CN110113246A - A method of protection session privacy - Google Patents

A method of protection session privacy Download PDF

Info

Publication number
CN110113246A
CN110113246A CN201910288880.XA CN201910288880A CN110113246A CN 110113246 A CN110113246 A CN 110113246A CN 201910288880 A CN201910288880 A CN 201910288880A CN 110113246 A CN110113246 A CN 110113246A
Authority
CN
China
Prior art keywords
user
screenshot
current sessions
shot operation
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910288880.XA
Other languages
Chinese (zh)
Other versions
CN110113246B (en
Inventor
吴培希
王飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201910288880.XA priority Critical patent/CN110113246B/en
Publication of CN110113246A publication Critical patent/CN110113246A/en
Application granted granted Critical
Publication of CN110113246B publication Critical patent/CN110113246B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/23Reliability checks, e.g. acknowledgments or fault reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application provides a kind of methods for protecting session privacy, and the method includes the first users of detection to the shot operation of current sessions;According to the friend relation of the second user in first user and current sessions, determine that first user carries out the permission of shot operation to current sessions;Respective operations are executed according to the permission that first user carries out shot operation to current sessions, and send the first prompting message to the second user.Herein described method can be reminded to when other users carry out screenshot for chat content, and carry out authorization limitation to the permission of screenshot and transmission, and user's chat privacy is protected.

