CN110113246A - A method of protection session privacy - Google Patents
A method of protection session privacy Download PDFInfo
- Publication number
- CN110113246A CN110113246A CN201910288880.XA CN201910288880A CN110113246A CN 110113246 A CN110113246 A CN 110113246A CN 201910288880 A CN201910288880 A CN 201910288880A CN 110113246 A CN110113246 A CN 110113246A
- Authority
- CN
- China
- Prior art keywords
- user
- screenshot
- current sessions
- shot operation
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04842—Selection of displayed objects or displayed text elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This application provides a kind of methods for protecting session privacy, and the method includes the first users of detection to the shot operation of current sessions;According to the friend relation of the second user in first user and current sessions, determine that first user carries out the permission of shot operation to current sessions;Respective operations are executed according to the permission that first user carries out shot operation to current sessions, and send the first prompting message to the second user.Herein described method can be reminded to when other users carry out screenshot for chat content, and carry out authorization limitation to the permission of screenshot and transmission, and user's chat privacy is protected.
Description
[technical field]
This application involves internet application field more particularly to a kind of methods for protecting session privacy.
[background technique]
With development in science and technology, instant communication software have become exchanged in people's daily life and work must can not
Few communication tool.But being widely used with instant communication software, also bring other problems.
Since the conversation recording between user is respectively stored on local terminal, the session note of user and other side
Record may be carried out on their terminal screenshotss in the unwitting situation of user by other side, forwarding operates, and these conversation recordings
It may be related to the privacy of user, this privacy for resulting in user conversation to record is unable to get satisfaction.
[summary of the invention]
A kind of method that many aspects of the application provide protection session privacy is prevented for protecting user conversation privacy
Conversation recording is in the unwitting situation of user by other side's screenshotss, forwarding.
The one side of the application provides a kind of method for protecting session privacy, comprising: the first user is to current sessions for detection
Shot operation;According to the friend relation of the second user in first user and current sessions, first user is determined
Current sessions are carried out with the permission of shot operation;It is executed according to the permission that first user carries out shot operation to current sessions
Respective operations, and prompting message is sent to the second user.
The another aspect of the application provides a kind of method for protecting session privacy, comprising: the first user is to screenshot for detection
Send operation;The screenshot is obtained and is stored in by the above method in the corresponding file of instant messaging application;According to
The ID, Xiang Suoshu second of the ID for sending the third user for including in operation and second user associated with the screenshot
User sends third prompting message;Respective operations are executed according to the instruction of the feedback of the second user.
The another aspect of the application provides a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes any above-mentioned method.
The another aspect of the application provides a kind of computer readable storage medium, is stored thereon with computer program, special
Sign is that the program realizes any above-mentioned method when being executed by processor.
By the technical solution it is found that the embodiment of the present application, for protecting user conversation privacy, prevent conversation recording with
By other side's screenshotss, forwarding in the unwitting situation in family.
[Detailed description of the invention]
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some realities of the application
Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these
Figure obtains other attached drawings.
Fig. 1 is a kind of flow diagram of the method for protection session privacy that the embodiment of the present application one provides;
Fig. 2 is a kind of flow diagram of the method for protection session privacy that the embodiment of the present application two provides;
Fig. 3 is the block diagram suitable for being used to realize the exemplary computer system/server of the embodiment of the present invention.
[specific embodiment]
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Whole other embodiments obtained without creative efforts, shall fall in the protection scope of this application.
In addition, the terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist
Three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Separately
Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Fig. 1 is the flow diagram of the method for the protection session privacy that the embodiment of the present application one provides, as shown in Figure 1, packet
Include following steps:
Step S11, shot operation of the first user of detection to current sessions;
Step S12, according to the friend relation of the second user in first user and current sessions, described first is determined
User carries out the permission of shot operation to current sessions;
Step S13, according to first user to the permission execution respective operations of current sessions progress shot operation, and to
The second user sends prompting message.
The executing subject of method shown in Fig. 1 can be the first client of the first wireless device installation.
Wherein, the wireless device includes but is not limited to that any one can carry out human-computer interaction with user and can be realized nothing
The intelligent terminal of line communication function, such as smart phone, tablet computer, laptop.
The client is that can be realized the instant communication software client of instant communication function.First wireless device
The second client that first client of installation can be installed with the second wireless device carries out instant messaging.
In a kind of preferred implementation of step S11;
Preferably, the first client for being mounted on the first wireless device detects the first user and executes in current sessions window
Shot operation.
Preferably, the first user logs in the first client for being mounted on the first wireless device;By session window and log in
The second user for being mounted on the second client of the second wireless device conversates.
Preferably, the current sessions window can be the private chat session window of the first user and second user;It can also be with
It is the group chat session window of the first user Yu multiple second users.
Preferably, the shot operation can be click of first user to " screenshot " button provided in session window.
In a kind of preferred implementation of step S12,
According to the friend relation of the second user in first user and current sessions, determine first user to working as
The permission of the shot operation of preceding session;
Preferably, the property for first determining whether current sessions is that private chat or group chat are then only deposited in current sessions if private chat
In the first user and a second user;If group chat, then there are the first user and multiple second users in current sessions.
In the case where current sessions are private chat, the friend relation of first user and the second user are judged;Example
Such as, in the case that current sessions are interim conversation, first user and the second user may not be friend relation, because
This, needs to judge whether it is friend relation.
Preferably, the first client inquired in local buddy list the second user whether with the first user preferably
Friendly relationship can also inquire whether the second user is friend relation with the first user to instant communication server.
If first user and the second user are friend relation, it is determined that first user possesses to current meeting
Words carry out the permission of shot operation.
If first user and the second user are non-friend relation, it is determined that first user is not to current
The permission of session progress shot operation.
In the case where current sessions are group chat, the friend relation of first user and each second user are judged.
Preferably, if first user and each second user are friend relation, it is determined that first user
Possess the permission that current sessions are carried out with shot operation.Preferably, if first user and any one second user are non-good
Friendly relationship, it is determined that first user does not carry out the permission of shot operation to current sessions.
In a kind of preferred implementation of the present embodiment, according to the second user in first user and current sessions
Friend relation, determine that first user includes: to the permission of the shot operation of current sessions
It obtains first user to attempt to carry out second user included by the session content of shot operation, judges described the
One user and first user attempt to carry out the friend relation of second user included by the session content of shot operation.
This is because chat of the group chat between multiple users involved in, first user attempt to carry out shot operation
The content of session may relate only to some second user, therefore, carry out shot operation without notice to the partial session content
Other second users not occurred.
In a kind of preferred implementation of step S13,
Respective operations are executed according to permission of first user to the shot operation of current sessions, and are used to described second
Family sends prompting message.
In a kind of preferred implementation of the present embodiment, however, it is determined that first user, which possesses, cuts current sessions
The permission of graphic operation then executes the shot operation, and the screenshot of current sessions is stored in text corresponding in instant messaging application
In part folder.The screenshot is associated with the ID of user included in current sessions.
Preferably, the screenshot is associated with the ID of user included by the session content of shot operation.For example, working as some
Second user does not appear in the session content of shot operation, then the screenshot is without related to the ID of the second user
Connection.For example, the first User ID 1 and second user ID2 and third User ID 3 carry out group chat, if first user attempts screenshot
Session content in only include the first User ID 1 with second user ID2 chat content, then the screenshot saved is not necessarily to and second
User ID 2 is associated.
Preferably, first client has carried out encryption to the file where the screenshot, with prevent without
It crosses the client and the operation such as is directly copied, sheared.
Preferably, the first prompting message is sent to second user that first user is friend relation, described in prompt
First user has carried out shot operation to current sessions.First prompting message is as follows: " the chat record quilt of you and user XX
Screenshot ".
In a kind of preferred implementation of the present embodiment, however, it is determined that first user does not cut current sessions
The permission of graphic operation is then refused to execute the shot operation, prompts the first user screenshot failure.
Preferably, the second prompting message is sent for the second user of non-friend relation to first user, prompts institute
The first user is stated to attempt to carry out shot operation to current sessions.Second prompting message is for example: " XX user attempts you and its
Chat record carry out screenshot ".
Preferably, second prompting message is also used to prompt whether the second user deletes current sessions content, with
Toilet states the instruction whether second user feedback deletes current sessions content.
Preferably, the instruction for receiving the second user feedback, executes correspondence according to the instruction that the second user is fed back
Operation.
If the instruction for being designated as deleting current sessions content deletes current sessions content in the first client.
Preferably, it deletes first user to attempt to carry out session content included by shot operation, in other sessions
Appearance is not processed.This is because chat of the group chat between multiple users involved in, first user attempt to carry out screenshot behaviour
The content of the session of work may relate only to some second user, therefore, according to the reply of the second user, only described in deletion
First user attempts to carry out the content of the session of shot operation, and is not processed to the content of session other parts.
If not receiving the instruction of the second user feedback, retain current sessions content in the first client.
Through this embodiment, only allow the session content progress screenshot of user couple and good friend, and user attempt to it is non-
The session content of good friend carries out reminding corresponding non-good friend user when screenshot, if corresponding non-good friend user thinks the hidden of oneself
Private receives infringement, can delete corresponding session content.Achieve the purpose that ensure user conversation privacy.
Fig. 2 is the flow diagram of the method for the protection session privacy that the embodiment of the present application two provides, as shown in Fig. 2, packet
Include following steps:
Step S21, the first user of detection operates the transmission of screenshot;
Step S22, according to the ID for sending the third user for including in operation and associated with the screenshot the
The ID of two users, Xiang Suoshu second user send third prompting message;
Step S23, respective operations are executed according to the instruction of second user feedback.
The executing subject of method shown in Fig. 2 can be the first client of the first wireless device installation.
Wherein, the wireless device includes but is not limited to that any one can carry out human-computer interaction with user and can be realized nothing
The intelligent terminal of line communication function, such as smart phone, tablet computer, laptop.
The client is that can be realized the client of instant communication function.First visitor of the first wireless device installation
The second client that family end can be installed with the second wireless device carries out instant messaging.
In a kind of preferred implementation of step S21;
Preferably, the first client for being mounted on the first wireless device detects the first user and operates to the transmission of screenshot.
Preferably, the screenshot is that the corresponding text of instant messaging application is obtained and be stored in by one the method for embodiment
In part folder.
Preferably, the screenshot is associated with the ID of user included in current sessions.
Preferably, the screenshot is associated with the ID of user included by the session content of shot operation.For example, working as some
Second user does not appear in the session content of shot operation, then the screenshot is without related to the ID of the second user
Connection.
Preferably, the file where the screenshot has carried out encryption, direct without the client to prevent
The operation such as copied, sheared.
Preferably, the first user selection is stored in the first wireless device and is answered with instant messaging by the first client, selection
With the screenshot in corresponding file, selected screenshot is sent to third user.
In a kind of preferred implementation of step S22,
The third User ID for including in operation and second user ID associated with the screenshot are sent according to described, to
The second user sends third prompting message, and prompting first user to attempt will include the session content screenshot of second user
It is sent to third user.The third prompting message is as follows: " the chat record screenshot of you and the first user XX will be by the first users
XX is sent to third user XX ".
Preferably, the hair that the third prompting message is also used to that the second user is prompted whether to agree to first user
Operation is sent, so that whether second user feedback agrees to the instruction of the transmission operation of first user.
Preferably, the third prompting message is also used to prompt whether the second user deletes the screenshot and/or institute
The corresponding session content of screenshot is stated, so that whether second user feedback deletes the screenshot and/or the screenshot is corresponding
The instruction of session content.
In a kind of preferred implementation of step S23,
First client receives the instruction of the second user feedback, according to the execution pair of the feedback of the second user
It should operate.
Preferably, if the instruction for being designated as the second user and agreeing to the transmission operation of first user of feedback,
The transmission operation is executed, the session content screenshot comprising second user is sent to third user.
Preferably, if the instruction for being designated as the second user and disagreeing the transmission operation of first user of feedback,
Then refuse to execute the transmission operation, the first user screenshot is prompted to send failure.
Preferably, if the second user that is designated as of feedback deletes the screenshot and/or the corresponding session of the screenshot
The screenshot and/or the corresponding session content of the screenshot are then deleted in the instruction of content in the first client.
Preferably, if not receiving the second user deletes the screenshot and/or the corresponding session content of the screenshot
Instruction, then retain the screenshot and/or the corresponding session content of the screenshot in the first client.
In a kind of preferred implementation of the application,
Third prompting message described in step S22 is only used for prompting whether the second user agrees to first user's
Operation is sent, so that whether second user feedback agrees to the instruction of the transmission operation of first user.
If the transmission operation for being designated as the second user and disagreeing first user of second user feedback
Instruction, then the first terminal refusal executes the transmission operation, while prompting the first user screenshot to send failure, to
The second user sends the 4th prompting message, for prompting whether the second user deletes the screenshot and/or described section
Corresponding session content is schemed, so that whether second user feedback deletes the screenshot and/or the corresponding session of the screenshot
The instruction of content.
Preferably, if the second user that is designated as of feedback deletes the screenshot and/or the corresponding session of the screenshot
The screenshot and/or the corresponding session content of the screenshot are then deleted in the instruction of content in the first client.
Preferably, if not receiving the second user deletes the screenshot and/or the corresponding session content of the screenshot
Instruction, then retain the screenshot and/or the corresponding session content of the screenshot in the first client.
Through this embodiment, only allow user that can just forward after the agreement for obtaining the corresponding other users of screenshot to cut
Figure can be objective where the user of screenshot to be forwarded if the corresponding other users of screenshot think that the privacy of oneself receives infringement
Corresponding screenshot and/or session content are deleted on the end of family.Achieve the purpose that ensure user conversation privacy.
Fig. 3 shows the frame for being suitable for the exemplary computer system/server 012 for being used to realize embodiment of the present invention
Figure.The computer system/server 012 that Fig. 3 is shown is only an example, should not function and use to the embodiment of the present invention
Range band carrys out any restrictions.
As shown in figure 3, computer system/server 012 is showed in the form of universal computing device.Computer system/clothes
The component of business device 012 can include but is not limited to: one or more processor or processing unit 016, system storage
028, connect the bus 018 of different system components (including system storage 028 and processing unit 016).
Bus 018 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 012 typically comprises a variety of computer system readable media.These media, which can be, appoints
The usable medium what can be accessed by computer system/server 012, including volatile and non-volatile media, movably
With immovable medium.
System storage 028 may include the computer system readable media of form of volatile memory, such as deposit at random
Access to memory (RAM) 030 and/or cache memory 032.Computer system/server 012 may further include other
Removable/nonremovable, volatile/non-volatile computer system storage medium.Only as an example, storage system 034 can
For reading and writing immovable, non-volatile magnetic media (Fig. 3 do not show, commonly referred to as " hard disk drive ").Although in Fig. 3
It is not shown, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and to can
The CD drive of mobile anonvolatile optical disk (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these situations
Under, each driver can be connected by one or more data media interfaces with bus 018.Memory 028 may include
At least one program product, the program product have one group of (for example, at least one) program module, these program modules are configured
To execute the function of various embodiments of the present invention.
Program/utility 040 with one group of (at least one) program module 042, can store in such as memory
In 028, such program module 042 includes --- but being not limited to --- operating system, one or more application program, other
It may include the realization of network environment in program module and program data, each of these examples or certain combination.Journey
Sequence module 042 usually executes function and/or method in embodiment described in the invention.
Computer system/server 012 can also with one or more external equipments 014 (such as keyboard, sensing equipment,
Display 024 etc.) communication, in the present invention, computer system/server 012 is communicated with outside radar equipment, can also be with
One or more enable a user to the equipment interacted with the computer system/server 012 communication, and/or with make the meter
Any equipment (such as network interface card, the modulation that calculation machine systems/servers 012 can be communicated with one or more of the other calculating equipment
Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 022.Also, computer system/clothes
Being engaged in device 012 can also be by network adapter 020 and one or more network (such as local area network (LAN), wide area network (WAN)
And/or public network, such as internet) communication.As shown in figure 3, network adapter 020 by bus 018 and computer system/
Other modules of server 012 communicate.It should be understood that computer system/server 012 can be combined although being not shown in Fig. 3
Using other hardware and/or software module, including but not limited to: microcode, device driver, redundant processing unit, external magnetic
Dish driving array, RAID system, tape drive and data backup storage system etc..
The program that processing unit 016 is stored in system storage 028 by operation, thereby executing described in the invention
Function and/or method in embodiment.
Above-mentioned computer program can be set in computer storage medium, i.e., the computer storage medium is encoded with
Computer program, the program by one or more computers when being executed, so that one or more computers execute in the present invention
State method flow shown in embodiment and/or device operation.
With time, the development of technology, medium meaning is more and more extensive, and the route of transmission of computer program is no longer limited by
Tangible medium, can also be directly from network downloading etc..It can be using any combination of one or more computer-readable media.
Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer-readable storage medium
Matter for example may be-but not limited to-system, device or the device of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or
Any above combination of person.The more specific example (non exhaustive list) of computer readable storage medium includes: with one
Or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM),
Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light
Memory device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium can
With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
Person is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but
It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be
Any computer-readable medium other than computer readable storage medium, which can send, propagate or
Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or
Wide area network (WAN) is connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service
Quotient is connected by internet).
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although
The application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (15)
1. a kind of method for protecting session privacy characterized by comprising
The first user is detected to the shot operation of current sessions;
According to the friend relation of the second user in first user and current sessions, determine first user to current meeting
Words carry out the permission of shot operation;
Respective operations are executed according to the permission that first user carries out shot operation to current sessions, and to the second user
Send prompting message.
2. the method according to claim 1, wherein the according in first user and current sessions
The friend relation of two users, the permission for determining that first user carries out shot operation to current sessions include:
If first user and the second user are friend relation, it is determined that first user possess to current sessions into
The permission of row shot operation;If first user and the second user are non-friend relation, it is determined that first user
Current sessions are not carried out with the permission of shot operation.
3. the method according to claim 1, wherein the according in first user and current sessions
The friend relation of two users, the permission for determining that first user carries out shot operation to current sessions include:
It obtains first user to attempt to carry out second user included by the session content of shot operation, judges that described first uses
Family and first user attempt to carry out the friend relation of second user included by the session content of shot operation;
If friend relation, it is determined that first user possesses the permission that current sessions are carried out with shot operation;If non-good
Friendly relationship, it is determined that first user does not carry out the permission of shot operation to current sessions.
4. according to the method in claim 2 or 3, which is characterized in that it is described according to first user to current sessions
The permission of shot operation executes respective operations
If it is determined that first user possesses the permission that current sessions are carried out with shot operation, then the shot operation is executed, it will
The screenshot of current sessions is stored in the corresponding file of instant messaging application;
If it is determined that first user does not carry out current sessions the permission of shot operation, then refuse to execute the screenshot behaviour
Make, prompts the first user screenshot failure.
5. according to the method described in claim 4, it is characterized in that, including: to second user transmission prompting message
The first prompting message is sent to second user that first user is friend relation, prompts first user to working as
Preceding session has carried out shot operation.
6. according to the method described in claim 4, it is characterized in that, including: to second user transmission prompting message
The second prompting message is sent for the second user of non-friend relation to first user, prompts the first user examination
Figure carries out shot operation to current sessions.
7. according to the method described in claim 6, it is characterized in that, second prompting message is also used to prompt described second to use
Whether family deletes current sessions content, so that whether second user feedback deletes the instruction of current sessions content.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The instruction for receiving the second user feedback executes respective operations according to the instruction of second user feedback.
9. a kind of method for protecting session privacy characterized by comprising
The first user is detected to operate the transmission of screenshot;The screenshot is obtained simultaneously by any the method for claim 1-8
It is stored in the corresponding file of instant messaging application;
According to it is described send operation in include third user I D and second user associated with the screenshot I D,
Third prompting message is sent to the second user;
Respective operations are executed according to the instruction of the feedback of the second user.
10. according to the method described in claim 9, it is characterized in that, the third prompting message, for prompting described second to use
Whether family agrees to the transmission operation of first user, so that whether second user feedback agrees to the hair of first user
Send the instruction of operation.
11. according to the method described in claim 10, it is characterized in that, the third prompting message is also used to prompt described second
Whether user deletes the screenshot and/or the corresponding session content of the screenshot, so that whether second user feedback deletes
The instruction of the screenshot and/or the corresponding session content of the screenshot.
12. according to the method described in claim 10, it is characterized in that, the instruction of the feedback according to the second user is held
Row respective operations include:
If the instruction for being designated as the second user and agreeing to the transmission operation of first user of feedback, executes the transmission
Operation, is sent to third user for the session content screenshot comprising second user;
If the instruction for being designated as the second user and disagreeing the transmission operation of first user of feedback, refuses to execute institute
Transmission operation is stated, the first user screenshot is prompted to send failure.
13. according to the method for claim 12, which is characterized in that the method also includes:
While prompting the first user screenshot to send failure, Xiang Suoshu second user sends the 4th prompting message, for mentioning
Show whether the second user deletes the screenshot and/or the corresponding session content of the screenshot, so that the second user is anti-
Whether feedback deletes the instruction of the screenshot and/or the corresponding session content of the screenshot.
14. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now method as described in any in claim 1-13.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The method as described in any in claim 1-13 is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910288880.XA CN110113246B (en) | 2019-04-11 | 2019-04-11 | Method for protecting conversation privacy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910288880.XA CN110113246B (en) | 2019-04-11 | 2019-04-11 | Method for protecting conversation privacy |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110113246A true CN110113246A (en) | 2019-08-09 |
CN110113246B CN110113246B (en) | 2022-06-28 |
Family
ID=67485394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910288880.XA Active CN110113246B (en) | 2019-04-11 | 2019-04-11 | Method for protecting conversation privacy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113246B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110535755A (en) * | 2019-08-30 | 2019-12-03 | 上海掌门科技有限公司 | A kind of method and apparatus for deleting conversation message |
CN110750162A (en) * | 2019-09-17 | 2020-02-04 | 上海掌门科技有限公司 | Input method and equipment |
CN113285870A (en) * | 2021-06-09 | 2021-08-20 | 成都安恒信息技术有限公司 | Method and system for protecting internet chat privacy |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102520926A (en) * | 2011-11-18 | 2012-06-27 | 深圳中兴网信科技有限公司 | Screen-cutting method of screen content and device thereof |
US20130239021A1 (en) * | 2004-01-22 | 2013-09-12 | International Business Machines Corporation | Receiving and presenting detailed activity information regarding current and recent instant messaging sessions of remote users |
CN104579847A (en) * | 2015-01-22 | 2015-04-29 | 网易(杭州)网络有限公司 | Monitoring method and device for communication information |
CN105471956A (en) * | 2014-09-11 | 2016-04-06 | 中兴通讯股份有限公司 | User safety control method of social network, social application tool and terminal |
CN106503584A (en) * | 2016-10-26 | 2017-03-15 | 腾讯科技(深圳)有限公司 | A kind of session content methods of exhibiting and system |
CN108762847A (en) * | 2018-05-30 | 2018-11-06 | 上海连尚网络科技有限公司 | Method for handling information |
CN108777655A (en) * | 2018-05-14 | 2018-11-09 | 深圳市口袋网络科技有限公司 | A kind of instant communication method and its device, equipment, storage medium |
-
2019
- 2019-04-11 CN CN201910288880.XA patent/CN110113246B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130239021A1 (en) * | 2004-01-22 | 2013-09-12 | International Business Machines Corporation | Receiving and presenting detailed activity information regarding current and recent instant messaging sessions of remote users |
CN102520926A (en) * | 2011-11-18 | 2012-06-27 | 深圳中兴网信科技有限公司 | Screen-cutting method of screen content and device thereof |
CN105471956A (en) * | 2014-09-11 | 2016-04-06 | 中兴通讯股份有限公司 | User safety control method of social network, social application tool and terminal |
CN104579847A (en) * | 2015-01-22 | 2015-04-29 | 网易(杭州)网络有限公司 | Monitoring method and device for communication information |
CN106503584A (en) * | 2016-10-26 | 2017-03-15 | 腾讯科技(深圳)有限公司 | A kind of session content methods of exhibiting and system |
CN108777655A (en) * | 2018-05-14 | 2018-11-09 | 深圳市口袋网络科技有限公司 | A kind of instant communication method and its device, equipment, storage medium |
CN108762847A (en) * | 2018-05-30 | 2018-11-06 | 上海连尚网络科技有限公司 | Method for handling information |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110535755A (en) * | 2019-08-30 | 2019-12-03 | 上海掌门科技有限公司 | A kind of method and apparatus for deleting conversation message |
CN110535755B (en) * | 2019-08-30 | 2021-10-22 | 上海掌门科技有限公司 | Method and equipment for deleting session message |
CN110750162A (en) * | 2019-09-17 | 2020-02-04 | 上海掌门科技有限公司 | Input method and equipment |
CN110750162B (en) * | 2019-09-17 | 2024-04-05 | 上海掌门科技有限公司 | Input method and device |
CN113285870A (en) * | 2021-06-09 | 2021-08-20 | 成都安恒信息技术有限公司 | Method and system for protecting internet chat privacy |
Also Published As
Publication number | Publication date |
---|---|
CN110113246B (en) | 2022-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8528050B2 (en) | Instant messagings | |
US20190109835A1 (en) | User authentication using unique hidden identifiers | |
US8930479B2 (en) | Processing cellular telephone subscription for E-mail threads | |
CN110113252A (en) | A kind of processing method, equipment and the computer storage medium of small routine notification message | |
US20080109741A1 (en) | User-generated content with instant-messaging functionality | |
US20180069906A1 (en) | Method and system for private communication with multiple parties | |
US20200301648A1 (en) | Method of operating a shared object in a video call | |
CN110113246A (en) | A method of protection session privacy | |
CN109491567A (en) | A kind of message back method, apparatus, terminal and storage medium | |
CN103503019A (en) | Document based on contextual communication | |
CN101243381A (en) | User interface for conducting chats over a network | |
CN109947408B (en) | Message pushing method and device, storage medium and electronic equipment | |
US20220368656A1 (en) | Information interaction method and apparatus, and non-transitory computer-readable storage medium | |
CN109891828A (en) | Context painting canvas for collaboration workspace environment | |
US11870742B2 (en) | Information exchange method and apparatus, device, and medium | |
CN111147348B (en) | Instant message sending method, device and readable medium | |
CN110083467A (en) | Processing method, equipment and the computer storage medium of small routine message | |
CN107733781B (en) | Instant messaging processing method, equipment and computer storage medium | |
WO2020177731A1 (en) | Real-time communication method between hosted applications | |
CN107888478A (en) | Voice messaging retransmission method, equipment and storage medium during instant messaging | |
US9948581B2 (en) | Allow hidden and silent observers in a group conversation | |
US20230013744A1 (en) | Connection of network members | |
CN106055226A (en) | Method and device for information replying | |
US8996613B2 (en) | Automated activity creation in a mobile device business application | |
CN110113443A (en) | Social persona management method, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |