Movatterモバイル変換


[0]ホーム

URL:


CN111556199B - Method and equipment for presenting background in social application - Google Patents

Method and equipment for presenting background in social application
Download PDF

Info

Publication number
CN111556199B
CN111556199BCN202010339178.4ACN202010339178ACN111556199BCN 111556199 BCN111556199 BCN 111556199BCN 202010339178 ACN202010339178 ACN 202010339178ACN 111556199 BCN111556199 BCN 111556199B
Authority
CN
China
Prior art keywords
background
session
decryption
user
context
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010339178.4A
Other languages
Chinese (zh)
Other versions
CN111556199A (en
Inventor
向康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zongzhang Technology Group Co.,Ltd.
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co LtdfiledCriticalShanghai Zhangmen Science and Technology Co Ltd
Priority to CN202010339178.4ApriorityCriticalpatent/CN111556199B/en
Publication of CN111556199ApublicationCriticalpatent/CN111556199A/en
Application grantedgrantedCritical
Publication of CN111556199BpublicationCriticalpatent/CN111556199B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本申请的目的是提供一种在社交应用中呈现背景的方法与设备,该方法包括:响应于社交应用中第一用户针对目标会话的背景设置操作,获取所述第一用户设置的第一背景及所述第一背景对应的加密方式;将所述第一背景及所述加密方式经由所述社交应用对应的服务器发送至所述目标会话中的至少一个第二用户,以在每个第二用户对应的第二用户设备中的相应会话页面中呈现第二背景,其中,所述第二背景是根据所述加密方式对所述第一背景执行加密操作所生成的。根据本申请的方案,能够通过聊天背景的遮罩唤起社交应用使用者的好奇心,增强使用者聊天意愿,尽快帮助用户建立起熟人社交。

Figure 202010339178

The purpose of this application is to provide a method and device for presenting a background in a social application. The method includes: in response to a background setting operation of a first user in the social application for a target session, acquiring a first background set by the first user and the encryption method corresponding to the first context; send the first background and the encryption method to at least one second user in the target session via the server corresponding to the social application, so that in each second user A second background is presented in the corresponding session page in the second user equipment corresponding to the user, wherein the second background is generated by performing an encryption operation on the first background according to the encryption method. According to the solution of the present application, the curiosity of the users of the social application can be aroused by the masking of the chat background, the user's willingness to chat can be enhanced, and the user can be helped to establish acquaintance social interaction as soon as possible.