Description

A method of protection session privacy
[technical field]
This application involves internet application field more particularly to a kind of methods for protecting session privacy.
[background technique]
With development in science and technology, instant communication software have become exchanged in people's daily life and work must can not Few communication tool.But being widely used with instant communication software, also bring other problems.
Since the conversation recording between user is respectively stored on local terminal, the session note of user and other side Record may be carried out on their terminal screenshotss in the unwitting situation of user by other side, forwarding operates, and these conversation recordings It may be related to the privacy of user, this privacy for resulting in user conversation to record is unable to get satisfaction.
[summary of the invention]
A kind of method that many aspects of the application provide protection session privacy is prevented for protecting user conversation privacy Conversation recording is in the unwitting situation of user by other side's screenshotss, forwarding.
The one side of the application provides a kind of method for protecting session privacy, comprising: the first user is to current sessions for detection Shot operation;According to the friend relation of the second user in first user and current sessions, first user is determined Current sessions are carried out with the permission of shot operation;It is executed according to the permission that first user carries out shot operation to current sessions Respective operations, and prompting message is sent to the second user.
The another aspect of the application provides a kind of method for protecting session privacy, comprising: the first user is to screenshot for detection Send operation;The screenshot is obtained and is stored in by the above method in the corresponding file of instant messaging application;According to The ID, Xiang Suoshu second of the ID for sending the third user for including in operation and second user associated with the screenshot User sends third prompting message;Respective operations are executed according to the instruction of the feedback of the second user.
The another aspect of the application provides a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes any above-mentioned method.
The another aspect of the application provides a kind of computer readable storage medium, is stored thereon with computer program, special Sign is that the program realizes any above-mentioned method when being executed by processor.
By the technical solution it is found that the embodiment of the present application, for protecting user conversation privacy, prevent conversation recording with By other side's screenshotss, forwarding in the unwitting situation in family.
[Detailed description of the invention]
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some realities of the application Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is a kind of flow diagram of the method for protection session privacy that the embodiment of the present application one provides;
Fig. 2 is a kind of flow diagram of the method for protection session privacy that the embodiment of the present application two provides;
Fig. 3 is the block diagram suitable for being used to realize the exemplary computer system/server of the embodiment of the present invention.
[specific embodiment]
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Whole other embodiments obtained without creative efforts, shall fall in the protection scope of this application.
In addition, the terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist Three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Separately Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Fig. 1 is the flow diagram of the method for the protection session privacy that the embodiment of the present application one provides, as shown in Figure 1, packet Include following steps:
Step S11, shot operation of the first user of detection to current sessions;
Step S12, according to the friend relation of the second user in first user and current sessions, described first is determined User carries out the permission of shot operation to current sessions;
Step S13, according to first user to the permission execution respective operations of current sessions progress shot operation, and to The second user sends prompting message.
The executing subject of method shown in Fig. 1 can be the first client of the first wireless device installation.
Wherein, the wireless device includes but is not limited to that any one can carry out human-computer interaction with user and can be realized nothing The intelligent terminal of line communication function, such as smart phone, tablet computer, laptop.
The client is that can be realized the instant communication software client of instant communication function.First wireless device The second client that first client of installation can be installed with the second wireless device carries out instant messaging.
In a kind of preferred implementation of step S11;
Preferably, the first client for being mounted on the first wireless device detects the first user and executes in current sessions window Shot operation.
Preferably, the first user logs in the first client for being mounted on the first wireless device;By session window and log in The second user for being mounted on the second client of the second wireless device conversates.
Preferably, the current sessions window can be the private chat session window of the first user and second user;It can also be with It is the group chat session window of the first user Yu multiple second users.
Preferably, the shot operation can be click of first user to " screenshot " button provided in session window.
In a kind of preferred implementation of step S12,
According to the friend relation of the second user in first user and current sessions, determine first user to working as The permission of the shot operation of preceding session;
Preferably, the property for first determining whether current sessions is that private chat or group chat are then only deposited in current sessions if private chat In the first user and a second user;If group chat, then there are the first user and multiple second users in current sessions.
In the case where current sessions are private chat, the friend relation of first user and the second user are judged;Example Such as, in the case that current sessions are interim conversation, first user and the second user may not be friend relation, because This, needs to judge whether it is friend relation.
Preferably, the first client inquired in local buddy list the second user whether with the first user preferably Friendly relationship can also inquire whether the second user is friend relation with the first user to instant communication server.
If first user and the second user are friend relation, it is determined that first user possesses to current meeting Words carry out the permission of shot operation.
If first user and the second user are non-friend relation, it is determined that first user is not to current The permission of session progress shot operation.
In the case where current sessions are group chat, the friend relation of first user and each second user are judged.
Preferably, if first user and each second user are friend relation, it is determined that first user Possess the permission that current sessions are carried out with shot operation.Preferably, if first user and any one second user are non-good Friendly relationship, it is determined that first user does not carry out the permission of shot operation to current sessions.
In a kind of preferred implementation of the present embodiment, according to the second user in first user and current sessions Friend relation, determine that first user includes: to the permission of the shot operation of current sessions
It obtains first user to attempt to carry out second user included by the session content of shot operation, judges described the One user and first user attempt to carry out the friend relation of second user included by the session content of shot operation.
This is because chat of the group chat between multiple users involved in, first user attempt to carry out shot operation The content of session may relate only to some second user, therefore, carry out shot operation without notice to the partial session content Other second users not occurred.
In a kind of preferred implementation of step S13,
Respective operations are executed according to permission of first user to the shot operation of current sessions, and are used to described second Family sends prompting message.
In a kind of preferred implementation of the present embodiment, however, it is determined that first user, which possesses, cuts current sessions The permission of graphic operation then executes the shot operation, and the screenshot of current sessions is stored in text corresponding in instant messaging application In part folder.The screenshot is associated with the ID of user included in current sessions.
Preferably, the screenshot is associated with the ID of user included by the session content of shot operation.For example, working as some Second user does not appear in the session content of shot operation, then the screenshot is without related to the ID of the second user Connection.For example, the first User ID 1 and second user ID2 and third User ID 3 carry out group chat, if first user attempts screenshot Session content in only include the first User ID 1 with second user ID2 chat content, then the screenshot saved is not necessarily to and second User ID 2 is associated.
Preferably, first client has carried out encryption to the file where the screenshot, with prevent without It crosses the client and the operation such as is directly copied, sheared.
Preferably, the first prompting message is sent to second user that first user is friend relation, described in prompt First user has carried out shot operation to current sessions.First prompting message is as follows: " the chat record quilt of you and user XX Screenshot ".
In a kind of preferred implementation of the present embodiment, however, it is determined that first user does not cut current sessions The permission of graphic operation is then refused to execute the shot operation, prompts the first user screenshot failure.
Preferably, the second prompting message is sent for the second user of non-friend relation to first user, prompts institute The first user is stated to attempt to carry out shot operation to current sessions.Second prompting message is for example: " XX user attempts you and its Chat record carry out screenshot ".
Preferably, second prompting message is also used to prompt whether the second user deletes current sessions content, with Toilet states the instruction whether second user feedback deletes current sessions content.
Preferably, the instruction for receiving the second user feedback, executes correspondence according to the instruction that the second user is fed back Operation.
If the instruction for being designated as deleting current sessions content deletes current sessions content in the first client.
Preferably, it deletes first user to attempt to carry out session content included by shot operation, in other sessions Appearance is not processed.This is because chat of the group chat between multiple users involved in, first user attempt to carry out screenshot behaviour The content of the session of work may relate only to some second user, therefore, according to the reply of the second user, only described in deletion First user attempts to carry out the content of the session of shot operation, and is not processed to the content of session other parts.
If not receiving the instruction of the second user feedback, retain current sessions content in the first client.
Through this embodiment, only allow the session content progress screenshot of user couple and good friend, and user attempt to it is non- The session content of good friend carries out reminding corresponding non-good friend user when screenshot, if corresponding non-good friend user thinks the hidden of oneself Private receives infringement, can delete corresponding session content.Achieve the purpose that ensure user conversation privacy.
Fig. 2 is the flow diagram of the method for the protection session privacy that the embodiment of the present application two provides, as shown in Fig. 2, packet Include following steps:
Step S21, the first user of detection operates the transmission of screenshot;
Step S22, according to the ID for sending the third user for including in operation and associated with the screenshot the The ID of two users, Xiang Suoshu second user send third prompting message;
Step S23, respective operations are executed according to the instruction of second user feedback.
The executing subject of method shown in Fig. 2 can be the first client of the first wireless device installation.
Wherein, the wireless device includes but is not limited to that any one can carry out human-computer interaction with user and can be realized nothing The intelligent terminal of line communication function, such as smart phone, tablet computer, laptop.
The client is that can be realized the client of instant communication function.First visitor of the first wireless device installation The second client that family end can be installed with the second wireless device carries out instant messaging.
In a kind of preferred implementation of step S21;
Preferably, the first client for being mounted on the first wireless device detects the first user and operates to the transmission of screenshot.
Preferably, the screenshot is that the corresponding text of instant messaging application is obtained and be stored in by one the method for embodiment In part folder.
Preferably, the screenshot is associated with the ID of user included in current sessions.
Preferably, the screenshot is associated with the ID of user included by the session content of shot operation.For example, working as some Second user does not appear in the session content of shot operation, then the screenshot is without related to the ID of the second user Connection.
Preferably, the file where the screenshot has carried out encryption, direct without the client to prevent The operation such as copied, sheared.
Preferably, the first user selection is stored in the first wireless device and is answered with instant messaging by the first client, selection With the screenshot in corresponding file, selected screenshot is sent to third user.
In a kind of preferred implementation of step S22,
The third User ID for including in operation and second user ID associated with the screenshot are sent according to described, to The second user sends third prompting message, and prompting first user to attempt will include the session content screenshot of second user It is sent to third user.The third prompting message is as follows: " the chat record screenshot of you and the first user XX will be by the first users XX is sent to third user XX ".
Preferably, the hair that the third prompting message is also used to that the second user is prompted whether to agree to first user Operation is sent, so that whether second user feedback agrees to the instruction of the transmission operation of first user.
Preferably, the third prompting message is also used to prompt whether the second user deletes the screenshot and/or institute The corresponding session content of screenshot is stated, so that whether second user feedback deletes the screenshot and/or the screenshot is corresponding The instruction of session content.
In a kind of preferred implementation of step S23,
First client receives the instruction of the second user feedback, according to the execution pair of the feedback of the second user It should operate.
Preferably, if the instruction for being designated as the second user and agreeing to the transmission operation of first user of feedback, The transmission operation is executed, the session content screenshot comprising second user is sent to third user.
Preferably, if the instruction for being designated as the second user and disagreeing the transmission operation of first user of feedback, Then refuse to execute the transmission operation, the first user screenshot is prompted to send failure.
Preferably, if the second user that is designated as of feedback deletes the screenshot and/or the corresponding session of the screenshot The screenshot and/or the corresponding session content of the screenshot are then deleted in the instruction of content in the first client.
Preferably, if not receiving the second user deletes the screenshot and/or the corresponding session content of the screenshot Instruction, then retain the screenshot and/or the corresponding session content of the screenshot in the first client.
In a kind of preferred implementation of the application,
Third prompting message described in step S22 is only used for prompting whether the second user agrees to first user's Operation is sent, so that whether second user feedback agrees to the instruction of the transmission operation of first user.
If the transmission operation for being designated as the second user and disagreeing first user of second user feedback Instruction, then the first terminal refusal executes the transmission operation, while prompting the first user screenshot to send failure, to The second user sends the 4th prompting message, for prompting whether the second user deletes the screenshot and/or described section Corresponding session content is schemed, so that whether second user feedback deletes the screenshot and/or the corresponding session of the screenshot The instruction of content.
Preferably, if the second user that is designated as of feedback deletes the screenshot and/or the corresponding session of the screenshot The screenshot and/or the corresponding session content of the screenshot are then deleted in the instruction of content in the first client.
Preferably, if not receiving the second user deletes the screenshot and/or the corresponding session content of the screenshot Instruction, then retain the screenshot and/or the corresponding session content of the screenshot in the first client.
Through this embodiment, only allow user that can just forward after the agreement for obtaining the corresponding other users of screenshot to cut Figure can be objective where the user of screenshot to be forwarded if the corresponding other users of screenshot think that the privacy of oneself receives infringement Corresponding screenshot and/or session content are deleted on the end of family.Achieve the purpose that ensure user conversation privacy.
Fig. 3 shows the frame for being suitable for the exemplary computer system/server 012 for being used to realize embodiment of the present invention Figure.The computer system/server 012 that Fig. 3 is shown is only an example, should not function and use to the embodiment of the present invention Range band carrys out any restrictions.
As shown in figure 3, computer system/server 012 is showed in the form of universal computing device.Computer system/clothes The component of business device 012 can include but is not limited to: one or more processor or processing unit 016, system storage 028, connect the bus 018 of different system components (including system storage 028 and processing unit 016).
Bus 018 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 012 typically comprises a variety of computer system readable media.These media, which can be, appoints The usable medium what can be accessed by computer system/server 012, including volatile and non-volatile media, movably With immovable medium.
System storage 028 may include the computer system readable media of form of volatile memory, such as deposit at random Access to memory (RAM) 030 and/or cache memory 032.Computer system/server 012 may further include other Removable/nonremovable, volatile/non-volatile computer system storage medium.Only as an example, storage system 034 can For reading and writing immovable, non-volatile magnetic media (Fig. 3 do not show, commonly referred to as " hard disk drive ").Although in Fig. 3 It is not shown, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and to can The CD drive of mobile anonvolatile optical disk (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these situations Under, each driver can be connected by one or more data media interfaces with bus 018.Memory 028 may include At least one program product, the program product have one group of (for example, at least one) program module, these program modules are configured To execute the function of various embodiments of the present invention.
Program/utility 040 with one group of (at least one) program module 042, can store in such as memory In 028, such program module 042 includes --- but being not limited to --- operating system, one or more application program, other It may include the realization of network environment in program module and program data, each of these examples or certain combination.Journey Sequence module 042 usually executes function and/or method in embodiment described in the invention.
Computer system/server 012 can also with one or more external equipments 014 (such as keyboard, sensing equipment, Display 024 etc.) communication, in the present invention, computer system/server 012 is communicated with outside radar equipment, can also be with One or more enable a user to the equipment interacted with the computer system/server 012 communication, and/or with make the meter Any equipment (such as network interface card, the modulation that calculation machine systems/servers 012 can be communicated with one or more of the other calculating equipment Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 022.Also, computer system/clothes Being engaged in device 012 can also be by network adapter 020 and one or more network (such as local area network (LAN), wide area network (WAN) And/or public network, such as internet) communication.As shown in figure 3, network adapter 020 by bus 018 and computer system/ Other modules of server 012 communicate.It should be understood that computer system/server 012 can be combined although being not shown in Fig. 3 Using other hardware and/or software module, including but not limited to: microcode, device driver, redundant processing unit, external magnetic Dish driving array, RAID system, tape drive and data backup storage system etc..
The program that processing unit 016 is stored in system storage 028 by operation, thereby executing described in the invention Function and/or method in embodiment.
Above-mentioned computer program can be set in computer storage medium, i.e., the computer storage medium is encoded with Computer program, the program by one or more computers when being executed, so that one or more computers execute in the present invention State method flow shown in embodiment and/or device operation.
With time, the development of technology, medium meaning is more and more extensive, and the route of transmission of computer program is no longer limited by Tangible medium, can also be directly from network downloading etc..It can be using any combination of one or more computer-readable media. Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer-readable storage medium Matter for example may be-but not limited to-system, device or the device of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or Any above combination of person.The more specific example (non exhaustive list) of computer readable storage medium includes: with one Or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium other than computer readable storage medium, which can send, propagate or Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or Wide area network (WAN) is connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service Quotient is connected by internet).
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (15)

1. a kind of method for protecting session privacy characterized by comprising
The first user is detected to the shot operation of current sessions;
According to the friend relation of the second user in first user and current sessions, determine first user to current meeting Words carry out the permission of shot operation;
Respective operations are executed according to the permission that first user carries out shot operation to current sessions, and to the second user Send prompting message.
2. the method according to claim 1, wherein the according in first user and current sessions The friend relation of two users, the permission for determining that first user carries out shot operation to current sessions include:
If first user and the second user are friend relation, it is determined that first user possess to current sessions into The permission of row shot operation;If first user and the second user are non-friend relation, it is determined that first user Current sessions are not carried out with the permission of shot operation.
3. the method according to claim 1, wherein the according in first user and current sessions The friend relation of two users, the permission for determining that first user carries out shot operation to current sessions include:
It obtains first user to attempt to carry out second user included by the session content of shot operation, judges that described first uses Family and first user attempt to carry out the friend relation of second user included by the session content of shot operation;
If friend relation, it is determined that first user possesses the permission that current sessions are carried out with shot operation;If non-good Friendly relationship, it is determined that first user does not carry out the permission of shot operation to current sessions.
4. according to the method in claim 2 or 3, which is characterized in that it is described according to first user to current sessions The permission of shot operation executes respective operations
If it is determined that first user possesses the permission that current sessions are carried out with shot operation, then the shot operation is executed, it will The screenshot of current sessions is stored in the corresponding file of instant messaging application;
If it is determined that first user does not carry out current sessions the permission of shot operation, then refuse to execute the screenshot behaviour Make, prompts the first user screenshot failure.
5. according to the method described in claim 4, it is characterized in that, including: to second user transmission prompting message
The first prompting message is sent to second user that first user is friend relation, prompts first user to working as Preceding session has carried out shot operation.
6. according to the method described in claim 4, it is characterized in that, including: to second user transmission prompting message
The second prompting message is sent for the second user of non-friend relation to first user, prompts the first user examination Figure carries out shot operation to current sessions.
7. according to the method described in claim 6, it is characterized in that, second prompting message is also used to prompt described second to use Whether family deletes current sessions content, so that whether second user feedback deletes the instruction of current sessions content.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The instruction for receiving the second user feedback executes respective operations according to the instruction of second user feedback.
9. a kind of method for protecting session privacy characterized by comprising
The first user is detected to operate the transmission of screenshot;The screenshot is obtained simultaneously by any the method for claim 1-8 It is stored in the corresponding file of instant messaging application;
According to it is described send operation in include third user I D and second user associated with the screenshot I D, Third prompting message is sent to the second user;
Respective operations are executed according to the instruction of the feedback of the second user.
10. according to the method described in claim 9, it is characterized in that, the third prompting message, for prompting described second to use Whether family agrees to the transmission operation of first user, so that whether second user feedback agrees to the hair of first user Send the instruction of operation.
11. according to the method described in claim 10, it is characterized in that, the third prompting message is also used to prompt described second Whether user deletes the screenshot and/or the corresponding session content of the screenshot, so that whether second user feedback deletes The instruction of the screenshot and/or the corresponding session content of the screenshot.
12. according to the method described in claim 10, it is characterized in that, the instruction of the feedback according to the second user is held Row respective operations include:
If the instruction for being designated as the second user and agreeing to the transmission operation of first user of feedback, executes the transmission Operation, is sent to third user for the session content screenshot comprising second user;
If the instruction for being designated as the second user and disagreeing the transmission operation of first user of feedback, refuses to execute institute Transmission operation is stated, the first user screenshot is prompted to send failure.
13. according to the method for claim 12, which is characterized in that the method also includes:
While prompting the first user screenshot to send failure, Xiang Suoshu second user sends the 4th prompting message, for mentioning Show whether the second user deletes the screenshot and/or the corresponding session content of the screenshot, so that the second user is anti- Whether feedback deletes the instruction of the screenshot and/or the corresponding session content of the screenshot.
14. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-13.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The method as described in any in claim 1-13 is realized when execution.
CN201910288880.XA 2019-04-11 2019-04-11 Method for protecting conversation privacy Active CN110113246B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910288880.XA CN110113246B (en) 2019-04-11 2019-04-11 Method for protecting conversation privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910288880.XA CN110113246B (en) 2019-04-11 2019-04-11 Method for protecting conversation privacy

Publications (2)

Publication Number Publication Date
CN110113246A true CN110113246A (en) 2019-08-09
CN110113246B CN110113246B (en) 2022-06-28

Family

ID=67485394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910288880.XA Active CN110113246B (en) 2019-04-11 2019-04-11 Method for protecting conversation privacy

Country Status (1)

Country Link
CN (1) CN110113246B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535755A (en) * 2019-08-30 2019-12-03 上海掌门科技有限公司 A kind of method and apparatus for deleting conversation message
CN110750162A (en) * 2019-09-17 2020-02-04 上海掌门科技有限公司 Input method and equipment
CN113285870A (en) * 2021-06-09 2021-08-20 成都安恒信息技术有限公司 Method and system for protecting internet chat privacy

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102520926A (en) * 2011-11-18 2012-06-27 深圳中兴网信科技有限公司 Screen-cutting method of screen content and device thereof
US20130239021A1 (en) * 2004-01-22 2013-09-12 International Business Machines Corporation Receiving and presenting detailed activity information regarding current and recent instant messaging sessions of remote users
CN104579847A (en) * 2015-01-22 2015-04-29 网易(杭州)网络有限公司 Monitoring method and device for communication information
CN105471956A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 User safety control method of social network, social application tool and terminal
CN106503584A (en) * 2016-10-26 2017-03-15 腾讯科技(深圳)有限公司 A kind of session content methods of exhibiting and system
CN108762847A (en) * 2018-05-30 2018-11-06 上海连尚网络科技有限公司 Method for handling information
CN108777655A (en) * 2018-05-14 2018-11-09 深圳市口袋网络科技有限公司 A kind of instant communication method and its device, equipment, storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130239021A1 (en) * 2004-01-22 2013-09-12 International Business Machines Corporation Receiving and presenting detailed activity information regarding current and recent instant messaging sessions of remote users
CN102520926A (en) * 2011-11-18 2012-06-27 深圳中兴网信科技有限公司 Screen-cutting method of screen content and device thereof
CN105471956A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 User safety control method of social network, social application tool and terminal
CN104579847A (en) * 2015-01-22 2015-04-29 网易(杭州)网络有限公司 Monitoring method and device for communication information
CN106503584A (en) * 2016-10-26 2017-03-15 腾讯科技(深圳)有限公司 A kind of session content methods of exhibiting and system
CN108777655A (en) * 2018-05-14 2018-11-09 深圳市口袋网络科技有限公司 A kind of instant communication method and its device, equipment, storage medium
CN108762847A (en) * 2018-05-30 2018-11-06 上海连尚网络科技有限公司 Method for handling information

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535755A (en) * 2019-08-30 2019-12-03 上海掌门科技有限公司 A kind of method and apparatus for deleting conversation message
CN110535755B (en) * 2019-08-30 2021-10-22 上海掌门科技有限公司 Method and equipment for deleting session message
CN110750162A (en) * 2019-09-17 2020-02-04 上海掌门科技有限公司 Input method and equipment
CN110750162B (en) * 2019-09-17 2024-04-05 上海掌门科技有限公司 Input method and device
CN113285870A (en) * 2021-06-09 2021-08-20 成都安恒信息技术有限公司 Method and system for protecting internet chat privacy

Also Published As

Publication number Publication date
CN110113246B (en) 2022-06-28

Similar Documents

Publication Publication Date Title
US8528050B2 (en) Instant messagings
US20190109835A1 (en) User authentication using unique hidden identifiers
US8930479B2 (en) Processing cellular telephone subscription for E-mail threads
CN110113252A (en) A kind of processing method, equipment and the computer storage medium of small routine notification message
US20080109741A1 (en) User-generated content with instant-messaging functionality
US20180069906A1 (en) Method and system for private communication with multiple parties
US20200301648A1 (en) Method of operating a shared object in a video call
CN110113246A (en) A method of protection session privacy
CN109491567A (en) A kind of message back method, apparatus, terminal and storage medium
CN103503019A (en) Document based on contextual communication
CN101243381A (en) User interface for conducting chats over a network
CN109947408B (en) Message pushing method and device, storage medium and electronic equipment
US20220368656A1 (en) Information interaction method and apparatus, and non-transitory computer-readable storage medium
CN109891828A (en) Context painting canvas for collaboration workspace environment
US11870742B2 (en) Information exchange method and apparatus, device, and medium
CN111147348B (en) Instant message sending method, device and readable medium
CN110083467A (en) Processing method, equipment and the computer storage medium of small routine message
CN107733781B (en) Instant messaging processing method, equipment and computer storage medium
WO2020177731A1 (en) Real-time communication method between hosted applications
CN107888478A (en) Voice messaging retransmission method, equipment and storage medium during instant messaging
US9948581B2 (en) Allow hidden and silent observers in a group conversation
US20230013744A1 (en) Connection of network members
CN106055226A (en) Method and device for information replying
US8996613B2 (en) Automated activity creation in a mobile device business application
CN110113443A (en) Social persona management method, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant