Information sharing method and terminal
An information sharing and terminal technology, applied in the field of information processing, can solve problems such as information missharing and achieve the effect of protecting privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0045] As yet another optional implementation manner: the preset interception rule includes enabling a sharing prompt;
[0046] When the target information satisfies the preset interception rule, prohibiting sending the target information includes:
[0047] displaying a query box to ask the user whether to confirm sharing the target information to the target object;
[0048] If a second input from the user confirming this sharing is received, in response to the second input, share the target information with the target object; otherwise, intercept (that is, prohibit sending) the target information.
[0049] Specifically, the user can define whether to enable the sharing prompt for the target object in the target application. If the user turns on the sharing prompt for a target object, every time the user shares the target information with the target object, a query box will be displayed to ask the user whether to confirm to share the target information with the target object....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


