Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information sharing method and device, electronic equipment and storage medium

A technology for information sharing and user information, applied in computer security devices, using information identifiers to retrieve web data, electronic digital data processing, etc., can solve problems such as hidden dangers of user information security, and achieve the effect of improving information security

Active Publication Date: 2020-03-17
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in order to distribute rewards reasonably, after the shared user opens the sharing page on the client terminal, the user information of the shared user will be uploaded to the server for verification. This processing mechanism has potential user information security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information sharing method and device, electronic equipment and storage medium
  • Information sharing method and device, electronic equipment and storage medium
  • Information sharing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0091] As an exemplary implementation, such as figure 1 As shown, the embodiment of the present application provides an information sharing method, including the following steps:

[0092] Step S101, receiving a first shared page link from a second user terminal.

[0093] Wherein, the link of the first sharing page is encrypted; the link of the first sharing page includes user information of the second client terminal.

[0094] Exemplarily, the first shared page link may be a link pointing to a shared page, and decrypting the encrypted first shared page link can obtain the content included in the link and open the shared page it points to. For example, when the user of the first client clicks the link of the first sharing page, the first client decrypts the link of the first sharing page, obtains the user information of the second client and opens the corresponding sharing page. The shared page can be used to instruct the first client receiving the link to complete some tasks...

example 1

[0126] Example 1, user information may include user equipment information. For example, before the first user terminal sends the second sharing page link, the operating system type of the user equipment and the version number of the user terminal are verified. Only a specific type of operating system and a specific version of the client are allowed to send the second shared page link, so as to increase the threshold for users to forge the shared page link.

[0127] Example 2: User information may include user status, including user login status or user region. For example, before the first client sends the link to the second sharing page, it is verified whether the user is logged in, whether the region where the user is located belongs to the activity range of the information sharing activity, and the like.

example 3

[0128] Example 3: User information may include user equipment information and user account information. For example, before the first client sends the link to the second shared page, it is verified whether the binding relationship between the user equipment information and the user identity information is consistent with that recorded in the server. When a user participates in an activity for the first time, their device information and identity information are strongly bound and recorded. In this way, only when the user's device information and identity information are the same as those recorded in the server can the link be sent and rewards obtained. Prevent one user account from using multiple devices to share links, or one device to register multiple user accounts to share links, and prevent users from maliciously swiping rewards.

[0129] In some embodiments, it is also possible to verify the sharing frequency of the first user terminal before sending the sharing page li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information sharing method and device, electronic equipment and a storage medium, and relates to the field of internet information processing. The specific implementation scheme is as follows: receiving a first sharing page link from a second user side; encrypting the first sharing page link, wherein the first sharing page link comprises user information of the second user side; decrypting the received first sharing page link by using a predetermined algorithm to obtain user information of a second user side; sending the first verification information to a server, wherein the first verification information comprises user information of the second user side, and the first verification information is used for enabling the server to verify whether the user information of the second user side is legal or not. According to the embodiment of the invention, the user information is sent only when the first user side and the second user side are both normal user sides, so that the user information is prevented from being intercepted by malicious programs, and the user information security is guaranteed.

Description

technical field [0001] The present application relates to the field of information processing, in particular to the field of Internet information processing. Background technique [0002] AARRR (Acquisition-Activation-Retention-Revenue-Refer, Acquisition-Activation-Retention-Realization-Refer) model is a common model for user growth, including five important stages in the user life cycle. The user acquisition phase can be achieved through information sharing. At present, in information sharing activities, the sharing user can use the user terminal to share the link of the sharing page, and the shared user opens the sharing page on the user terminal and completes the sharing task, and then the sharing user or the shared user can obtain corresponding activity rewards. The use of rewards for information sharing can drive users to share and use user-end products, thereby achieving the effect of user fission. At present, in order to distribute rewards reasonably, after the shar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/31G06F16/955
CPCG06F21/602G06F21/31G06F16/9558
Inventor 王全想
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products