Figure 202010339178

Description

Method and equipment for presenting background in social application
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for presenting context in social applications.
Background
With the rapid development of mobile internet and domestic society, economy and culture, the social and entertainment requirements of people on mobile terminals are more and more strong, and in recent years, social applications are more and more widely used and become important tools for people to carry out social relations.
Disclosure of Invention
One object of the present application is to provide a method and apparatus for presenting a background in a social application.
According to an aspect of the present application, there is provided a method for presenting a background in a social application, applied to a first user equipment, the method comprising:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to an aspect of the present application, there is provided a method for presenting a background in a social application, applied to a second user equipment, the method including:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
According to one aspect of the application, a method for presenting a background in a social application is provided, which is applied to a server and comprises the following steps:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to one aspect of the application, a method for presenting a background in a social application is provided, which is applied to a server and comprises the following steps:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
According to one aspect of the application, a method for presenting a background in a social application is provided, which is applied to a server and comprises the following steps:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
According to an aspect of the present application, there is provided a first user device for presenting a context in a social application, the device comprising:
the system comprises a one-to-one module, a first background module and a second background module, wherein the one-to-one module is used for responding to background setting operation of a first user aiming at a target session in social application and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and a second module, configured to send the first context and the encryption manner to at least one second user in the target session via a server corresponding to the social application, so as to present a second context in a corresponding session page in second user equipment corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
According to an aspect of the present application, there is provided a second user equipment for presenting a context in a social application, the apparatus comprising:
a first background and an encryption mode corresponding to the first background, wherein the first background is set by a first user in the first user equipment for a target session;
a second module, configured to perform an encryption operation on the first background according to the encryption manner, and generate a second background;
and a second and third module for presenting the second background in a session page corresponding to the target session.
According to one aspect of the present application, there is provided a server for presenting a context in a social application, the server comprising:
a third module, configured to receive a first context sent by a first user equipment and an encryption manner corresponding to the first context, where the first context is set for a target session by a first user in the first user equipment;
and a third module, configured to send the first context and the encryption manner to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
According to one aspect of the present application, there is provided a server for presenting a context in a social application, the server comprising:
a fourth module, configured to determine, in response to a trigger event set for a context of a target session in a social application, a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context;
a fourth-second module, configured to send the fourth context and the encryption mode corresponding to the fourth context to a first user device corresponding to the at least one first user, so as to present a fifth context in a session page corresponding to the target session in the first user device, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode.
According to an aspect of the present application, there is provided a first user device for presenting a context in a social application, the device comprising:
a fifthly module, configured to receive a fourth background sent by a server and an encryption manner corresponding to the fourth background, where the fourth background is set by the server for a target session;
a fifth-second module, configured to perform an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background;
and a fifthly and a thirteen module, which is used for presenting the fifth background in the session page corresponding to the target session.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
According to an aspect of the present application, there is provided an apparatus for presenting a background in a social application, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
responding to a background setting operation of a first user for a target session in a social application, and acquiring a first background set by the first user and an encryption mode corresponding to the first background;
and sending the first background and the encryption mode to at least one second user in the target session through a server corresponding to the social application so as to present a second background in a corresponding session page in second user equipment corresponding to each second user, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving a first background and an encryption mode corresponding to the first background, wherein the first background is sent by first user equipment through a server, and the first background is set by a first user in the first user equipment for a target session;
according to the encryption mode, performing encryption operation on the first background to generate a second background;
and presenting the second background in a session page corresponding to the target session.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving a first background sent by first user equipment and an encryption mode corresponding to the first background, wherein the first background is set for a target session by a first user in the first user equipment;
and sending the first background and the encryption mode to second user equipment corresponding to at least one second user in the target session so as to present a second background in a session page corresponding to the target session in the second user equipment, wherein the second background is generated by performing encryption operation on the first background according to the encryption mode.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
responding to a background setting triggering event aiming at a target session in a social application, and determining a fourth background corresponding to at least one first user in the target session and an encryption mode corresponding to the fourth background;
and sending the fourth context and the encryption mode corresponding to the fourth context to first user equipment corresponding to the at least one first user so as to present a fifth context in a session page corresponding to the target session in the first user equipment, wherein the fifth context is generated by performing encryption operation on the fourth context according to the encryption mode.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving a fourth background sent by a server and an encryption mode corresponding to the fourth background, wherein the fourth background is set by the server for a target session;
according to the encryption mode, performing encryption operation on the fourth background to generate a fifth background;
and presenting the fifth background in a session page corresponding to the target session.
Compared with the prior art, the method and the device have the advantages that the second background generated by performing encryption operation on the first background is presented on the conversation page, so that the user can only see the encrypted second background at the initial stage of chat, and the second background can be gradually decrypted along with the deepening of the chat among the users, so that the curiosity of the social application user is aroused through the shade of the chat background, the chat willingness of the user is enhanced, the chat interaction frequency of the user is increased, the aim of clearing the chat background is fulfilled, the chat interaction frequency among the users is certainly increased through the process, and the acquaintance social interaction of the user can be built as soon as possible.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for presenting context in a social application applied to a first user device, according to one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a method for presenting context in a social application applied to a second user device, according to one embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method for presenting context in a social application applied to a server according to one embodiment of the present application;
FIG. 4 illustrates a flow diagram of a method for presenting context in a social application applied to a server according to one embodiment of the present application;
FIG. 5 illustrates a flow diagram of a method for presenting context in a social application applied to a first user device, according to one embodiment of the present application;
FIG. 6 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application;
FIG. 7 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application;
FIG. 8 illustrates a first user equipment structure diagram presenting context in a social application, according to one embodiment of the present application;
FIG. 9 illustrates a second user equipment structure diagram for presenting context in a social application, according to one embodiment of the present application;
FIG. 10 illustrates a server structure diagram for presenting context in a social application, according to one embodiment of the present application;
FIG. 11 illustrates a server structure diagram for presenting context in a social application, according to one embodiment of the present application;
FIG. 12 illustrates a first user equipment structure diagram presenting context in a social application, according to one embodiment of the present application;
FIG. 13 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 shows a flowchart of a method for presenting a background in a social application applied to a first user equipment according to an embodiment of the present application, the method comprising steps S11 and S12. In step S11, in response to a background setting operation of a first user for a target session in a social application, a first user device obtains a first background set by the first user and an encryption mode corresponding to the first background; in step S12, the first user device sends the first context and the encryption manner to at least one second user in the target session via the server corresponding to the social application, so as to present a second context in a corresponding session page in the second user device corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
In step S11, the first user device, in response to a context setting operation of the first user for the target session in the social application, obtains a first context set by the first user and an encryption manner corresponding to the first context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setting operation includes, but is not limited to, the first user selecting an existing picture from the first user device as the context of the target session, and the first user taking a picture through a camera on the first user device as the context of the target session. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
In step S12, the first user device sends the first context and the encryption manner to at least one second user in the target session via the server corresponding to the social application, so as to present a second context in a corresponding session page in the second user device corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, the first user device sends the first context and the encryption mode set by the first user to at least one second user in the target session via the server, and presents a second context generated after encrypting the first context according to the encryption mode in a session page of the second user, where if the target session is a private chat session, the second user is a session object of the private chat session, and if the target session is a group session where the first user is located, the second user may be all or part of other users in the group session except the first user. In some embodiments, the first user may present, in the session page, the second background generated after encrypting the first background according to the encryption manner, in synchronization with the second user, at this time, decryption schedules of the second backgrounds of the first user and the second user are kept synchronized, and the first user may have a portal in the social application to view the first background before encryption. In some embodiments, the first user may also present the first context before encryption in the conversation page, and the first user may have a portal in the social application to view the decryption progress of the second context of the second user.
Fig. 2 shows a flowchart of a method for presenting a background in a social application applied to a second user equipment according to an embodiment of the present application, the method including step S21, step S22, and step S23. In step S21, the second user equipment receives a first context and an encryption manner corresponding to the first context, where the first context is set for a target session by the first user in the first user equipment, and the first context is sent by the first user equipment via the server; in step S22, the second user equipment performs an encryption operation on the first background according to the encryption manner to generate a second background; in step S23, the second user equipment presents the second background in the session page corresponding to the target session.
In step S21, the second user equipment receives the first context and the encryption manner corresponding to the first context, which are sent by the first user equipment via the server, where the first context is set in the first user equipment for the target session by the first user. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the second user via the server. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
In step S22, the second user equipment performs an encryption operation on the first background according to the encryption method to generate a second background. In some embodiments, the second user equipment encrypts the first background according to an encryption mode set by the first user and sent by the server, generates a second background, and presents the second background in a session page corresponding to the target session.
In step S23, the second user equipment presents the second background in the session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the second background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a third background, then the session page is updated, the third background is presented in the session page, for example, the decryption progress information is 50%, and a half region in the second background is decrypted to generate the third background and present in the session page.
In some embodiments, the method further comprises: the second user equipment acquires decryption progress information corresponding to the second background; according to the decryption progress information and the decryption mode corresponding to the encryption mode, performing decryption operation on the second background to generate a third background; and updating the session page, and presenting the third background in the session page. In some embodiments, the decryption progress information is used to indicate a percentage, e.g., 50%, of the decrypted area in the first background to the entire area of the second background. In some embodiments, if the encryption method is fuzzy encryption, the corresponding decryption method is deblurring, and if the encryption method is mask encryption, the corresponding decryption method is unmasking. In some embodiments, according to the decryption progress information, a partial area in the second background is decrypted to generate a third background, then the session page is updated, the third background is presented in the session page, for example, the decryption progress information is 50%, and a half area in the second background is decrypted to generate the third background and is presented in the session page.
In some embodiments, the method further comprises: the second user equipment acquires decryption area sequence information corresponding to the second background, wherein the decryption area sequence information comprises decryption orders corresponding to a plurality of areas in the second background; wherein, the executing decryption operation on the second background according to the decryption progress information and the decryption mode corresponding to the encryption mode to generate a third background comprises: and decrypting one or more areas in the second background according to the decryption progress information, the decryption mode corresponding to the encryption mode and the decryption area sequence information to generate a third background, wherein the decryption area sequence information comprises decryption orders corresponding to the areas in the second background. In some embodiments, the decryption Area order information of the second background is used to indicate a decryption order of several sub-areas into which the entire Area of the second background is divided, for example, the entire Area of the second background is divided into 4 sub-areas, areas 1, Area2, Area3, and Area4, and at this time, the decryption Area order information may be "sequentially decrypting the second background in the decryption order of Area2, Area1, Area4, and Area 3". In some embodiments, the decryption progress information is 50%, and the decryption Area sequence information may be "sequentially decrypt the second background in the decryption order of Area2, Area1, Area4, and Area 3", and decrypt the Area2 and the Area1 in the second background to generate the third background.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: and receiving decryption progress information which is sent by the server and corresponds to the second background. In some embodiments, the decryption progress information of the second background is determined by the server and then sent to the second user.
In some embodiments, the method further comprises: and the second user equipment receives the decryption area sequence information sent by the server. In some embodiments, the server determines the decryption region sequence information and sends the decryption region sequence information to the second user, or the first user sets the decryption region sequence information and sends the decryption region sequence information to the second user via the server.
In some embodiments, the method further comprises: and if the decryption progress information indicates that the second background is completely decrypted, the second user equipment updates the session page and presents the first background on the session page. In some embodiments, if the decryption progress information indicates that the percentage of the decrypted area in the second background to the whole area of the second background reaches 100%, the session page is updated, and the first background is directly presented in the session page.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: receiving session frequency information which is sent by a server and corresponds to the target session; and determining the decryption progress information of the second background according to the session frequency information. In some embodiments, the session frequency information includes, but is not limited to, session message sending frequency information and sending number information of the target session, and the session frequency information may be used to characterize the activity level of the target session, for example, the session frequency information may be the number of session message sending times (e.g., 100) of the target session within a predetermined time (e.g., the last day) and may also be the session message sending frequency (e.g., 1 session message is sent every 5 minutes on average or 10 session messages are sent every minute on average) of the target session within a predetermined time (e.g., the last week). In some embodiments, the first user determines the decryption progress information of the second background according to the session frequency information of the target session sent by the server, and the higher the activity degree of the target session represented by the session frequency information is, the greater the decryption progress of the second background is. In some embodiments, the session frequency information may be an overall session frequency of the target session, if the target session is a private chat session between the first user and the second user, the session frequency information is the overall session frequency between the first user and the second user, if the target session is a group session where the first user is located, the session frequency information is the overall session frequency of all group members in the group session, at this time, the session frequency information received by each user and sent by the server is the same, and thus the determined decryption progress information is also the same. In some embodiments, the session frequency information may also be the respective speaking frequency of each user in the target session, the respective speaking frequency of each user is independent of each other, if the target session is a private chat session between the first user and the second user, the session frequency information is the speaking frequency of the first user or the second user, if the target session is a group session where the first user is located, the session frequency information is the speaking frequency of each group member in the group session, at this time, the session frequency information received by each user, that is, the speaking frequency of the user itself, sent by the server is independent of each other, and thus the determined decryption progress information is also independent of each other.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. In some embodiments, the predetermined re-encryption conditions include, but are not limited to, the current liveness of the target session being less than or equal to a predetermined liveness threshold, the average liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, the maximum or minimum liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, and the degree of decrease in liveness of the target session over the last predetermined time being greater than or equal to the predetermined decrease threshold. In some embodiments, if it is determined that the liveness of the target session meets the predetermined re-encryption condition according to the session frequency information, at this time, the decryption progress needs to be backed off, the areas needing re-encryption in one or more decrypted areas in the second background are determined first, and then the decryption progress information of the second background is determined according to the areas needing re-encryption, and the decryption progress of the second background is determined to be smaller when the number of the areas needing re-encryption is larger or the ratio of the areas to the whole area of the second background is larger.
In some embodiments, the method further comprises: and if the conversation frequency information is larger than or equal to the preset frequency threshold information, the second user equipment updates the conversation page and presents the first background on the conversation page. In some embodiments, if the received session frequency information sent by the server is greater than or equal to the predetermined frequency threshold information, the session page is updated, and the first background is directly presented in the session page.
In some embodiments, the encryption means comprises mask encryption and/or fuzzy encryption. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
Fig. 3 shows a flowchart of a method for presenting a background in a social application applied to a server according to an embodiment of the present application, and the method includes steps S31 and S32. In step S31, the server receives a first context and an encryption method corresponding to the first context, where the first context is set by a first user in the first user equipment for a target session, and the first context is sent by the first user equipment; in step S32, the server sends the first context and the encryption scheme to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
In step S31, the server receives a first context and an encryption method corresponding to the first context, where the first context is set by a first user in the first user equipment for a target session, and the first context is sent by the first user equipment. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the server.
In step S32, the server sends the first context and the encryption scheme to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
In some embodiments, the method further comprises step S33 (not shown). In step S33, the server obtains decryption area sequence information, where the decryption area sequence information includes a plurality of areas in the second background and decryption sequences corresponding to the areas; and sending the decryption area sequence information to the second user equipment. In some embodiments, the decryption Area order information is used to indicate a decryption order of several sub-areas into which the entire Area of the second background is divided, for example, the entire Area of the second background is divided into 4 sub-areas, areas Area1, Area2, Area3, and Area4, and at this time, the decryption Area order information may be "sequentially decrypt the second background in the decryption order of Area2, Area1, Area4, and Area 3". In some embodiments, the decryption area sequence information may be sent to the second user via the server after the first user has set the decryption area sequence information, or may be sent to the second user after the server automatically determines the decryption area sequence information according to the first context, for example, the server performs a picture recognition operation on the first context and automatically determines the decryption area sequence information according to a recognition result.
In some embodiments, the step S33 includes: and the server receives the decryption area sequence information which is sent by the first user equipment and is set by the first user. In some embodiments, the decryption area sequence information may be sent to the second user via the server after being set by the first user.
In some embodiments, the step S33 includes: and the server identifies the first background and determines the sequence information of the decryption area according to the identification result. In some embodiments, the server automatically determines the decryption region sequence information by performing a picture recognition operation on the first background and according to the recognition result. For example, the first background is a personal photograph, by performing a picture recognition operation on the personal photograph, the entire area of the first background is divided into 4 sub-areas, a leg area, a hand area, a chest area, and a head area according to the recognition result, and the decrypted area order information is determined to be "sequentially decrypted in the order of decryption of the hand area, the leg area, the chest area, and the head area".
In some embodiments, identifying the first background and determining the decryption region order information according to the identification result includes: identifying the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area; and sequencing the plurality of areas according to the importance degree of each area to obtain the decryption area sequence information. In some embodiments, the server performs a picture recognition operation on the first background to recognize a plurality of regions corresponding to the first background and a degree of importance corresponding to each region, then sorts the regions according to the degree of importance of each region, and sequentially decrypts the regions from high to low in order of the degree of importance. For example, the first background is a personal photograph, and by performing a picture recognition operation on the personal photograph, a plurality of regions corresponding to the first background, a leg region (importance degree 70), a hand region (importance degree 60), a chest region (importance degree 80), and a head region (importance degree 90) are recognized and then sorted according to the importance degree of each region, so that the decrypted region order information can be obtained as "sequentially decrypted in the order of decryption of the hand region, the leg region, the chest region, and the head region".
In some embodiments, identifying the first background, and obtaining a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: identifying type information corresponding to the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area according to the type information. In some embodiments, the image recognition operation is performed on the first background, the type information corresponding to the first background is obtained through recognition, the first background is divided into a plurality of regions according to the type information, and the importance degree corresponding to each region is obtained. For example, a picture recognition operation is performed through the first background, the type information of the first background is recognized as a person type, the first background is divided into a plurality of regions according to the type information, and the degree of importance corresponding to each region, a leg region (degree of importance 70), a hand region (degree of importance 60), a chest region (degree of importance 80), and a head region (degree of importance 90) are obtained.
In some embodiments, the obtaining, according to the type information, a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: and if the type information is the type of the person, determining a plurality of areas corresponding to the limb parts of the person, and determining the corresponding importance degree of each area according to the preset weight of the limb parts of the person. For example, if the type information of the first background is a human type, a plurality of regions corresponding to the limb portions of the human, a leg region, a hand region, a chest region, and a head region, are specified, and the degree of importance corresponding to each region, a leg region (degree of importance 70), a hand region (degree of importance 60), a chest region (degree of importance 80), and a head region (degree of importance 90) are specified in accordance with the predetermined weight of the limb portion of the human, leg (weight 0.7), hand (weight 0.6), chest (weight 0.8), and head (weight 0.9).
In some embodiments, the first background is a photograph of the first user. Preferably, the first background is a photograph of the first user.
In some embodiments, the method further comprises step S34 (not shown) and step S35 (not shown). In step S34, the server acquires session frequency information of the target session; in step S35, the server sends the session frequency information to the first user equipment and the second user equipment. In some embodiments, the session frequency information may be an overall session frequency of the target session, if the target session is a private chat session between the first user and the second user, the session frequency information is the overall session frequency between the first user and the second user, if the target session is a group session where the first user is located, the session frequency information is the overall session frequency of all group members in the group session, at this time, the session frequency information received by each user and sent by the server is the same, and thus the determined decryption progress information is also the same. In some embodiments, the session frequency information may also be the respective speaking frequency of each user in the target session, the respective speaking frequency of each user is independent of each other, if the target session is a private chat session between the first user and the second user, the session frequency information is the speaking frequency of the first user or the second user, if the target session is a group session where the first user is located, the session frequency information is the speaking frequency of each group member in the group session, at this time, the session frequency information received by each user, that is, the speaking frequency of the user itself, sent by the server is independent of each other, and thus the determined decryption progress information is also independent of each other. In some embodiments, the server may send the session frequency information to the first user and the second user at regular time, may send the session frequency information to the first user and the second user when the session frequency information is changed, and may return the session frequency information to the first user and the second user in response to a request for acquiring the session frequency information initiated by the first user or the second user.
In some embodiments, the step S34 includes at least one of: acquiring session frequency information of all users in the target session; acquiring the conversation frequency information of the first user and the at least one second user in the target conversation; and obtaining the speaking frequency information of the at least one second user in the target session. In some embodiments, the session frequency information includes, but is not limited to, session message sending frequency information and sending number information of the target session, and the session frequency information may be used to characterize the activity level of the target session, for example, the session frequency information may be the number of session message sending times (e.g., 100) of the target session within a predetermined time (e.g., the last day) and may also be the session message sending frequency (e.g., 1 session message is sent every 5 minutes on average or 10 session messages are sent every minute on average) of the target session within a predetermined time (e.g., the last week). In some embodiments, the session frequency information may be session frequency information of all users in the target session, for example, session frequency information of all users in a group session in which the first user is located, or session frequency information of the first user and the second user in a private chat session between the first user and the second user. In some embodiments, the session frequency information may be session frequency information of the first user and the second user in the target session. For example, the conversation frequency information of the first user and the second user in the group conversation of the first user. In some embodiments, the session frequency information may be speaking frequency information of the second user in the target session, for example, speaking frequency information of the second user in a group session in which the first user is located, or speaking frequency information of the second user in a private chat session between the first user and the second user.
In some embodiments, the method further comprises: the server determines decryption progress information of the second background according to the session frequency information; and sending the decryption progress information to the first user equipment and the second user equipment. In some embodiments, the server determines the decryption progress information of the second background according to the session frequency information of the target session, and the higher the activity degree of the target session represented by the session frequency information is, the greater the decryption progress of the second background is.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and determining a session frequency range in which the session frequency information falls, and taking a decryption progress corresponding to the session frequency range as decryption progress information of the second background. For example, the decryption progress corresponding to the session message sending frequency range 1-100 of the target session in the last day is 10%, the decryption progress corresponding to the session message sending frequency range 101-200 is 20%, the decryption progress corresponding to the session message sending frequency range 201-300 is 30%, and when the session frequency information is the session message sending frequency of the target session in the last day is 150, at this time, the session frequency range in which the session frequency information falls is 101-200, so that 20% of the decryption progress corresponding to the session frequency range 101-200 is used as the decryption progress information of the second context.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. In some embodiments, the predetermined re-encryption conditions include, but are not limited to, the current liveness of the target session being less than or equal to a predetermined liveness threshold, the average liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, the maximum or minimum liveness of the target session over the last predetermined time being less than or equal to the predetermined liveness threshold, and the degree of decrease in liveness of the target session over the last predetermined time being greater than or equal to the predetermined decrease threshold. In some embodiments, if it is determined that the liveness of the target session meets the predetermined re-encryption condition according to the session frequency information, at this time, the decryption progress needs to be backed off, the areas needing re-encryption in one or more decrypted areas in the second background are determined first, and then the decryption progress information of the second background is determined according to the areas needing re-encryption, and the decryption progress of the second background is determined to be smaller when the number of the areas needing re-encryption is larger or the ratio of the areas to the whole area of the second background is larger.
Fig. 4 shows a flowchart of a method for presenting a background in a social application applied to a server according to an embodiment of the present application, and the method includes steps S41 and S42. In step S41, in response to a trigger event set for a context of a target session in a social application, a server determines a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context; in step S42, the server sends the fourth context and the encryption mode corresponding to the fourth context to the first user equipment corresponding to the at least one first user, so as to present a fifth context in the session page corresponding to the target session in the first user equipment, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode.
In step S41, in response to a trigger event set for a context of a target session in a social application, the server determines a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setup triggering event includes, but is not limited to, a new setup of a one-to-one private chat session between the first user and the second user, and a new joining of the first user to a group session. In some embodiments, the fourth context may be a private chat session object of the first user or a group member other than the first user in the group session in which the first user is located, which is uploaded to the server in advance, or may be any other context in the server. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
In step S42, the server sends the fourth context and the encryption mode corresponding to the fourth context to the first user equipment corresponding to the at least one first user, so as to present a fifth context in the session page corresponding to the target session in the first user equipment, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
Fig. 5 shows a flowchart of a method for presenting a background in a social application applied to a first user equipment according to an embodiment of the present application, the method comprising steps S51, S52 and S53. In step S51, the first user equipment receives a fourth context and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for a target session; in step S52, the first user equipment performs an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background; in step S53, the first user equipment presents the fifth background in the session page corresponding to the target session.
In step S51, the first user equipment receives a fourth context and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for the target session. In some embodiments, if the target session is a one-to-one private chat session, the first user is a session object in the private chat session, and if the target session is a group session, the first user may be a group member in the group session.
In step S52, the first user equipment performs an encryption operation on the fourth background according to the encryption manner, and generates a fifth background. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
In step S53, the first user equipment presents the fifth background in the session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the fifth background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a sixth background, then the session page is updated, the sixth background is presented in the session page, for example, the decryption progress information is 50%, a half region in the fifth background is decrypted to generate the sixth background and presented in the session page.
Compared with the prior art, the method and the device have the advantages that the second background generated by executing the encryption operation on the first background is presented on the conversation page, so that the user can only see the encrypted second background at the initial chat, and the second background can be gradually decrypted along with the deepening of the chat among the users, so that the curiosity of the instant messaging user is aroused through the shade of the chat background, the chat willingness of the user is enhanced, the chat interaction frequency of the user is increased, the aim of clearly seeing the chat background is fulfilled, the chat interaction frequency among the users is certainly increased through the process, and the acquaintance social contact of the user can be built as soon as possible.
FIG. 6 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application.
As shown in fig. 6, in step S61, in response to a context setting operation of a first user for a target session in a social application, a first user device obtains a first context set by the first user and an encryption manner corresponding to the first context, where step S61 is the same as or similar to step S11, and is not repeated here; in step S62, the first user equipment sends the first background and the encryption manner to a server corresponding to the social application, and step S62 is the same as or similar to step S12, which is not described herein again; in step S63, the server receives the first context and the encryption manner sent by the first user equipment, and sends the first context and the encryption manner to a second user equipment corresponding to at least one second user in the target session, where step S63 is the same as or similar to steps S31 and S32, and is not described herein again; in step S64, the second ue receives the first background and the encryption mode sent by the server, and step S64 is the same as or similar to step S21, which is not described herein again; in step S65, the second user equipment performs an encryption operation on the first background according to the encryption manner, generates a second background, and presents the second background in a session page corresponding to the target session, where step S65 is the same as or similar to steps S22 and S23, and is not described herein again.
FIG. 7 illustrates a flow diagram of a system method for presenting context in a social application, according to one embodiment of the present application.
As shown in fig. 7, in step S71, in response to a trigger event set for the context of the target session in the social application, the server determines a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context, where step S71 is the same as or similar to step S41, and is not repeated here; in step S72, the server sends the fourth context and the encryption mode corresponding to the fourth context to the first user equipment corresponding to the at least one first user, where step S72 is the same as or similar to step S42, and is not described herein again; in step S73, the first user equipment receives the fourth background and the encryption mode sent by the server, and step S73 is the same as or similar to step S51, which is not described herein again; in step S74, the first user equipment performs an encryption operation on the fourth background according to the encryption manner to generate a fifth background, and presents the fifth background in a session page corresponding to the target session, where step S74 is the same as or similar to steps S52 and S53, and is not described herein again.
Fig. 8 shows a first user equipment structure diagram for presenting context in a social application according to an embodiment of the present application, the device comprising a one-module 11 and a two-module 12. A one-to-one module 11, configured to respond to a background setting operation of a first user for a target session in a social application, to obtain a first background set by the first user and an encryption manner corresponding to the first background; a secondary module 12, configured to send the first context and the encryption manner to at least one second user in the target session via a server corresponding to the social application, so as to present a second context in a corresponding session page in second user equipment corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
The one-to-one module 11 is configured to, in response to a context setting operation of a first user for a target session in a social application, obtain a first context set by the first user and an encryption mode corresponding to the first context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setting operation includes, but is not limited to, the first user selecting an existing picture from the first user device as the context of the target session, and the first user taking a picture through a camera on the first user device as the context of the target session. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
A secondary module 12, configured to send the first context and the encryption manner to at least one second user in the target session via a server corresponding to the social application, so as to present a second context in a corresponding session page in second user equipment corresponding to each second user, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, the first user device sends the first context and the encryption mode set by the first user to at least one second user in the target session via the server, and presents a second context generated after encrypting the first context according to the encryption mode in a session page of the second user, where if the target session is a private chat session, the second user is a session object of the private chat session, and if the target session is a group session where the first user is located, the second user may be all or part of other users in the group session except the first user. In some embodiments, the first user may present, in the session page, the second background generated after encrypting the first background according to the encryption manner, in synchronization with the second user, at this time, decryption schedules of the second backgrounds of the first user and the second user are kept synchronized, and the first user may have a portal in the social application to view the first background before encryption. In some embodiments, the first user may also present the first context before encryption in the conversation page, and the first user may have a portal in the social application to view the decryption progress of the second context of the second user.
Fig. 9 shows a second user equipment structure diagram for presenting a context in a social application according to an embodiment of the present application, the second user equipment structure diagram comprising a two-in-one module 21, a two-in-two module 22 and a two-in-three module 23. A first module 21, configured to receive a first context and an encryption manner corresponding to the first context, where the first context is set by a first user in a first user equipment for a target session, and the first context is sent by the first user equipment via a server; a second module 22, configured to perform an encryption operation on the first background according to the encryption manner, so as to generate a second background; a second and third module 23, configured to present the second background in a session page corresponding to the target session.
A first module 21, configured to receive a first context and an encryption manner corresponding to the first context, where the first context is set by a first user in a first user equipment for a target session, and the first context is sent by the first user equipment via a server. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the second user via the server. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
And a second-second module 22, configured to perform an encryption operation on the first background according to the encryption manner, so as to generate a second background. In some embodiments, the second user equipment encrypts the first background according to an encryption mode set by the first user and sent by the server, generates a second background, and presents the second background in a session page corresponding to the target session.
A second and third module 23, configured to present the second background in a session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the second background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a third background, then the session page is updated, the third background is presented in the session page, for example, the decryption progress information is 50%, and a half region in the second background is decrypted to generate the third background and present in the session page.
In some embodiments, the apparatus is further configured to: acquiring decryption progress information corresponding to the second background; according to the decryption progress information and the decryption mode corresponding to the encryption mode, performing decryption operation on the second background to generate a third background; and updating the session page, and presenting the third background in the session page. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: acquiring decryption area sequence information corresponding to the second background, wherein the decryption area sequence information comprises decryption orders corresponding to a plurality of areas and a plurality of areas in the second background; wherein, the executing decryption operation on the second background according to the decryption progress information and the decryption mode corresponding to the encryption mode to generate a third background comprises: and decrypting one or more areas in the second background according to the decryption progress information, the decryption mode corresponding to the encryption mode and the decryption area sequence information to generate a third background, wherein the decryption area sequence information comprises decryption orders corresponding to the areas in the second background. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: and receiving decryption progress information which is sent by the server and corresponds to the second background. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: and receiving the decryption area sequence information sent by the server. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: and if the decryption progress information indicates that the second background is completely decrypted, updating the session page, and presenting the first background on the session page. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the obtaining decryption progress information corresponding to the second context includes: receiving session frequency information which is sent by a server and corresponds to the target session; and determining the decryption progress information of the second background according to the session frequency information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: and if the conversation frequency information is larger than or equal to the preset frequency threshold information, updating the conversation page, and presenting the first background on the conversation page. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the encryption means comprises mask encryption and/or fuzzy encryption. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
Fig. 10 shows a diagram of a server structure for presenting a background in a social application according to an embodiment of the present application, where the server includes a three-in-one module 31 and a three-in-two module 32. A third-to-first module 31, configured to receive a first context and an encryption manner corresponding to the first context, where the first context is set in a first user equipment for a target session by a first user; a third and second module 32, configured to send the first context and the encryption manner to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner.
A third module 31, configured to receive a first context sent by a first user equipment and an encryption manner corresponding to the first context, where the first context is set in the first user equipment for a target session by a first user. In some embodiments, the first user sets a first context and a corresponding encryption mode for the target session, and sends the first context and the corresponding encryption mode to the server.
A third and second module 32, configured to send the first context and the encryption manner to a second user device corresponding to at least one second user in the target session, so as to present a second context in a session page corresponding to the target session in the second user device, where the second context is generated by performing an encryption operation on the first context according to the encryption manner. In some embodiments, if the target session is a one-to-one private chat session, the second user is a session object of the private chat session, and if the target session is a group session in which the first user is located, the second user may be any other user in the group session except the first user.
In some embodiments, the apparatus further comprises a triplex module 33 (not shown). A third module 33, configured to obtain decryption area sequence information, where the decryption area sequence information includes multiple areas in the second background and decryption sequences corresponding to the multiple areas; and sending the decryption area sequence information to the second user equipment. Here, the specific implementation of the three modules 33 is the same as or similar to the embodiment related to step S33 in fig. 3, and therefore, the detailed description is omitted, and the detailed implementation is incorporated herein by reference.
In some embodiments, the thirty-three module 33 is configured to: and receiving decryption area sequence information which is sent by the first user equipment and set by the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the thirty-three module 33 is configured to: and identifying the first background, and determining the sequence information of the decryption area according to the identification result. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, identifying the first background and determining the decryption region order information according to the identification result includes: identifying the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area; and sequencing the plurality of areas according to the importance degree of each area to obtain the decryption area sequence information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, identifying the first background, and obtaining a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: identifying type information corresponding to the first background, and obtaining a plurality of areas corresponding to the first background and the importance degree corresponding to each area according to the type information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the obtaining, according to the type information, a plurality of regions corresponding to the first background and a degree of importance corresponding to each region includes: and if the type information is the type of the person, determining a plurality of areas corresponding to the limb parts of the person, and determining the corresponding importance degree of each area according to the preset weight of the limb parts of the person. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the first background is a photograph of the first user. Preferably, the first background is a photograph of the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus further includes a thirty-four module 34 (not shown) and a thirty-five module 35 (not shown). A thirty-four module 34, configured to obtain session frequency information of the target session; a thirty-five module 35, configured to send the session frequency information to the first user equipment and the second user equipment. Here, the specific implementation manners of the thirty-four module 34 and the thirty-five module 35 are the same as or similar to those of the embodiments related to steps S34 and S35 in fig. 3, and therefore, the detailed descriptions thereof are omitted, and the detailed descriptions thereof are incorporated herein by reference.
In some embodiments, the thirty-four module 34 is for at least one of: acquiring session frequency information of all users in the target session; acquiring the conversation frequency information of the first user and the at least one second user in the target conversation; and obtaining the speaking frequency information of the at least one second user in the target session. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: determining decryption progress information of the second background according to the session frequency information; and sending the decryption progress information to the first user equipment and the second user equipment. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and determining a session frequency range in which the session frequency information falls, and taking a decryption progress corresponding to the session frequency range as decryption progress information of the second background. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
In some embodiments, the determining decryption progress information of the second context according to the session frequency information includes: and if the liveness of the target session meets the preset re-encryption condition according to the session frequency information, determining the area information needing re-encryption in the second background, and determining the decryption progress information of the second background according to the area information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 3, and therefore are not described again, and are included herein by reference.
Fig. 11 shows a diagram of a server structure for presenting a context in a social application, according to an embodiment of the present application, the server includes a quad module 41 and a quad module 42. A fourth module 41, configured to determine, in response to a trigger event set for a context of a target session in a social application, a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context; a fourth-second module 42, configured to send the fourth context and the encryption mode corresponding to the fourth context to a first user device corresponding to the at least one first user, so as to present a fifth context in a session page corresponding to the target session in the first user device, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode.
A fourth module 41, configured to determine, in response to a trigger event set for a context of a target session in a social application, a fourth context corresponding to at least one first user in the target session and an encryption manner corresponding to the fourth context. In some embodiments, the target session may be a one-to-one private chat session between the first user and the second user, or may be a group session in which the first user is located. In some embodiments, the context setup triggering event includes, but is not limited to, a new setup of a one-to-one private chat session between the first user and the second user, and a new joining of the first user to a group session. In some embodiments, the fourth context may be a private chat session object of the first user or a group member other than the first user in the group session in which the first user is located, which is uploaded to the server in advance, or may be any other context in the server. In some embodiments, the encryption manner may be fuzzy encryption (for example, the initial state of the background is fuzzy, and the fuzzy degree may be customized by an algorithm such as gaussian fuzzy), mask encryption (for example, an opaque mask is covered on the background to block the background), or any other encryption manner capable of blocking the background.
A fourth-second module 42, configured to send the fourth context and the encryption mode corresponding to the fourth context to a first user device corresponding to the at least one first user, so as to present a fifth context in a session page corresponding to the target session in the first user device, where the fifth context is generated by performing an encryption operation on the fourth context according to the encryption mode. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
Fig. 12 shows a diagram of a first user equipment structure for presenting context in a social application according to an embodiment of the present application, the equipment comprising a five-one module 51, a five-two module 52 and a five-three module 53. A fifthly-first module 51, configured to receive a fourth context sent by a server and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for a target session; a fifth-second module 52, configured to perform an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background; and a fifthly and thirteen module 53, configured to present the fifth background in a session page corresponding to the target session.
A fifthly-one module 51, configured to receive a fourth context sent by a server and an encryption manner corresponding to the fourth context, where the fourth context is set by the server for a target session. In some embodiments, if the target session is a one-to-one private chat session, the first user is a session object in the private chat session, and if the target session is a group session, the first user may be a group member in the group session.
A fifth-second module 52, configured to perform an encryption operation on the fourth background according to the encryption manner, so as to generate a fifth background. In some embodiments, the first user equipment encrypts the fourth background according to the encryption mode sent by the server to generate a fifth background, and presents the fifth background in a session page corresponding to the target session.
And a fifthly and thirteen module 53, configured to present the fifth background in a session page corresponding to the target session. In some embodiments, after the session page presents the second background, a partial region in the fifth background is decrypted (e.g., deblurred or unmasked) according to the decryption progress information sent by the server or the decryption progress information determined according to the session frequency information of the target session sent by the server to generate a sixth background, then the session page is updated, the sixth background is presented in the session page, for example, the decryption progress information is 50%, a half region in the fifth background is decrypted to generate the sixth background and presented in the session page.
FIG. 13 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
In some embodiments, as shown in FIG. 13, thesystem 300 can be implemented as any of the devices in the various embodiments described. In some embodiments,system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions forsystem 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on whichsystem 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface forsystem 300 to communicate over one or more networks and/or with any other suitable device.System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments,system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a holding computing device, a tablet, a netbook, etc.). In various embodiments,system 300 may have more or fewer components and/or different architectures. For example, in some embodiments,system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (22)

Translated fromChinese
1.一种在社交应用中呈现背景的方法,应用于第一用户设备,其中,所述方法包括:1. A method for presenting a background in a social application, applied to a first user equipment, wherein the method comprises:响应于社交应用中第一用户针对目标会话的背景设置操作,获取所述第一用户设置的第一背景及所述第一背景对应的加密方式;In response to the background setting operation of the target session by the first user in the social application, acquiring the first background set by the first user and the encryption method corresponding to the first background;将所述第一背景及所述加密方式经由所述社交应用对应的服务器发送至所述目标会话中的至少一个第二用户,以在每个第二用户对应的第二用户设备中的相应会话页面中呈现第二背景,其中,所述第二用户设备根据所述加密方式对所述第一背景执行加密操作生成所述第二背景,并获取所述第二背景对应的解密进度信息,根据所述解密进度信息及所述加密方式对应的解密方式,对所述第二背景执行解密操作,生成第三背景,更新所述相应会话页面,在所述相应会话页面中呈现所述第三背景。Sending the first background and the encryption method to at least one second user in the target session via the server corresponding to the social application, so as to create a corresponding session in the second user equipment corresponding to each second user A second background is presented on the page, wherein the second user equipment performs an encryption operation on the first background according to the encryption method to generate the second background, and obtains decryption progress information corresponding to the second background, according to The decryption progress information and the decryption method corresponding to the encryption method, perform a decryption operation on the second background, generate a third background, update the corresponding session page, and present the third background in the corresponding session page. .2.一种在社交应用中呈现背景的方法,应用于第二用户设备,其中,所述方法包括:2. A method for presenting a background in a social application, applied to a second user equipment, wherein the method comprises:接收第一用户设备经由服务器发送的第一背景及所述第一背景对应的加密方式,其中,所述第一背景是第一用户在第一用户设备中针对目标会话设置的;receiving a first context and an encryption method corresponding to the first context sent by the first user equipment via the server, wherein the first context is set by the first user in the first user equipment for the target session;根据所述加密方式,对所述第一背景执行加密操作,生成第二背景;According to the encryption method, an encryption operation is performed on the first background to generate a second background;在所述目标会话对应的会话页面中呈现所述第二背景;presenting the second background in a session page corresponding to the target session;获取所述第二背景对应的解密进度信息;obtaining decryption progress information corresponding to the second background;根据所述解密进度信息及所述加密方式对应的解密方式,对所述第二背景执行解密操作,生成第三背景;According to the decryption progress information and the decryption method corresponding to the encryption method, perform a decryption operation on the second background to generate a third background;更新所述会话页面,在所述会话页面中呈现所述第三背景。The session page is updated to render the third background in the session page.3.根据权利要求2所述的方法,其中,所述方法还包括:3. The method of claim 2, wherein the method further comprises:获取所述第二背景对应的解密区域顺序信息,其中,所述解密区域顺序信息包括所述第二背景中多个区域以及多个区域对应的解密顺序;Obtain the decryption area sequence information corresponding to the second background, wherein the decryption area sequence information includes multiple areas in the second background and the decryption sequence corresponding to the multiple areas;其中,所述根据所述解密进度信息及所述加密方式对应的解密方式,对所述第二背景执行解密操作,生成第三背景,包括:Wherein, performing a decryption operation on the second background according to the decryption progress information and the decryption method corresponding to the encryption method to generate a third background, including:根据所述解密进度信息、所述加密方式对应的解密方式及所述解密区域顺序信息,解密所述第二背景中的一个或多个区域,生成第三背景。According to the decryption progress information, the decryption method corresponding to the encryption method, and the decryption area sequence information, one or more areas in the second background are decrypted to generate a third background.4.根据权利要求2所述的方法,其中,所述获取所述第二背景对应的解密进度信息,包括:4. The method according to claim 2, wherein the obtaining decryption progress information corresponding to the second background comprises:接收所述服务器发送的与所述第二背景对应的解密进度信息。Decryption progress information corresponding to the second background sent by the server is received.5.根据权利要求2所述的方法,其中,所述获取所述第二背景对应的解密进度信息,包括:5. The method according to claim 2, wherein the obtaining decryption progress information corresponding to the second background comprises:接收服务器发送的与所述目标会话对应的会话频次信息;receiving session frequency information corresponding to the target session sent by the server;根据所述会话频次信息,确定所述第二背景的解密进度信息。Decryption progress information of the second background is determined according to the session frequency information.6.根据权利要求5所述的方法,其中,所述根据所述会话频次信息,确定所述第二背景的解密进度信息,包括:6. The method according to claim 5, wherein the determining the decryption progress information of the second background according to the session frequency information comprises:若根据所述会话频次信息确定所述目标会话的活跃度满足预定重加密条件,确定所述第二背景中需要重加密的区域信息,并根据所述区域信息确定所述第二背景的解密进度信息。If it is determined according to the session frequency information that the activity of the target session satisfies a predetermined re-encryption condition, determine the area information in the second background that needs to be re-encrypted, and determine the decryption progress of the second background according to the area information information.7.一种在社交应用中呈现背景的方法,应用于服务器,其中,所述方法包括:7. A method for presenting a background in a social application, applied to a server, wherein the method comprises:接收第一用户设备发送的第一背景及所述第一背景对应的加密方式,其中,所述第一背景是第一用户在第一用户设备中针对目标会话设置的;receiving a first background sent by a first user equipment and an encryption method corresponding to the first background, wherein the first background is set by the first user in the first user equipment for the target session;将所述第一背景及所述加密方式发送至所述目标会话中的至少一个第二用户对应的第二用户设备,以在所述第二用户设备中所述目标会话对应的会话页面中呈现第二背景,其中,所述第二用户设备根据所述加密方式对所述第一背景执行加密操作所生成所述第二背景,并获取所述第二背景对应的解密进度信息,根据所述解密进度信息及所述加密方式对应的解密方式,对所述第二背景执行解密操作,生成第三背景,更新所述会话页面,在所述会话页面中呈现所述第三背景。sending the first background and the encryption method to a second user equipment corresponding to at least one second user in the target session, so as to be presented in a session page corresponding to the target session in the second user equipment The second background, wherein the second user equipment performs an encryption operation on the first background according to the encryption method to generate the second background, and obtains decryption progress information corresponding to the second background, according to the Decrypt the progress information and the decryption method corresponding to the encryption method, perform a decryption operation on the second background, generate a third background, update the session page, and present the third background in the session page.8.根据权利要求7所述的方法,其中,所述方法还包括;8. The method of claim 7, wherein the method further comprises;获取解密区域顺序信息,其中,所述解密区域顺序信息包括所述第二背景中多个区域以及所述多个区域对应的解密顺序;Obtaining decryption area sequence information, wherein the decryption area sequence information includes multiple areas in the second background and decryption sequences corresponding to the multiple areas;将所述解密区域顺序信息发送至所述第二用户设备。Sending the decrypted area sequence information to the second user equipment.9.根据权利要求8所述的方法,其中,所述获取解密区域顺序信息,包括:9. The method according to claim 8, wherein the obtaining decryption area sequence information comprises:识别所述第一背景,根据识别结果,确定解密区域顺序信息。Identify the first background, and determine decryption area sequence information according to the identification result.10.根据权利要求9所述的方法,其中,识别所述第一背景,根据识别结果,确定解密区域顺序信息,包括:10. The method according to claim 9, wherein, identifying the first background, and determining decryption area sequence information according to the identification result, comprising:识别所述第一背景,获得所述第一背景对应的多个区域以及每个区域对应的重要程度;Identifying the first background, obtaining a plurality of regions corresponding to the first background and the corresponding importance of each region;根据所述每个区域的重要程度对所述多个区域进行排序,获得所述解密区域顺序信息。The plurality of regions are sorted according to the importance of each region, and the decrypted region sequence information is obtained.11.根据权利要求10所述的方法,其中,识别所述第一背景,获得所述第一背景对应的多个区域以及每个区域对应的重要程度,包括:11. The method according to claim 10, wherein identifying the first background, and obtaining a plurality of regions corresponding to the first background and an importance level corresponding to each region, comprising:识别所述第一背景对应的类型信息,根据所述类型信息获得所述第一背景对应的多个区域以及每个区域对应的重要程度。Identify the type information corresponding to the first background, and obtain a plurality of areas corresponding to the first background and the corresponding importance level of each area according to the type information.12.根据权利要求7所述的方法,其中,所述方法还包括:12. The method of claim 7, wherein the method further comprises:获取所述目标会话的会话频次信息;obtaining session frequency information of the target session;将所述会话频次信息发送至所述第一用户设备及所述第二用户设备。Sending the session frequency information to the first user equipment and the second user equipment.13.根据权利要求12所述的方法,其中,所述获取所述目标会话的会话频次信息,包括以下至少一项:13. The method according to claim 12, wherein the acquiring session frequency information of the target session comprises at least one of the following:获取所述目标会话中的所有用户的会话频次信息;Obtain session frequency information of all users in the target session;获取所述目标会话中所述第一用户与所述至少一个第二用户的会话频次信息;Acquire session frequency information of the first user and the at least one second user in the target session;获取所述目标会话中所述至少一个第二用户的发言频次信息。Acquiring speech frequency information of the at least one second user in the target session.14.根据权利要求12所述的方法,其中,所述方法还包括:14. The method of claim 12, wherein the method further comprises:根据所述会话频次信息,确定所述第二背景的解密进度信息;determining the decryption progress information of the second background according to the session frequency information;将所述解密进度信息发送至所述第一用户设备及所述第二用户设备。Sending the decryption progress information to the first user equipment and the second user equipment.15.根据权利要求14所述的方法,其中,所述根据所述会话频次信息,确定所述第二背景的解密进度信息,包括:15. The method according to claim 14, wherein the determining the decryption progress information of the second background according to the session frequency information comprises:确定所述会话频次信息落入的会话频次范围,并将所述会话频次范围对应的解密进度作为所述第二背景的解密进度信息。Determine the session frequency range that the session frequency information falls into, and use the decryption progress corresponding to the session frequency range as the decryption progress information of the second background.16.根据权利要求14所述的方法,其中,所述根据所述会话频次信息,确定所述第二背景的解密进度信息,包括:16. The method according to claim 14, wherein the determining the decryption progress information of the second background according to the session frequency information comprises:若根据所述会话频次信息确定所述目标会话的当前活跃度满足预定重加密条件,确定所述第二背景中需要重加密的区域信息,并根据所述区域信息确定所述第二背景的解密进度信息。If it is determined according to the session frequency information that the current activity of the target session satisfies a predetermined re-encryption condition, determine the area information in the second background that needs to be re-encrypted, and determine the decryption of the second background according to the area information progress information.17.一种在社交应用中呈现背景的方法,应用于服务器,其中,所述方法包括:17. A method of presenting a background in a social application, applied to a server, wherein the method comprises:响应于社交应用中针对目标会话的背景设置触发事件,确定所述目标会话中的至少一个第一用户对应的第四背景及所述第四背景对应的加密方式;In response to setting a trigger event for the context of the target session in the social application, determining a fourth context corresponding to at least one first user in the target session and an encryption method corresponding to the fourth context;将所述第四背景及所述第四背景对应的加密方式发送至所述至少一个第一用户对应的第一用户设备,以在所述第一用户设备中所述目标会话对应的会话页面中呈现第五背景,其中,所述第一用户设备根据所述加密方式对所述第四背景执行加密操作所生成所述第五背景,并获取所述第五背景对应的解密进度信息,根据所述解密进度信息及所述加密方式对应的解密方式,对所述第五背景执行解密操作,生成第三背景,更新所述会话页面,在所述会话页面中呈现所述第三背景。sending the fourth context and the encryption method corresponding to the fourth context to the first user equipment corresponding to the at least one first user, so as to be displayed in the session page corresponding to the target session in the first user equipment A fifth background is presented, wherein the fifth background is generated by the first user equipment performing an encryption operation on the fourth background according to the encryption method, and obtains decryption progress information corresponding to the fifth background, and according to the encryption method The decryption progress information and the decryption method corresponding to the encryption method are performed, a decryption operation is performed on the fifth background, a third background is generated, the session page is updated, and the third background is presented in the session page.18.一种在社交应用中呈现背景的方法,应用于第一用户设备,其中,所述方法包括:18. A method of presenting a background in a social application, applied to a first user equipment, wherein the method comprises:接收服务器发送的第四背景及所述第四背景对应的加密方式,其中,所述第四背景是所述服务器针对目标会话设置的;receiving the fourth context sent by the server and the encryption method corresponding to the fourth context, wherein the fourth context is set by the server for the target session;根据所述加密方式,对所述第四背景执行加密操作,生成第五背景;According to the encryption method, an encryption operation is performed on the fourth background to generate a fifth background;在所述目标会话对应的会话页面中呈现所述第五背景;presenting the fifth background in a session page corresponding to the target session;获取所述第五背景对应的解密进度信息;obtaining decryption progress information corresponding to the fifth background;根据所述解密进度信息及所述加密方式对应的解密方式,对所述第五背景执行解密操作,生成第三背景;According to the decryption progress information and the decryption method corresponding to the encryption method, perform a decryption operation on the fifth background to generate a third background;更新所述会话页面,在所述会话页面中呈现所述第三背景。The session page is updated to render the third background in the session page.19.一种在社交应用中呈现背景的方法,其中,所述方法包括:19. A method of presenting a context in a social application, wherein the method comprises:第一用户设备响应于社交应用中第一用户针对目标会话的背景设置操作,获取所述第一用户设置的第一背景及所述第一背景对应的加密方式;The first user equipment acquires the first background set by the first user and the encryption method corresponding to the first background in response to the background setting operation of the first user for the target session in the social application;所述第一用户设备将所述第一背景及所述加密方式发送至所述社交应用对应的服务器;The first user equipment sends the first background and the encryption method to a server corresponding to the social application;所述服务器接收所述第一用户设备发送的所述第一背景及所述加密方式,并将所述第一背景及所述加密方式发送至所述目标会话中的至少一个第二用户对应的第二用户设备;The server receives the first context and the encryption method sent by the first user equipment, and sends the first background and the encryption method to the corresponding at least one second user in the target session. second user equipment;所述第二用户设备接收所述服务器发送的所述第一背景及所述加密方式;receiving, by the second user equipment, the first background and the encryption method sent by the server;所述第二用户设备根据所述加密方式,对所述第一背景执行加密操作,生成第二背景,并在所述目标会话对应的会话页面中呈现所述第二背景;The second user equipment performs an encryption operation on the first background according to the encryption method, generates a second background, and presents the second background in a session page corresponding to the target session;所述第二用户设备获取所述第二背景对应的解密进度信息;obtaining, by the second user equipment, decryption progress information corresponding to the second background;所述第二用户设备根据所述解密进度信息及所述加密方式对应的解密方式,对所述第二背景执行解密操作,生成第三背景;The second user equipment performs a decryption operation on the second background according to the decryption progress information and the decryption method corresponding to the encryption method to generate a third background;所述第二用户设备更新所述会话页面,在所述会话页面中呈现所述第三背景。The second user equipment updates the session page and presents the third background in the session page.20.一种在社交应用中呈现背景的方法,其中,所述方法包括:20. A method of presenting a background in a social application, wherein the method comprises:服务器响应于社交应用中针对目标会话的背景设置触发事件,确定所述目标会话中的至少一个第一用户对应的第四背景及所述第四背景对应的加密方式;The server determines a fourth context corresponding to at least one first user in the target session and an encryption method corresponding to the fourth context in response to setting a trigger event for the context of the target session in the social application;所述服务器将所述第四背景及所述第四背景对应的加密方式发送至所述至少一个第一用户对应的第一用户设备;sending, by the server, the fourth context and the encryption method corresponding to the fourth context to the first user equipment corresponding to the at least one first user;所述第一用户设备接收所述服务器发送的所述第四背景及所述加密方式;receiving, by the first user equipment, the fourth context and the encryption method sent by the server;所述第一用户设备根据所述加密方式,对所述第四背景执行加密操作,生成第五背景,并在所述目标会话对应的会话页面中呈现所述第五背景;The first user equipment performs an encryption operation on the fourth background according to the encryption method, generates a fifth background, and presents the fifth background in a session page corresponding to the target session;所述第一用户设备获取所述第五背景对应的解密进度信息;obtaining, by the first user equipment, decryption progress information corresponding to the fifth background;所述第一用户设备根据所述解密进度信息及所述加密方式对应的解密方式,对所述第五背景执行解密操作,生成第三背景;The first user equipment performs a decryption operation on the fifth background according to the decryption progress information and the decryption method corresponding to the encryption method to generate a third background;所述第一用户设备更新所述会话页面,在所述会话页面中呈现所述第三背景。The first user equipment updates the session page and presents the third background in the session page.21.一种用于在社交应用中呈现背景的设备,其中,所述设备包括:21. An apparatus for presenting a context in a social application, wherein the apparatus comprises:处理器;以及processor; and被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求1至18中任一项所述的方法。a memory arranged to store computer-executable instructions which, when executed, cause the processor to perform a method as claimed in any one of claims 1 to 18.22.一种存储指令的计算机可读介质,所述指令在被执行时使得系统进行如权利要求1至18中任一项所述的方法。22. A computer-readable medium storing instructions that, when executed, cause a system to perform the method of any of claims 1 to 18.
CN202010339178.4A2020-04-262020-04-26Method and equipment for presenting background in social applicationActiveCN111556199B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010339178.4ACN111556199B (en)2020-04-262020-04-26Method and equipment for presenting background in social application

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010339178.4ACN111556199B (en)2020-04-262020-04-26Method and equipment for presenting background in social application

Publications (2)

Publication NumberPublication Date
CN111556199A CN111556199A (en)2020-08-18
CN111556199Btrue CN111556199B (en)2021-04-13

Family

ID=72004447

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010339178.4AActiveCN111556199B (en)2020-04-262020-04-26Method and equipment for presenting background in social application

Country Status (1)

CountryLink
CN (1)CN111556199B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103312506A (en)*2013-05-062013-09-18西安电子科技大学Multi-receiver sign-cryption method for receivers with anonymous identities
CN103442146A (en)*2013-08-302013-12-11宇龙计算机通信科技(深圳)有限公司Mobile terminal and method and system thereof for displaying session interface with contacts
CN104134042A (en)*2013-07-182014-11-05腾讯科技(深圳)有限公司Private file encryption method and private file encryption device
TW201508520A (en)*2013-08-212015-03-01Alibaba Group Services LtdMethod, Server and System for Setting Background Image
WO2015161690A1 (en)*2014-04-252015-10-29天地融科技股份有限公司Secure data interaction method and system
CN105991513A (en)*2015-01-272016-10-05中兴通讯股份有限公司Data protection method, device and mobile terminal
CN106776774A (en)*2016-11-112017-05-31努比亚技术有限公司Mobile terminal chooses picture device and method
CN107579903A (en)*2017-07-112018-01-12深圳市中易通安全芯科技有限公司A kind of image information safe transmission method and system based on mobile device
CN110099159A (en)*2018-01-292019-08-06优酷网络技术(北京)有限公司A kind of methods of exhibiting and client of chat interface

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103945344B (en)*2014-04-232019-02-01华为技术有限公司A kind of method for sending information, the network equipment and terminal
CN104010299B (en)*2014-05-212016-12-28中国人民解放军信息工程大学Mobile communication session privacy Enhancement Method based on safety of physical layer
US10664576B2 (en)*2016-07-242020-05-26Darrin EdelmanIdentity assurance method
CN106682967A (en)*2017-01-052017-05-17胡开标Online translation and chat system
US9924447B1 (en)*2017-02-202018-03-20Sprint Spectrum L.P.Distinguishing between foreground and background communications based on analysis of context information

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103312506A (en)*2013-05-062013-09-18西安电子科技大学Multi-receiver sign-cryption method for receivers with anonymous identities
CN104134042A (en)*2013-07-182014-11-05腾讯科技(深圳)有限公司Private file encryption method and private file encryption device
TW201508520A (en)*2013-08-212015-03-01Alibaba Group Services LtdMethod, Server and System for Setting Background Image
CN103442146A (en)*2013-08-302013-12-11宇龙计算机通信科技(深圳)有限公司Mobile terminal and method and system thereof for displaying session interface with contacts
WO2015161690A1 (en)*2014-04-252015-10-29天地融科技股份有限公司Secure data interaction method and system
CN105991513A (en)*2015-01-272016-10-05中兴通讯股份有限公司Data protection method, device and mobile terminal
CN106776774A (en)*2016-11-112017-05-31努比亚技术有限公司Mobile terminal chooses picture device and method
CN107579903A (en)*2017-07-112018-01-12深圳市中易通安全芯科技有限公司A kind of image information safe transmission method and system based on mobile device
CN110099159A (en)*2018-01-292019-08-06优酷网络技术(北京)有限公司A kind of methods of exhibiting and client of chat interface

Also Published As

Publication numberPublication date
CN111556199A (en)2020-08-18

Similar Documents

PublicationPublication DateTitle
CN107294709A (en)A kind of block chain data processing method, apparatus and system
CN110266505B (en)Method and equipment for managing session group
CN112822431B (en) Method and device for private audio and video call
CN110046000B (en) Small program running method and device
CN110780955B (en)Method and equipment for processing expression message
CN112765642B (en) Data processing method, data processing device, electronic device and medium
EP2916257B1 (en)Proximity communication method and apparatus
CN113591040B (en)Encryption method and device, decryption method and device, electronic device and medium
CN112822430A (en)Conference group merging method and device
CN112968899A (en)Method and equipment for encrypted communication
CN110535755B (en) A method and device for deleting session messages
CN112380502A (en)Web application processing method and device, server and terminal equipment
CN108833504B (en)Cross-site information synchronization method and device
CN111556199B (en)Method and equipment for presenting background in social application
KR102213429B1 (en)Apparatus And Method For Providing Sound
CN110492998B (en) Methods of encrypting and decrypting data
CN112866302A (en)Method, apparatus, medium and program product for integrity checking of cluster data
CN113157162A (en)Method, apparatus, medium and program product for revoking session messages
CN112949866A (en)Poisson regression model training method and device, electronic equipment and storage medium
CN112787831A (en)Method and equipment for splitting conference group
US12400034B2 (en)Preserving user privacy in captured content
CN114826792B (en)Audio-based authentication transfer method, device, equipment and readable storage medium
JP2021513712A (en) Systems and methods for distributed data storage
KR20160026313A (en)Device and method for encrypting or decrypting data
CN105528557A (en)Method and device for encrypting audio file

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
CP03Change of name, title or address
CP03Change of name, title or address

Address after:Room 80536, Shanghai

Patentee after:Shanghai Zongzhang Technology Group Co.,Ltd.

Country or region after:China

Address before:Room 80536, Shanghai

Patentee before:SHANGHAI ZHANGMEN SCIENCE AND TECHNOLOGY Co.,Ltd.

Country or region before:China


[8]ページ先頭

©2009-2025 Movatter.jp