CN103532945B - Sharing control method and related equipment and communication system - Google Patents

Sharing control method and related equipment and communication system Download PDF

Info

Publication number
CN103532945B
CN103532945B CN201310465818.6A CN201310465818A CN103532945B CN 103532945 B CN103532945 B CN 103532945B CN 201310465818 A CN201310465818 A CN 201310465818A CN 103532945 B CN103532945 B CN 103532945B
Authority
CN
China
Prior art keywords
sharing
sharing control
application
applications
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310465818.6A
Other languages
Chinese (zh)
Other versions
CN103532945A (en
Inventor
亢治
任雁蒙
朱建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201310465818.6A priority Critical patent/CN103532945B/en
Publication of CN103532945A publication Critical patent/CN103532945A/en
Application granted granted Critical
Publication of CN103532945B publication Critical patent/CN103532945B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a sharing control method and related equipment and a communication system. The sharing control method can comprise the following steps: sending a sharing control strategy issuing request carrying N application identifiers to a sharing control strategy server by a user terminal; receiving N sharing control strategies which are issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies are in one-to-one correspondence with N applications which are represented by the N application identifiers, and N is a positive integer; if a sharing closing command is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. The scheme of the embodiment is favorable to improvement on sharing control flexibility and convenience.

Description

Sharing control method, related equipment and communication system
Technical Field
The invention relates to the technical field of communication, in particular to a sharing control method, related equipment and a communication system.
Background
With the development and popularization of consumer terminal devices, it has become increasingly common for a family to have multiple terminal devices at the same time, for example, one family may have terminal devices such as a Personal Computer, a tablet Computer, a smart television, a mobile phone, and a Home Theater Computer (HTPC) at the same time. Sharing media content between devices is one of the basic requirements of users, and some Alliance organizations and some companies make some protocols for media sharing and interconnection based on the existing requirements of the media sharing function, such as music share of an affiliate company, AllShare of samsung, iTunes of apple, flash Alliance, Digital Living Network Alliance (DLNA), and the like.
At present, applications developed on intelligent terminal equipment following the above protocols all have their own setting pages for setting the sharing switch. However, there is no solution for performing unified control on sharing functions in the prior art, for example, if a plurality of applications with sharing functions are simultaneously installed on one intelligent terminal device, and if a user wants to close all or a plurality of sharing functions, the prior art needs to enter a setting page of a related application to perform setting change.
Disclosure of Invention
The embodiment of the invention provides a sharing control method, related equipment and a communication system, aiming at improving the flexibility and convenience of sharing control.
A first aspect of an embodiment of the present invention provides a sharing control method, which may include:
a user terminal sends a sharing control strategy issuing request carrying N application identifications to a sharing control strategy server;
receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer;
and if a sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies.
With reference to the first aspect, in a first possible implementation manner, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes:
extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set;
the third application set is a difference between an intersection of a first application set and a second application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of a first port set and a second port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
With reference to the first aspect, in a second possible implementation manner, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes:
extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; the third port set is a difference between an intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
With reference to the first aspect, in a third possible implementation manner, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; closing the extracted first port set.
With reference to the first aspect or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, or the third possible implementation manner of the first aspect, in a fourth possible implementation manner, the method further includes:
and if a sharing starting instruction is received, executing the sharing starting operation of the N applications according to the N sharing control strategies.
With reference to the fourth possible implementation manner of the first aspect, in a fifth possible implementation manner,
the executing the sharing starting operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; opening the extracted first port set.
With reference to the first aspect, or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, or the third possible implementation manner of the first aspect, or the fourth possible implementation manner of the first aspect, or the fifth possible implementation manner of the first aspect, in a sixth possible implementation manner, the sending, to the shared control policy server, the shared control policy issuing request carrying the N application identifiers includes: and after receiving a sharing control strategy updating notification message carrying the N application identifiers and sent by the sharing control strategy server, sending a sharing control strategy sending request carrying the N application identifiers to the sharing control strategy server.
With reference to the first aspect, or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, or the third possible implementation manner of the first aspect, or the fourth possible implementation manner of the first aspect, or the fifth possible implementation manner of the first aspect, in a seventh possible implementation manner, the sending, to the shared control policy server, the shared control policy issuing request carrying N application identifiers includes: and after the sharing control strategy server inquires that the sharing control strategy of the application represented by the N application identifiers is updated, sending a sharing control strategy issuing request carrying the N application identifiers to the sharing control strategy server.
With reference to the first aspect, or the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, or the third possible implementation manner of the first aspect, or the fourth possible implementation manner of the first aspect, or the fifth possible implementation manner of the first aspect, or the sixth possible implementation manner of the first aspect, or the seventh possible implementation manner of the first aspect, in an eighth possible implementation manner, the receiving the sharing-off instruction includes: and receiving a sharing closing instruction generated by clicking a sharing closing icon on the interface by a user.
A second aspect of the embodiments of the present invention provides a sharing control method, which may include:
the sharing control strategy server receives a sharing control strategy issuing request carrying N application identifications from a user terminal;
sending N sharing control strategies used for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifications in a one-to-one mode, and N is a positive integer; and executing the sharing closing operation of the N applications according to the N sharing control strategies after the user terminal receives the sharing closing instruction.
In combination with the second aspect, in a first possible embodiment,
a first sharing control policy corresponding to a first application among the N sharing control policies includes:
the application identifier of the first application, the process name of the first application, the version number of the first application, and the sharing port set of the first application, wherein the first sharing control policy is any one of the N sharing control policies.
A third aspect of the present invention provides a user equipment, which may include:
the sender is used for sending a sharing control strategy issuing request carrying N application identifiers to the sharing control strategy server;
a receiver, configured to receive N sharing control policies issued by the sharing control policy server in response to the sharing control policy issuing request, where the N sharing control policies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer;
and the controller is used for executing the sharing closing operation of the N applications according to the N sharing control strategies if a sharing closing instruction is received.
With reference to the third aspect, in a first possible implementation manner, in terms of performing the sharing shutdown operation of the N applications according to the N sharing control policies,
the controller is specifically configured to:
extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of a first application set and a second application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of a first port set and a second port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications;
or,
extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; the third port set is a difference between an intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list;
or,
extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; closing the extracted first port set.
With reference to the third aspect or the first possible implementation manner of the third aspect, in a second possible implementation manner, the controller is further configured to, if a sharing start instruction is received, execute the sharing start operation of the N applications according to the N sharing control policies.
With reference to the second possible implementation manner of the third aspect, in a third possible implementation manner,
in the aspect of executing the sharing start operation of the N applications according to the N sharing control policies, the controller is specifically configured to extract a first port set that the N applications included in the N sharing control policies need to use in sharing; opening the extracted first port set.
With reference to the third aspect, or the first possible implementation manner of the third aspect, or the second possible implementation manner of the third aspect, or the third possible implementation manner of the third aspect, in a fourth possible implementation manner, the transmitter is specifically configured to send a sharing control policy issuing request carrying N application identifiers to a sharing control policy server after receiving a sharing control policy update notification message carrying the N application identifiers and issued by the sharing control policy server;
or,
and after the sharing control strategy server inquires that the sharing control strategy of the application represented by the N application identifiers is updated, sending a sharing control strategy issuing request carrying the N application identifiers to the sharing control strategy server.
A fourth aspect of the present invention provides a shared control policy server, which may include:
the receiver is used for receiving a sharing control strategy issuing request carrying N application identifiers from a user terminal;
a transmitter, configured to send, to the user terminal, N sharing control policies for responding to the sharing control policy issuing request, where the N sharing control policies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and executing the sharing closing operation of the N applications according to the N sharing control strategies after the user terminal receives the sharing closing instruction.
In combination with the fourth aspect, in a first possible embodiment,
a first sharing control policy corresponding to a first application among the N sharing control policies includes:
the application identifier of the first application, the process name of the first application, the version number of the first application, and the sharing port set of the first application, wherein the first sharing control policy is any one of the N sharing control policies.
A fifth aspect of the present invention provides a communication system, which may include:
the user terminal is used for sending a sharing control strategy issuing request carrying N application identifiers to the sharing control strategy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; if a sharing closing instruction is received, executing sharing closing operation of the N applications according to the N sharing control strategies;
the sharing control strategy server is used for receiving a sharing control strategy issuing request carrying N application identifiers from the user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal.
As can be seen from the above, in the solutions provided in some embodiments of the present invention, a user terminal sends a sharing control policy issuing request carrying N application identifiers to a sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a sharing control method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another sharing control method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart illustrating another sharing control method according to an embodiment of the present invention;
fig. 4-a is a schematic flow chart of another sharing control method according to an embodiment of the present invention;
fig. 4-b is a schematic diagram of a screen sharing area configuration according to an embodiment of the present invention;
FIGS. 4-c-4-g are schematic diagrams of several WLAN configurations according to embodiments of the present invention;
FIG. 4-h is a schematic diagram of a doodle service provided by an embodiment of the present invention;
fig. 5 is a schematic diagram of a shared control policy server according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a user equipment according to an embodiment of the present invention;
fig. 7 is a schematic diagram of another ue provided in an embodiment of the present invention;
fig. 8 is a schematic diagram of another sharing control policy server according to an embodiment of the present invention;
fig. 9 is a schematic diagram of another ue provided in an embodiment of the present invention;
fig. 10 is a schematic diagram of another sharing control policy server according to an embodiment of the present invention;
fig. 11 is a schematic diagram of another sharing control policy server according to an embodiment of the present invention;
fig. 12 is a schematic diagram of a communication system provided by an embodiment of the present invention;
fig. 13 is a schematic diagram of another ue according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a sharing control method, related equipment and a communication system, aiming at improving the flexibility and convenience of sharing control.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following are detailed below.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In an embodiment of the sharing control method of the present invention, a sharing control method includes: a user terminal sends a sharing control strategy issuing request carrying N application identifiers to a sharing control strategy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies.
Referring to fig. 1, fig. 1 is a schematic flowchart of a sharing control method according to an embodiment of the present invention. As shown in fig. 1, a sharing control method provided by an embodiment of the present invention may include the following steps:
101. and the user terminal sends a sharing control strategy issuing request carrying N application identifiers to the sharing control strategy server.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the sending, by the user terminal, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: and after receiving the sharing control strategy updating notification message carrying the N application identifiers and issued by the sharing control strategy server, the user terminal sends a sharing control strategy issuing request carrying the N application identifiers to the sharing control strategy server. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the terminal, may send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server to request to acquire the latest sharing control policy of the application represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the user terminal, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after inquiring from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers is updated, the user terminal sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The user terminal may, for example, periodically or aperiodically query the shared control policy server whether the shared control policy of the application represented by the N application identifiers is updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed by the user terminal), in this scenario, the sharing control policy server may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and certainly, the sharing control policy server may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
102. And the user terminal receives N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
103. And if the user terminal receives the sharing closing instruction, executing the sharing closing operation of the N applications according to the N sharing control strategies.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
The application sets or the port sets recorded in the sharing control white list are not allowed to be closed randomly, so that a user can protect some application sets and/or port sets from being closed easily by configuring the sharing control white list in the user terminal.
In some embodiments of the present invention, the method may further include: if the user terminal receives the sharing start instruction (for example, the sharing start instruction generated by clicking the sharing start icon on the desktop by the user may be received, or the sharing start instruction generated by triggering the user in another manner may also be received, or the sharing start instruction sent by another object may also be received), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the user terminal may receive a sharing closing instruction generated by the user by clicking a sharing closing icon on a desktop, or the user terminal may also receive a sharing closing instruction generated by the user through triggering in other manners, or the user terminal may also receive a sharing closing instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
As can be seen from the above, the user terminal of this embodiment sends a sharing control policy issuing request carrying N application identifiers to the sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
In another embodiment of the sharing control method of the present invention, another sharing control method may include: the sharing control strategy server receives a sharing control strategy issuing request carrying N application identifications from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer.
Referring to fig. 2, fig. 2 is a schematic flowchart of a sharing control method according to an embodiment of the present invention. As shown in fig. 2, a sharing control method provided by an embodiment of the present invention may include the following steps:
201. and the sharing control strategy server receives a sharing control strategy issuing request carrying N application identifications from the user terminal.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the receiving, by the sharing control policy server, a sharing control policy issuing request carrying N application identifiers from the user terminal may include: and after sending a sharing control strategy updating notification message carrying the N application identifiers to the user terminal, receiving a sharing control strategy issuing request carrying the N application identifiers from the user terminal. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal, the user terminal may send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server to request to acquire the latest sharing control policy of the application represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the user terminal, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after inquiring from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers is updated, the user terminal sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The user terminal may, for example, periodically or aperiodically query the shared control policy server whether the shared control policy of the application represented by the N application identifiers is updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed by the user terminal), in this scenario, the sharing control policy server may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and certainly, the sharing control policy server may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
202. The method comprises the steps that a sharing control strategy server sends N sharing control strategies for responding to a sharing control strategy issuing request to a user terminal, wherein the N sharing control strategies correspond to N applications represented by N application identifications one to one, and N is a positive integer; and executing the sharing closing operation of the N applications according to the N sharing control strategies after the user terminal receives the sharing closing instruction.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the present invention, the method may further include: if the user terminal receives a sharing start instruction (for example, may receive a sharing stop instruction generated by a user by clicking a sharing stop icon on a desktop, or may also receive a sharing stop instruction generated by the user by triggering in another manner, or may also receive a sharing stop instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the user terminal may receive a sharing start instruction generated by a user by clicking a sharing close icon on a desktop, or the user terminal may also receive a sharing start instruction generated by the user by triggering in other manners, or the user terminal may also receive a sharing start instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
As can be seen from the above, the sharing control policy server of the embodiment receives a sharing control policy issuing request carrying N application identifiers from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer, so that after the user terminal receives a sharing closing instruction, the user terminal executes sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
To facilitate a better understanding and implementation of the above-described aspects of embodiments of the present invention, several application scenarios are described below.
Referring to fig. 3, fig. 3 is a schematic flow chart of another sharing control method according to another embodiment of the present invention. As shown in fig. 3, another sharing control method according to another embodiment of the present invention may include the following steps:
301. and the sharing control strategy server sends a sharing control strategy updating notification message carrying P application identifications to the user terminal.
The sharing control policy server may manage and maintain the sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and may use the application identifiers and the like as indexes to find the corresponding sharing control policies maintained by the sharing control policy server. It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies. The sharing control strategy can comprise a plurality of information related to sharing control.
And the sharing control strategy server sends a sharing control strategy updating notification message carrying P application identifications to a plurality of user terminals. Each user terminal can obtain the sharing control strategy corresponding to the related application from the sharing control strategy server according to the requirement.
302. The method comprises the steps that a user terminal receives a sharing control strategy updating notification message carrying P application identifications from a sharing control strategy server, and the user terminal sends a sharing control strategy issuing request carrying N application identifications to the sharing control strategy server, wherein the N application identifications are subsets of the P application identifications (for example, applications represented by the N application identifications in the P application identifications are installed in the user terminal).
303. The method comprises the steps that a sharing control strategy server receives a sharing control strategy issuing request carrying N application identifications from a user terminal, and sends a sharing control strategy issuing request response used for responding to the sharing control strategy issuing request to the user terminal, wherein the sharing control strategy issuing request response carries N sharing control strategies, the N sharing control strategies correspond to N applications represented by the N application identifications one to one, and N is a positive integer.
304. And the user terminal receives the sharing control strategy issuing request response sent by the sharing control strategy server, and can store the N sharing control strategies carried by the sharing control strategy issuing request response.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
305. And the user terminal receives a sharing closing instruction.
306. And the user terminal executes the sharing closing operation of the N applications according to the N sharing control strategies.
In some embodiments of the present invention, the user terminal may receive a sharing closing instruction generated by the user by clicking a sharing closing icon on a desktop, or the user terminal may also receive a sharing closing instruction generated by the user through triggering in other manners, or the user terminal may also receive a sharing closing instruction sent by another object.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
For example, the user terminal extracts a first port set that the N applications included in the N sharing control policies share and need to use, the N applications form a first application set, the user terminal extracts a second application set and a second port set recorded in a sharing control white list, the user terminal removes elements included in the second application set from the first application set to obtain a third application set, the user terminal removes elements included in the second port set from the first port set to obtain a third port set, the elements in the third application set are further determined, if at least 1 of the sharing ports used by the applications in the third application set exists in the second port set, the applications are added to an application set a4 that needs to be terminated, the user terminal closes the third port set, and ends a corresponding process of the application set a 4.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the invention, the user terminal may close the first port set by executing a network port restriction instruction.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
In some embodiments of the present invention, if the user terminal receives the sharing start instruction (for example, may receive a sharing start instruction generated by the user by clicking a sharing start icon on a desktop, or may also receive a sharing start instruction generated by the user by triggering in another manner, or may also receive a sharing start instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
As can be seen from the above, the sharing control policy server of the embodiment receives a sharing control policy issuing request carrying N application identifiers from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer, so that after the user terminal receives a sharing closing instruction, the user terminal executes sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
To facilitate a better understanding and implementation of the above-described aspects of embodiments of the present invention, several application scenarios are described below.
Referring to fig. 4-a, fig. 4-a is a schematic flow chart of another sharing control method according to another embodiment of the present invention. As shown in fig. 4-a, another sharing control method provided by another embodiment of the present invention may include the following steps:
401. and the user terminal sends a sharing control strategy updating query request to the sharing control strategy server.
The user terminal may, for example, periodically or aperiodically query the shared control policy server whether the shared control policy of the application represented by the N application identifiers is updated. For example, the user terminal may send a request for updating the sharing control policy to the sharing control policy server under an instruction of the user, so as to query the sharing control policy server whether the sharing control policy corresponding to the application is updated.
In some embodiments of the present invention, the request for querying and updating the sharing control policy may carry P0 application identifiers, and certainly may also carry P0 version numbers corresponding to the P0 application identifiers one to one, where the version numbers may be corresponding version numbers of applications currently installed in the user terminal or version numbers of sharing control policies currently stored in the user terminal, so as to query, to the sharing control policy server, whether the sharing control policies corresponding to the applications identified by the P0 application identifiers are updated.
402. And after receiving the sharing control strategy updating query request sent by the user terminal, the sharing control strategy server sends a sharing control strategy updating notification message carrying P application identifications to the user terminal.
The P application ids may be a subset of the P0 application ids, the P0 application ids may also be a subset of the P application ids, and the P0 application id may also be partially or completely different from the P0 application ids.
The sharing control policy server may manage and maintain the sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and may use the application identifiers and the like as indexes to find the corresponding sharing control policies maintained by the sharing control policy server. It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies. The sharing control strategy can comprise a plurality of information related to sharing control.
And the sharing control strategy server sends a sharing control strategy updating notification message carrying P application identifications to a plurality of user terminals. Each user terminal can obtain the sharing control strategy corresponding to the related application from the sharing control strategy server according to the requirement.
403. The method comprises the steps that a user terminal receives a sharing control strategy updating notification message carrying P application identifications from a sharing control strategy server, and the user terminal sends a sharing control strategy issuing request carrying N application identifications to the sharing control strategy server, wherein the N application identifications are subsets of the P application identifications (for example, applications represented by the N application identifications in the P application identifications are installed in the user terminal).
404. The method comprises the steps that a sharing control strategy server receives a sharing control strategy issuing request carrying N application identifications from a user terminal, and sends a sharing control strategy issuing request response used for responding to the sharing control strategy issuing request to the user terminal, wherein the sharing control strategy issuing request response carries N sharing control strategies, the N sharing control strategies correspond to N applications represented by the N application identifications one to one, and N is a positive integer.
405. And the user terminal receives the sharing control strategy issuing request response sent by the sharing control strategy server, and can store the N sharing control strategies carried by the sharing control strategy issuing request response.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
406. And the user terminal receives a sharing closing instruction.
407. And the user terminal executes the sharing closing operation of the N applications according to the N sharing control strategies.
In some embodiments of the present invention, the user terminal may receive a sharing closing instruction generated by the user by clicking a sharing closing icon on a desktop, or the user terminal may also receive a sharing closing instruction generated by the user through triggering in other manners, or the user terminal may also receive a sharing closing instruction sent by another object.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
For example, the user terminal extracts a first port set that the N applications included in the N sharing control policies share and need to use, the N applications form a first application set, the user terminal extracts a second application set and a second port set recorded in a sharing control white list, the user terminal removes elements included in the second application set from the first application set to obtain a third application set, the user terminal removes elements included in the second port set from the first port set to obtain a third port set, the elements in the third application set are further determined, if at least 1 of the sharing ports used by the applications in the third application set exists in the second port set, the applications are added to an application set a4 that needs to be terminated, the user terminal closes the third port set, and ends a corresponding process of the application set a 4.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the invention, the user terminal may close the first port set by executing a network port restriction instruction.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
In some embodiments of the present invention, if the user terminal receives the sharing start instruction (for example, may receive a sharing start instruction generated by the user by clicking a sharing start icon on a desktop, or may also receive a sharing start instruction generated by the user by triggering in another manner, or may also receive a sharing start instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
For example, assuming that the ue is a linux architecture system, the ue can execute an "iptables-I OUTPUT-p tcp-sport 9000-j ACCEPT" command statement to open the port No. 9000 after receiving the sharing open command. Similarly, if the user terminal receives the sharing closing instruction, the user terminal may execute the "iptables-I OUTPUT-ptcp-sport 9000-j DROP" command statement to close the port9000, execute the "kill-9 process name" command statement to end the application process, and so on.
As can be seen from the above, the sharing control policy server of the embodiment receives a sharing control policy issuing request carrying N application identifiers from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer, so that after the user terminal receives a sharing closing instruction, the user terminal executes sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
A description will be given below by taking as an example a scenario in which screen sharing is performed between user terminals (for example, between a first user terminal and a second user terminal) by invoking a screen sharing application.
Supposing that a first user terminal sends a sharing control strategy issuing request carrying N1 application identifiers to a sharing control strategy server; and receiving N1 sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, and storing N1 sharing control strategies. Wherein, the N1 sharing control policies correspond to N1 applications represented by the N1 application identifiers one to one, and the N1 is a positive integer; the N1 application identifications include a screen sharing application identification.
Optionally, the second user terminal sends a sharing control policy issuing request carrying N2 application identifiers to the sharing control policy server; and receiving N2 sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, and storing N1 sharing control strategies. The N2 shared control policies correspond to N2 applications represented by the N2 application identifiers one to one, where N2 is a positive integer; wherein, the N2 application identifications include screen sharing application identifications.
The first user terminal can call the screen sharing application to initiate the screen sharing service; a first user terminal receives a screen sharing service access request corresponding to a screen sharing service from X second user terminals through a wireless local area network, wherein the first user terminal and the X second user terminals are both positioned in the wireless local area network, and X is a positive integer; if the X second user terminals are allowed to access the screen sharing service, the first user terminal encodes the content displayed in the first area of the screen of the first user terminal into a first video stream, and sends the first video stream to the X second user terminals through the wireless local area network. In this way, the second user terminal may display the first video stream (i.e. display the content corresponding to the first video stream) in a certain area (referred to as a second area for ease of reference) of its screen after receiving the first video stream transmitted by the first user terminal, and accordingly, the second user terminal may display the first video stream in the second area of its screen after receiving the first video stream transmitted by the first user terminal.
The user terminal in the embodiments of the present invention may be an intelligent mobile terminal, a portable computer, or a personal digital processing user terminal, and of course, the user terminal in the embodiments of the present invention may have a touch display screen or other types of display screens.
It can be understood that the first user terminal (if the first user terminal is installed with the screen sharing client) initiates the screen sharing service, which means that the first user terminal allows other user terminals to share the screen with the first user terminal, and some user terminals located in the same local area network (for example, user terminals installed with the screen sharing client) may monitor that the first user terminal starts the screen sharing service, and may access the screen sharing service started by the first user terminal. The user terminal initiating the screen sharing service may be referred to as a screen sharing service initiator, and the user terminal accessing the screen sharing service may be referred to as a screen sharing service access party.
In some embodiments of the present invention, the initiating, by the first user terminal, the screen sharing service may include: the first user terminal broadcasts a screen sharing service starting message corresponding to the screen sharing service in the wireless local area network, wherein the screen sharing service access request corresponding to the screen sharing service is sent by a second user terminal after the screen sharing service starting message is received.
In addition, in some other embodiments of the present invention, the initiating, by the first user terminal, the screen sharing service may include: the method comprises the steps that a first user terminal receives screen sharing service starting inquiry requests from X second user terminals, screen sharing service starting messages corresponding to the screen sharing services are broadcasted in the wireless local area network, or screen sharing service starting messages used for responding to the screen sharing service starting inquiry requests are sent to the X second user terminals, wherein the screen sharing service access requests corresponding to the screen sharing services are sent by the second user terminals after the screen sharing service starting messages are received.
In some embodiments of the present invention, the first ue may determine whether to allow the X second ues to access the screen sharing service according to a user instruction or a remaining amount of processing resources or a signal quality of a wireless local area network.
It can be understood that, after receiving the screen sharing service access request from the second user terminal, the first user terminal may send a screen sharing service denial access message (or no message is replied) to the second user terminal if the second user terminal is not allowed to access the screen sharing service, and may send a screen sharing service permission access message to the second user terminal if the second user terminal is allowed to access the screen sharing service.
The first user terminal may select a certain area (referred to as a first area for convenience of reference) in the screen as the screen sharing area. The first region selected by the first user terminal as the screen share may occupy a part or all of the area of the screen of the first user terminal, and the first region occupies a part of the area of the screen of the first user terminal as an example in fig. 4-b. The first user terminal may display picture, video, document, desktop, etc. content in the first area.
The following illustrates a manner in which the first user terminal selects the screen sharing area, as shown in fig. 4-b. After a user triggers the operation of selecting the sharing area, the first user terminal covers a semi-transparent image layer on the current screen, the user can slide a finger on the semi-transparent image for a long time, in the finger sliding process, the initial touch point of the finger is used as the vertex, the current touch point in the finger sliding process is used as the diagonal vertex to generate a rectangular frame, and the rectangular frame is continuously redrawn and changed along with the sliding of the finger. When the finger leaves the screen and stops sliding, the first user terminal records the position and size parameters of the current selected area, and simultaneously can pop up an option menu bar, the option menu bar is displayed at the bottom of the screen, and the user selects a desired operation in the option menu to complete the setting of the screen sharing area. For example, there are three types of options menu, i.e., "cancel", "reselect", and "determine". The selection of 'cancel' is to give up the setting of this time, the first user terminal can cancel the display of the option menu, cancel the display of the rectangular frame of the selected area, cancel the display of the semitransparent layer, and exit the setting mode; selecting 'reselect' indicates that the sharing area is to be reset, the first user terminal disappears the rectangular frame and the option menu bar of the selected area, and the user can execute the setting step again; and after the 'determination' is selected, the first user terminal cancels the option menu display, cancels the rectangular frame display of the selected area and cancels the semi-transparent layer display.
In some embodiments of the present invention, the first user terminal serves as a wifi hotspot, and the X second user terminals access the wireless local area network through the wifi hotspot (see fig. 4-c). Or, one of the X second user terminals serves as a wifi hotspot, and the first user terminal and the remaining second user terminals of the X second user terminals except the one second user terminal access the wireless local area network through the wifi hotspot (see fig. 4-d). Or, the first user terminal serves as a group owner, and the X second user terminals serve as group clients, and access the wireless local area network in a wifi direct connection manner (see fig. 4-e). Or one of the X second user terminals serves as a group owner, and the first user terminal and the remaining second user terminals of the X second user terminals except the one second user terminal serve as group clients, and access the wireless local area network in a wifi direct connection manner (see fig. 4-f). Or the first user terminal and the X second user terminals access the wireless local area network through a third-party wifi hotspot (see fig. 4-g). Of course, the first ue and the X second ues may access the same wlan through other methods.
In some embodiments of the present invention, the first user terminal may send the first video stream to the X second user terminals through the wireless local area network based on a multicast or unicast manner. For example, the first user terminal may comprise a video stream buffer queue and a block buffer queue; for the unicast mode, the first user terminal can put the video frames of the first video stream into the video stream buffer queue in turn according to the first-in first-out principle, wherein, if the first video frame stored in the X1 th queue unit in the video stream buffer queue is to be replaced by the second video frame in the first video stream, the first video frame still cannot be successfully transmitted to K4 second user terminals among the X second user terminals (i.e.: the K4 second user terminals did not successfully acquire the first video frame), the first video frame is written into a queue unit corresponding to K4 second user terminals in the blocking buffer queue (wherein at least one queue unit corresponds to each of the X second user terminals in the blocking buffer queue), and the first video frame stored in the X1 th queue unit is replaced by the second video frame. Wherein the sending the first video stream to the X second user terminals through the wireless lan may include: and aiming at each second user terminal in the X second user terminals, sending the video frames of the first video stream read from the video stream buffer queue and/or the blocking buffer queue to each second user terminal. It can be seen that, the video stream buffer queue and the blocking buffer queue are cooperatively used in the user terminal initiating the screen sharing service, which is beneficial to saving memory overhead in a scenario where there are a plurality of user terminals accessing the screen sharing service, because the first user terminal does not need to store unsuccessfully distributed video frames in the video stream buffer queue for a long time, the dequeuing speed of the video stream buffer queue can be synchronized with the speed of the encoded first video stream, and at least one queue unit is corresponding to each second user terminal in the X second user terminals in the blocking buffer queue, which is beneficial to realizing that each video stream does not affect each other, and is further beneficial to achieving the technical effect of saving memory overhead and time overhead without affecting each video stream.
In some embodiments of the present invention, if the first user terminal receives a first user operation event from the second user terminal through the wireless local area network, the first user operation event is executed, where the first user operation event is a user operation event for a second area in a screen of the second user terminal, and the second area displays a first video stream received by the second user terminal. The first user terminal can add the first user operation event into the system operation event linked list, and execute the first user operation event according to the execution sequence of each event in the system operation event linked list. The first user operation event may be a plurality of user operation events for a second area in a screen of the second user terminal, and assuming that the second area displays an animation, the first user operation event may be, for example, a user operation event for adjusting the progress, brightness, contrast, and/or size of the animation displayed in the second area. Assuming that the second area displays a desktop including a plurality of application icons, the first user operation event may be, for example, a user operation event for starting an application corresponding to a certain application icon in the desktop displayed in the second area, and so on. If necessary, the second user terminal may convert the monitored user operation event for the second area in the screen of the second user terminal into a first user operation event in a specified format (for example, the first user terminal specifies the format of the user operation event), and send the first user operation event to the first user terminal through the wireless local area network, so that the first user terminal can execute the first user operation event. Of course, if the system types of the first user terminal and the second user terminal are the same, and the first user terminal can identify the user operation event monitored by the second user terminal, the second user terminal can send the monitored user operation event to the first user terminal without performing format conversion.
In some embodiments of the present invention, the screen sharing may further support a doodle function, for example, the first user terminal may further cover a transparent layer on the first area; the first user operation event is a graffiti drawing event, wherein if the first user terminal receives the first user operation event from the second user terminal through the wireless local area network, the first user operation event is executed, and the method comprises the following steps: if the first user terminal receives the scrawling drawing event from the second user terminal through the wireless local area network, the scrawling to be drawn by the scrawling drawing event can be displayed on the transparent layer, and the drawn scrawling can be shared with other screen sharing service access parties. For example, as shown in fig. 4-h, the screen sharing service initiator S shares the content of the screen sharing area with the screen sharing service access party Pad and PhoXe, first, Pad makes a doodle mark on the sharing area, and at this time, all three devices can see the doodle mark made by Pad; and then, the phoXe makes some scrawling marks on the shared area, the three devices can see the scrawling marks made by the PhoXe, and the rest scenes can be analogized.
In some embodiments of the present invention, the first user terminal may further collect a sound signal played by the first user terminal, encode the collected sound signal into a first audio stream, and interleave the first audio stream into the first video stream, or the first user terminal may decode an audio file to obtain the first audio stream, interleave the obtained first audio stream into the first video stream,
wherein the sending the first video stream to the X second user terminals through the wireless lan may include: and distributing the first video stream interwoven with the first audio stream to the X second user terminals through the wireless local area network. Thus, the first user terminal can issue a voice command or play background music and the like to the second user terminal.
In some embodiments of the present invention, the first user terminal interleaves the first audio stream and the first video stream into a video stream in a hypertext transfer protocol Live Streaming (HLS) format, and the first user terminal may also interleave the first audio stream and the first video stream into a video stream in a non-HLS format, for example, the first user terminal may interleave the first audio stream and the first video stream into a video stream in a format specified by the second user terminal. And part or all of the X second user terminals can access the video stream in the HLS format in a browser mode, and part or all of the X second user terminals can access the video stream in the non-HLS format in a special client mode.
In some embodiments of the present invention, the bitrate of the first video stream may be constant. Or, the bitrate of the first video stream may correspond to the size of X, for example, when the number of the user terminals accessing the screen sharing service changes, the bitrate of the video stream may be dynamically adjusted by the first user terminal, for example, when the first user terminal detects that the number of the user terminals accessing the screen sharing service changes, the bitrate of the video stream may be adjusted according to the changed number of the user terminals accessing the screen sharing service, and assuming that the bitrate of the video stream when only 1 user terminal accessing the screen sharing service is set is a, and the number of the user terminals currently accessing the screen sharing service is X, then the bitrate of the current video stream should be a/X. That is, the larger the number of user terminals accessing the screen sharing service is, the lower the bitrate of the video stream is. Or, the bitrate of the first video stream may correspond to the type of the display content of the first area, for example, if the type of the content currently displayed in the first area by the first user terminal is a high-dynamic picture (such as a video, an interface animation, and the like), the first user terminal may increase the frame rate of the first video stream, and decrease the frame size of the first video stream, so as to increase the fluency of the first video stream; if the type of the content currently displayed in the first area by the first user terminal is a non-high dynamic picture, the first user terminal can reduce the frame rate of the video stream and increase the frame size of the video stream so as to increase the definition of the first video stream.
It can be understood that the first user terminal may decide whether to start encoding of the first video stream according to whether the user terminal of the screen sharing service is accessed. For example, if the user terminal does not have the accessed screen sharing service, the encoding of the first video stream is not started; if at least one user terminal of the accessed screen sharing service exists, starting the coding of the first video stream; if all the user terminals of the accessed screen sharing service are disconnected, the first user terminal may stop encoding of the first video stream. Of course, the first user terminal may also perform encoding of the first video stream all the time during the screen sharing service initiation.
In some embodiments of the invention, the first user terminal may also turn on a remote clip service; if M second user terminals among the X second user terminals access the remote clipboard service through the wireless local area network, when the first user terminal monitors that an updated clipboard object exists on a system clipboard of the first user terminal, the clipboard object is sent to the M second user terminals through the wireless local area network, so that the M second user terminals update the received clipboard object on the system clipboard.
In some embodiments of the invention, voice tagging may also be implemented while the screen is shared. The first user terminal may further transmit a voice tag service on indication to K1 second user terminals among the X second user terminals, for example, when the first user terminal displays a document in a first region of its screen; if receiving the voice mark recorded by some or all of the K1 second user terminals after receiving the voice mark service start instruction, storing the voice mark and recording the association relationship between the voice mark and a first document, where the first document is a document displayed by the first user terminal in a first area of a screen during recording the voice mark. Further, the first user terminal may play a voice mark having an association relation therewith when the first document is opened again. It is understood that K1 is less than or equal to X.
For another example, when the first user terminal displays a picture in a first area of the screen thereof, the first user terminal sends a voice tag service start instruction to K2 second user terminals among the X second user terminals; if receiving the voice tag recorded by some or all of the K2 second user terminals after receiving the voice tag service start instruction, storing the voice tag and recording the association relationship between the voice tag and a first picture, where the first picture is a picture displayed by the first user terminal in a first area of a screen during recording the voice tag. Further, the first user terminal may play a voice tag having an association relation with the first picture when the first picture is opened again.
It is understood that K2 is less than or equal to X.
For another example, when the first user terminal displays a video in a first area of its screen, the first user terminal sends a voice tag service on instruction to K3 second user terminals among the X second user terminals; if receiving the voice mark recorded by some or all of the K3 second user terminals after receiving the voice mark service start instruction, storing the voice mark and recording the association relationship between the voice mark and a first video, where the first video is a video displayed by the first user terminal in a first area of a screen during recording the voice mark. Other scenarios may be voice tagged in a similar manner. Further, the first user terminal may play a voice tag having an association with the first video when the first video is turned on again. It is understood that K3 is less than or equal to X.
It can be seen that, in this embodiment, after the first user terminal starts the screen sharing service allowing the multiple user terminals to access; if X second user terminals are accessed to the screen sharing service started by the first user terminal through the wireless local area network, the first user terminal codes the content displayed in the first area of the screen of the first user terminal into a first video stream, and sends the first video stream to the X second user terminals through the wireless local area network. In addition, the screen sharing technology in the embodiment of the invention can better support scenes with high requirements on fluency and real-time performance by means of higher transmission rate of the wireless local area network, and the first user terminal can realize the access control of the screen sharing services of a plurality of X second user terminals by means of the wireless local area network, and is also favorable for enhancing the flexibility of screen sharing participation and further favorable for expanding the number of screen sharing participants.
Furthermore, different coding means can be adopted according to different types of current screen display contents, so that the problem of balance between fluency requirements in scenes needing high fluency, such as videos or interface animations, and the like and definition requirements in image display scenes can be solved, and the dynamic response effect of coded video streams on scene requirements during switching of screen display scenes can be achieved.
Furthermore, the video stream buffer queue and the blocking buffer queue are cooperatively used in the user terminal initiating the screen sharing service, which is beneficial to saving memory overhead in a scene where a plurality of user terminals accessing the screen sharing service exist, and realizing that each path of video stream does not influence each other, thereby being beneficial to achieving the technical effect of saving the memory overhead and the time overhead under the condition that each path of video stream is not influenced.
In the process of screen sharing between the first user terminal and the second user terminal, the first user terminal receives a sharing closing instruction. The first user terminal can execute sharing closing operation of the N applications (including the screen sharing application) according to the N sharing control strategies.
In some embodiments of the present invention, the first user terminal may receive a sharing shutdown instruction generated by a user by clicking a sharing shutdown icon on a desktop, or the first user terminal may also receive a sharing shutdown instruction generated by the user by triggering in another manner, or the first user terminal may also receive a sharing shutdown instruction sent by another object.
In some embodiments of the invention, a first sharing control policy corresponding to the screen sharing application in the N sharing control policies may include: the method comprises the steps of identifying an application identifier of a screen sharing application, a process name of the screen sharing application, a version number of the screen sharing application and a sharing port set of the screen sharing application. Of course, the first sharing control policy may further include other information such as a manufacturer of the screen sharing application, an overview of the screen sharing application, and the like. The information contained in the sharing control strategy corresponding to other applications can be analogized.
In some embodiments of the present invention, the executing, by the first user terminal, the sharing shutdown operation of the N applications (including the screen sharing application) according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
For example, the first user terminal extracts a first port set that the N applications included in the N sharing control policies share and need to use, the N applications form a first application set, the first user terminal extracts a second application set and a second port set recorded in the sharing control white list, the first user terminal removes elements included in the second application set from the first application set to obtain a third application set, the first user terminal removes elements included in the second port set from the first port set to obtain a third port set, the elements in the third application set are further determined, if at least 1 of the sharing ports used by the applications in the third application set exists in the second port set, the applications are added to an application set a4 that needs to be terminated to be finally, the user terminal closes the third port set, and ends a corresponding process of the application set a 4.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N applications (including screen sharing applications) contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which needs to be used by the N applications (including screen sharing applications) contained in the N sharing control strategies in a sharing mode; the extracted first port set is closed.
In some embodiments of the invention, the user terminal may close the first port set by executing a network port restriction instruction.
It is understood that the screen sharing service between the first user terminal and the second user terminal is interrupted after the first port set is closed. In particular, if the screen sharing application is recorded in the sharing control white list, the port used by the screen sharing application for sharing will not be closed, and the screen sharing service between the first user terminal and the second user terminal can continue.
It is understood that the screen sharing service is taken as an example in the above example, and the sharing control of other applications can be performed in the same way.
To facilitate a better understanding and implementation of the above-described aspects of embodiments of the present invention, the following also provides related apparatus for practicing the above-described aspects.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an internal module structure of the sharing control policy server according to the embodiment of the present invention. As shown in fig. 5, a shared control policy server 500 provided by an embodiment of the present invention may include: a policy database 501, a policy management service unit 502, a management maintenance interface 503, and a terminal interface service unit 504.
The policy database 501 is mainly responsible for storing the sharing control policy.
The policy management service unit 502 is mainly responsible for maintaining the policy database, and may include reading and writing the policy database, backup management, and the like. The method provides viewing, modifying, adding and deleting operations of the sharing strategy to the outside, provides service for the management and maintenance interface, and can further support synchronous downloading, updating service and the like of the sharing control strategy of the user terminal.
The administration and maintenance interface 503: a maintenance portal is provided to the administrator. The administrator can use the management and maintenance interface 503 to perform the operations of viewing, modifying, adding, and deleting the sharing control policy, and also support the operation of actively backing up the policy database.
The terminal interface service unit 504 provides interface services for the terminal, including a request for the terminal to synchronously download the sharing policy base and a request for the terminal to update the sharing policy base.
Referring to fig. 6, fig. 6 is a schematic diagram of an internal module structure of a user terminal according to an embodiment of the present invention. As shown in fig. 6, a user terminal 600 according to an embodiment of the present invention may include a local policy repository 601, a policy management maintenance unit 602, a sharing policy execution unit 603, an interface control switch 604, and a sharing control configuration unit 605.
The local policy repository 601 is mainly responsible for storing the sharing control policy synchronized from the sharing control policy server.
The policy management maintenance unit 602 is mainly responsible for maintaining and updating the local policy repository 601. Including downloading of the policy repository, periodic update checking of the policy repository, and providing access to the policy repository for other modules.
The sharing policy executing unit 603 is responsible for parsing the policy base and executing the policy.
The sharing control configuration unit 605 is mainly responsible for performing supplementary setting on the execution rule of the sharing control policy, including selection setting and local saving of the sharing control white list.
Interface control switch 604 may be viewed as a toggle button located in a system setting that provides a user with shared control access. Wherein the user may initiate the sharing on or off control, for example, by clicking on the interface control switch 604.
The policy management maintenance unit 602 may establish a connection with the sharing control policy server after the service is started, and send a request for querying a version of the sharing control policy to the sharing control policy server. If the local sharing control strategy is the latest version, a regular checking version updating process can be entered. If the local sharing control strategy is not the latest version, sending a sharing control strategy issuing request to a sharing control strategy server; after the sharing control policy is updated successfully, a notification that the policy base is updated is sent to the sharing policy executing unit 603 that executes the sharing policy control, and a regular version update check process is entered.
Referring to fig. 7, an embodiment of the present invention further provides a user terminal 700, which may include:
a transmitter 710, a receiver 720, and a controller 730.
The transmitter 710 is configured to send a sharing control policy issuing request carrying N application identifiers to a sharing control policy server;
a receiver 720, configured to receive N sharing control policies issued by the sharing control policy server in response to the sharing control policy issuing request, where the N sharing control policies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer;
the controller 730 is configured to, if the sharing shutdown instruction is received, execute the sharing shutdown operation of the N applications according to the N sharing control policies.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, in terms of executing the sharing shutdown operation of the N applications according to the N sharing control policies, the controller 730 is specifically configured to:
extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is the difference between the intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is the difference between the intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications;
or,
extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list;
or,
extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the present invention, controller 730 may also be used to,
and if the sharing starting instruction is received, executing the sharing starting operation of the N applications according to the N sharing control strategies.
In some embodiments of the present invention, in terms of performing the sharing start operation of the N applications according to the N sharing control policies, the controller 730 may be specifically configured to extract a first port set that the N applications included in the N sharing control policies need to use in sharing; the extracted first port set is opened.
In some embodiments of the present invention, the transmitter 710 may be specifically configured to, after receiving the sharing control policy update notification message carrying the N application identifiers and sent by the sharing control policy server, send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal 700, the sender 710 may send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server to request to acquire the latest sharing control policy of the applications represented by the N application identifiers.
In other embodiments of the present invention, the transmitter 710 may be specifically configured to send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server after querying that the sharing control policy of the application represented by the N application identifiers is updated from the sharing control policy server.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed by the user terminal), in this scenario, the sharing control policy server may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and certainly, the sharing control policy server may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
In some embodiments of the present invention, a first sharing control policy corresponding to the first application in the N sharing control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies.
In some embodiments of the present invention, the controller 730 may receive a sharing closing instruction generated by a user by clicking a sharing closing icon on a desktop, or the controller 730 may also receive a sharing closing instruction generated by a user through other triggering methods, or the controller 730 may also receive a sharing closing instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
It can be understood that the functions of the functional modules of the user terminal 700 in this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the relevant description of the foregoing method embodiment, which is not described herein again.
As can be seen from the above, the user terminal 700 of this embodiment sends a request for issuing a sharing control policy carrying N application identifiers to the sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud collaborative mode, and not only can the future new sharing mode be executed by a cloud updating strategy and a user terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
Referring to fig. 8, an embodiment of the present invention further provides a shared control policy server 800, which may include:
a receiver 810 and a transmitter 820.
The receiver 810 is configured to receive a request for issuing a sharing control policy carrying N application identifiers from a user terminal.
A transmitter 820, configured to transmit, to the ue, N sharing control policies for responding to the request for issuing the sharing control policy, where the N sharing control policies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and executing the sharing closing operation of the N applications according to the N sharing control strategies after the user terminal receives the sharing closing instruction.
In some embodiments of the present invention, a first sharing control policy corresponding to the first application in the N sharing control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the receiving, by the sharing control policy server, a sharing control policy issuing request carrying N application identifiers from the user terminal may include: and after sending a sharing control strategy updating notification message carrying the N application identifiers to the user terminal, receiving a sharing control strategy issuing request carrying the N application identifiers from the user terminal. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal, the user terminal may send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server to request to acquire the latest sharing control policy of the application represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the user terminal, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after inquiring from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers is updated, the user terminal sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The user terminal may, for example, periodically or aperiodically query the shared control policy server whether the shared control policy of the application represented by the N application identifiers is updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed by the user terminal), in this scenario, the sharing control policy server may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and certainly, the sharing control policy server may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the present invention, the method may further include: if the user terminal receives a sharing start instruction (for example, may receive a sharing stop instruction generated by a user by clicking a sharing stop icon on a desktop, or may also receive a sharing stop instruction generated by the user by triggering in another manner, or may also receive a sharing stop instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the user terminal may receive a sharing start instruction generated by a user by clicking a sharing close icon on a desktop, or the user terminal may also receive a sharing start instruction generated by the user by triggering in other manners, or the user terminal may also receive a sharing start instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
It can be understood that the functions of the functional modules of the sharing control policy server 800 in this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
As can be seen from the above, the sharing control policy server 800 of the present embodiment receives a sharing control policy issuing request carrying N application identifiers from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer, so that after the user terminal receives a sharing closing instruction, the user terminal executes sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
Fig. 9 is a schematic structural diagram of a user terminal according to the present invention, and as shown in fig. 9, the user terminal 900 of this embodiment includes at least one bus 901, at least one processor 902 connected to the bus 901, and at least one memory 903 connected to the bus 901.
The processor 902 calls a code stored in the memory 903 through the bus 901 to send a sharing control policy issuing request carrying N application identifiers to the sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the sending, by the processor 902, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after receiving the sharing control policy update notification message carrying the N application identifiers and sent by the sharing control policy server, the processor 902 sends a sharing control policy sending request carrying the N application identifiers to the sharing control policy server. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal 900, the sharing control policy issuing request carrying the N application identifiers may be sent to the sharing control policy server to request to acquire the latest sharing control policy of the application represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the processor 902, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after querying from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers is updated, the processor 902 sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The processor 902 may query the shared control policy server periodically or aperiodically whether the shared control policies of the applications represented by the N application identifications are updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed by the user terminal 900), in this scenario, the sharing control policy server may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and of course, the sharing control policy server may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing, by the processor 902, the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In other embodiments of the present invention, the executing, by the processor 902, the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing, by the processor 902, the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
The application sets or the port sets recorded in the sharing control white list are not allowed to be closed randomly, so that a user can protect some application sets and/or port sets from being closed easily by configuring the sharing control white list in the user terminal.
In some embodiments of the present invention, if the processor 902 receives a sharing start instruction (for example, may receive a sharing start instruction generated by a user by clicking a sharing start icon on a desktop, or may also receive a sharing start instruction generated by the user by triggering in another manner, or may also receive a sharing start instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the processor 902, the sharing start operation of the N applications according to the N sharing control policies includes: the processor 902 extracts the first port set that the N applications included in the N sharing control policies share and need to use; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the processor 902 may receive a sharing closing instruction generated by a user by clicking a sharing closing icon on a desktop, or the processor 902 may also receive a sharing closing instruction generated by a user by triggering in other ways, or the processor 902 may also receive a sharing closing instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
It can be understood that the functions of the functional modules of the user terminal 900 in this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the relevant description of the foregoing method embodiment, which is not described herein again.
As can be seen from the above, the user terminal 900 of this embodiment sends a request for issuing a sharing control policy carrying N application identifiers to the sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
Fig. 10 is a schematic structural diagram of a shared control policy server according to the present invention, and as shown in fig. 10, the shared control policy server 1000 of this embodiment includes at least one bus 1001, at least one processor 1002 connected to the bus 1001, and at least one memory 1003 connected to the bus 1001.
The processor 1002 calls a code stored in the memory 1003 through the bus 1001 to receive a request for issuing a sharing control policy carrying N application identifiers from the user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the receiving, by the processor 1002, a request for issuing a sharing control policy carrying N application identifiers from a user terminal includes: and after sending a sharing control strategy updating notification message carrying the N application identifiers to the user terminal, receiving a sharing control strategy issuing request carrying the N application identifiers from the user terminal. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal, the user terminal may send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server to request to acquire the latest sharing control policy of the application represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the user terminal, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after inquiring from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers is updated, the user terminal sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The user terminal may, for example, periodically or aperiodically query the shared control policy server whether the shared control policy of the application represented by the N application identifiers is updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed in the user terminal), in this scenario, the processor 1002 may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and certainly, the processor 1002 may issue the sharing control policy of the latest version of the application represented by the N application identifiers.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the present invention, if the user terminal receives the sharing start instruction (for example, may receive a sharing stop instruction generated by the user by clicking a sharing stop icon on a desktop, or may also receive a sharing stop instruction generated by the user by triggering in another manner, or may also receive a sharing stop instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the user terminal may receive a sharing start instruction generated by a user by clicking a sharing close icon on a desktop, or the user terminal may also receive a sharing start instruction generated by the user by triggering in other manners, or the user terminal may also receive a sharing start instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
It can be understood that the functions of the functional modules of the sharing control policy server 1000 according to this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
As can be seen from the above, the sharing control policy server 1000 in this embodiment receives a sharing control policy issuing request carrying N application identifiers from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer, so that after the user terminal receives a sharing closing instruction, the user terminal executes sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
Referring to fig. 11, fig. 11 illustrates a structure of a shared control policy server 1100 according to an embodiment of the present invention, where the shared control policy server 1100 includes: at least one processor 1101, such as a CPU, at least one network interface 1104 or other user interface 1103, a memory 1105, at least one communication bus 1102. A communication bus 1102 is used to enable communications among the components. The sharing control policy server 1100 optionally contains a user interface 1103 including a display, a keyboard or a pointing device (e.g., a mouse, trackball, touch pad or touch screen). Memory 1105 may comprise high speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1105 may optionally include at least one memory device located remotely from the processor 1101 as previously described.
In some embodiments, memory 1105 stores the following elements, executable modules or data structures, or a subset or extended set thereof:
an operating system 11051 containing various system programs for implementing various basic services and for processing hardware-based tasks;
an application module 11052 contains various applications for implementing various application services.
Included in the application module 11052 are, but not limited to, a receiver 810 and a transmitter 820.
The specific implementation of each module in the application module 11052 refers to the corresponding module in the embodiment shown in fig. 8, which is not described herein again.
In some embodiments of the invention, the processor 1101 may be configured to, by invoking programs or instructions stored by the memory 1105: receiving a sharing control strategy issuing request carrying N application identifications from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the receiving, by the processor 1101, the request for issuing the sharing control policy carrying N application identifiers from the user terminal includes: and after sending a sharing control strategy updating notification message carrying the N application identifiers to the user terminal, receiving a sharing control strategy issuing request carrying the N application identifiers from the user terminal. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal, the user terminal may send a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server to request to acquire the latest sharing control policy of the application represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the user terminal, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after inquiring from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers is updated, the user terminal sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The user terminal may, for example, periodically or aperiodically query the shared control policy server whether the shared control policy of the application represented by the N application identifiers is updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed in the user terminal), in this scenario, the processor 1101 may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and certainly, the processor 1101 may issue the sharing control policy of the latest version of the application represented by the N application identifiers.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
In some embodiments of the present invention, if the user terminal receives the sharing start instruction (for example, may receive a sharing stop instruction generated by the user by clicking a sharing stop icon on a desktop, or may also receive a sharing stop instruction generated by the user by triggering in another manner, or may also receive a sharing stop instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal extracts the first port set which is contained in the N sharing control strategies and needs to be used by the N applications in a sharing mode; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the user terminal may receive a sharing start instruction generated by a user by clicking a sharing close icon on a desktop, or the user terminal may also receive a sharing start instruction generated by the user by triggering in other manners, or the user terminal may also receive a sharing start instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
It can be understood that the functions of the functional modules of the sharing control policy server 1100 in this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
As can be seen from the above, the sharing control policy server 1100 in this embodiment receives a sharing control policy issuing request carrying N application identifiers from a user terminal; and sending N sharing control strategies for responding to the sharing control strategy issuing request to the user terminal, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer, so that after the user terminal receives a sharing closing instruction, the user terminal executes sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
Referring to fig. 12, an embodiment of the present invention further provides a communication system, which may include:
a user terminal 1210 and a shared control policy server 1220.
The user terminal 1210 is configured to send a sharing control policy issuing request carrying N application identifiers to a sharing control policy server; receiving N sharing control policies issued by the sharing control policy server 1220 in response to the sharing control policy issuing request, where the N sharing control policies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if a sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies.
A sharing control policy server 1220, configured to receive a sharing control policy issuing request carrying N application identifiers from a user terminal 1210; and sending the N sharing control policies for responding to the sharing control policy issuing request to the user terminal 1210.
The sharing control policy server 1220 may manage and maintain the sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal 1210 may obtain the sharing control policies corresponding to the relevant applications from the sharing control policy server 1220 as needed.
In some embodiments of the present invention, the sending, by the user terminal 1210, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server 1220 may include: after receiving the sharing control policy update notification message carrying the N application identifiers and sent by the sharing control policy server 1220, the user terminal 1210 sends a sharing control policy sending request carrying the N application identifiers to the sharing control policy server 1220. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server 1220, the sharing control policy server 1220 may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal 1210, so as to notify the user terminal 1210 that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server 1220, and if the applications identified by the application identifiers are installed in the terminal, a sharing control policy issuing request carrying the N application identifiers may be sent to the sharing control policy server 1220, so as to request to acquire the latest control policy of the applications represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the user terminal 1210, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server 1220 may include: after querying from the sharing control policy server 1220 that the sharing control policy of the application represented by the N application identifiers is updated, the user terminal 1210 sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server 1220. The user terminal 1210 may query the shared control policy server 1220 periodically or aperiodically to determine whether the shared control policy of the application represented by the N application identifiers is updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding version numbers of applications currently installed by the user terminal 1210), in this scenario, the sharing control policy server 1220 may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and of course, the sharing control policy server 1220 may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In another embodiment of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
Since the application sets or port sets recorded in the sharing control white list are not allowed to be closed at will, the user configures the sharing control white list in the user terminal 1210 to protect some application sets and/or port sets from being closed easily.
In some embodiments of the present invention, if the user terminal 1210 receives a sharing start instruction (for example, may receive a sharing start instruction generated by a user by clicking a sharing start icon on a desktop, or may also receive a sharing start instruction generated by a user through other triggering, or may also receive a sharing start instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the executing, by the user terminal 1210, the sharing start operation of the N applications according to the N sharing control policies may include: the user terminal 1210 extracts the first port set that the N applications included in the N sharing control policies share; the extracted first port set is opened. Of course, the user terminal 1210 executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the user terminal 1210 may receive a sharing shutdown instruction generated by a user by clicking a sharing shutdown icon on a desktop, or the user terminal 1210 may also receive a sharing shutdown instruction generated by the user through triggering in another manner, or the user terminal 1210 may also receive a sharing shutdown instruction sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
As can be seen from the above, the user terminal 1210 of this embodiment sends a request for issuing a sharing control policy carrying N application identifiers to the sharing control policy server 1220; receiving N sharing control policies issued by the sharing control policy server 1220 in response to the sharing control policy issuing request, where the N sharing control policies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control policy server 1220 is used to manage and maintain the sharing control policies corresponding to a plurality of applications (possibly thousands of applications), the user terminal 1210 can request to obtain the sharing control policies corresponding to the relevant applications from the sharing control policy server 1220 as needed, and can execute the sharing shutdown operation of the corresponding applications according to the sharing control policies requested from the sharing control policy server 1220 after receiving the sharing shutdown instruction, which can avoid entering the relevant applications for shutdown setting by adopting the prior art, thereby being beneficial to improving the flexibility and convenience of sharing control. In addition, the sharing control policy server 1220 is used to manage and maintain the sharing control policies corresponding to a plurality of applications (possibly thousands of applications), which is beneficial to better support a plurality of user terminals 1210 to obtain flexible and convenient sharing control characteristics.
Furthermore, the scheme of the embodiment can be regarded as an end cloud cooperative mode, and not only can the future new sharing mode be performed by a cloud updating strategy and a terminal cooperation strategy aiming at the existing sharing modes such as DLNA, but also the effect can be still achieved.
An embodiment of the present invention further provides a schematic diagram of a user terminal 1300, where the user terminal 1000 may be used to implement part or all of the functions of the user terminal 600, the user terminal 700, the user terminal 900, or the user terminal 1210 in the foregoing embodiments.
As shown in fig. 13, for convenience of illustration, only some portions that may be related to the embodiments of the present invention are shown, and details of the specific technology are not disclosed, please refer to the method portion of the embodiments of the present invention.
Fig. 13 is a block diagram illustrating a partial structure of a mobile terminal that may be related to the terminal provided by the embodiment of the present invention. Referring to fig. 13, the mobile terminal includes a Radio Frequency (RF) circuit 1310, a memory 1320, an input unit 1330, a wireless fidelity (WiFi) module 1370, a display unit 1340, a sensor 1350, an audio circuit 1360, a processor 1380, and a power supply 1390.
Wherein those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 13 does not constitute a limitation of the mobile terminal and may include more or less components than those shown, or some of the components may be combined, or a different arrangement of components.
RF circuit 1310 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, for processing downlink information of a base station after receiving the downlink information to processor 1380; in addition, the data for designing uplink is transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 1310 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to global system for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), etc.
The memory 1320 may be used to store software programs and modules, and the processor 1380 executes various functional applications and data processing of the mobile terminal by operating the software programs and modules stored in the memory 1320. The memory 1320 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like; the storage data area may store data (e.g., audio data, a phonebook, etc.) created according to the use of the mobile terminal, etc. Further, the memory 1320 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 1330 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal 1300. Specifically, the input unit 1330 may include a touch panel 1331 and other input devices 1332. Touch panel 1331, also referred to as a touch screen, can collect touch operations by a user (e.g., operations by a user on or near touch panel 1331 using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 1331 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1380, where the touch controller can receive and execute commands sent by the processor 1380. In addition, the touch panel 1331 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1330 may include other input devices 1332 in addition to the touch panel 1331. In particular, other input devices 1332 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Among other things, the display unit 1340 may be used to display information input by a user or information provided to the user and various menus of the mobile terminal. The Display unit 1340 may include a Display panel 1341, and optionally, the Display panel 1341 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, touch panel 1331 can overlay display panel 1341, and when touch panel 1331 detects a touch operation on or near touch panel 1331, processor 1380 can be configured to determine the type of touch event, and processor 1380 can then provide a corresponding visual output on display panel 1341 based on the type of touch event. Although in fig. 13, the touch panel 1331 and the display panel 1341 are implemented as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1331 and the display panel 1341 may be integrated to implement the input and output functions of the mobile terminal.
Therein, the mobile terminal 1300 may further include at least one sensor 1350, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 1341 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 1341 and/or a backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the accelerometer sensor may detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when stationary, and may be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping) and the like for recognizing the attitude of the mobile terminal, and the mobile terminal may further be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor and the like, which are not described herein again.
The audio circuit 1360, speaker 1361, microphone 1362 may provide an audio interface between the user and the mobile terminal. The audio circuit 1360 may transmit the electrical signal converted from the received audio data to the speaker 1361, and the electrical signal is converted into a sound signal by the speaker 1361 and output; on the other hand, the microphone 1362 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 1360, processes the audio data by the audio data output processor 1380, and then transmits the processed audio data to, for example, another mobile terminal via the RF circuit 1310, or outputs the audio data to the memory 1320 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 1370, and provides wireless broadband internet access for the user. Although fig. 13 shows the WiFi module 1370, it is understood that it does not belong to the essential constitution of the mobile terminal 1300 and may be omitted entirely within the scope not changing the essence of the invention as needed.
The processor 1380 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 1320 and calling data stored in the memory 1320, thereby integrally monitoring the mobile terminal. Optionally, processor 1380 may include one or more processing units; preferably, the processor 1380 may integrate an application processor, which handles primarily operating systems, user interfaces, application programs, etc., and a modem processor, which handles primarily wireless communications. It will be appreciated that the modem processor described above may not be integrated within processor 1380.
Mobile terminal 1300 also includes a power supply 1390 (e.g., a battery) to provide power to various components, which may be logically coupled to processor 1380 via a power management system that may enable management of charging, discharging, and power consumption management functions. Although not shown, the mobile terminal 1300 may further include a camera, a bluetooth module, etc., which are not described in detail herein.
In some embodiments of the present invention, the processor 1380 is configured to send a sharing control policy issuing request carrying N application identifiers to the sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies.
The sharing control policy server may manage and maintain sharing control policies corresponding to a plurality of applications (possibly thousands of applications), and each user terminal may obtain the sharing control policies corresponding to the related applications from the sharing control policy server as needed.
In some embodiments of the present invention, the sending, by the processor 1380, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after receiving the sharing control policy update notification message carrying the N application identifiers and sent by the sharing control policy server, the processor 1380 sends a sharing control policy sending request carrying the N application identifiers to the sharing control policy server. For example, after the sharing control policy of the application represented by at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, the sharing control policy server may broadcast or unicast a sharing control policy update notification message carrying the at least one application identifier to the user terminal to notify the user terminal that the sharing control policy of the application represented by the at least one application identifier (for example, including the N application identifiers) is updated in the sharing control policy server, and if the applications identified by the application identifiers are installed in the user terminal 1300, the sharing control policy issuing request carrying the N application identifiers may be sent to the sharing control policy server to request to acquire the latest application sharing control policy represented by the N application identifiers.
In some embodiments of the present invention, the sending, by the processor 1380, the request for issuing the sharing control policy carrying the N application identifiers to the sharing control policy server may include: after inquiring from the sharing control policy server that the sharing control policy of the application represented by the N application identifiers has been updated, the processor 1380 sends a sharing control policy issuing request carrying the N application identifiers to the sharing control policy server. The processor 1380 may, for example, periodically or aperiodically query the shared control policy server whether the shared control policies of the applications represented by the N application identifiers are updated.
Further, the sharing control policy issuing request may carry, in addition to the N application identifiers, version numbers of applications represented by the N application identifiers (the version numbers are corresponding to applications currently installed by the user terminal 1300), in this scenario, the sharing control policy server may issue the sharing control policy of the corresponding version numbers of the applications represented by the N application identifiers, and of course, the sharing control policy server may issue the sharing control policy of the latest version of the applications represented by the N application identifiers.
It can be understood that each application corresponds to one sharing control policy, and of course, some applications may have partially or completely the same sharing control policies, and some applications may have completely different sharing control policies.
The sharing control strategy can comprise a plurality of information related to sharing control.
In some embodiments of the invention, a first shared control policy corresponding to the first application in the N shared control policies may include: the method comprises the steps of identifying an application identifier of a first application, a process name of the first application, a version number of the first application and a sharing port set of the first application, wherein a first sharing control strategy is any one of the N sharing control strategies. Of course, other information such as the vendor of the first application, a summary of the first application, etc. may also be included in the first shared control policy.
In some embodiments of the present invention, the executing, by the processor 1380, the sharing shutdown operation of the N applications according to the N sharing control policies may include: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the corresponding process of the application needing to use any one port in the second port set in the third application set; the third application set is a difference between an intersection of the first application set and the second application set, the second application set is an application set recorded in a preset sharing control white list, the third port set is a difference between an intersection of the first port set and the second port set, the second port set is a port set required to be used by the second application set, and the first application set is composed of the N applications.
In other embodiments of the present invention, the processor 1380 executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is required to be used by the N application shares and contained in the N sharing control strategies; closing the third port set and ending the process of the application which needs to use any one port in the second port set in the N applications; and the third port set is the difference between the intersection of the first port set and the second port set, and the second port set is a port set recorded in a preset sharing control white list.
In still other embodiments of the present invention, the processor 1380 executing the sharing shutdown operation of the N applications according to the N sharing control policies includes: extracting a first port set which is contained in the N sharing control strategies and needs to be used by the N application shares; the extracted first port set is closed.
The application sets or the port sets recorded in the sharing control white list are not allowed to be closed randomly, so that a user can protect some application sets and/or port sets from being closed easily by configuring the sharing control white list in the user terminal.
In some embodiments of the present invention, if the processor 1380 receives the sharing start instruction (for example, may receive a sharing start instruction generated by a user by clicking a sharing start icon on a desktop, or may also receive a sharing start instruction generated by the user by triggering in another manner, or may also receive a sharing start instruction sent by another object), the sharing start operation of the N applications may be executed according to the N sharing control policies.
In some embodiments of the present invention, the processor 1380 executes the sharing start operation of the N applications according to the N sharing control policies, which may include: the processor 1380 extracts a first port set that the N applications included in the N sharing control policies need to use; the extracted first port set is opened. Of course, the user terminal executes the sharing start operation of the N applications in other manners according to the N sharing control policies.
In some embodiments of the present invention, the processor 1380 may receive a sharing shutdown command generated by a user clicking a sharing shutdown icon on a desktop, or the processor 1380 may receive a sharing shutdown command generated by a user triggering in other ways, or the processor 1380 may receive a sharing shutdown command sent by another object.
There may be many applications with sharing function, such as screen sharing application, media resource analysis application, text sharing application, processing resource sharing application or network analysis application, etc., and sharing requires using a port, so that sharing can be closed by closing the port.
As can be seen from the above, the user terminal 1300 of this embodiment sends a sharing control policy issuing request carrying N application identifiers to the sharing control policy server; receiving N sharing control strategies issued by the sharing control strategy server in response to the sharing control strategy issuing request, wherein the N sharing control strategies correspond to N applications represented by the N application identifiers one to one, and N is a positive integer; and if the sharing closing instruction is received, executing the sharing closing operation of the N applications according to the N sharing control strategies. Because the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), the user terminal can request to obtain the sharing control strategies corresponding to the related applications from the sharing control strategy server according to needs, and can execute the sharing closing operation of the corresponding applications according to the sharing control strategies requested from the sharing control strategy server after receiving the sharing closing instruction, so that the related applications can be prevented from being closed and set by adopting the prior art, and the flexibility and the convenience of sharing control can be further improved. In addition, the sharing control strategy server is used for managing and maintaining the sharing control strategies corresponding to a plurality of applications (possibly thousands of applications), so that the method is favorable for better supporting a plurality of user terminals to obtain flexible and convenient sharing control characteristics.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium may store a program, and the program includes, when executed, some or all of the steps of the sharing control method described in the foregoing method embodiment.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (19)

1.一种分享控制方法,其特征在于,包括:1. A shared control method, characterized in that, comprising: 用户终端向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求;The user terminal sends a sharing control policy delivery request carrying N application identifiers to the sharing control policy server; 接收所述分享控制策略服务器响应所述分享控制策略下发请求而下发的N个分享控制策略,其中,所述N个分享控制策略与所述N个应用标识所表示的N个应用一一对应,所述N为正整数;receiving the N sharing control policies issued by the sharing control policy server in response to the request for issuing the sharing control policies, wherein the N sharing control policies correspond to the N applications represented by the N application identifiers one by one Correspondingly, the N is a positive integer; 若接收到分享关闭指令,则根据所述N个分享控制策略执行所述N个应用的分享关闭操作。If the sharing disabling instruction is received, the sharing disabling operation of the N applications is executed according to the N sharing control policies. 2.根据权利要求1所述的方法,其特征在于,所述根据所述N个分享控制策略执行所述N个应用的分享关闭操作,包括:2. The method according to claim 1, wherein the execution of closing the sharing operation of the N applications according to the N sharing control policies comprises: 提取所述N个分享控制策略中包含的所述N个应用分享需使用的第一端口集;关闭第三端口集,并结束第三应用集中需使用第二端口集中的任意一个端口的应用的对应进程;Extracting the first set of ports that need to be used by the N application sharing contained in the N sharing control policies; closing the third set of ports, and ending the application of any port in the second set of ports in the third application set Corresponding process; 其中,所述第三应用集为第一应用集和第二应用集的交集与所述第二应用集之差,所述第二应用集为预置的分享控制白名单中记录的应用集,所述第三端口集为第一端口集和第二端口集的交集与所述第二端口集之差,所述第二端口集为所述第二应用集所需使用的端口集,所述第一应用集由所述N个应用组成。Wherein, the third application set is the difference between the intersection of the first application set and the second application set and the second application set, and the second application set is the application set recorded in the preset sharing control white list, The third port set is the difference between the intersection of the first port set and the second port set and the second port set, the second port set is the port set required by the second application set, the The first application set consists of the N applications. 3.根据权利要求1所述的方法,其特征在于,所述根据所述N个分享控制策略执行所述N个应用的分享关闭操作,包括:3. The method according to claim 1, characterized in that, the execution of the closing operation of sharing of the N applications according to the N sharing control strategies comprises: 提取所述N个分享控制策略中包含的所述N个应用分享需使用的第一端口集;关闭第三端口集,并结束所述N个应用中需使用第二端口集中的任意一个端口的应用的进程;其中,所述第三端口集为第一端口集和第二端口集的交集与所述第二端口集之差,所述第二端口集为预置的分享控制白名单中记录的端口集。Extracting the first set of ports that need to be used by the N applications contained in the N sharing control policies; closing the third set of ports, and ending the process of using any port in the second set of ports among the N applications The process of the application; wherein, the third port set is the difference between the intersection of the first port set and the second port set and the second port set, and the second port set is recorded in the preset sharing control white list set of ports. 4.根据权利要求1所述的方法,其特征在于,所述根据所述N个分享控制策略执行所述N个应用的分享关闭操作,包括:提取所述N个分享控制策略中包含的所述N个应用分享需要使用的第一端口集;关闭提取的所述第一端口集。4. The method according to claim 1, wherein the performing the closing operation of sharing of the N applications according to the N sharing control policies comprises: extracting all the information contained in the N sharing control policies The N applications share the first port set that needs to be used; close the extracted first port set. 5.根据权利要求1至4任意一项所述的方法,其特征在于,5. The method according to any one of claims 1 to 4, characterized in that, 所述方法还包括:The method also includes: 若接收到分享开启指令,则根据所述N个分享控制策略执行所述N个应用的分享开启操作。If the sharing enabling instruction is received, performing the sharing enabling operation of the N applications according to the N sharing control policies. 6.根据权利要求5所述的方法,其特征在于,所述根据所述N个分享控制策略执行所述N个应用的分享开启操作,包括:提取所述N个分享控制策略中包含的所述N个应用分享需要使用的第一端口集;开启提取的所述第一端口集。6. The method according to claim 5, characterized in that, the performing the operation of enabling the sharing of the N applications according to the N sharing control policies comprises: extracting all the information contained in the N sharing control policies The N applications share the first port set that needs to be used; and enable the extracted first port set. 7.根据权利要求1至4任意一项所述的方法,其特征在于,7. The method according to any one of claims 1 to 4, characterized in that, 所述向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求,包括:在接收到所述分享控制策略服务器下发的携带所述N个应用标识的分享控制策略更新通知消息之后,向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求。The sending the sharing control strategy delivery request carrying N application identifiers to the sharing control strategy server includes: receiving the sharing control strategy update notification message carrying the N application identifiers issued by the sharing control strategy server Afterwards, a request for issuing a sharing control policy carrying N application identifiers is sent to the sharing control policy server. 8.根据权利要求1至4任意一项所述的方法,其特征在于,8. The method according to any one of claims 1 to 4, characterized in that, 所述向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求,包括:在从所述分享控制策略服务器查询到所述N个应用标识所表示的应用的分享控制策略已更新之后,向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求。The sending of the sharing control strategy delivery request carrying N application identifiers to the sharing control strategy server includes: after querying from the sharing control strategy server, it is found that the sharing control strategy of the application represented by the N application identifiers has been updated Afterwards, a sharing control policy delivery request carrying N application identifiers is sent to the sharing control policy server. 9.根据权利要求1至4任意一项所述的方法,其特征在于,9. The method according to any one of claims 1 to 4, characterized in that, 所述接收到分享关闭指令,包括:接收到用户通过点击界面上的分享关闭图标而产生的分享关闭指令。The receiving the share closing instruction includes: receiving the sharing close instruction generated by the user clicking the sharing close icon on the interface. 10.一种分享控制方法,其特征在于,包括:10. A shared control method, characterized in that it comprises: 分享控制策略服务器接收来自用户终端的携带有N个应用标识的分享控制策略下发请求;The sharing control policy server receives a sharing control policy delivery request carrying N application identifiers from the user terminal; 向所述用户终端发送用于响应所述分享控制策略下发请求的N个分享控制策略,其中,所述N个分享控制策略与所述N个应用标识所表示的N个应用一一对应,所述N为正整数;以便于所述用户终端在接收到分享关闭指令之后,根据所述N个分享控制策略执行所述N个应用的分享关闭操作。sending to the user terminal N sharing control strategies for responding to the request for issuing the sharing control strategy, wherein the N sharing control strategies correspond to the N applications represented by the N application identifiers one by one, The N is a positive integer; so that the user terminal executes the sharing closing operation of the N applications according to the N sharing control policies after receiving the sharing closing instruction. 11.根据权利要求10所述的方法,其特征在于,11. The method of claim 10, wherein, 所述N个分享控制策略中与第一应用对应的第一分享控制策略包括:The first sharing control strategy corresponding to the first application among the N sharing control strategies includes: 所述第一应用的应用标识、所述第一应用的进程名、所述第一应用的版本号和所述第一应用的分享端口集,其中,所述第一分享控制策略为所述N个分享控制策略之中的任意一个。The application identifier of the first application, the process name of the first application, the version number of the first application, and the shared port set of the first application, wherein the first sharing control policy is the N Any one of the shared control strategies. 12.一种用户终端,其特征在于,包括:12. A user terminal, characterized in that it comprises: 发送器,用于向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求;The sender is configured to send a sharing control policy delivery request carrying N application identifiers to the sharing control policy server; 接收器,用于接收所述分享控制策略服务器响应所述分享控制策略下发请求而下发的N个分享控制策略,其中,所述N个分享控制策略与所述N个应用标识所表示的N个应用一一对应,所述N为正整数;The receiver is configured to receive the N sharing control policies issued by the sharing control policy server in response to the request for issuing the sharing control policies, wherein the N sharing control policies and the N application identifiers represent N applications correspond one-to-one, and N is a positive integer; 控制器,用于若接收到分享关闭指令,则根据所述N个分享控制策略执行所述N个应用的分享关闭操作。The controller is configured to, if receiving the sharing closing instruction, execute the sharing closing operation of the N applications according to the N sharing control strategies. 13.根据权利要求12所述的用户终端,其特征在于,在根据所述N个分享控制策略执行所述N个应用的分享关闭操作的方面,13. The user terminal according to claim 12, characterized in that, in terms of executing the share closing operation of the N applications according to the N share control policies, 所述控制器具体用于:The controller is specifically used for: 提取所述N个分享控制策略中包含的所述N个应用分享需使用的第一端口集;关闭第三端口集,并结束第三应用集中需使用第二端口集中的任意一个端口的应用的对应进程;其中,所述第三应用集为第一应用集和第二应用集的交集与所述第二应用集之差,所述第二应用集为预置的分享控制白名单中记录的应用集,所述第三端口集为第一端口集和第二端口集的交集与所述第二端口集之差,所述第二端口集为所述第二应用集所需使用的端口集,所述第一应用集由所述N个应用组成;Extracting the first set of ports that need to be used by the N application sharing contained in the N sharing control policies; closing the third set of ports, and ending the application of any port in the second set of ports in the third application set Corresponding process; wherein, the third application set is the difference between the intersection of the first application set and the second application set and the second application set, and the second application set is recorded in the preset sharing control white list An application set, the third port set is the difference between the intersection of the first port set and the second port set and the second port set, and the second port set is the port set required by the second application set , the first application set is composed of the N applications; 或者,or, 提取所述N个分享控制策略中包含的所述N个应用分享需使用的第一端口集;关闭第三端口集,并结束所述N个应用中需使用第二端口集中的任意一个端口的应用的进程;其中,所述第三端口集为第一端口集和第二端口集的交集与所述第二端口集之差,所述第二端口集为预置的分享控制白名单中记录的端口集;Extracting the first set of ports that need to be used by the N applications contained in the N sharing control policies; closing the third set of ports, and ending the process of using any port in the second set of ports among the N applications The process of the application; wherein, the third port set is the difference between the intersection of the first port set and the second port set and the second port set, and the second port set is recorded in the preset sharing control white list set of ports; 或者,or, 提取所述N个分享控制策略中包含的所述N个应用分享需要使用的第一端口集;关闭提取的所述第一端口集。Extracting the first set of ports that need to be used by the N application sharing included in the N sharing control policies; closing the extracted first set of ports. 14.根据权利要求12或13所述的用户终端,其特征在于,所述控制器还用于,若接收到分享开启指令,则根据所述N个分享控制策略执行所述N个应用的分享开启操作。14. The user terminal according to claim 12 or 13, wherein the controller is further configured to execute the sharing of the N applications according to the N sharing control strategies if the sharing start instruction is received. Start operation. 15.根据权利要求14所述的用户终端,其特征在于,在所述根据所述N个分享控制策略执行所述N个应用的分享开启操作的方面,所述控制器具体用于,提取所述N个分享控制策略中包含的所述N个应用分享需要使用的第一端口集;开启提取的所述第一端口集。15. The user terminal according to claim 14, characterized in that, in the aspect of executing the sharing enabling operation of the N applications according to the N sharing control policies, the controller is specifically configured to extract the The first set of ports that need to be used by the N application sharing included in the N sharing control policies; enabling the extracted first set of ports. 16.根据权利要求12或13所述的用户终端,其特征在于,16. The user terminal according to claim 12 or 13, characterized in that, 所述发送器具体用于,在接收到所述分享控制策略服务器下发的携带所述N个应用标识的分享控制策略更新通知消息之后,向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求;The sender is specifically configured to, after receiving the sharing control strategy update notification message carrying the N application identifiers issued by the sharing control strategy server, send the sharing control strategy server carrying the N application identifiers to the sharing control strategy server. Control policy delivery request; 或者,or, 在从所述分享控制策略服务器查询到所述N个应用标识所表示的应用的分享控制策略已更新之后,向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求。After querying from the sharing control policy server that the sharing control policies of the applications represented by the N application identifiers have been updated, send a sharing control policy delivery request carrying the N application identifiers to the sharing control policy server. 17.一种分享控制策略服务器,其特征在于,包括:17. A shared control strategy server, characterized in that it comprises: 接收器,用于接收来自用户终端的携带有N个应用标识的分享控制策略下发请求;a receiver, configured to receive a sharing control policy delivery request carrying N application identifiers from a user terminal; 发送器,用于向所述用户终端发送用于响应所述分享控制策略下发请求的N个分享控制策略,其中,所述N个分享控制策略与所述N个应用标识所表示的N个应用一一对应,所述N为正整数;以便于所述用户终端在接收到分享关闭指令之后,根据所述N个分享控制策略执行所述N个应用的分享关闭操作。A sender, configured to send to the user terminal N sharing control strategies for responding to the request for issuing the sharing control strategies, where the N sharing control strategies are related to the N The application is one-to-one, and the N is a positive integer; so that the user terminal executes the sharing closing operation of the N applications according to the N sharing control policies after receiving the sharing closing instruction. 18.根据权利要求17所述的分享控制策略服务器,其特征在于,18. The sharing control strategy server according to claim 17, characterized in that: 所述N个分享控制策略中与第一应用对应的第一分享控制策略包括:The first sharing control strategy corresponding to the first application among the N sharing control strategies includes: 所述第一应用的应用标识、所述第一应用的进程名、所述第一应用的版本号和所述第一应用的分享端口集,其中,所述第一分享控制策略为所述N个分享控制策略之中的任意一个。The application identifier of the first application, the process name of the first application, the version number of the first application, and the shared port set of the first application, wherein the first sharing control policy is the N Any one of the shared control strategies. 19.一种通信系统,其特征在于,包括:19. A communication system, comprising: 用户终端,用于向分享控制策略服务器发送携带有N个应用标识的分享控制策略下发请求;接收所述分享控制策略服务器响应所述分享控制策略下发请求而下发的N个分享控制策略,其中,所述N个分享控制策略与所述N个应用标识所表示的N个应用一一对应,所述N为正整数;若接收到分享关闭指令,则根据所述N个分享控制策略执行所述N个应用的分享关闭操作;The user terminal is configured to send a sharing control policy delivery request carrying N application identifiers to the sharing control policy server; and receive N sharing control policies issued by the sharing control policy server in response to the sharing control policy delivery request , wherein, the N sharing control strategies are in one-to-one correspondence with the N applications represented by the N application identifiers, and the N is a positive integer; if a sharing close instruction is received, according to the N sharing control strategies Executing the sharing close operation of the N applications; 所述分享控制策略服务器,用于接收来自所述用户终端的携带有N个应用标识的分享控制策略下发请求;向所述用户终端发送用于响应所述分享控制策略下发请求的N个分享控制策略。The sharing control policy server is configured to receive a sharing control policy delivery request carrying N application identifiers from the user terminal; and send N application identifications for responding to the sharing control policy delivery request to the user terminal. Share control strategies.
CN201310465818.6A 2013-09-30 2013-09-30 Sharing control method and related equipment and communication system Active CN103532945B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310465818.6A CN103532945B (en) 2013-09-30 2013-09-30 Sharing control method and related equipment and communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310465818.6A CN103532945B (en) 2013-09-30 2013-09-30 Sharing control method and related equipment and communication system

Publications (2)

Publication Number Publication Date
CN103532945A CN103532945A (en) 2014-01-22
CN103532945B true CN103532945B (en) 2017-01-18

Family

ID=49934624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310465818.6A Active CN103532945B (en) 2013-09-30 2013-09-30 Sharing control method and related equipment and communication system

Country Status (1)

Country Link
CN (1) CN103532945B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015113833A1 (en) * 2014-01-30 2015-08-06 Koninklijke Philips N.V. Gesture control
CN106062842B (en) * 2014-01-30 2019-11-05 飞利浦灯具控股公司 Lighting system and controller and mobile subscriber terminal for controlling it
CN103986914B (en) * 2014-05-27 2017-02-01 东南大学 Code rate self-adaption method based on number of client sides in wireless video monitoring system
CN104317620B (en) * 2014-10-24 2018-08-10 中兴通讯股份有限公司 The application management method and device shared based on multi-screen
CN107170072A (en) * 2017-04-14 2017-09-15 怀宁鑫橙信息技术有限公司 A kind of cargo data long-range control method
CN112291742B (en) * 2019-07-25 2022-04-01 大唐移动通信设备有限公司 Direct communication method and device
CN112165522A (en) * 2020-09-28 2021-01-01 杭州安恒信息技术股份有限公司 Policy library upgrading method, device, system, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702715A (en) * 2009-11-13 2010-05-05 中国电信股份有限公司 Permission control point, permission control method and system of application software
CN102325144A (en) * 2011-09-29 2012-01-18 Tcl集团股份有限公司 Method and system for interconnection between media equipment and multimedia equipment
CN103312804A (en) * 2013-06-17 2013-09-18 华为技术有限公司 Screen sharing method, associated equipment and communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850052B2 (en) * 2008-09-30 2014-09-30 Apple Inc. System and method for simplified resource sharing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702715A (en) * 2009-11-13 2010-05-05 中国电信股份有限公司 Permission control point, permission control method and system of application software
CN102325144A (en) * 2011-09-29 2012-01-18 Tcl集团股份有限公司 Method and system for interconnection between media equipment and multimedia equipment
CN103312804A (en) * 2013-06-17 2013-09-18 华为技术有限公司 Screen sharing method, associated equipment and communication system

Also Published As

Publication number Publication date
CN103532945A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
US12047528B2 (en) Favorite-object display method and terminal
US20150019694A1 (en) Method for Screen Sharing, Related Device, and Communications System
CN103532945B (en) Sharing control method and related equipment and communication system
US10470229B2 (en) Wireless local area communication method and terminal supporting the same
RU2610679C1 (en) Method and device for instant messaging
CN110035004B (en) User name card sharing method, friend adding method and related device
CN112486363A (en) Cross-device content sharing method, electronic device and system
CN104113787A (en) Program-based commenting method, terminal, server, and program-based commenting system
CN110945467B (en) Disturbance-free method and terminal
US20140143435A1 (en) Electronic device and method for displaying service information in electronic device
CN103491421B (en) Content displaying method, device and intelligent television
KR20150057309A (en) Broadcasting cheannel information sharing method of electronic apparatus and electronic appparatus thereof
CN114244955B (en) Service sharing method and system, electronic device and computer readable storage medium
CN109995743A (en) A kind of processing method and terminal of multimedia file
CN106254469A (en) A picture push and display method, server and communication terminal
CN114691277A (en) Application program processing method, intelligent terminal and storage medium
CN106339477B (en) Picture playing method and terminal equipment
CN103686317A (en) Method and device for playing television channels
CN104216506A (en) Data interaction method and device based on gesture operation
US20130070575A1 (en) Alarm method and apparatus in portable terminal
CN109714734B (en) DMR system, wireless communication method and device of DMR and terminal equipment
CN106331368B (en) Picture downloading method and terminal equipment
CN106254503A (en) Seamless operational approach based on operating system, device and portable multifunction device
CN106060786B (en) Short message sending, receiving method and related device based on single deck tape-recorder multi-pass signal code
CN103312804B (en) Screen sharing method and relevant device and communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant