CN113079492A - Information sharing method and device - Google Patents
Information sharing method and device Download PDFInfo
- Publication number
- CN113079492A CN113079492A CN202110300192.8A CN202110300192A CN113079492A CN 113079492 A CN113079492 A CN 113079492A CN 202110300192 A CN202110300192 A CN 202110300192A CN 113079492 A CN113079492 A CN 113079492A
- Authority
- CN
- China
- Prior art keywords
- information
- equipment
- message
- decryption algorithm
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012546 transfer Methods 0.000 claims abstract description 21
- 230000004044 response Effects 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 12
- 238000003860 storage Methods 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a method and a device for sharing information.A first device receives first information sent by a second device; the first information comprises a device identification of the at least one device; if the first device determines that the device identifier of at least one device comprises the device identifier of the first device, acquiring a second decryption algorithm; the first equipment receives second information sent by the second equipment; the second information is generated after the second equipment encrypts the transfer content; and the first equipment decrypts the second information according to the second decryption algorithm to obtain the transfer content. In this way, only some devices designated by the user can view the second information, thereby protecting the personal privacy of the sender of the message.
Description
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to an information sharing method and device.
Background
As wearable devices are widely applied to various scenes, the wearable devices are increasingly unable to keep away from the lives of people. When the user is in the environment of limited carrying or not carrying the terminal, insufficient terminal electric quantity, terminal communication failure and the like, the Bluetooth broadcast mode can be sent out through the wearable device, and then any device supporting receiving the Bluetooth broadcast in the environment receives the Bluetooth broadcast sent by the wearable device, so that the message content can be checked. Taking a rescue scene as an example, the current wearable device sends user personalized information such as user location information and heartbeat information … … in a broadcast manner, so that personal information of a wearable device holder is leaked to a great extent, and a potential safety hazard exists.
Disclosure of Invention
The application provides an information sharing method and device, which are used for solving the problem that leakage of user personalized information is easily caused when wearable equipment sends information.
In a first aspect, an embodiment of the present application provides an information sharing method, where the method includes: the method comprises the steps that first information sent by second equipment is received by first equipment; the first information comprises a device identification of at least one device; if the first device determines that the device identifier of the at least one device comprises the device identifier of the first device, acquiring a second decryption algorithm; the first equipment receives second information sent by the second equipment; the second information is generated after the second device encrypts the transfer content; and the first equipment decrypts the second information according to the second decryption algorithm to obtain the transfer content.
Based on the scheme, the function of the wearable device is upgraded, and the message is divided into two messages to be sent when the wearable device sends the message (the wearable device after the function upgrade is the second device, or may be called as the sending device), where the first message is the device identifiers of some devices specified by the user, and the second message is generated by encrypting the content that the user needs to deliver, so that when the receiving device (i.e. the first device) receives the first message, the receiving device can obtain the second decryption algorithm to decrypt the second message received by the receiving device to obtain the delivered content only when the device identifiers of the receiving device (i.e. the first device) and the device identifiers of some devices specified by the sending device are matched, and this way can realize that the delivered content is viewed only by some devices specified by the user, thereby protecting the personal privacy of the sender of the message. In the method, for the wearable device with the upgraded function, when the first information does not include the device identifier of the wearable device, the second information is not processed; for the wearable device with the function not upgraded, the second decryption algorithm is not available, so that the transferred content cannot be viewed, and the purpose that only some devices specified by the user can view the second information is achieved.
In a possible implementation method, before the first device receives the first information sent by the second device, the method further includes: the first equipment receives indication information sent by the second equipment; the indication information is used for indicating a response mode of the first device to the second device.
Based on the scheme, in different scenes (such as a scene needing to dial 119, or a scene needing to dial 110; such as a scene that a user in the bed wishes to spread out a voice message delivered by the user, or such as a scene that the user in the bed only wishes to be listened by a holder of a receiving device appointed by the user currently for the voice message delivered by the user), when the user sends the message to the receiving device through the sending device, different trigger modes can be applied to the sending device, wherein each trigger mode corresponds to indication information, and the indication information is used for indicating that a device appointed by the user and capable of responding to the user at a later stage can respond to the user according to a preset response mode. By the method, the scene of message sharing can be enriched.
In a possible implementation method, the first information is generated by the second device after encrypting a device identifier of the at least one device; the first device, before determining that the device identity of the at least one device includes the device identity of the first device, further includes: the first equipment determines a first decryption algorithm corresponding to the indication information according to the response mode; and the first equipment decrypts the first information according to the first decryption algorithm to obtain the equipment identifier of the at least one equipment.
Based on the scheme, when the sending device sends the first information, the sending device can also encrypt the device identifier of the device which is specified by the user and can see the delivered content, so that when the receiving device receives the indication information, if the indication information can be interpreted, that is, the receiving device can know which response mode the indication information corresponds to, the receiving device can obtain the first decryption algorithm which can be used for decrypting the first information, and some old devices in the environment can be filtered through the method. Specifically, in the iterative upgrade process of the device, some old devices do not support the function of interpreting the indication information, so that the old devices cannot know what meaning the indication information expresses after receiving the indication information, and the upgrade device can support the function of interpreting the indication information, so that the upgrade device can acquire the first decryption algorithm corresponding to the indication information after receiving the indication information, thereby operating subsequent first information and second information.
In one possible implementation, the first device sends the indication information, the first information, and the second information to a third device.
Based on the scheme, when the receiving equipment cannot respond to the sending equipment in time, the receiving equipment can respond to the sending equipment through the same message sending mode and the receiving equipment trusted by the receiving equipment is authorized, so that the response mode to the sending equipment is enriched.
In one possible implementation, the delivery content is user input information or user personalized information collected by the second device.
Based on the scheme, in the scene of information sharing, the user can transmit the content which the user wants to transmit outwards in various ways, for example, the user can actively input the content, for example, the user can use the expression forms of voice input, keyboard input, video input and the like, for example, the user can also actively transmit personalized information which is stored in the local part of the device by the device through the mode of device import, for example, the device can actively transmit outwards after the user permission.
In one possible implementation, the first information and the second information are respectively encapsulated in a broadcast message and transmitted.
Based on the scheme, when the sending device sends the first information and the second information to the receiving device, the sending device sends the first information and the second information by respectively encapsulating the first information and the second information in the broadcast message, and the mode can realize that some upgrading devices which do not specify the device for the user do not need to decrypt the second information.
In one possible implementation, the device identification is a MAC address of the device.
Based on the scheme, the MAC address of the device can be used for identifying the device, so that the device can be distinguished accurately, and the MAC address of the device is used as the device identification, so that the device can be specified accurately.
In a second aspect, an embodiment of the present application provides an apparatus for information sharing, where the apparatus includes means for performing the method according to any one of the first aspect.
In a third aspect, an embodiment of the present application provides an information sharing apparatus, including:
a memory for storing a computer program;
a processor for calling a computer program stored in said memory and executing the method according to any of the first aspect according to the obtained program.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program for causing a computer to execute the method according to any one of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic diagram of a possible system architecture provided by an embodiment of the present application;
fig. 2 is a method for information sharing according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Currently, for some scenes in which messages sent by terminals are limited, any device supporting receiving bluetooth broadcast in the environment can receive the bluetooth broadcast sent by the wearable device in a manner of sending the bluetooth broadcast by using the wearable device, and then the message content can be viewed. However, in this method, since a trusted relationship between the transmitting device and the receiving device is not established, leakage of personal information of the holder of the transmitting device is likely to occur.
In view of the foregoing technical problem, an embodiment of the present application provides a possible system architecture, as shown in fig. 1, the system architecture includes a second device 110 and a first device 120, where the second device 110 is a message sending device, and the first device 120 is a message receiving device, where products of the second device 110 and the first device 120 may be the same or different, and the present application is not limited specifically. Further, the second device 110 is a relative concept to the first device 120, namely: the second device 110 is a device for sending a message to the first device 120, and meanwhile, the second device 110 may also be a device for receiving a message sent by another sending device; similarly, the first device 120 is a device for receiving a message sent by the second device 110, and meanwhile, the first device 120 may also be a device for sending a received message sent from the second device 110 to another receiving device.
It should be noted that, after receiving the message, the first device 120 determines whether or not to transmit the received message to another receiving device according to the actual situation of the holder of the first device 120, and includes: the holder of the first device 120 may choose to forward the received message to other receiving devices following the manner in which the received message was sent; of course, the holder of the first device 120 may also choose not to forward the message, but to process the message by itself, which is not specifically limited in this application.
In view of the above technical problem and the system architecture shown in fig. 1, an embodiment of the present application provides an information sharing method, as shown in fig. 2, the method includes the following steps:
In this step, the first device is a message receiving device, the second device is a message sending device, and in a process that the second device sends a message to the first device, the second device may send first information to the first device, where the first information includes a device identifier of at least one device.
Wherein the understanding of the at least one device can be illustrated by the following examples: for example, in a scenario where a message is not suitable for being disclosed in its entirety, such as a disease rescue scenario, the holder of the message sending device only wants some devices in the environment to receive rescue information sent out by the holder of the message sending device, so as to want the designated devices to respond to the message, and does not want all devices in the environment to receive rescue information sent out by the holder of the message sending device, because the rescue information may include sensitive information such as heart rate, blood pressure, etc. of the holder of the message sending device, so the holder of the message sending device may only want some people in the environment to see the sensitive information, and thus, by designating some devices, it is helpful to ensure the personal privacy of the holder of the message sending device. As such, at least one device in the embodiments of the present application may be understood as a device that the second device determines may be responsive to the second device based on the user indication. When the second device detects that there are many devices in the environment, for example, a display list of the second device includes device identifiers of a large number of devices, then, when the holder of the second device determines to make the holder of one or several devices in the environment respond to the second device by making a selection, the user instruction may be to specify the device by means of voice input of the device identifier, or to specify the device by means of clicking the device identifier, or to specify the device by means of manual input of the device identifier, which is not specifically limited in the present application.
In some implementations of the present application, the first device may be a wearable device, such as a smart band, a smart watch, or the like, or may be a smart terminal, such as a mobile phone; the second device can be wearable equipment, for example be intelligent bracelet, smart watch etc. or can be intelligent terminal, for example for the cell-phone.
In some implementations of the present application, the device identification may be a MAC address of the device.
Since the MAC address of the device can be used to identify the device, and thus, the device can be accurately distinguished from the device, and therefore, the MAC address of the device is used as the device identifier, which is helpful for the user to accurately specify the device.
In this step, when the first device receives the first information, the first device matches the device identifier of itself (i.e., the first device) with the device identifier of the at least one device included in the first information, and if the first device determines that the device identifier of the at least one device includes the device identifier of itself (i.e., the first device) after the matching, the first device may obtain the second decryption algorithm.
By the method, the second decryption algorithm can be acquired only by some specified devices, and the second decryption algorithm cannot be acquired by unspecified devices.
In this step, for a scenario in which the second device sends a message to the first device, after the second device sends the first information to the first device, the second device may continue to send second information to the first device, where the second information is generated after the second device encrypts the transfer content.
In this way, by encrypting the transfer content, all devices in the environment cannot immediately check the message that the holder of the message sending device wants to transfer to the outside, thereby promoting the protection of the personal privacy of the holder of the message sending device.
It should be understood that, in the embodiment of the present application, the order in which the first device executes step 203, step 201, and step 202 is not limited. For example, the first device may perform step 203, step 201, and step 202 in a sequential order, or may perform step 201, step 203, and step 202, which is not limited in this application.
And step 204, the first device decrypts the second information according to the second decryption algorithm to obtain the transfer content.
In this step, the first device may decrypt the second information received by itself (i.e., the first device) according to the obtained second decryption algorithm, and then the first device may finally obtain the content that the holder of the second device wants to deliver, i.e., the delivery content.
The description is as follows: in the process of the iterative upgrade of the equipment, the upgraded equipment is distinguished from the old equipment. Among them, one important difference in function between the upgrading device and the old device is that: the upgrade device locally stores a second decryption algorithm that decrypts the second information, while the old device locally stores no second decryption algorithm that decrypts the second information. Thus, when the upgrading device is designated as a device that can respond by the holder of the message sending device, that is, the upgrading device is within range of at least one device, the upgrading device can acquire the second decryption algorithm from the local storage to decrypt the second information, and further view the transfer content of the message sending device; however, when the old device is designated as a device that can respond by the holder of the message sending device, the old device cannot acquire the second decryption algorithm because the second decryption algorithm for decrypting the second information is not locally stored, so that the old device cannot decrypt the second information, and further cannot view the content transferred by the message sending device. Therefore, by the method, the old devices in the environment can be effectively filtered, namely even if the old devices are in the range of at least one device, in other words, even if the old devices are the specified devices of the holders of the message sending devices, the old devices cannot acquire the transfer contents of the message sending devices, and therefore the protection of the personal privacy of the holders of the message sending devices is improved.
Based on the scheme, the function of the wearable device is upgraded, and the message is divided into two messages to be sent when the wearable device sends the message (the wearable device after the function upgrade is the second device, or may be called as the sending device), where the first message is the device identifiers of some devices specified by the user, and the second message is generated by encrypting the content that the user needs to deliver, so that when the receiving device (i.e. the first device) receives the first message, the receiving device can obtain the second decryption algorithm to decrypt the second message received by the receiving device to obtain the delivered content only when the device identifiers of the receiving device (i.e. the first device) and the device identifiers of some devices specified by the sending device are matched, and this way can realize that the delivered content is viewed only by some devices specified by the user, thereby protecting the personal privacy of the sender of the message. In the method, for the wearable device with the upgraded function, when the first information does not include the device identifier of the wearable device, the second information is not processed; for the wearable device with the function not upgraded, the second decryption algorithm is not available, so that the transferred content cannot be viewed, and the purpose that only some devices specified by the user can view the second information is achieved.
In some implementations of the present application, before the first device receives the first information sent by the second device, the method further includes: the first equipment receives indication information sent by the second equipment; the indication information is used for indicating a response mode of the first device to the second device.
For example, when a user sends a message to the outside through the second device, the user may send out the corresponding message based on different scenarios. If the holder of the second device is ill, he wants to make the designated device dial 120 when seeing the ill message, and if the holder of the second device encounters a fire, he wants to make the designated device dial 119 when seeing the fire rescue message, and if the holder of the second device is a sleeping platform assigned by the police, he wants to make the designated device know the content of the message detected by him when detecting the message in the sleeping platform, and other scenes are not illustrated one by one. Obviously, in the above-listed scenario, the holder of the second device may apply different triggering operations to the second device, and then the second device converts the triggering operation made by the user into corresponding indication information according to the mapping relationship between the preset triggering manner and the indication information, and then when the second device sends the indication information to the first device, and after the first device obtains the transfer content, the first device may know what response behavior the holder of the second device needs to make.
For example, for a scene in which 120 needs to be dialed in case of a disease, the holder of the second device may use a key triggering mode on the second device, and if the key "1" is pressed, the second device may convert the key behavior of the holder on the key "1" into an indication information, and if the indication information is converted into an indication information "001", the indication information received by the subsequent first device is "001", and the first device also clearly indicates that the response mode corresponding to "001" is the dialing 120.
For another example, for a scene where a fire needs to dial 119, the holder of the second device may trigger the second device by pressing a key, for example, pressing the key "2", the second device may convert the key behavior of the holder on the key "2" into an indication information, for example, into an indication information of "002", the indication information received by the subsequent first device is "002", and the first device also clearly indicates that the response mode corresponding to "002" is to dial 119.
For another example, for a scene of message delivery from the bottom of the bed, the holder of the second device may perform a key triggering on the second device, for example, if the key "3" is pressed, the second device may convert the key behavior of the key "3" by the holder into an indication information, for example, an indication information "003", the indication information received by the subsequent first device is "003", and the first device also knows that the corresponding response manner of "003" is that the corresponding response operation is performed on the holder of the second device later according to the understanding of the content of the message delivery.
It is noted that the triggering manner is not limited in the embodiments of the present application, and for example, the triggering manner may be key triggering, drag triggering, gesture triggering, or the like; in addition, the user may set the indication information corresponding to various scenes only in a single trigger mode (e.g., only key trigger, or only drag trigger, or only gesture trigger), or the user may set the indication information corresponding to various scenes in combination with multiple trigger modes (e.g., combination of key trigger and drag trigger, or combination of key trigger, drag trigger, and gesture trigger), which is not specifically limited in this application; in addition, the embodiment of the present application does not limit the expression of the indication information.
In some implementations of the present application, the delivery is user input information or user personalization information collected by the second device.
As in the case of the scenario of dialing 120 for the foregoing ailments, the user may not be required to actively input personal information at this time, but may instead implement the action in a preset manner. If the second device detects that the user presses the key "1", the second device can know that the user personalized information stored locally by the user (i.e. the second device) needs to be acquired by the second device according to a preset programming mechanism and then sent out after being encrypted as the transmission content.
The description is as follows: in the embodiment of the application, the user personalized information may be information such as position information, various index information of the body, and environment detection information of the user. As for the above scenario that the patient needs to dial 120, the personalized information of the user collected by the second device may include the location information of the user, because generally speaking, after receiving the rescue information, the 120 emergency center may find the object sending the rescue information according to the location information of the patient to rescue the patient.
As another example, in the scenario of the message transmission by the bedding, when the bedding faces a message that needs to be transmitted, the message can be transmitted in various manners, such as by voice input, keyboard input, video input, and the like, so that when the second device receives the transmission content input by the user, the transmission content can be encrypted and transmitted to the outside.
In some implementations of the present application, the first information and the second information are each encapsulated in a broadcast message for transmission.
For example, when the second device sends the first information and the second information to the first device, the second device sends the first information and the second information by respectively encapsulating the first information and the second information in a broadcast message, which can realize that some upgrading devices which do not specify devices for users do not need to decrypt the second information.
In some implementations of the present application, the first information is generated by the second device after encrypting a device identifier of the at least one device; the first device, before determining that the device identity of the at least one device includes the device identity of the first device, further includes: the first equipment determines a first decryption algorithm corresponding to the indication information according to the response mode; and the first equipment decrypts the first information according to the first decryption algorithm to obtain the equipment identifier of the at least one equipment.
For example, when the second device sends a message to the first device, the first information in the message includes a device identifier of at least one device; further, for the purpose of privacy protection of the device identifier of the at least one device, the second device may further encrypt the device identifier of the at least one device, and when encrypting the device identifier of the at least one device, the second device encrypts the device identifier of the at least one device according to a response manner, where different response manners correspond to different encryption algorithms. Therefore, the indication information sent by the second device to the first device may also be used to indicate a decryption algorithm for decrypting the encrypted device identifier of at least one device, that is, the indication information is used to indicate what decryption algorithm is specifically used for decrypting the first information. Therefore, when the first device receives the indication information, the first device decrypts the first information by matching the first decryption algorithm corresponding to the indication information, and obtains the device identifier of the at least one device.
The description is as follows: in the process of the iterative upgrade of the equipment, the upgraded equipment is distinguished from the old equipment. Among them, an important difference in function between the upgrading device and the old device is that: the upgrading device locally stores a first decryption algorithm for decrypting the first information, and the old device locally stores no first decryption algorithm for decrypting the first information. Therefore, when the upgrading equipment receives the indication information sent by the message sending equipment, the upgrading equipment can decrypt the first information by matching the first decryption algorithm corresponding to the indication information, so as to obtain the equipment identifier of at least one piece of equipment, and then the upgrading equipment can match the equipment identifier of the upgrading equipment with the equipment identifier of at least one piece of equipment and make a judgment on whether the equipment identifier of the upgrading equipment is in accordance with the equipment identifier of the at least one piece of equipment; when the old device receives the indication information sent by the message sending device, the old device cannot analyze what the indication information shows because the old device does not locally store the mapping relationship between the indication information and the first decryption algorithm, so that the old device cannot acquire the decryption algorithm for decrypting the first information according to the indication information, the purpose of preventing the old device in the environment from checking the contents transmitted by the holder of the second device is achieved, the possibility that the transmitted contents are checked by a plurality of devices is reduced, and the personal privacy protection of the holder of the message sending device is promoted.
In some implementations of the present application, the first device sends the indication information, the first information, and the second information to a third device.
For example, when the first device is an upgrade device, after receiving the indication information sent by the second device, after locally searching for the first decryption algorithm corresponding to the indication information, the first device decrypts the first information by using the first decryption algorithm, and determines the device identifier of the first device included in the device identifiers of the at least one device, so that the first device can locally obtain the second decryption algorithm for decrypting the second information, and decrypt the second information, thereby obtaining the delivered content. After the first device obtains the transfer content, the first device may perform the following three processing modes on the transfer content, including:
mode 1: and directly responding to the second device according to the transfer content. If the content transmitted by the second device is that the second device needs to be dialed 120, the holder of the first device can dial 120 to rescue the holder of the second device.
Mode 2: the delivered content is ignored, i.e. no response is made to the second device in case the transmitted message of the second device is not received. If the content transmitted by the second device is to dial 120 for the second device, the holder of the first device chooses not to dial 120.
Mode 3: the transfer is not responded to directly, but is forwarded out. If the second device sends a transfer that requires dialing 120 for the second device, and the holder of the first device cannot dial 120 for the holder of the second device for some personal reasons when receiving the transfer, then the first device may respond to the second device by forwarding the transfer to some devices of its own choosing in hopes of some devices that may be trusted by itself.
The above three modes enrich the mode of responding to the second device.
Based on the same concept, the embodiment of the present application provides an information sharing device, which includes a module for executing any method of the foregoing embodiments.
The embodiment of the present application provides an information sharing apparatus, which may specifically be a desktop computer, a portable computer, a smart phone, a tablet computer, a Personal Digital Assistant (PDA), and the like. The information sharing apparatus may include a Central Processing Unit (CPU), a memory, an input/output device, and the like, the input device may include a keyboard, a mouse, a touch screen, and the like, and the output device may include a Display device, such as a Liquid Crystal Display (LCD), a Cathode Ray Tube (CRT), and the like.
Memory, which may include Read Only Memory (ROM) and Random Access Memory (RAM), provides the processor with program instructions and data stored in the memory. In embodiments of the present application, the memory may be used to store program instructions for a method of information sharing;
and the processor is used for calling the program instructions stored in the memory and executing the information sharing method according to the obtained program.
The embodiment of the application provides a computer-readable storage medium, which stores computer-executable instructions for enabling a computer to execute an information sharing method.
It will be apparent to those skilled in the art that embodiments of the present application may be provided as a method, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (10)
1. A method of information sharing, comprising:
the method comprises the steps that first information sent by second equipment is received by first equipment; the first information comprises a device identification of at least one device;
if the first device determines that the device identifier of the at least one device comprises the device identifier of the first device, acquiring a second decryption algorithm;
the first equipment receives second information sent by the second equipment; the second information is generated after the second device encrypts the transfer content;
and the first equipment decrypts the second information according to the second decryption algorithm to obtain the transfer content.
2. The method of claim 1,
before the first device receives the first information sent by the second device, the method further includes:
the first equipment receives indication information sent by the second equipment; the indication information is used for indicating a response mode of the first device to the second device.
3. The method of claim 2, wherein the first information is generated by the second device after encrypting a device identification of the at least one device;
the first device, before determining that the device identity of the at least one device includes the device identity of the first device, further includes:
the first equipment determines a first decryption algorithm corresponding to the indication information according to the response mode;
and the first equipment decrypts the first information according to the first decryption algorithm to obtain the equipment identifier of the at least one equipment.
4. The method of claim 2 or 3, further comprising:
and the first equipment sends the indication information, the first information and the second information to third equipment.
5. The method of any of claims 1 to 3, wherein the delivered content is user input information or user personalization information collected by the second device.
6. The method of any of claims 1-3, wherein the first information and the second information are each encapsulated in a broadcast message for transmission.
7. The method of claim 6, wherein the device identification is a MAC address of the device.
8. An apparatus for information sharing, comprising: means for performing the method of any one of claims 1 to 7.
9. An apparatus for information sharing, comprising:
a memory for storing a computer program;
a processor for calling a computer program stored in said memory, for executing the method according to any one of claims 1-7 in accordance with the obtained program.
10. A computer-readable storage medium, characterized in that the storage medium stores a program which, when run on a computer, causes the computer to carry out the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110300192.8A CN113079492B (en) | 2021-03-22 | 2021-03-22 | A method and device for sharing information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110300192.8A CN113079492B (en) | 2021-03-22 | 2021-03-22 | A method and device for sharing information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113079492A true CN113079492A (en) | 2021-07-06 |
CN113079492B CN113079492B (en) | 2022-04-05 |
Family
ID=76613926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110300192.8A Active CN113079492B (en) | 2021-03-22 | 2021-03-22 | A method and device for sharing information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113079492B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001017288A1 (en) * | 1999-08-28 | 2001-03-08 | Koninklijke Philips Electronics N.V. | System and method of communicating encrypted group broadcast messages |
US7996894B1 (en) * | 2005-02-15 | 2011-08-09 | Sonicwall, Inc. | MAC address modification of otherwise locally bridged client devices to provide security |
CN104244237A (en) * | 2014-09-12 | 2014-12-24 | 宇龙计算机通信科技(深圳)有限公司 | Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set |
US20150350189A1 (en) * | 2014-05-27 | 2015-12-03 | Sk Planet Co., Ltd. | Method, system and apparatus for enhancing security of beacon device |
US20160094525A1 (en) * | 2014-09-25 | 2016-03-31 | Xiaomi Inc. | Information interaction methods and devices |
CN105517102A (en) * | 2015-11-20 | 2016-04-20 | 青岛海信移动通信技术股份有限公司 | Method, device and equipment for enabling wireless network equipment to be connected with hot spot |
US20170310679A1 (en) * | 2016-04-26 | 2017-10-26 | International Business Machines Corporation | Security determination |
CN108012270A (en) * | 2017-12-27 | 2018-05-08 | 努比亚技术有限公司 | A kind of method of information processing, equipment and computer-readable recording medium |
CN109033885A (en) * | 2017-06-09 | 2018-12-18 | 腾讯科技(深圳)有限公司 | A kind of data response method, terminal device and server |
CN109067739A (en) * | 2018-07-27 | 2018-12-21 | 平安科技(深圳)有限公司 | Encryption of communicated data method and apparatus |
CN109462693A (en) * | 2018-10-30 | 2019-03-12 | 努比亚技术有限公司 | A kind of information processing method, terminal and computer readable storage medium |
CN110912920A (en) * | 2019-12-03 | 2020-03-24 | 望海康信(北京)科技股份公司 | Data processing method, apparatus and medium |
CN111836260A (en) * | 2019-04-22 | 2020-10-27 | 中国移动通信有限公司研究院 | Authentication information processing method, terminal and network device |
-
2021
- 2021-03-22 CN CN202110300192.8A patent/CN113079492B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001017288A1 (en) * | 1999-08-28 | 2001-03-08 | Koninklijke Philips Electronics N.V. | System and method of communicating encrypted group broadcast messages |
US7996894B1 (en) * | 2005-02-15 | 2011-08-09 | Sonicwall, Inc. | MAC address modification of otherwise locally bridged client devices to provide security |
US20150350189A1 (en) * | 2014-05-27 | 2015-12-03 | Sk Planet Co., Ltd. | Method, system and apparatus for enhancing security of beacon device |
CN104244237A (en) * | 2014-09-12 | 2014-12-24 | 宇龙计算机通信科技(深圳)有限公司 | Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set |
US20160094525A1 (en) * | 2014-09-25 | 2016-03-31 | Xiaomi Inc. | Information interaction methods and devices |
CN105517102A (en) * | 2015-11-20 | 2016-04-20 | 青岛海信移动通信技术股份有限公司 | Method, device and equipment for enabling wireless network equipment to be connected with hot spot |
US20170310679A1 (en) * | 2016-04-26 | 2017-10-26 | International Business Machines Corporation | Security determination |
CN109033885A (en) * | 2017-06-09 | 2018-12-18 | 腾讯科技(深圳)有限公司 | A kind of data response method, terminal device and server |
CN108012270A (en) * | 2017-12-27 | 2018-05-08 | 努比亚技术有限公司 | A kind of method of information processing, equipment and computer-readable recording medium |
CN109067739A (en) * | 2018-07-27 | 2018-12-21 | 平安科技(深圳)有限公司 | Encryption of communicated data method and apparatus |
CN109462693A (en) * | 2018-10-30 | 2019-03-12 | 努比亚技术有限公司 | A kind of information processing method, terminal and computer readable storage medium |
CN111836260A (en) * | 2019-04-22 | 2020-10-27 | 中国移动通信有限公司研究院 | Authentication information processing method, terminal and network device |
CN110912920A (en) * | 2019-12-03 | 2020-03-24 | 望海康信(北京)科技股份公司 | Data processing method, apparatus and medium |
Also Published As
Publication number | Publication date |
---|---|
CN113079492B (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10275581B2 (en) | Method and apparatus for sharing content between electronic devices | |
JP2018519682A (en) | Secure communication with wearable devices | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
WO2015144066A1 (en) | Sensitive operation verification method, apparatus, and system | |
US10762231B2 (en) | Protecting screenshots of applications executing in a protected workspace container provided in a mobile device | |
CN103914520B (en) | Data query method, terminal device and server | |
CN106250770B (en) | Electronic device and method for encrypting content | |
KR20150062686A (en) | Spam filtering method of electronic apparatus and electronic appparatus thereof | |
KR20160099431A (en) | Apparatus and method for secure message transmission | |
KR102144509B1 (en) | Proximity communication method and apparatus | |
CN114553612B (en) | Data encryption and decryption method and device, storage medium and electronic equipment | |
CN106648583A (en) | Information processing method and terminal | |
CN114666048A (en) | Data processing method and device, electronic equipment and storage medium | |
CN107509180B (en) | Method for automatically encrypting short message, storage device and mobile terminal | |
CN106709362A (en) | File encryption method and device and file decryption method and device | |
CN113079492A (en) | Information sharing method and device | |
KR20160063793A (en) | Electronic device and method for transmitting and receiving information in the electronic device | |
WO2017185454A1 (en) | Esim card binding processing method and apparatus, and terminal | |
CN102768671B (en) | File processing method and system | |
CN106453335B (en) | Data transmission method and device | |
CN115132305A (en) | Data sharing method, data verification method and terminal equipment | |
CN116049812B (en) | Methods and electronic devices for accessing hardware resources | |
KR20210142973A (en) | Electronic device using blockchain and a method thereof | |
KR102348401B1 (en) | Did signing and validation system and method for using threshold signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |