preset time period in (such as in two minutes), user can cancel this information of sharing, and still, user does not realize at all
To when sending out wrong information, alternatively, can be led when user is more than that preset time period (can not cancel this information) just recognizes to send out wrong information
Breath is write accidentally to be shared.
Thus, how to avoid information from accidentally being shared, is a technical problem to be solved urgently.
Summary of the invention
The embodiment of the present invention provides a kind of information sharing method and terminal, is accidentally shared with to solve information in the prior art
Problem.
In order to solve the above technical problems, the present invention is implemented as follows:
In a first aspect, being applied to terminal the embodiment of the invention provides a kind of information sharing method, comprising:
User is received to share target information to the first input of target object;
In response to first input, the sharing rule for the target object is obtained;
According to the sharing rule, the target information is handled.
Second aspect, the embodiment of the invention also provides a kind of terminals, comprising:
Receiving module shares target information to the first input of target object for receiving user;
Module is obtained, for obtaining the sharing rule for the target object in response to first input;
Processing module, for handling the target information according to the sharing rule.
The third aspect the embodiment of the invention also provides a kind of terminal, including processor, memory and is stored in described deposit
On reservoir and the computer program that can run on the processor, the computer program are realized when being executed by the processor
The step of above-mentioned information sharing method.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium
Computer program is stored on storage media, the computer program realizes the step of above-mentioned information sharing method when being executed by processor
Suddenly.
In embodiments of the present invention, it when user shares target information to target object, obtains be directed to target pair first
The sharing rule of elephant, handles target information further according to the sharing rule, can be avoided target information and accidentally shared to mesh
Object is marked, the privacy of user can be preferably protected.
Detailed description of the invention
Fig. 1 is the information sharing method flow diagram of the embodiment of the present invention one;
Fig. 2 is the structural schematic diagram of the terminal of the embodiment of the present invention two;
Fig. 3 is the structural schematic diagram of the terminal of the embodiment of the present invention three;
The hardware structural diagram of Fig. 4 terminal of each embodiment to realize the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
Attached drawing, the technical solution of the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is this hair
Bright a part of the embodiment, instead of all the embodiments.Based on described the embodiment of the present invention, ordinary skill
Personnel's every other embodiment obtained, shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is the flow diagram of the information sharing method of the embodiment of the present invention one, this method is applied to
Terminal, comprising:
Step 11: receiving user and share target information to the first input of target object;
Step 12: in response to first input, obtaining the sharing rule for the target object;
Step 13: according to the sharing rule, the target information being handled.
Using information sharing method provided in an embodiment of the present invention, it can be avoided target information and accidentally shared to target pair
As can preferably protect the privacy of user.
Wherein, target application can be social application (such as: wechat, QQ, microblogging), and target object can be user in mesh
Good friend, group or sharing interface (such as: wechat circle of friends or micro-blog group) in mark application.
It is broadcast to prevent target information from being misinformated, preparatory interception mechanism can be used, specifically, of the invention some excellent
Select in embodiment, sharing rule include it is default intercept rule, it is described regular according to sharings, to the target information into
Row is handled
In the case where the target information meets the default interception rule, forbid sending the target information.Institute
It states in the case that target information is unsatisfactory for the default interception rule, the target information can be shared to the target pair
As.
That is, if the target information that user wants to share is to meet the default information for intercepting rule and intercepting, to mesh
Mark information is intercepted, and otherwise, passes through the sharing of the target information.
In the embodiment of the present invention, presets and intercept there are many rules, be exemplified below.
As one of optional embodiment: the default interception rule includes that preset time intercepts rule, described
It includes the first time range for forbidding sharing to the target object target information that preset time, which intercepts regular, and/or, permit
Perhaps share the second time range of the target information to the target object;
It is described the target information meet the default interception it is regular in the case where, forbid sending the target information packet
It includes:
Do not allowing (namely forbidding) described according to the first time range and/or second time range judgement
In the case that target information is shared to the target object, forbid sending the target information.Optionally, according to described first
The case where time range and/or second time range judgement allow to share the target information to the target object
Under, the target information is shared to the target object.
For example, a user is set in advance in the working time (working day 9:00-12:00 and 13:00-17:00) and forbids
The group's (i.e. target object is the group that works in the social application) that works in a social application shares any information, if the user is one
Workaday 10:00 shares target information to work group, then the target information will be directly intercepted, if the user is at this
Workaday 20:00 shares target information to work group, then shares the target information to work group.
As another optional embodiment: the default interception rule includes that predetermined keyword intercepts rule, described
It includes the keyword for forbidding sharing to the target object that predetermined keyword, which intercepts rule,;
It is described the target information meet the default interception it is regular in the case where, forbid sending the target information packet
It includes:
Judge whether the target information includes the keyword;
If the target information includes the keyword, forbid sending the target information.If the target information is not wrapped
(any) described keyword is included, the target information can be shared to the target object.
For example, forbidding the keyword shared to the target object is to be related to a series of keywords of "pornography, gambling and drug abuse and trafficking", if mesh
It marks including any keyword in the series keyword in information, then the target information is directly intercepted, if target information is not wrapped
All series keywords are included, which is shared to target object.
Wherein, keyword can be the default keyword of terminal, such as: terminal has preset a series of keys when leaving the factory
Word can preferably prevent sensitive information from being misinformated and broadcast.Keyword can also be preset by user, can preferably meet user
Demand, it is more flexible and convenient.
Optionally, target information meet preset time intercept rule or predetermined keyword intercept rule intercept and to its into
In the case that row intercepts, without interception prompting.
That is, if target information meets, preset time intercepts rule or predetermined keyword intercepts rule, directly intercepts
The target information does not carry out any prompt to the user for sharing the target information.
As another optional embodiment: the default interception rule includes opening to share prompt;
It is described the target information meet the default interception it is regular in the case where, forbid sending the target information packet
It includes:
Display inquiry frame is to ask the user whether that confirmation shares the target information to the target object;
If receiving user confirms this second input shared, in response to second input, by the target information
Share to the target object;Otherwise, (namely forbidding sending) described target information is intercepted.
Specifically, user can define whether to open and share prompt for target object in target application.If user's needle
To a target object, opens and share prompt, then user every time shares target information to the target object, can all show inquiry
Frame asks the user whether that determination shares the target information to the target object.If user confirms this sharing, by the target
Otherwise information, which is shared to the target object, intercepts the target information.To can preferably avoid information from accidentally being shared.
In the other embodiment of the present invention, above-mentioned preset time intercepts rule, predetermined keyword intercepts rule and opens
Sharing prompt can be applied in combination, and can also exist simultaneously above-mentioned three kinds default two kinds intercepted in rule, or even deposit simultaneously
In above-mentioned three kinds of rules.The terminal is shared the target information to the first input of the target object receiving
Afterwards, need to judge respectively whether the target information meets the default interception rule being applied in combination, if met therein any
One, then forbid sending the target information, only all can just send the target information in ungratified situation.
The target information that user is shared with target object may be related to the privacy of user, in order to avoid the privacy of user
It is leaked, in other preferred embodiments of the invention, the sharing rule includes default privacy rule, the default privacy
Rule includes at least one default privacy keyword;It is described regular according to the sharing, processing packet is carried out to the target information
It includes:
In the case where the target information includes the default privacy keyword, privacy operations are executed.
That is, the target information that user shares touches default privacy rule, then privacy operations are executed.To prevent
Only the privacy of user is leaked.Specifically, may determine that whether target information includes being related to the keyword of privacy of user, namely it is pre-
If privacy keyword;If the target information includes default privacy keyword, determination needs to be implemented privacy operations, otherwise, it determines
It does not need to execute privacy operations.
Keyword in particular to privacy of user can be payment cipher, login password and the wage income of user
Equal keywords, user can set according to actual needs, more flexible and convenient.If user is shared with the target of target object
Information includes being related to the keyword of privacy of user, then needs to be implemented privacy operations, is leaked to avoid the privacy of user.
In the embodiment of the present invention, there are many modes that execute privacy operations, illustrates separately below.
As one of optional embodiment: the execution privacy operations include:
The target information is encrypted, the target information after encryption is shared to the target object;
The encryption includes: mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment.
It specifically, can be using mosaic processing, out-of-order processing, a variety of encryptions such as obscure processing and/or coded treatment
Mode target information is encrypted (such as: in target information keyword or canonical information do the encryption process), then
Encrypted target information is shared to target object again, thus the content of target information can not by human eye Direct Recognition, even if
Target information is accidentally shared, other people can not also understand the meaning of the target information, to protect the privacy of user.
As another optional embodiment: the execution privacy operations include:
In the case where sharing the target information to the target object, generate for prompting to recall the target
Information recalls prompt information;
That is, sharing target information to target object, post mechanism can be used, target information is prevented
Misinformation is broadcast.The mode of remedying may include generating to recall prompt information, recall target information to remind.
Specifically, described generate for prompting the prompt information of recalling for recalling the target information to include:
Prompt information is recalled described in display;And/or
Prompt information is recalled to described in default good friend transmission, the default good friend has the power for cancelling the target information
Limit.
Prompt information is recalled that is, can show, i.e., to the user's alarm for accidentally sharing target information, reminds the user
Target information is recalled in time.
It can also be sent to the default good friend for the permission for having revocation target information and recall prompt information, remind default good friend
Recall target information.That is, user can authorize default good friend's rights of rescission to limit, after user shares certain target information, not intentionally
It is wrong target object (such as: work group) to know hair, preset good friend (such as default good friend is in the work group as target object,
Namely default good friend is the group members of work group) target information this time shared of discovery and it is not suitable for sharing to target object, in advance
If good friend can directly cancel this target information.
Preferably, it is described to default good friend send described in recall prompt information after, further includes:
In the case where detecting that the target information has been withdrawn, display is used to indicate what the target information was withdrawn
Notification information.
That is, if default good friend has recalled user and has shared to the target information of target object, by removing for default good friend
Reversion is notice to user.
Preferably, the reception user shares target information to before the first input of target object, further includes:
It receives user to input the revocation priority assignation of the default good friend, be inputted in response to the revocation priority assignation,
The revocation permission of the default good friend is set.That is, user needs to authorize revocation permission to default good friend in advance.This presets good friend
The member of the target object.
As another optional embodiment: the execution privacy operations include:
In the case where sharing the target information to the target object, multiple presupposed informations are shared to described
Target object.
That is, sharing target information to target object, using post mechanism, target information is prevented to misinformate
Sowing time, the mode of remedying can also include multiple presupposed informations are shared to target object, such as: a large amount of circulations are shared multiple default
Information directly will a large amount of multiple default letters alternatively, in the case that the quantity of the pre-set presupposed information of user is very big
Breath is shared to target object, thus, other people are it is seen that newest a large amount of presupposed informations, the user accidentally to share strive for recalling
Time needed for the target information.
In the other embodiment of the present invention, three kinds of above-mentioned privacy operations can be applied in combination, and preferably be used to mention by generation
Show that the privacy operations for recalling prompt information for recalling the target information are shared with by multiple presupposed informations to the target object
Privacy operations be applied in combination.
Referring to Fig. 2, Fig. 2 is the structural schematic diagram of the terminal of the embodiment of the present invention two, which includes:
Receiving module 21 shares target information to the first input of target object for receiving user;
Module 22 is obtained, for obtaining the sharing rule for the target object in response to first input;
Processing module 23, for handling the target information according to the sharing rule.
Terminal provided in an embodiment of the present invention can be avoided target information and accidentally be shared to target object, can preferably be protected
Protect the privacy of user.
Optionally, the sharing rule includes default interception rule;
The processing module 23 is used to forbid sending in the case where the target information meets the default interception rule
The target information.
Optionally, the default interception rule includes that preset time interception rule and predetermined keyword intercept in rule extremely
Few one kind;It includes forbidding sharing to the target object first time model of the target information that the preset time, which intercepts rule,
It encloses, and/or, allow to share to the target object the second time range of the target information;The predetermined keyword intercepts
Rule includes the keyword for forbidding sharing to the target object;
The processing module 23 is used in the default interception rule include that the preset time intercepts rule and according to institute
Stating first time range and/or second time range judgement does not allow to share the target information to the target object
In the case where, forbid sending the target information;
The processing module 23 is used to include the case where that the predetermined keyword intercepts rule in the default interception rule
Under, judge whether the target information includes the keyword;If the target information includes the keyword, forbid sending institute
State target information.
Optionally, the sharing rule includes default privacy rule, and the default privacy rule includes that at least one is default
Privacy keyword;
The processing module 23 is used to execute hidden in the case where the target information includes the default privacy keyword
Private operation.
Optionally, the processing module 23 is for executing at least one of following privacy operations:
The target information is encrypted, the target information after encryption is shared to the target object;
The encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target
Information recalls prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to described
Target object.
Optionally, the processing module 23 for show it is described recall prompt information, and/or, for being sent out to default good friend
Prompt information is recalled described in sending, the default good friend has the permission for cancelling the target information.
Optionally, the processing module 23 is also used in the case where detecting that the target information has been withdrawn, display
It is used to indicate the notification information that the target information is withdrawn.
Preferably, the terminal 20 further include:
Determining module inputs the revocation priority assignation of the default good friend for receiving user, in response to the revocation
Priority assignation input, is arranged the revocation permission of the default good friend.
Terminal provided in an embodiment of the present invention can be realized each process in the corresponding embodiment of the method for Fig. 1, to avoid
It repeats, which is not described herein again.
Referring to FIG. 3, Fig. 3 is the structural schematic diagram of the terminal of the embodiment of the present invention three, which includes processor 31,
Memory 32 is stored in the computer program that can be run on memory 32 and on the processor 31, the computer program quilt
Processor 31 realizes following steps when executing:
User is received to share target information to the first input of target object;
In response to first input, the sharing rule for the target object is obtained;
According to the sharing rule, the target information is handled.
The terminal of the embodiment of the present invention can be avoided target information and accidentally be shared to target object, can preferably protect use
The privacy at family.
Optionally, the sharing rule includes default interception rule;Computer program can also be real when being executed by processor 31
Existing following steps:
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information meets the default interception rule, forbid sending the target information.
Optionally, the default interception rule includes that preset time interception rule and predetermined keyword intercept in rule extremely
Few one kind;It includes forbidding sharing to the target object first time model of the target information that the preset time, which intercepts rule,
It encloses, and/or, allow to share to the target object the second time range of the target information;The predetermined keyword intercepts
Rule includes the keyword for forbidding sharing to the target object;Computer program can also be achieved as follows when being executed by processor 31
Step:
It is described in the target information in the case where the default interception rule includes that the preset time intercepts rule
In the case where meeting the default interception rule, forbid sending the target information include:
Do not allow according to the first time range and/or second time range judgement by the target information point
In the case where enjoying to the target object, forbid sending the target information;
It is described to believe in the target in the case where the default interception rule includes that the predetermined keyword intercepts rule
Breath meet default interceptions it is regular in the case where, forbid sending the target information include:
Judge whether the target information includes the keyword;
If the target information includes the keyword, forbid sending the target information.
Optionally, the sharing rule includes default privacy rule, and the default privacy rule includes that at least one is default
Privacy keyword;Computer program can also be achieved following steps when being executed by processor 31:
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information includes the default privacy keyword, privacy operations are executed.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
The execution privacy operations include at least one of:
The target information is encrypted, the target information after encryption is shared to the target object;
The encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target
Information recalls prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to described
Target object.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
It is described to generate for prompting the prompt information of recalling for recalling the target information to include:
Prompt information is recalled described in display;And/or
Prompt information is recalled to described in default good friend transmission, the default good friend has the power for cancelling the target information
Limit.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
It is described to default good friend send described in recall prompt information after, detecting what the target information had been withdrawn
In the case of, display is used to indicate the notification information that the target information is withdrawn.
Optionally, following steps be can also be achieved when computer program is executed by processor 31:
The reception user shares target information to before the first input of target object, further includes:
It receives user to input the revocation priority assignation of the default good friend, be inputted in response to the revocation priority assignation,
The revocation permission of the default good friend is set.
The terminal can be realized each process of above- mentioned information sharing method embodiment, and can reach identical technology effect
Fruit, to avoid repeating, which is not described herein again.
A kind of hardware structural diagram of Fig. 4 terminal of each embodiment to realize the present invention, the terminal 400 include but not
It is limited to: radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit
406, the components such as user input unit 407, interface unit 408, memory 409, processor 410 and power supply 411.This field
Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 4, and terminal may include than illustrating more
More or less component perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal includes
But be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 410 share target information to target pair for controlling the reception user of user input unit 407
The first input of elephant;In response to first input, the sharing rule for the target object is obtained;It is advised according to the sharing
Then, the target information is handled.
The terminal of the embodiment of the present invention can be avoided target information and accidentally be shared to target object, can preferably protect use
The privacy at family.
It should be understood that the embodiment of the present invention in, radio frequency unit 401 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 410 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 401 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 401 can also by wireless communication system and network and other set
Standby communication.
Terminal provides wireless broadband internet by network module 402 for user and accesses, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 403 can be received by radio frequency unit 401 or network module 402 or in memory 409
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 403 can also provide and end
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 400 executes.Sound
Frequency output unit 403 includes loudspeaker, buzzer and receiver etc..
Input unit 404 is for receiving audio or video signal.Input unit 404 may include graphics processor
(Graphics Processing Unit, GPU) 4041 and microphone 4042, graphics processor 4041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 406.Through graphics processor 4041, treated that picture frame can be deposited
Storage is sent in memory 409 (or other storage mediums) or via radio frequency unit 401 or network module 402.Mike
Wind 4042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 401 is converted in the case where telephone calling model.
Terminal 400 further includes at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjusts the brightness of display panel 4061, and proximity sensor can close display panel when terminal 400 is moved in one's ear
4061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 405 can be with
Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer,
Infrared sensor etc., details are not described herein.
Display unit 406 is for showing information input by user or being supplied to the information of user.Display unit 406 can wrap
Display panel 4061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 4061.
User input unit 407 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 407 include touch panel 4071 and other
Input equipment 4072.Touch panel 4071, also referred to as touch screen, collect user on it or nearby touch operation (such as
User is using any suitable objects or attachment such as finger, stylus on touch panel 4071 or near touch panel 4071
Operation).Touch panel 4071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 410, receives processor 410
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch panel 4071.In addition to touch panel 4071, user input unit 407 can also include other input equipments 4072.
Specifically, other input equipments 4072 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 4071 can be covered on display panel 4061, when touch panel 4071 is detected at it
On or near touch operation after, send processor 410 to determine the type of touch event, be followed by subsequent processing device 410 according to touching
The type for touching event provides corresponding visual output on display panel 4061.Although in Fig. 4, touch panel 4071 and display
Panel 4061 is the function that outputs and inputs of realizing terminal as two independent components, but in certain embodiments, it can
The function that outputs and inputs of terminal is realized so that touch panel 4071 and display panel 4061 is integrated, is not limited herein specifically
It is fixed.
Interface unit 408 is the interface that external device (ED) is connect with terminal 400.For example, external device (ED) may include it is wired or
Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port,
For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module
Etc..Interface unit 408 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will
One or more elements that the input received is transferred in terminal 400 or can be used for terminal 400 and external device (ED) it
Between transmit data.
Memory 409 can be used for storing software program and various data.Memory 409 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 409 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 410 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 409, and call and be stored in memory 409
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 410 may include one
Or multiple processing units;Preferably, processor 410 can integrate application processor and modem processor, wherein application processing
The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage
Solution, above-mentioned modem processor can not also be integrated into processor 410.
Terminal 400 can also include the power supply 411 (such as battery) powered to all parts, it is preferred that power supply 411 can be with
It is logically contiguous by power-supply management system and processor 410, thus by power-supply management system realize management charging, electric discharge, with
And the functions such as power managed.
In addition, terminal 400 includes some unshowned functional modules, details are not described herein.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above- mentioned information sharing method embodiment, and energy when the computer program is executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (15)
1. a kind of information sharing method is applied to terminal characterized by comprising
User is received to share target information to the first input of target object;
In response to first input, the sharing rule for the target object is obtained;
According to the sharing rule, the target information is handled.
2. the method according to claim 1, wherein sharing rule includes default interception rule;
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information meets the default interception rule, forbid sending the target information.
3. according to the method described in claim 2, it is characterized in that, the default interception rule includes that preset time intercepts rule
At least one of rule is intercepted with predetermined keyword;It includes forbidding to the target object point that the preset time, which intercepts rule,
The first time range of the target information is enjoyed, and/or, when allowing to share the second of the target information to the target object
Between range;It includes the keyword for forbidding sharing to the target object that the predetermined keyword, which intercepts rule,;
It is described to meet in the target information in the case where the default interception rule includes that the preset time intercepts rule
In the case where the default interception rule, forbid sending the target information include:
According to the first time range and/or second time range judgement do not allow to share the target information to
In the case where the target object, forbid sending the target information;
It is described full in the target information in the case where the default interception rule includes that the predetermined keyword intercepts rule
In the case that foot default interceptions is regular, forbid sending the target information include:
Judge whether the target information includes the keyword;
If the target information includes the keyword, forbid sending the target information.
4. described pre- the method according to claim 1, wherein sharing rule includes default privacy rule
If privacy rule includes at least one default privacy keyword;
Described regular according to the sharing, carrying out processing to the target information includes:
In the case where the target information includes the default privacy keyword, privacy operations are executed.
5. according to the method described in claim 4, it is characterized in that, the execution privacy operations include at least one of:
The target information is encrypted, the target information after encryption is shared to the target object;It is described
Encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target information
Recall prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to the target
Object.
6. according to the method described in claim 5, it is characterized in that, described generate for prompting to recall removing for the target information
Returning prompt information includes:
Prompt information is recalled described in display;And/or
Prompt information is recalled to described in default good friend transmission, the default good friend has the permission for cancelling the target information.
7. according to the method described in claim 6, it is characterized in that, it is described to default good friend send described in recall prompt information it
Afterwards, further includes:
In the case where detecting that the target information has been withdrawn, display is used to indicate the notice that the target information is withdrawn
Information.
8. a kind of terminal characterized by comprising
Receiving module shares target information to the first input of target object for receiving user;
Module is obtained, for obtaining the sharing rule for the target object in response to first input;
Processing module, for handling the target information according to the sharing rule.
9. terminal according to claim 8, which is characterized in that the sharing rule includes default interception rule;
The processing module is used to forbid sending the mesh in the case where the target information meets the default interception rule
Mark information.
10. terminal according to claim 9, which is characterized in that the default interception rule includes that preset time intercepts rule
Then at least one of rule is intercepted with predetermined keyword;It includes forbidding to the target object that the preset time, which intercepts rule,
Share the first time range of the target information, and/or, allow to share the second of the target information to the target object
Time range;It includes the keyword for forbidding sharing to the target object that the predetermined keyword, which intercepts rule,;
The processing module is used in the default interception rule include that the preset time intercepts rule and according to described first
Not the case where time range and/or second time range judgement do not allow to share the target information to the target object
Under, forbid sending the target information;
The processing module is used for the judgement in the case where the default interception rule includes that the predetermined keyword intercepts rule
Whether the target information includes the keyword;If the target information includes the keyword, forbid sending the target
Information.
11. terminal according to claim 8, which is characterized in that the sharing rule includes default privacy rule, described pre-
If privacy rule includes at least one default privacy keyword;
The processing module is used to execute privacy behaviour in the case where the target information includes the default privacy keyword
Make.
12. terminal according to claim 11, which is characterized in that the processing module is for executing in following privacy operations
At least one of:
The target information is encrypted, the target information after encryption is shared to the target object;It is described
Encryption includes mosaic processing, out-of-order processing, obscures at least one of processing and coded treatment;
In the case where sharing the target information to the target object, generate for prompting to recall the target information
Recall prompt information;
In the case where sharing the target information to the target object, multiple presupposed informations are shared to the target
Object.
13. terminal according to claim 12, which is characterized in that the processing module is for showing that described recall prompts letter
Breath, and/or, for prompt information is recalled described in default good friend transmission, the default good friend to have the revocation target information
Permission.
14. terminal according to claim 13, which is characterized in that the processing module is also used to detecting the target
In the case that information has been withdrawn, display is used to indicate the notification information that the target information is withdrawn.
15. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place
The computer program run on reason device is realized when the computer program is executed by the processor as appointed in claim 1 to 7
The step of information sharing method described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910324178.4A CN110035183B (en) | 2019-04-22 | 2019-04-22 | Information sharing method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910324178.4A CN110035183B (en) | 2019-04-22 | 2019-04-22 | Information sharing method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110035183A true CN110035183A (en) | 2019-07-19 |
CN110035183B CN110035183B (en) | 2021-10-12 |
Family
ID=67239711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910324178.4A Active CN110035183B (en) | 2019-04-22 | 2019-04-22 | Information sharing method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110035183B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111510557A (en) * | 2020-04-14 | 2020-08-07 | 维沃移动通信有限公司 | Content processing method and electronic equipment |
CN111752893A (en) * | 2019-10-16 | 2020-10-09 | 北京京东尚科信息技术有限公司 | Data sharing method and device, storage medium and computer system |
CN112527533A (en) * | 2020-12-24 | 2021-03-19 | 网易(杭州)网络有限公司 | Method and device for processing publication information and electronic terminal |
CN113840035A (en) * | 2021-09-28 | 2021-12-24 | 维沃移动通信(杭州)有限公司 | Information sharing method and device, electronic equipment and readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140344948A1 (en) * | 2011-12-05 | 2014-11-20 | International Business Machines Corporation | Automated Management of Private Information |
CN105630855A (en) * | 2015-04-24 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | File sharing method, file sharing system and terminal |
CN105681166A (en) * | 2016-01-27 | 2016-06-15 | 网易传媒科技(北京)有限公司 | Information sharing method and device |
CN105991670A (en) * | 2015-01-28 | 2016-10-05 | 中兴通讯股份有限公司 | Data sharing method and device and terminal |
US20170019364A1 (en) * | 2015-07-14 | 2017-01-19 | International Business Machines Corporation | Determining potential sharing of private data associated with a private network domain to improve data security |
CN106527929A (en) * | 2016-10-31 | 2017-03-22 | 宇龙计算机通信科技(深圳)有限公司 | Picture information hiding method and apparatus |
CN108846295A (en) * | 2018-07-11 | 2018-11-20 | 北京达佳互联信息技术有限公司 | Sensitive information filter method, device, computer equipment and storage medium |
CN109547330A (en) * | 2018-11-20 | 2019-03-29 | 维沃移动通信有限公司 | A kind of information sharing method and device |
-
2019
- 2019-04-22 CN CN201910324178.4A patent/CN110035183B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140344948A1 (en) * | 2011-12-05 | 2014-11-20 | International Business Machines Corporation | Automated Management of Private Information |
CN105991670A (en) * | 2015-01-28 | 2016-10-05 | 中兴通讯股份有限公司 | Data sharing method and device and terminal |
CN105630855A (en) * | 2015-04-24 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | File sharing method, file sharing system and terminal |
US20170019364A1 (en) * | 2015-07-14 | 2017-01-19 | International Business Machines Corporation | Determining potential sharing of private data associated with a private network domain to improve data security |
CN105681166A (en) * | 2016-01-27 | 2016-06-15 | 网易传媒科技(北京)有限公司 | Information sharing method and device |
CN106527929A (en) * | 2016-10-31 | 2017-03-22 | 宇龙计算机通信科技(深圳)有限公司 | Picture information hiding method and apparatus |
CN108846295A (en) * | 2018-07-11 | 2018-11-20 | 北京达佳互联信息技术有限公司 | Sensitive information filter method, device, computer equipment and storage medium |
CN109547330A (en) * | 2018-11-20 | 2019-03-29 | 维沃移动通信有限公司 | A kind of information sharing method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111752893A (en) * | 2019-10-16 | 2020-10-09 | 北京京东尚科信息技术有限公司 | Data sharing method and device, storage medium and computer system |
CN111510557A (en) * | 2020-04-14 | 2020-08-07 | 维沃移动通信有限公司 | Content processing method and electronic equipment |
CN112527533A (en) * | 2020-12-24 | 2021-03-19 | 网易(杭州)网络有限公司 | Method and device for processing publication information and electronic terminal |
CN113840035A (en) * | 2021-09-28 | 2021-12-24 | 维沃移动通信(杭州)有限公司 | Information sharing method and device, electronic equipment and readable storage medium |
CN113840035B (en) * | 2021-09-28 | 2023-03-21 | 维沃移动通信(杭州)有限公司 | Information sharing method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110035183B (en) | 2021-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107608514A (en) | Information processing method and mobile terminal | |
CN109918930A (en) | A kind of information protecting method and terminal device | |
CN110035183A (en) | Information sharing method and terminal | |
CN108491123A (en) | A kind of adjusting application program image target method and mobile terminal | |
CN109697494A (en) | A kind of graphic code display methods and terminal device | |
CN109194818A (en) | A kind of information processing method and terminal | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN108629171A (en) | A kind of unread message processing method and terminal | |
CN108280337A (en) | A kind of message protection method and mobile terminal | |
CN110188524A (en) | Information ciphering method, information decryption method and terminal | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN109753350A (en) | A kind of method for managing resource and terminal device | |
CN110336805A (en) | Network access management method and mobile terminal | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN109740312A (en) | A kind of application control method and terminal device | |
CN109815679A (en) | Right management method and mobile terminal | |
CN109446794A (en) | A kind of cipher-code input method and its mobile terminal | |
CN109522741A (en) | A kind of application program permission reminding method and its terminal device | |
CN109067979A (en) | A kind of reminding method and mobile terminal | |
CN110457921A (en) | Right management method and terminal device | |
CN109062492A (en) | A kind of application access method and terminal | |
CN109753776A (en) | A kind of method, apparatus and mobile terminal of information processing | |
CN108848240A (en) | A kind of protecting information safety method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |