Movatterモバイル変換


[0]ホーム

URL:


CN110730121A - User information transmission method, device and storage medium - Google Patents

User information transmission method, device and storage medium
Download PDF

Info

Publication number
CN110730121A
CN110730121ACN201911222616.2ACN201911222616ACN110730121ACN 110730121 ACN110730121 ACN 110730121ACN 201911222616 ACN201911222616 ACN 201911222616ACN 110730121 ACN110730121 ACN 110730121A
Authority
CN
China
Prior art keywords
user
sharing
application
picture
user identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911222616.2A
Other languages
Chinese (zh)
Inventor
胡晨鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co LtdfiledCriticalShanghai Zhangmen Science and Technology Co Ltd
Publication of CN110730121ApublicationCriticalpatent/CN110730121A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

The invention discloses a user information transmission method, user information transmission equipment and a storage medium, and belongs to the technical field of internet. The method comprises the following steps: the method comprises the steps that a first application receives a sharing request from a first user, and generates a sharing picture which contains a user identifier and is invisible to the user identifier according to sharing content corresponding to the sharing request and the user identifier of the first user; sharing the sharing picture to a second application and/or a second user; when the server receives a joining request from a second application and/or a second user, acquiring a corresponding sharing picture, and detecting the acquired sharing picture to obtain a user identifier of the first user. According to the invention, cross-platform information transmission not based on webpage links is realized, and meanwhile, the privacy of the user is effectively protected and the prohibition of a third-party platform is avoided; and the service operation such as data analysis and statistics based on the user identification can not be adversely affected.

Description

User information transmission method, device and storage medium
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method, an apparatus, and a storage medium for transferring user information.
Background
At present, sharing and delivering of contents among various products of the mobile internet are often required, for example, a link is shared from a tremble to a WeChat to promote a user to click, and the click quantity is increased. The webpage corresponding to the link often carries the user identifier D1 of the sharer U1, so that the server side can count the sharing behavior of the corresponding sharer U1 according to the user identifier D1, and perform data analysis, or issue business operations such as rewards according to the sharing behavior of the sharer U1. Generally, the user identification in the shared data is important associated information in internet services.
However, in the current process of sharing content and recording the sharing behavior of the sharer through a link mode, the user identifier of the sharer appears in the webpage content, and the risk of revealing the privacy information of the user exists; in addition, because of the competitive relationship between different platforms, the link sharing mode is usually forbidden.
Disclosure of Invention
The purpose of the invention is realized by the following technical scheme.
In a first aspect, the present invention provides a user information delivery method applied to a client, including:
the first application receives a sharing request from a first user;
the first application generates a sharing picture containing the user identification and invisible to the user identification according to the sharing content corresponding to the sharing request and the user identification of the first user, so that a server side can detect the user identification in the sharing picture;
and sharing the sharing picture to a second application and/or a second user.
Optionally, the generating, by the first application, a shared picture that includes the user identifier and is invisible to the user identifier according to the shared content corresponding to the sharing request and the user identifier of the first user includes:
the first application generates a content picture according to the sharing content corresponding to the sharing request;
the first application acquires a user identifier of the first user;
and the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the content picture and the user identification.
Optionally, the obtaining, by the first application, the user identifier of the first user includes: the first application searches a corresponding user identifier in a user database according to the login information of the first user;
or the first application sends a user identification obtaining request to the server according to the login information of the first user and receives the user identification returned by the server.
Optionally, the generating, by the first application, a shared picture that includes the user identifier and is invisible to the user identifier according to the content picture and the user identifier includes:
the first application transforms the content picture to obtain a first digital image;
the first application replaces preset elements in the first digital image with the user identification to obtain a second digital image;
and the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the second digital image.
Optionally, the replacing, by the first application, the preset element in the first digital image with the user identifier to obtain a second digital image, where the replacing includes:
the first application encrypts the user identification to obtain a user identification ciphertext;
the first application generates header information in a preset form according to the length of the user identification ciphertext;
and the first application closely replaces preset elements in the first digital image with the header information and the user identification ciphertext according to a preset storage proportion to obtain a second digital image.
Optionally, after the generating of the shared picture that contains the user identifier and is invisible to the user identifier, the method further includes:
and receiving a picture storage request from the first user, and storing the shared picture to the photo album of the device where the shared picture is located.
Optionally, the sharing the shared picture to a second application includes:
the first application calls a sharing program package to share the sharing picture to the second application;
or sharing the shared pictures in the photo album to the second application through the sharing function of the photo album.
Optionally, sharing the shared picture to a second user includes:
the first application calls a sharing program package to share the sharing picture to a second user;
or accessing the album in the equipment through the second application, and sharing the shared pictures in the album to the second user;
or sending the shared pictures in the album to the second user through the multimedia messages.
In a second aspect, the present invention provides a user information delivery method applied to a server, including:
a server receives a joining request from a second application and/or a second user, wherein the server is the server of the first application;
the server side obtains a corresponding sharing picture, detects the sharing picture and obtains a user identifier of a first user of the first application.
Optionally, the server obtains the corresponding shared picture, including:
the server returns submitted picture information and receives a sharing picture uploaded by a second application and/or a second user;
or the server accesses the photo album of the corresponding equipment to acquire the shared pictures in the photo album.
Optionally, the detecting the shared picture to obtain the user identifier of the first user of the first application includes:
transforming the shared picture to obtain a second digital image;
and detecting the second digital image to obtain the user identification of the first user of the first application.
Optionally, the detecting the second digital image to obtain the user identifier of the first user of the first application includes:
identifying header information in a preset form in the second digital image;
analyzing the header information to obtain the length of a user identification ciphertext;
reading data next to the header information according to the length of the user identification ciphertext and a preset storage proportion to obtain the user identification ciphertext;
and decrypting the user identification ciphertext to obtain the user identification.
In a third aspect, the present invention provides a method for transferring user information, including:
the first application receives a sharing request from a first user;
the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the sharing content corresponding to the sharing request and the user identification of the first user;
sharing the sharing picture to a second application and/or a second user;
when the server receives a joining request from a second application and/or a second user, acquiring a corresponding sharing picture, and detecting the sharing picture to obtain a user identifier of the first user.
In a fourth aspect, the present invention provides a user information delivery apparatus, including:
one or more processors, storage devices to store one or more programs;
the one or more programs, when executed by the one or more processors, implement the method of any of the first and second aspects of the invention.
In a fifth aspect, the present invention proposes a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method according to any one of the first and second aspects of the present invention.
The invention has the advantages that:
according to the invention, the sharing picture which contains the user identification and can be detected by the user identification but is invisible is generated, so that the cross-platform information transmission which is not based on the webpage link is realized by sharing the sharing picture; meanwhile, the privacy of the user is effectively protected in the process, and the possibility of the third-party platform is reduced; and the adverse effect on the service operation such as data analysis and statistics based on the user identification is reduced.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart of a user information delivery method applied to a client according to an embodiment of the present invention;
fig. 2 is a flowchart of a user information delivery method applied to a server according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method for transferring user information according to an embodiment of the present invention;
fig. 4 is a block diagram of a user information delivery system according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Example one
According to the embodiment of the present invention, a user information delivery method applied to a client is provided, as shown in fig. 1, including step 101, step 102 and step 103.
Step 101: the first application receives a sharing request from a first user.
In some embodiments, the first application includes, but is not limited to, an application including instant messaging functionality; the sharing request includes any request for sharing information, such as a sharing request for sharing information inviting friends to participate in a vote, a sharing request for sharing a photo, and so on.
According to some embodiments of the invention, before step 101, the method further comprises: the first application receives a registration request from a first user, sends the registration request to the server, receives a registration result returned by the server, and correspondingly stores the user identification contained in the registration result and the registration information contained in the registration request; the registration information includes, but is not limited to, a user name, etc.
Further, before step 101, the method further includes: the first application receives a login request from a first user, verifies whether login information in the login request is correct or not according to the stored registration information, if yes, login is successful, and otherwise, login is failed.
Step 102: the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the sharing content corresponding to the received sharing request and the user identification of the first user, so that the server side can detect the user identification in the sharing picture. The user identifier in the shared picture is almost invisible in visual effect for an ordinary user, that is, the user identifier contained in the shared picture does not affect the visual effect of the shared picture basically. The first application can add the user identifier to the shared picture in multiple modes, and the visual effect of the shared picture is not affected basically.
According to some embodiments of the invention, step 102 comprises:
step A1: the first application generates a content picture according to the sharing content corresponding to the received sharing request;
step A2: the first application acquires a user identifier of a first user;
optionally, the first application searches a corresponding user identifier in a user database according to the login information of the first user; or the first application sends a user identification obtaining request to the server according to the login information of the first user and receives a user identification returned by the server; the login information includes, but is not limited to, a user name, etc.
It should be noted that the execution order of step a1 and step a2 may be interchanged.
Step A3: and the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the generated content picture and the acquired user identification.
According to some embodiments of the invention, step a3 comprises:
step A3-1: the first application transforms the generated content picture to obtain a first digital image;
according to some embodiments of the present application, step a3-1 may comprise: the first application carries out discrete cosine change on the generated content picture to obtain a first frequency domain matrix, and the first frequency domain matrix is used as a first digital image.
As an example, the upper right portion of the first digital image may be a high frequency sequence, the lower left portion may be a low frequency sequence, and the diagonal portion from the upper left portion to the lower right portion may be a medium frequency sequence.
According to other embodiments of the present application, step a3-1 may include: and the first application carries out color decomposition on the generated content picture to obtain an integer matrix corresponding to red, green and blue one by one, and the obtained integer matrix is used as a first digital image.
Step A3-2: and the first application replaces the preset elements in the first digital image with the acquired user identification to obtain a second digital image.
In some embodiments, the preset elements in the first digital image comprise preset eligible elements. For example, if the first digital image is a frequency domain matrix, the predetermined elements include elements in the frequency domain matrix that conform to a predetermined frequency band.
According to some embodiments of the present application, step a3-2 comprises:
step A3-2-1: and the first application encrypts the acquired user identifier to obtain a user identifier ciphertext.
Specifically, the first application encrypts the obtained user identifier according to a preset encryption algorithm by using a preset key to obtain a user identifier ciphertext.
The encryption algorithm may be set according to the requirement, such as AES, RSA, and the like.
Step A3-2-2: and the first application generates the header information in a preset form according to the length of the user identification ciphertext.
The preset form can be set according to the requirement, for example, the header information is set to be 8 bytes, the first two bytes are preset characters, and the last six bytes are used for representing the length of the user identification ciphertext.
Step A3-2-3: and the first application replaces preset elements in the first digital image with the generated header information and the user identification ciphertext according to a preset storage proportion to obtain a second digital image.
The preset storage proportion can be set according to the requirement; preferably, the preset storage ratio is such that each element in the matrix stores 8 bytes of data.
In some embodiments, when the first digital image is specifically the first frequency domain matrix, the user identification ciphertext is placed behind and next to the header information, and a part of intermediate frequency elements in the first digital image is sequentially replaced according to a mode that 8 bytes correspond to one element, so that a second frequency domain matrix is obtained and serves as the second digital image.
When the first digital image is specifically an integer matrix after color decomposition, an integer matrix corresponding to a preset color (for example, an integer matrix corresponding to red) is selected, a user identification ciphertext is placed behind and next to the header information, part of elements in the selected integer matrix are sequentially replaced according to a mode that 8 bytes correspond to one element, the replaced integer matrix and other integer matrices which are not replaced are synthesized to obtain a transformation matrix, and the transformation matrix is used as a second digital image.
Particularly, when the length of the user identification ciphertext is not an integral multiple of 8 bytes, according to the sequence from left to right, filling zero with a corresponding number after the last byte of the user identification ciphertext, and performing bit padding; for example, if the user identification ciphertext has a length of 68 bytes, then 4 zeros are padded after the last byte.
Furthermore, in the invention, the first application can automatically select the position of the header information in the first digital image according to the length of the user identification ciphertext; the location of the header information may also be preset.
Step A3-4: and the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the second digital image.
Specifically, when the first digital image is a first frequency domain matrix, the first application converts the second digital image into a time domain to obtain a shared picture which contains a user identifier and is invisible to the user identifier; when the first digital image is an integer matrix after color decomposition, the first application calculates the second digital image and a preset image layer matrix and converts the second digital image and the preset image layer matrix into a sharing image which contains a user identifier and is invisible to the user identifier.
Preferably, the shared picture contains a preset picture identifier, wherein the preset picture identifier can be set according to the requirement, for example, the preset picture identifier is a character or a pattern related to the activity.
It should be noted that, because the replacement of a part of intermediate frequency elements does not substantially affect the display of the visual effect of the picture itself, when the first digital picture is a frequency domain matrix, by replacing a part of intermediate frequency elements thereof, it is achieved that the generated shared picture contains a detectable user identifier and the user identifier is invisible.
Furthermore, partial elements in the integer matrix after color decomposition are replaced, so that the color of the corresponding position in the picture corresponding to the synthesized transformation matrix is changed, and the original color is restored by operating the transformation matrix and the preset layer matrix, and the visual effect display of the picture is basically not influenced, so that the generated shared picture contains detectable user identification and the user identification is invisible.
In the application, the generated content picture is converted to obtain the digital picture in a matrix form, so that part of elements in the digital picture are replaced by the user identification on the premise of not influencing the normal display of the picture, or other transformations are carried out after part of elements in the digital picture are replaced, so that the generated picture can be normally displayed, and the generated sharing picture contains the detectable user identification and is invisible to the user identification. It should be noted that the conversion of the content pictures is not limited to the above conversion method, and all other conversion methods applied to the conversion principle of the present application should be covered within the protection scope of the present application.
Step 103: and sharing the sharing picture to the second application and/or the second user.
Wherein the second application is an application different from the first application, and in some embodiments, the second application comprises an application with a technology communication function; in some embodiments, the second user may have a social relationship with the first user, e.g., the second user is a contact of the first user in the first application, and/or the second user is a contact of the first user in the second application.
Preferably, step 103 further comprises: and the first application receives a picture storage request from the first user and stores the generated shared picture to the album of the device where the first application is located.
Preferably, the sharing the picture to the second application in step 103 includes: the first application calls a sharing program package and shares the sharing picture to the second application; or sharing the shared pictures in the photo album to the second application through the sharing function of the photo album.
More preferably, the first application calls a corresponding sharing program package of the second application according to application information (for example, an application name) of the second application submitted by the first user, and shares the shared picture to the second application; or the first user accesses the photo album of the own device, selects the shared picture in the photo album, and shares the shared picture to the second application through the sharing function of the photo album.
According to some embodiments of the present invention, sharing the shared picture to the second user may include: the first application calls a sharing program package to share the shared picture to the second user; or accessing the album in the equipment through the second application, and sharing the shared pictures in the album to the second user; or sending the stored sharing picture to the second user through the multimedia message.
More preferably, the first application calls a sharing program package of the first application or the second application according to the user information of the second user submitted by the first user, and shares the shared picture to the second user; or the first user accesses the photo album in the second application, selects the shared pictures in the photo album and shares the shared pictures to the second user; or the first user selects the shared pictures in the album and sends the shared pictures to the second user through the multimedia messages.
Therefore, in the embodiment, the user identifier is hidden in the shared picture and can be obtained through detection, so that when the shared picture is shared, not only is the privacy of the user effectively protected, but also the possibility of the blocking of a third-party platform can be reduced.
Example two
According to the embodiment of the present invention, a method for delivering user information applied to a server is provided, as shown in fig. 2, including step 201 and step 202.
Step 201: and the server receives a joining request from the second application and/or the second user, and the server is the server of the first application.
Preferably, when the user of the second application sees the shared picture in the second application, the user sends a join request to the server through the second application; or when the second user receives the sharing picture sent by the multimedia message of the first user, the two-dimension code in the sharing picture is identified or the sharing picture is clicked to carry out page skipping, and a joining request is sent to the server side.
It should be noted that the join request is a generic term of related operations, including joining certain social networks, browsing certain information, participating in certain activities, and the like.
Step 202: the server side obtains the corresponding sharing picture, and detects the obtained sharing picture to obtain the user identification of the first user of the first application.
According to some embodiments of the present invention, when the second user receives the shared picture, the method further comprises saving the shared picture to an album of the device;
correspondingly, the server side obtains the corresponding sharing picture, including: the server returns the submitted picture information and receives the sharing picture uploaded by the second application and/or the second user; or the server accesses the photo album of the corresponding equipment to acquire the shared pictures in the photo album.
Further, the server accesses the photo album of the corresponding device to obtain the shared pictures in the photo album, which specifically includes: and the server accesses the photo album of the corresponding equipment and searches the shared picture in the photo album according to the preset picture identification.
The preset picture identification can be set according to the requirement, for example, characters or patterns related to activities.
Further, when the server obtains the corresponding shared picture, specifically, when the server receives the shared picture uploaded by the second application and/or the second user, before analyzing the obtained shared picture in step 202, the method further includes: and judging whether the received sharing picture is effective or not, if so, continuing, and otherwise, returning joining failure information.
For example, whether the received picture contains a preset picture identifier is judged, if yes, the received shared picture is judged to be valid, and if not, the received shared picture is judged to be invalid.
According to some embodiments of the present invention, detecting the obtained shared picture to obtain the user identifier of the first user of the first application includes:
step B1: and transforming the acquired sharing picture to obtain a second digital image.
Generally, the transformation performed on the acquired shared picture is an inverse transformation of a transformation method adopted when the first application transforms the second digital image into the shared picture.
For example, discrete cosine change is performed on the obtained shared picture to obtain a second frequency domain matrix, and the second frequency domain matrix is used as a digital image.
Or, the obtained shared picture and a preset layer matrix are operated to obtain a transformation matrix, and the transformation matrix is used as a second digital image.
Step B2: the second digital image is detected to obtain a user identification of the first user of the first application.
According to some embodiments of the present application, step B2 includes:
step B2-1: header information in a preset form in the second digital image is identified.
When the second digital image is a second frequency domain matrix, identifying header information in a preset form in the second digital image according to preset characters; or identifying the preset form of header information in the second digital image according to the position of the preset header information.
When the second digital image is a transformation matrix, performing color decomposition on the image corresponding to the transformation matrix to obtain an integer matrix corresponding to red, green and blue one by one, selecting an integer matrix corresponding to a preset color (for example, an integer matrix corresponding to red), and identifying header information in a preset form in the selected integer matrix according to preset characters; or, according to the preset head information position, identifying the head information in the preset form in the selected integer matrix.
Step B2-2: and analyzing the identified header information to obtain the length of the user identification ciphertext.
Specifically, according to the preset form of the header information, data on the corresponding byte in the header information is read, and the length of the user identification ciphertext is obtained.
For example, the preset header information is 8 bytes, where the first two bytes are preset characters, and the last six bytes are used to indicate the length of the user identification ciphertext, and then the data in the last six bytes of the header information are read to obtain the length of the user identification ciphertext.
Step B2-3: and reading data behind the header information to obtain the user identification ciphertext according to the length of the obtained user identification ciphertext and a preset storage proportion.
The preset storage proportion can be set according to the requirement; for example, the preset scale stores 8 bytes of data for each element in the matrix.
Particularly, when the length of the user identification ciphertext obtained by analysis is not an integral multiple of 8 bytes, discarding the padding zero on the corresponding byte in the last element for storing the user identification ciphertext; for example, if the parsed user identification ciphertext has a length of 68 bytes, zeros are discarded from the last four bytes of the last element of the user identification ciphertext.
Step B2-4: and decrypting the obtained user identification ciphertext to obtain the user identification.
Specifically, according to a preset decryption algorithm, the obtained user identifier is decrypted by using a preset secret key to obtain a user identifier ciphertext.
The preset decryption algorithm can be set according to the requirement.
In this embodiment, the server can obtain the invisible user identifier in the surface of the shared picture by detecting the obtained shared picture, so that adverse effects on business operations such as data analysis and statistics based on the user identifier are not caused.
EXAMPLE III
According to an embodiment of the present invention, a method for transferring user information is provided, as shown in fig. 3, including:
step 301: the first application receives a sharing request from a first user.
For example, a first application receives a share request from a first user inviting a friend to participate in a voting activity.
Step 302: and the first application generates a sharing picture which contains the user identification and is invisible to the user identification according to the sharing content corresponding to the received sharing request and the user identification of the first user.
The implementation method of this step is the same as the implementation method of step 102 in the first embodiment, and is not described herein again.
Preferably, step 302 is followed by: and the first application receives a picture storage request from the first user and stores the generated shared picture to the album of the device where the first application is located.
Step 303: sharing the generated sharing picture to a second application and/or a second user;
for example, a first user of a first application shares a shared picture to a second application in advance, and when the first application receives application information of the second application submitted by the first user, a sharing program package of the second application is called to share the shared picture to the second application;
for another example, a first user of a first application shares a shared picture to a second user, and the second user is a contact of the first user in the first application and a contact of the first user in the second application; the sharing program package of the first application or the second application can be called through the first application, and the shared picture is analyzed to the second user; the photo album can also be accessed in the second application, and shared pictures in the photo album are shared to the second user; and the sharing picture can be sent to a second user through the multimedia message.
Step 304: when the server receives a joining request from a second application and/or a second user, acquiring a corresponding sharing picture, and detecting the acquired sharing picture to obtain a user identifier of the first user.
For example, the second user sees a shared picture shared by the first user in the second application, and sends a join request to the server through the second application; the server returns the submitted picture information, receives the sharing picture uploaded by the second application, and detects the received sharing picture to obtain the user identification of the first user.
If the second user receives the sharing picture sent by the first user through the multimedia message, the two-dimension code in the sharing picture is identified and the second user jumps to the corresponding page, so that a joining request is sent to the server; and the server accesses the photo album of the second user equipment, searches the shared picture in the photo album according to the preset active pattern, and detects the searched shared picture to obtain the user identification of the first user.
The process of detecting the shared picture to obtain the user identifier of the first user is the same as the process of detecting the shared picture obtained to obtain the user identifier of the first user in step 202 of the embodiment, and is not repeated here.
Example four
According to an embodiment of the present invention, there is provided a user information delivery system, as shown in fig. 4, including: a client and a server;
the client comprises:
the first receiving module is used for receiving a sharing request from a first user;
the generating module is used for generating a sharing picture which contains the user identifier and is invisible to the user identifier according to the sharing content corresponding to the sharing request received by the first receiving module and the user identifier of the first user, so that the server side can detect the user identifier in the sharing picture;
and the sharing module is used for sharing the sharing picture generated by the generating module to the second application and/or the second user.
The server side comprises:
a second receiving module, configured to receive a join request from a second application and/or a second user;
the acquisition module is used for acquiring the corresponding shared pictures;
and the detection module is used for detecting the shared picture acquired by the acquisition module to obtain the user identifier of the first user.
According to an embodiment of the invention, the generating module comprises: the device comprises a first generation submodule, an acquisition submodule and a second generation submodule, wherein:
the first generation submodule is used for generating a content picture according to the sharing content corresponding to the sharing request received by the second receiving module;
the obtaining submodule is used for obtaining a user identifier of a first user;
and the second generation submodule is used for generating a sharing picture which contains the user identification and is invisible to the user identification according to the content picture generated by the first generation submodule and the user identification acquired by the acquisition submodule.
According to an embodiment of the present invention, the obtaining submodule is specifically configured to: searching a corresponding user identifier in a user database according to the login information of the first user;
or, sending a request for obtaining a user identifier to the server according to the login information of the first user, and receiving the user identifier returned by the server.
According to an embodiment of the invention, the second generation submodule comprises: a conversion unit, a replacement unit and a generation unit, wherein:
the conversion unit is used for converting the content picture generated by the first generation submodule to obtain a first digital image;
the replacing unit is used for replacing the preset elements in the first digital image with the user identification acquired by the acquiring submodule to obtain a second digital image;
and the generating unit is used for generating a sharing picture which contains the user identifier acquired by the acquisition submodule and is invisible to the user identifier according to the second digital image.
According to an embodiment of the present invention, the replacement unit is specifically configured to: encrypting the user identification obtained by the obtaining sub-module to obtain a user identification ciphertext; generating header information in a preset form according to the length of the user identification ciphertext; and replacing preset elements in the first digital image by the generated header information and the user identification ciphertext in a close proximity manner according to a preset storage ratio to obtain a second digital image.
According to an embodiment of the present invention, the client further includes: a storage module;
the first receiving module is further used for receiving a picture saving request from a first user after the generating module generates the sharing picture which contains the user identifier and is invisible to the user identifier;
the storage module is used for storing the shared picture to the album of the equipment when the first receiving module receives a picture storage request from the first user;
according to an embodiment of the present invention, the sharing module includes: a first sharing submodule and a second sharing submodule, wherein:
the first sharing submodule is used for calling the sharing program package and sharing the sharing picture generated by the generating module to the second application; or sharing the shared pictures in the photo album to the second application through the sharing function of the photo album;
the second sharing submodule is used for calling the sharing program package and sharing the sharing picture generated by the generating module to a second user; or accessing the album in the equipment through the second application, and sharing the shared pictures in the album to the second user; or sending the shared pictures in the album to the second user through the multimedia messages.
According to an embodiment of the present invention, the obtaining module is specifically configured to: receiving a sharing picture uploaded by a second application and/or a second user; or accessing the photo album of the corresponding equipment to obtain the shared pictures in the photo album.
According to an embodiment of the invention, the detection module comprises: a conversion sub-module and a detection sub-module, wherein:
the conversion sub-module is used for converting the shared picture to obtain a second digital image;
and the detection submodule is used for detecting the second digital image to obtain the user identification of the first user of the first application.
According to an embodiment of the invention, the detection submodule comprises: identification element, analysis unit, reading unit and decryption unit, wherein:
the identification unit is used for identifying the header information in a preset form in the second digital image;
the analysis unit is used for analyzing the header information to obtain the length of the user identification ciphertext;
the reading unit is used for reading data next to the header information to obtain a user identification ciphertext according to the length of the user identification ciphertext and a preset storage proportion;
and the decryption unit is used for decrypting the user identification ciphertext to obtain the user identification.
EXAMPLE five
According to an embodiment of the present invention, there is also provided a user information delivery apparatus including:
one or more processors, storage devices to store one or more programs; the one or more programs, when executed by the one or more processors, implement the method of any of embodiments one or two.
EXAMPLE six
According to an embodiment of the present invention, a computer-readable storage medium is further provided, on which a computer program is stored, which, when executed by a processor, implements the method according to any one of the first and second embodiments.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. Especially for the device embodiment, since it is basically similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
Generally, the internet platform product cannot and is not convenient to block the picture, so that the sharing operation through the picture is safer; therefore, the cross-platform information transmission which is not based on the webpage link is realized by sharing the sharing picture by generating the sharing picture which contains the user identification and can be detected by the user identification but is invisible; meanwhile, the privacy of the user is effectively protected in the process, and the prohibition of a third-party platform is avoided; and the service operation such as data analysis and statistics based on the user identification can not be adversely affected.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (15)

CN201911222616.2A2018-12-032019-12-03User information transmission method, device and storage mediumPendingCN110730121A (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
CN2018114685482018-12-03
CN20181146854832018-12-03

Publications (1)

Publication NumberPublication Date
CN110730121Atrue CN110730121A (en)2020-01-24

Family

ID=69226443

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911222616.2APendingCN110730121A (en)2018-12-032019-12-03User information transmission method, device and storage medium

Country Status (1)

CountryLink
CN (1)CN110730121A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3758350B1 (en)*2019-06-252023-02-22Ricoh Company, Ltd.Image processing apparatus, printing system, method for embedding latent image, and carrier medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101872398A (en)*2010-06-132010-10-27上海交通大学 Anti-collusion Digital Fingerprint Method Based on Code Division Multiple Access and Diversity Technology
CN105516225A (en)*2014-09-252016-04-20腾讯科技(深圳)有限公司Operation object method, device and system
CN107809492A (en)*2017-12-082018-03-16广东太平洋互联网信息服务有限公司The generation method and system of sharing information
CN107862352A (en)*2017-10-122018-03-30深圳思为科技有限公司A kind of Quick Response Code sharing method and Quick Response Code share equipment
CN108304435A (en)*2017-09-082018-07-20腾讯科技(深圳)有限公司Information recommendation method, device, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101872398A (en)*2010-06-132010-10-27上海交通大学 Anti-collusion Digital Fingerprint Method Based on Code Division Multiple Access and Diversity Technology
CN105516225A (en)*2014-09-252016-04-20腾讯科技(深圳)有限公司Operation object method, device and system
CN108304435A (en)*2017-09-082018-07-20腾讯科技(深圳)有限公司Information recommendation method, device, computer equipment and storage medium
CN107862352A (en)*2017-10-122018-03-30深圳思为科技有限公司A kind of Quick Response Code sharing method and Quick Response Code share equipment
CN107809492A (en)*2017-12-082018-03-16广东太平洋互联网信息服务有限公司The generation method and system of sharing information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
记忆张量,坏蛋: "阿里巴巴公司根据截图查到泄露信息的具体员工的技术是什么?", 《知乎》*

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3758350B1 (en)*2019-06-252023-02-22Ricoh Company, Ltd.Image processing apparatus, printing system, method for embedding latent image, and carrier medium

Similar Documents

PublicationPublication DateTitle
US11140138B2 (en)Method for encrypting an image, method for transmitting an image, electronic device and computer readable storage medium
US9449294B2 (en)Method and apparatus for managing user devices and contents by using quick response codes
CN107809436B (en)Authority authentication method, encryption method, device and system for network video access
CN104602238B (en)A kind of wireless network connecting method, device and system
CN109190409B (en)Method, device, equipment and readable storage medium for recording information propagation path
CN107196917B (en)Service response method and middleware thereof
US20170171166A1 (en)Anti-hotlinking method and electronic device
US20230421544A1 (en)Preventing fraud in aggregated network measurements
CN114286131A (en)Transmission method and device for anchor image model file in live broadcast wheat
CN116662941A (en)Information encryption method, device, computer equipment and storage medium
US20040252186A1 (en)Method, program, storage medium, server and image filter for displaying a three-dimensional image
CN115225934B (en)Video playing method, system, electronic device and storage medium
CN111460502B (en)Data sharing method, device, equipment and storage medium
CN110730121A (en)User information transmission method, device and storage medium
CN114996663B (en) Image processing method, storage medium and computer terminal
CN114499836B (en)Key management method, device, computer equipment and readable storage medium
CN113656713B (en)Network resource processing method, device and system
CN108319822A (en)A kind of method, storage medium, electronic equipment and the system of protection web page code
CN104184773B (en)A kind of data download method and system
CN114978637A (en)Message processing method and device
JP2014106690A (en)Terminal equipment, server, content distribution system, content distribution method and program
CN114339282A (en)Method and device for transmitting anchor image picture in live broadcast interaction
CN111131270B (en)Data encryption and decryption method and device, electronic equipment and storage medium
CN107483314B (en)A kind of information processing method and system, terminal device
CN117539671A (en)Problem positioning method based on webpage watermark, electronic equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20200124


[8]ページ先頭

©2009-2025 Movatter.jp