Information sharing method, device and non-transitory computer readable storage medium thereof

ABSTRACT

Disclosed is an information sharing method including: obtaining information to be shared that a sending terminal wants to share to a receiving terminal; detecting whether the information to be shared meets a preset rule, the preset rule including: the information meeting a first preset condition, and/or, the receiving terminal and/or the sending terminal meeting a second preset condition; and in determining that the information to be shared meets the preset rule, sending the information according to a preset strategy. The application also discloses other related information sharing methods, devices, and non-volatile computer-readable storage medium. The purpose of intelligently sharing information is realized.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 16/940,723, filed on Jul. 28, 2020, which claims priority toChinese Patent Application No. 202010070486.1, filed on Jan. 20, 2020and titled “INFORMATION SHARING METHOD, TERMINAL, AND READABLE STORAGEMEDIUM”, Chinese Patent Application No. 202010068136.1, filed on Jan.20, 2020 and titled “INFORMATION SHARING METHOD, TERMINAL, AND READABLESTORAGE MEDIUM”, Chinese Patent Application No. 202010068407.3, filed onJan. 20, 2020 and titled “INFORMATION SHARING METHOD, TERMINAL, ANDREADABLE STORAGE MEDIUM”, Chinese Patent Application No. 202010070487.6,filed on Jan. 20, 2020 and titled “INFORMATION SHARING METHOD, TERMINAL,AND READABLE STORAGE MEDIUM”, and Chinese Patent Application No.202010068388.4, filed on Jan. 20, 2020 and titled “INFORMATION SHARINGMETHOD, TERMINAL, AND READABLE STORAGE MEDIUM”. The disclosures of theaforementioned applications are incorporated in this application byreference in their entireties.

FIELD

The present application relates to the field of information sharing, andin particular to an information sharing method, a device, and anon-transitory computer readable storage medium.

BACKGROUND

With the popularization of network communication, communication betweenpeople is becoming more and more convenient. When people obtain certaininformation, they may need to share it with others. At present, sharinginformation always takes a very long time under a poor networkconnection, results in additional traffic cost if the traffic of areceiving terminal receiving the sharing information is insufficient, orresults that the information is failed to be received or only a portionof the information is received because of an insufficient storage spaceof the receiving terminal. In some situations, the information receivedcannot be opened by the receiving terminal, or some information cannotbe shared (such as WeChat application cannot share voice information).

In addition, at present it also has the following problem: informationis shared to the receiving terminal when the user of the receivingterminal is inconvenient to view the sharing information (for example,when the user of the receiving terminal is driving, the user isinconvenient to open his mobile phone to view the sharing information),the user of the receiving terminal is unable to get the content of thesharing information (for example, a language of the sharing informationis beyond the language ability of the user of the receiving terminal),after receiving the sharing information, the user of the receivingterminal cannot know whether the information has been processed,resulting in poor communication or other problem. For example, if thesharing information is encrypted, after the user of the receivingterminal downloads the information, the user finds that the informationis encrypted during the process of opening the information. In thiscase, the user needs to obtain a password to open the information, whichis very troublesome and inconvenient.

There is no solution to solve those problems, resulting that the sharinginformation is not intelligently processed before or when selecting theinformation to be shared. For example, it cannot automatically filterthe information or prompt that the information cannot be shared (such asvoice), it cannot intelligently convert a data type or a file format ofsharable information, and cannot automatically select sharableinformation, and etc., resulting in a poor user experience.

The above content is only used to help understand the technical solutionof the present application, and does not mean that the above content isrecognized as prior art.

SUMMARY

The main purpose of this application is to provide an informationsharing method, a device and a non-volatile computer-readable storagemedium, aiming to solve the problem of how to share informationintelligently.

To achieve the above purpose, the present application provides aninformation sharing method, the information sharing method includes:

S10: obtaining information to be shared that a sending terminal wants toshare to a receiving terminal;

S20: detecting whether the information to be shared meets a preset rule,the preset rule including: the information meeting a first presetcondition, and/or, the receiving terminal and/or the sending terminalmeeting a second preset condition;

S30: in determining that the information to be shared meets the presetrule, sending the information according to a preset strategy.

In an embodiment, the information to be shared meeting the first presetcondition includes at least one of the following:

the information to be shared including at least one preset data type,

a data size of the information to be shared being greater than or equalto a preset data threshold,

a language of the information to be shared is different from a languageof the receiving terminal; and/or,

the receiving terminal and/or the sending terminal meeting the secondpreset condition, including at least one of the following:

a current network speed of the receiving terminal and/or the sendingterminal being lower than a preset network speed threshold;

an available traffic of the receiving terminal and/or the sendingterminal being lower than a preset traffic threshold;

an available space of the receiving terminal being less than or equal toa size of the information to be shared;

the information to be shared including at least one data type or fileformat not supported by the receiving terminal;

a distance between the receiving terminal and the sending terminal beingless than or equal to a preset distance value;

the receiving terminal and the sending terminal both supporting at leastone preset communication mode;

the receiving terminal and the sending terminal both installed with atleast one preset application.

In an embodiment, the operation S30 further includes performing at leastone of the following processing on the information to be shared: a datatype conversion, a file format conversion, a compression, and anencryption.

In an embodiment, the preset strategy includes at least one of thefollowing:

sending the information to be shared through a second applicationdifferent from a current first application;

sending the information to be shared through a second communication modedifferent from a current first communication mode; and

sending the information to be shared through a second communication carddifferent from a current first communication card.

To achieve the above purpose, the present application provides aninformation sharing method, the information sharing method includes:

A10: obtaining processing information, where the processing informationis obtained from a sending terminal and/or provided by a receivingterminal;

A11: processing information to be shared according to the processinginformation to obtain target sharing information; and

A12: sending the target sharing information.

In an embodiment, before the operation A10 or in the operation A11, themethod further includes: processing a piece of information to be sharedthat does not meet a preset rule or a sharing condition according to apreset strategy, the preset strategy including at least one of thefollowing: filtering out the piece of information, hiding the piece ofinformation, setting the piece of information to an unselectable state,displaying a logo indicating sharing of the piece of the information notsupported, outputting prompt information; and/or,

before the operation A11, the method further includes:

selecting the information to be shared according to a selectionoperation, the selection operation including at least one of thefollowing: voice controlling operation, selection operation on aninterface, preset touch gesture on a screen, and preset remote controlgesture.

In an embodiment, the processing information includes at least one ofthe following: a data type, a file type, storage information, trafficinformation, network speed information, mode information, timeinformation, location information, language information, statusinformation of the receiving terminal, status information of a user ofthe receiving terminal; and/or,

processing the information to be shared includes at least one of thefollowing: performing a data type conversion, performing a file formatconversion, performing a content conversion, compressing, encrypting,and choosing a right time to send.

In an embodiment, operation of processing information to be sharedaccording to the processing information includes:

in determining that a data type and/or a file type of the receivingterminal does not meet a preset receiving condition, and/or,

in determining that storage information of the receiving terminal doesnot meet the preset receiving condition, and/or,

in determining that traffic information and/or network speed informationof the receiving terminal does not meet the preset receiving condition,and/or,

in determining that mode information of the receiving terminal does notmeet the preset receiving condition, and/or,

in determining that time information and/or location information of thereceiving terminal does not meet the preset receiving condition, and/or,

in determining that language information of the receiving terminal doesnot meet the preset receiving condition, and/or,

in determining that status information of the receiving terminal and/orstatus information of a user of the receiving terminal does not meet thepreset receiving condition, and/or,

in determining that traffic information and/or network speed informationof the sending terminal does not meet the preset sending condition,and/or,

in determining that mode information of the sending terminal does notmeet a preset sending condition,

processing the information to be shared according to a preset rule.

In an embodiment, before operation A10, the method further including:

determining whether a current mode of the receiving terminal is a presetmode;

in determining that the current mode of the receiving terminal is apreset mode, performing operation A10.

In an embodiment, the method is executed by the sending terminal, andthe target sharing information includes at least one of originalinformation to be shared and processed information to be shared; or

the method is executed by a server, and the target sharing informationincludes at least one of the following: original information to beshared, processed information to be shared, a link address, and a logo.

In an embodiment, before operation A10 or in the operation A11, themethod further includes:

B10: obtaining filtering information;

B11: processing the information to be shared according to the filteringinformation.

In an embodiment, the filtering information includes first typefiltering information and/or second type filtering information, whereinthe first type filtering information is obtained from the sendingterminal, and the second type filtering information is provided by thereceiving terminal.

In an embodiment, the first type filtering information includes at leastone of the following:

authentication information of a current user of the sending terminal,

permission information of the information to be shared,

available traffic of the sending terminal,

current network speed of the sending terminal, and

a current mode of the sending terminal; and/or

the method further includes at least one of the following:

in determining that the authentication information of the current userof the sending terminal meets a preset requirement, performing operationB11;

in determining that the permission information of the information to beshared meets another preset requirement, performing operation B11;

in determining that available traffic and/or a current network speed ofthe sending terminal does not meet a preset sending condition, and/or,in determining that the sending terminal is in a preset mode, processingthe information to be shared according to a preset rule, wherein thepreset mode includes at least one of the following: a profile mode, anintelligent mode, a security mode, a guest mode, a child mode, and anelderly mode.

In an embodiment, the second type filtering information includes atleast one of the following:

a data type and/or a file type supported by the receiving terminal,

available space and/or available traffic of the receiving terminal,

current network speed condition of the receiving terminal,

time information and/or location information of the receiving terminal,

a current mode of the receiving terminal,

system language and/or current application language of the receivingterminal,

status information of the receiving terminal and/or status informationof a user of the receiving terminal; and/or

operation B11 includes:

in determining that the data type supported by the receiving terminaldoes not meet a preset receiving condition, and/or,

in determining that the file type supported by the receiving terminaldoes not meet a preset receiving condition, and/or,

in determining that the available space of the receiving terminal doesnot meet a preset receiving condition, and/or,

in determining that the available traffic of the receiving terminal doesnot meet a preset receiving condition, and/or,

in determining that the current network speed of the receiving terminaldoes not meet a preset receiving condition, and/or,

in determining that the receiving terminal is in a preset profile mode,and/or,

in determining that the time information of the receiving terminal doesnot meet a preset receiving condition, and/or,

the location information of the receiving terminal does not meet apreset receiving condition, and/or,

in determining that the receiving terminal is in a preset mode, and/or,

in determining that the system language of the receiving terminal isdifferent from a system language of the sending terminal, and/or,

in determining that a sharing application language of the receivingterminal is different from a sharing application language of the sendingterminal, and/or,

in determining that the status information of the receiving terminaland/or the status information of the user of the receiving terminal doesnot meet a preset receiving condition, processing the information to beshared according to a preset rule.

In an embodiment, before operation B10, the method further includes:

determining whether a currently selection mode is a preset mode;

in determining that the currently selection mode is a preset mode,performing operation B10.

In an embodiment, the method further includes:

obtaining at least one piece of relevant information for selectinginformation to be shared, the relevant information defining requirementsincluding at least one of data type requirement, file type requirement,presentation form requirement, content requirement, and display locationinformation requirement;

automatically selecting information to be shared that meets therequirements according to the relevant information.

In an embodiment, the processing information is association informationof the information to be shared, and the association informationincludes at least one of the following: a current mode of the receivingterminal or a current mode of the sending terminal, sharing records ofthe sending terminal and/or, sharing records of the receiving terminal.

In an embodiment, before the operation A10, the method further includes:

determining whether the current mode of the sending terminal is a presetmode; and

in determining that the current mode of the receiving terminal is apreset mode, performing operation A10.

In an embodiment, operation of processing information to be sharedincludes at least one of the following: performing a data typeconversion, and translating, and performing the data type conversionincluding converting from a first data type to a second data typedifferent from the first data type.

In an embodiment, the data type conversion is performed by the sendingterminal, a server, or the receiving terminal, and in determining thatthe data type conversion is performed by the server or the receivingterminal, the data type conversion is performed by the server or thereceiving terminal according to data type conversion parameters providedby the sending terminal.

In an embodiment, the data type conversion parameters includes at leastone of the following: a data type and/or a file format of theinformation to be shared, a data type and/or a file format of processedinformation to be shared, time requirements, space requirements; and/or,the data type conversion parameters are determined according toselection operations of a user or system settings.

In an embodiment, operation A12 further includes: in determining thatthere is a piece of information in the target sharing information thatcannot be shared by a current first application, utilizing a secondapplication to share the piece of information, the second applicationbeing different from the current first application.

In an embodiment, the method further includes:

D10: obtaining the target sharing information;

D11: detecting whether the target sharing information is the same asfirst sharing information, wherein the first sharing information isoriginal information to be shared;

D12: in determining that the first sharing information is different fromthe original information to be shared, obtaining description informationcorresponding to the target sharing information, and sending the targetsharing information and the description information; and/or,

D13: in determining that the first sharing information is the same asthe original information to be shared, only sending the target sharinginformation.

In an embodiment, before operation of sending the target sharinginformation and description information, the method includes:

determining whether a current mode of the receiving terminal is a presetmode;

in determining that the current mode of the receiving terminal is apreset mode, sending the target sharing information and descriptioninformation.

In an embodiment, the description information includes at least one ofthe following:

a data type of the target sharing information, a file format of thetarget sharing information, a size of the target sharing information,time information for processing the first sharing information, andexecution body information for processing the first sharing information.

In an embodiment, the execution body information includes at least oneof the following: sending terminal information, server information, andreceiving terminal information.

In an embodiment, operation D10 includes:

D101: obtaining the first sharing information;

D102: obtain processing information corresponding to the first sharinginformation, and detect whether the processing information meets presetconditions;

D103: in determining that the processing information corresponding tothe first sharing information does not meet preset conditions,determining whether an execution body is the sending terminal;

D104: in determining that the execution body is not the sending terminalbut a server, taking the first sharing information as the target sharinginformation, thereby the execution body performs correspondingprocessing on the target sharing information according to the processinginformation.

To achieve the above purpose, the present application provides aninformation sharing method, the method includes the followingoperations:

D20: receiving sharing information, the sharing information including atleast one of the following: first sharing information, second sharinginformation, description information, a link address of the firstsharing information and/or the second shared information and thedescription information on a server, wherein the second sharinginformation is obtained by processing the first sharing information; and

D21: in determining that the sharing information includes thedescription information, performing a corresponding processing accordingto the description information.

In an embodiment, the description information includes at least one ofthe following:

a data type of target sharing information, a file format of the targetsharing information, a size of the target sharing information, timeinformation for processing the first sharing information, and executionbody information for processing the first sharing information, whereinthe target sharing information includes the first sharing informationand/or the second sharing information.

In an embodiment, operation D21 further includes:

in determining that the sharing information is the target sharinginformation, the corresponding processing includes at least one of thefollowing: outputting the first sharing information, outputting thesecond sharing information, outputting the explanation information,outputting a processing identifier, and outputting interceptioninformation; or

in determining that the sharing information is the link address, thecorresponding processing includes outputting prompt information, and theprompt information includes at least one of the following:

the first sharing information corresponding to the link address, contentpreview of the first sharing information, and the second sharedinformation corresponding to the link address, content preview of thesecond sharing information, and the description information.

In an embodiment, the content preview is displayed in a display window,and operation D21 further includes:

receiving the sharing information according to a user's selectionoperation on the display window.

To achieve the above purpose, the present application also provides andevice, the device includes: a memory, a processor, and an informationsharing program stored on the memory and executable on the processor,when the information sharing program is executed by the processor, theinformation sharing method described above is carried out.

To achieve the above purpose, the present application further provides anon-transitory computer-readable storage medium, a computer program isstored on the non-volatile computer-readable storage medium, and whenthe computer program is executed by a processor, the information sharingmethod described above is carried out

Information to be shared can be detected to determine whether theinformation to be shared meet preset rule, and in determining that thepreset rule is met, the information to be shared can be sent accordingto a preset policy. The preset policy may be sending the information tobe shared through another application different from a currentapplication, through another communication mode different from a currentcommunication mode, or through another communication card different froma current communication card. Or, the preset strategy may furtherinclude processing the information to be shared using processinginformation to obtain target sharing information, and then sending thetarget sharing information. The processing may be using the filteringinformation to filter the information to be shared to obtain the targetsharing information. By filtering, the information not suitable forsharing can be filtered out, only the information suitable for sharingcan be shared. Or the information not suitable for sharing can befurther processed. For example, compressing and encrypting theinformation not suitable for sharing to make it suitable for sharing.The processing may also be using association information or relevantinformation to process the information to be shared to obtain the targetsharing information, which prevents the user of the receiving terminalfrom being inconvenient to receive the information or unable to beunderstood the information. After processing, the target sharinginformation may be the same as the original information to be shared, orbe different from the original information to be shared. When the targetsharing information is the same as the original information to beshared, only the target sharing information is sent, and When the targetsharing information is different from the original information to beshared, the target sharing information and description information aresent, so that the receiving terminal outputs a corresponding promptaccording to the description information.

The information sharing method, a device and a non-transitory computerreadable storage medium thereof provided by the embodiment of thepresent application solves some problems that occur at present whensharing information by intelligently processing the information to beshared and sending the information to be shared, making informationsharing more intelligent, safer, more convenient, more effective and insome cases, save users' costs.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic flowchart of a first embodiment of an informationsharing method of the present application.

FIG. 2 is a schematic diagram of an interface scene in a secondembodiment of the information sharing method of the present application.

FIG. 3 is a schematic diagram of an interface scene in a thirdembodiment of the information sharing method of the present application.

FIG. 4 is a schematic diagram of an interface scene in a fourthembodiment of the information sharing method of the present application.

FIG. 5 is a schematic flowchart of a sixth embodiment of the informationsharing method of the application.

FIG. 6 is a schematic diagram of an interface scene of operation A10 ofthe information sharing method of the present application.

FIG. 7 is a schematic diagram of another interface scene of operationA10 of the information sharing method of the present application.

FIG. 8 is a schematic diagram of an interface scene in a seventhembodiment of the information sharing method of the present application.

FIG. 9 is a schematic diagram of another interface scene in the seventhembodiment of the information sharing method of the present application.

FIG. 10 is a schematic flowchart of an eleventh embodiment of theinformation sharing method of the present application.

FIG. 11 is a schematic diagram of an interface scene of operation B10 ofthe information sharing method of the present application.

FIG. 12 is a schematic diagram of another interface scene of operationB10 of the information sharing method of the present application.

FIG. 13 is a schematic diagram of still another interface scene ofoperation B10 of the information sharing method of the presentapplication.

FIG. 14 is a schematic diagram of an interface scene in a twelfthembodiment of the information sharing method of the present application.

FIG. 15 is a schematic diagram of another interface scene in the twelfthembodiment of the information sharing method of the present application.

FIG. 16 is a schematic diagram of an interface scene in a thirteenthembodiment of the information sharing method of the present application.

FIG. 17 is a schematic flowchart of a seventeenth embodiment of theinformation sharing method of the application.

FIG. 18 is a schematic diagram of an interface scene in an eighteenthembodiment of the information sharing method of the application.

FIG. 19 is a schematic diagram of another interface scene in theeighteenth embodiment of the information sharing method of the presentapplication.

FIG. 20 is a schematic diagram of still another interface scene in theeighteenth embodiment of the information sharing method of the presentapplication.

FIG. 21 is a schematic flowchart of a twenty-first embodiment of theinformation sharing method of the present application.

FIG. 22 is a schematic flowchart of a twenty-second embodiment of theinformation sharing method of the present application.

FIG. 23 is a schematic diagram of an interface scene in thetwenty-second embodiment of the information sharing method of thepresent application.

FIG. 24 is a schematic flowchart of a twenty-third embodiment of theinformation sharing method of the present application.

FIG. 25 is a schematic diagram of an interface scene in the twenty-thirdembodiment of the information sharing method of the present application.

FIG. 26 is a schematic diagram of a hardware operating environment of adevice that implements the schemes of the embodiments of the presentapplication.

The implementation, functional characteristics and advantages of thepresent application will be further described in conjunction with theembodiments and with reference to the drawings.

DETAILED DESCRIPTION OF THE EMBODIMENTS

It should be understood that the specific embodiments described hereinare only used to explain the present application, and are not used tolimit the present application.

At present, there exists that information cannot be shared or a sharingresult is not what's expected (for example, a process of sharinginformation takes a long time).

A first embodiment to a fifth embodiment of the present applicationprovide solutions to enable information to be shared to be intelligentlysent to conform to what the user is expected (such as with a rapidsharing process).

Referring to FIG. 1 , in the first embodiment of the information sharingmethod of the present application, the information sharing methodincludes the following operations.

In operation S10, information to be shared is obtained.

The information to be shared can be some preset information of aterminal, be information downloaded by a user from the Internet (such asimages, application software, etc.), be information input by the user onthe terminal, or be information on an application of the terminal (suchas news, application update information, etc.). The information to beshared can also be local information of the terminal (such as localfiles, etc.), or be sharing records on a social software (such as chatlogs, shared information, etc.).

The above information to be shared may be one or more of audios, videos,animations, images, documents, files, texts, sharing records, writingnotes, web page information, and web addresses.

In operation S20, it is detected whether the information to be sharedmeets a preset rule.

Not all information can be shared by a user of a sending terminal, andnot all information is wanted by a user of a receiving terminal.Specifically, when the user of the sending terminal shares informationto be shared, it needs to consider whether the information to be sharedmeets a first preset condition, or whether the receiving terminal and/orthe sending terminal meets a second preset condition.

In operation S30, in determining that the information to be shared meetsthe preset rule, the information to be shared is sent according to apreset strategy.

In determining that the information to be shared meets the first presetcondition, or the receiving terminal and/or the sending terminal meetsthe second preset condition, the information to be shared needs to beprocessed according to the first preset condition, or the information tobe shared is sent in a manner different from a current manner accordingto the second preset condition.

In this embodiment, through operations S10: information to be shared isobtained, S20: it is detected whether the information to be sharedmatches a preset rule, and S30: in determining that the information tobe shared matches the preset rule, the information to be shared is sentaccording to a preset strategy, specifically, a data type, a data sizeof the information to be shared and whether a language of theinformation to be shared is consistent with a language of the receivingterminal are checked, and a data type conversion, a file formatconversion, a compression, an encryption, and/or a translation isapplied to the information to be shared which is found to match thepreset rule. In addition, whether a current network speed of thereceiving terminal and/or a current network speed of the sendingterminal, available traffic of the receiving terminal and/or availabletraffic of the sending terminal, available space of the receivingterminal, and file types supported by the receiving terminal meetsharing conditions of a first application and/or a first communicationmode is checked, in determining not meeting the sharing conditions ofthe first application and/or the first communication mode, a secondapplication and/or a second communication mode is used to share theinformation to be shared, so that the information to be shared isintelligently processed according to the preset rule during the sharingprocess, and so that the processed information to be shared can bepresented to the user in the most needed way. The purpose ofintelligently sending information to be shared is realized.

Further, in a second embodiment of the information sharing method of thepresent application, based on the above first embodiment, theinformation to be shared meets the first preset condition, including atleast one of the followings:

the information to be shared including at least one preset data type;

a data size of the information to be shared being greater than or equalto a preset data threshold;

a language of the information to be shared being different from alanguage of the receiving terminal.

The information to be shared including at least one preset data type

When the data type of the information to be shared includes at least oneof text, voice, audio, video, image, animation, and file, the data typeconversion of the information to be shared may be performed.

In the information sharing process, the sending terminal generally sendsinformation, and the receiving terminal receives the information. Whenreceiving information, there may be certain situations causing thereceiving terminal to be unable to obtain the content of the receivedinformation, or it is inconvenient for the receiving terminal to obtainthe content of the received information, or the content of the receivedinformation cannot be understood by the user of the receiving terminaldue to language barrier. In one embodiment, it can convert the texts toan image (for example, when a text is “Hi”, it is easy to understand,the purpose of the user of the sending terminal sharing such text is togreet the user of the receiving terminal). Likewise, contrary to theconversion of texts to images, it can also convert an image to texts,texts and files (including only texts) to voices or audios. At present,converting texts to voices is already very mature, such as, listening tonovels daily. Likewise, it can also convert voices to texts. Inaddition, texts and files can also be converted to each other. Inaddition, it can also convert videos to audios and images. It's easy tounderstand that videos themselves are composed of audios and images.Likewise, it can convert animations to audios and images.

For data type conversions between voices, audios, texts, and images, howto convert there between can be determined by habits of the user of thereceiving terminal. The habits of the user of the receiving terminal canbe obtained through chat records in a chat application of the receivingterminal. Taking converting texts to voices as an example, referring toFIG. 2, 3000 indicates a sending terminal, and 3001, 3002, 3003, 3004,and 3005 indicate some pieces of information in a chat log. Among them,3004 indicates a piece of text information. When the user selects 3004,a dialog box indicated by 3006 is automatically popped up, to prompt theuser of the sending terminal and provide processing options includingautomatic text-to-voice conversion and cancellation of sending.

For the conversions between either two of the video, audio, image, andanimation, a data type conversion can be performed according to a needof the user of the sending terminal. For example, if the user of thesending terminal only wants to share a certain segment of a video, oreven only an image or audio data of the segment, there is no need toshare the whole video at this time. Therefore, it can perform a datatype conversion to the video, and provide editing functions after theconversion is completed, thus to select or crop the obtained images oraudio data as needed.

For the data type conversion between texts and files, texts are veryconvenient for users to browse, and files can prevent content thereinfrom leaking. They all have their own advantages and disadvantages. Whensharing information, users can specifically refer to content of texts orfiles to decide whether to perform a data type conversion.

The data size of the information to be shared being greater than orequal to a preset data threshold

When sharing information and the data size is greater than or equal to acertain value, the information to be shared needs to be processed forsubsequent sharing.

In an embodiment, the preset data threshold can be determined accordingto the daily traffic usage of the user of the sending terminal. To moreintelligently decide whether to send the information to be shared andwhether to restrict the user of the sending terminal from sending theinformation to be shared, it can take daily traffic usages of the userof the sending terminal within a certain period of time, for example anaverage daily traffic of the user of the sending terminal is 500 MBwithin one month, when the data size of the information to be shared isgreater than or equal to 500 MB, it can prompt the user to perform adata type conversion, a file format conversion or a compression on theinformation to be shared.

In addition, we know that a data size of a video or a animation is verylarge as compared to an audio or images. When the data size of theinformation to be shared is very large, it can prompt the user toperform a data type conversion, a file format conversion or acompression processing on the information to be shared. The data typeconversion can refer to the above process of converting video to imagesand audio, and will not be repeated here. Data of a same data type canhave multiple file formats, and the sizes of the data in different fileformats are generally different. Taking the lossless format and thestandard format of audio data as an example, the sizes of a same song inthese two file formats are different, and even differ by several times.For example, the size of a song in the lossless format is 20 MB, but thesize of the same song in the standard format is only 3 MB. Therefore, itcan perform a file format conversion to reduce the data size of theinformation to be shared. Except the above file format conversion, amore direct way to reduce the data size of the information to be sharedis to compress the information to be shared. The compressed informationis shared and original data can be recovered by decompressionafterwards, without affecting the quality of the shared information. Theabove file format conversions are generally not applied to theinformation after being converted and then shared. The receivingterminal directly receives and presents the information to be sharedafter the file format conversion to the user of the receiving terminal.When the data size of the information to be shared is very large, itgenerally means that the information to be shared is more important. Formore important information, the user of the sending terminal can encryptit before sharing it.

A language of the information to be shared being different from alanguage of the receiving terminal

When the language of the information to be shared is different from thelanguage of the receiving terminal, the information to be shared istranslated.

Specifically, when the user of the sending terminal shares information,since the source of the information is very wide, text content of theinformation shared by the sending terminal may not be understood by theuser of the receiving terminal. After sharing the information to theuser of the receiving terminal, the user of the receiving terminal needsto translate the information first if the user wants to browse theinformation, which is very troublesome. Therefore, before sharinginformation, it is necessary to obtain language information of thereceiving terminal. The language information can be the system languageof the system of the receiving terminal, the language set in anapplication, and/or the language of the chat logs. Of course, the mostconvenient way is to directly obtain the system language of the systemof the receiving terminal because the system language set by the usermust be understood by the user.

In this embodiment, by judging whether the information to be sharedmeets the first preset condition, a processing strategy is given toensure that the information shared to the receiving terminal is what theuser of the receiving terminal wishes to receive, and will not causethat the receiving terminal is unable to receive or the informationreceived by the receiving terminal cannot be understood, and thepresentation form of the information meets the habits of the user of thereceiving terminal, thereby realizing the intelligence and humanizationof information sharing.

In a third embodiment of the present application, based on theabove-mentioned first embodiment, the receiving terminal and/or thesending terminal meeting the second preset condition includes at leastone of the following:

a current network speed of the receiving terminal and/or the sendingterminal being lower than a preset network speed threshold;

available traffic of the receiving terminal and/or the sending terminalbeing lower than a preset traffic threshold;

an available space of the receiving terminal is less than or equal tothe size of the information to be shared; and

the information to be shared including at least one data type or fileformat not supported by the receiving terminal.

A current network speed of the receiving terminal and/or the sendingterminal being lower than a preset network speed threshold

In an embodiment, when the size of the information to be shared that theuser wants to share is much larger than a data size that can be receivedcurrently by the receiving unit per unit time, for example, the size ofthe information to be shared that the user wants to share is 1000 MB,and the current network speed of the receiving terminal can only reach10 KB/s, it is conceivable that the sharing will be meaningless.Therefore, in the information sharing process, it is necessary to obtainthe size of the information when the user chooses to share theinformation, and at the same time to obtain the network speed of thereceiving terminal. When the network speed of the receiving terminal ismuch lower than a network speed required to share the information to beshared, it can use compression to ensure that the size of theinformation to be shared meets the network speed. It can also prompt theuser that the current network condition is poor and it may take sometime to send the information, and recommend the user to allow thesending terminal to automatically send the information when the networkcondition does not affect the sending. For example, referring to FIG. 3,4000 indicates a sending terminal, 4001, 4002, 4003, 4004, and 4005indicate some pieces of information in a chat log, and 4001 and 4002indicate video files. When the user of the sending terminal selects4001, because a data size of the video file is relatively large, but thecurrent network condition at the receiving terminal are poor, a pop-upbox indicated by 4006 is popped up, and options including automaticsending and canceling automatic sending and returning to the sharinginterface are provided so that the user of the sending terminal canstill share. In addition, considering that compression will affect thequality of the information to be shared, for example, when theinformation to be shared contains a video, for files of data type suchas a video, compression will damage the original file, such as reduce adefinition, distort sounds of the video, and etc. Therefore, there is alimit to compress the information to be shared. For this, it cancompress the information to be shared to obtain target sharinginformation, and provide the user with a function to preview the targetsharing information. It is up to the user to decide whether to send thetarget sharing information, if the user deems that the content has beenexcessively distorted by compression, the user can reselect theinformation to be shared, such as deleting the selected content. Inaddition, in the same way, there may be cases where the network speed ofthe sending terminal does not meet the sending requirements. Beforesending the information to be shared, the network speed of the sendingterminal also needs to be taken into account. When the network speed ofthe sending terminal is much less than that required for sharing theinformation to be shared, the above processing method can be applied.

Available traffic of the receiving terminal and/or the sending terminalbeing lower than a preset traffic threshold

Specifically, the current traffic usage of common mobile phone users ismonthly traffic usage, such as subscribing 10 GB of data traffic permonth. If the user's traffic usage exceeds the subscribed amount in amonth, it will cause a lot of charges. Thus, before sending theinformation to be shared, it needs to obtain the traffic information ofthe receiving terminal, that is, the available traffic of the receivingterminal. If the available traffic of the receiving terminal is notenough to receive the information to be shared, similarly, the largersize contents of the information to be shared can be compressed, thatis, the larger size contents can undergo a format conversion in order toreduce a size of the information to be shared to a smaller size. Ofcourse, the whole of the information to be shared can be compressed. Inaddition, considering that the compression will affect the quality ofthe information to be shared, for example, when the information to beshared contains a video, for files of the data type such as a video,compression will damage the original file, resulting in a reduction in adefinition of the video and sound distortion, and etc. Therefore, thereis a limit to compress the information to be shared. For this, it cancompress the information to be shared to obtain target sharinginformation, and provide the user with a function to preview the targetsharing information. It is up to the user to decide whether to send thetarget sharing information, if the user deems that the content has beenexcessively distorted by compression, the user can reselect theinformation to be shared, such as deleting the selected content. Inaddition, in the same way, there may also be insufficient availabletraffic for the sending terminal. Before sending the information to beshared, the available traffic of the sending terminal also needs to betaken into account. When the available traffic of the sending terminalis insufficient to send the information to be shared, the abovecompression can be applied.

An available space at the receiving terminal being less than or equal tothe size of the information to be shared

Specifically, for storage information of the receiving terminal, it isnecessary to take into account whether the size of the information to beshared exceeds the available local storage space of the receivingterminal, so, it is necessary to obtain the size of the information tobe shared before sending the information to be shared, and at the sametime, to obtain the available local storage space of the receivingterminal. If the available local storage space of the receiving terminalis less than the size of the information to be shared, for example, ifthe size of the information to be shared is 300 MB, and the availablelocal storage space is only 200 MB, it then compresses the larger sizecontents (such as the contents greater than 100 MB) of the informationto be shared, that is, performs a format conversion, to obtaininformation to be shared with smaller size. Of course, the wholeinformation to be shared can be compressed. In addition, consideringthat compression will affect the quality of the information to beshared, for example, when the information to be shared contains a video,for files of the data type such as a video, compression will damage theoriginal file, such as reduce a definition, distort sounds of the video,and etc. Therefore, there is a limit to compress the information to beshared. For this, it can compress the information to be shared to obtaintarget sharing information, and provide the user with a function topreview the target sharing information. It is up to the user to decidewhether to send the target sharing information, if the user deems thatthe content has been excessively distorted by compression, the user canreselect the information to be shared, such as deleting the selectedcontent.

The information to be shared including at least one data type or fileformat not supported by the receiving terminal

Specifically, the information to be shared that the user wants to sharemay has various data types, such as audios, videos, animations, images,documents, files, texts, and etc. The information to be shared undermost situations, the receiving terminal supports reading the informationto be shared, but for some non-smart phones, it may not support readingvideo files. Therefore, it is unnecessary for the user of the sendingterminal to still send the contents that the receiving terminal does notsupport to the receiving terminal. Therefore, when sharing information,it is necessary to firstly obtain the data type supported by thereceiving terminal. In addition, the user may have such a requirement toshare a video file, but because the video file is particularly large,resulting that the sharing process takes a long time and requires alarge storage space to store the video file. Further the user may justwant a certain segment in the video file, or audio in the video file, orimages in the video file. For the case that the user wants to share acertain segment in the video file, it can provide a video croppingfunction, and the user can select the segment at any time point andlasting for any length of time as needed. For the case the user wants toshare is the audio in the video file, it can provide the user with afunction of data type conversion. The data in the information to beshared can be converted into audio through data type conversion. Anaudio cropping function can also be provided. The user can select anaudio segment at any time point and lasting for any length of time asneeded. For the case the user wants to share is the images in the videofile, similarly, it can only keep the images and remove the audio fromthe video file. Similarly, the user can select an image at any timepoint in the video file.

Regarding the file types of the information to be shared, one situationis that the information to be shared contains contents in anon-frequently used file format, such as video data including MPEG(Motion Picture Experts Group) format, but many mobile phones onlysupport frequently used file formats. For the file formats that are notfrequently used, it generally requires a specific software for formatconversion, such as the format factory. But in daily life, usersgenerally do not use such kind of professional software tool, so, beforesharing information, it needs to determine whether the receivingterminal supports a file format of the information to be shared. If thereceiving terminal does not support the file format of the informationto be shared, there is no need to share the contents in such fileformat. Therefore, during sharing, it can format the contents in thefile format that the receiving terminal does not support at the sendingterminal and convert the contents to any format supported by thereceiving terminal. Another situation is that for some privacy orconfidential files, encryption is usually required during theinformation sharing process. Similarly, for sharing information isrelatively convenient and fast, many times some company internal files(usually documents) are also shared through common software, such asthrough the social software WeChat. To ensure the security of the filesin the sharing process, it needs to encrypt the information to be sharedwith the data type being document.

In this embodiment, by determining whether the receiving terminal and/orthe sending terminal meets the second preset condition, a targetedpreset strategy is adopted to process the information to be shared toensure that the sharing of the information to be shared is conducted onthe premise of meeting the sharing needs of the user of the sendingterminal, thereby realizing the intelligence and humanization ofinformation sharing.

In a fourth embodiment of the information sharing method of the presentapplication, based on the first embodiment described above, the presetstrategy includes at least one of the following:

sending the information to be shared through a second applicationdifferent from a current first application;

sending the information to be shared through a second communication modedifferent from a current first communication mode;

sending the information to be shared through a second communication carddifferent from a current first communication card.

Sending the information to be shared through a second applicationdifferent from a current application

The second application includes social applications, e-mail application,SMS, MMS, RCS applications, and file transfer applications. Of course,the current first application also includes social applications, e-mailapplications, SMS, MMS, RCS applications, and file transferapplications. In the information sharing process, the current firstapplication and the second application are different from each other.For example, when the current first application is an email application,the second application may be another application except the emailapplication, such as MMS. When using a social application, such asWeChat, for WeChat does not support sharing certain types ofinformation, such as voice, and WeChat does not support sharing fileswith a data size greater than 10 MB, in this case, it can share theinformation or files through other applications, such as the emailapplication. Specifically, during sharing, it can use the information tobe shared to filter the applications that support the informationsharing, recommend the user to use the most frequently usedapplications, it can hide the remaining applications that supportsharing, and only provide an “other sharing manners” button for the userto share information.

Sending the information to be shared through a second communication modedifferent from a current first communication mode

The second communication mode includes WIFI (Wireless Fidelity, thenetwork of which is open and insecure), Bluetooth, and NFC (Near fieldcommunication, a transmission distance of which is very short, but theencryption is strong, there is no data interception, and more secure).Of course, the current first communication mode also includes WIFI,Bluetooth, and NFC, but in the information sharing process, the firstcommunication mode and the second communication mode used are differentfrom each other. For example, when the current first communication modeadopts WIFI, the second communication mode can adopt a communicationmode other than WIFI, such as NFC. Specifically, WIFI is relativelydifficult to guarantee information security due to its openness, but itbasically has no distance limitation between the receiving terminal andthe sending terminal. Like the Ethernet, WIFI can achieve globalinterconnection and the data transmission speed is very fast. Although atransmission distance of Bluetooth is short, Bluetooth does not requirea network, and will not generate costs of data traffic or other traffic,and the data transmission speed is very fast. The transmission distancerequirement of NFC is the highest, NFC devices can only transmit datawithin 10 cm or less, but NFC has strong encryption, and there will beno data interception, thus NFC is more secure. Documents with highconfidentiality can be shared using NFC. The user can select acommunication mode according to his needs, or it can automaticallyselect a communication mode by settings in advance.

Sending the information to be shared through a second communication carddifferent from a current first communication card

Communication cards include physical SIM cards and virtual SIM cards.The advantage of using a SIM card for sharing is that the SIM card canbe used to share basically at anytime and anywhere, without likingrestrictions as that other communication modes such as WIFI, Bluetooth,and NFC have. For a virtual SIM card, it can be used as long as there isan idle card slot (no physical SIM card is inserted). For example,referring to FIG. 4, 5000 indicates a sending terminal, 5001, 5002,5003, 5004, and 5005 indicate some pieces of information that can beshared in a chat log, and 5006 indicates a prompt message output by thesending terminal when a size of the information selected by the user isgreater than available traffic of a current SIM card 1. Both SIM card 1and SIM card 2 can be physical SIM cards or virtual SIM cards. Theprompt message provides an option to switch between the SIM cards.

In this embodiment, multiple applications that support sharing andmultiple communication modes are provided to share the information thatcannot be shared through a current application or a currentcommunication mode. The user of the sending terminal can also choose acommunication mode used for information sharing according to a distancebetween the receiving terminal and the sending terminal and actualneeds. The intelligence and humanization of sharing information isthereby realized.

In the fifth embodiment of the information sharing method of the presentapplication, based on the above-mentioned first embodiment, secondembodiment or third embodiment, before the operation of sending theinformation to be shared, the method further includes:

saving the information to be shared as at least one temporary file.

Rather than directly sending the target sharing information, it can savethe target sharing information as a temporary file; or save each pieceof the information of the target sharing information as a temporaryfile, and then put all the temporary files together to be packaged as atemporary file or folder. Which one of the saving manners is used is upto the user's choice or determined according to presetting.

It can choose to compress the temporary file or folder to reduce a sizeof the transmission data, or encrypt the temporary file or folder toincrease the security during transmission.

In addition, after the temporary file or folder is sent to the receivingterminal, it can also choose to delete the temporary file or folder toreduce a storage space used.

Specifically, when the data type conversion process is assigned to beexecuted by the sending terminal, the sending terminal directly packagesthe information to be shared into a temporary file or folder. When thedata type conversion process is assigned to be executed by a server, thesending terminal can package the information to be shared into atemporary file or folder before sending the information to be shared tothe server, or directly send the information to be shared to the server.After the data type conversion is completed by the server, the targetsharing information is packaged into a temporary file or folder beforeit is sent to the receiving terminal. When the data type conversionprocess is assigned to be performed by the receiving terminal, likewise,the sending terminal can package the information to be shared into atemporary file or folder, the server sends the temporary file or folderdirectly to the receiving terminal after receiving the temporary file orfolder from the sending terminal, or the sending terminal sends theinformation to be shared to the server and the server receives theinformation to be shared, packages the information to be shared into atemporary file or folder, and then send the temporary file or folder tothe receiving terminal.

In this embodiment, the target sharing information is packaged as atemporary file or folder to facilitate compression, encryption, andtransmission of the target sharing information. The purposes ofimproving the transmission speed of the target sharing information andthe security of the transmission process are achieved.

Sixth to tenth embodiments of the information sharing method of thepresent application are provided below. The sixth to tenth embodimentsinvolve processing the information to be shared using processinginformation to obtain the target sharing information and send the targetsharing information, so that the processing of the information to beshared is more intelligent. Referring to FIG. 5 , in the sixthembodiment of the information sharing method of the present application,the method includes the following operations.

In operation A10, processing information is obtained, the processinginformation being obtained from the sending terminal and/or provided bythe receiving terminal.

During information sharing, there may be various reasons for the sendingterminal and/or the receiving terminal to fail to complete theinformation sharing process, and those reasons may be avoided when theinformation to be shared undergoes some processing to enable theinformation sharing process to be completed. The processing informationcan be obtained from the sending terminal, or be provided by thereceiving terminal, or come from the both.

In addition, not all information can be shared, and the information thatthe user of the sending terminal wants to share needs to meet certainpreset rules or sharing conditions.

Specifically, for the case where the information that the user of thesending terminal wants to share does not meet the preset rules orsharing conditions, for example a current user of the sending terminalthat is not an owner or an authorized user of the owner of the sendingterminal shares information (chooses information to be shared or sendsinformation to be shared), especially when the information chosen orsent by the current user contains a file, and more especially when thefile is an encrypted file, it is necessary to prevent the current userfrom performing information sharing. A way to identify an identifier ofa current user can be the biological recognition (such as fingerprintinformation or face information), passphrases, or passwords input, etc.For identifying a user's identifier based on face information, aterminal can detect whether a current user is the owner, and directlyprovides the current user the information sharing information functionwithout displaying a prompt information when the current user is theowner and passes the verification. When the current user is not theowner, the current user is prompted that users not the owner areprohibited from sharing information, which thus not affect the user'snormal use. For another example, if the information the user of thesending terminal wants to share is an article, a video, or the like thatis copyrighted, the information is not allowed to be shared until theuser is authorized by the author of the information. For still anotherexample, the information involving the privacy of others, or violatingnational laws and regulations or social morals is not allowed to bespread. Similarly, the terminal system preset information, theinformation downloaded by the user from the Internet, the informationentered by the user on the terminal, and the information on the terminalapplication are not allowed to be shared when the above conditions arenot met. In addition, there is a possibility that the information itselfis not supported to be shared by the application of the sending terminalor not supported to be received by the application of the receivingterminal. For example, voice information in WeChat is not supported tobe shared.

For those pieces of information that cannot be shared among theinformation to be shared, it can filter out or hide some or all of thosepieces of information that cannot be shared according to the processinginformation, or make those pieces of information unselectable and give aprompt (such as a chat information area is set to be unselectable,referring to FIG. 6 , A3000 indicates a sending terminal, A3001, A3002,and A3004 indicate some pieces of information that can be shared in achat log, A3003 and A3005 indicate some pieces of information thatcannot be shared in the chat log, and A3006 and A3007 indicate viewsthat chat information areas of the pieces of information that cannot beshared are set to be unselectable. When the user selects A3003, the chatinformation areas indicated by A3006 and A3007 are set to beunselectable), or a mark indicating that the corresponding informationcannot be shared is displayed next to those pieces of information (suchas a text prompt, refer to FIG. 7 , A4000 indicates a sending terminal,A4001, A4002, and A4004 indicate some pieces of information that can beshared in a chat log, A4003 and A4005 indicate some pieces ofinformation that cannot be shared in the chat log, A4007, A4008 indicateviews that chat information areas of those pieces of information thatcannot be shared are set to be unselectable, and A4006 indicates aprompt box that pops up after the user selects A4003 or A4005, promptingthat the selected information cannot be shared and providing aconfirmation button, or, it does not provide the confirmation button,and the prompt box automatically disappears after a certain period oftime (such as is), or a prompt message is output through a dialog box,or those pieces of information that cannot be shared is compressed orencrypted (for example the information of file type is encrypted). Whenall the information to be shared is not input by the user (such as voicemessages), and the information selected by the user to be shared issharable, remaining information that cannot be shared will also befiltered out or hidden, or be made unselectable and give a prompt (forexample the chat information area of which is set to be unselectable),or it displays a corresponding mark (such as a text prompt) beside thosepieces of information to indicate that those pieces of informationcannot be shared, or it outputs a prompt message through a dialog box,or compresses or encrypt (such as encrypting the information of filetype) those pieces of information that cannot be shared.

In operation A11, the information to be shared is processed according tothe processing information to obtain the target sharing information.

The information to be shared is what the user of the sending terminalwants to share. Which information the user wants to share can beselected by the user on the terminal. There are many ways for the userto select the information that he wants to share. For example, the usercan obtain the information through voices to control the terminal, ordirectly select the information on a terminal interface, or obtain theinformation through preset touch gestures or through remote controlgestures.

After the above information selection process, the information to beshared is processed according to the processing information to obtainthe target sharing information that meets the conditions of thereceiving terminal. The processing method can be data type conversion,file format conversion, content conversion, compression, or encryption.

In operation A12, the target sharing information is sent.

In this embodiment, through operations A10: acquiring processinginformation, wherein the processing information being acquired from thesending terminal and/or provided by the receiving terminal, A11:processing the information to be shared according to the processinginformation to obtain the target sharing information, and A12: sendingthe target sharing information, when processing the information that theuser of the sending terminal wants to share, it processes theinformation to be shared according to the processing informationobtained from the sending terminal and/or provided by the receivingterminal, making it possible to share the information which is notsharable before the processing. The purpose of intelligently processingthe information to be shared is realized.

Further, in a seventh embodiment of the information sharing method ofthe present application, based on the above-mentioned sixth embodiment,the processing information includes at least one of the following: datatype, file type, storage information, traffic information, network speedinformation, mode information, time information, location information,language information, status information of the receiving terminal, andstatus information of the user of the receiving terminal.

Data Type, File Type

If the data type and/or the file type supported by the receivingterminal does not meet preset receiving conditions, that is, thereceiving terminal does not support a data type or a file type of theinformation to be shared, the information to be shared is processedaccording to a first preset rule.

Specifically, the information to be shared that the user wants to sharemay be of various data types, such as being audio, video, animation,image, document, file, text, and etc. In most cases, the receivingterminal supports reading the information to be shared, but for somenon-smart phones, it may not support reading video files. Therefore, itis unnecessary for the user of the sending terminal to still send thecontents that the receiving terminal does not support to the receivingterminal. Therefore, when sharing information, it is necessary to firstobtain the data type supported by the receiving terminal. In addition,the user may have such a requirement to share a video file, but becausethe video file are particularly large, the sharing process takes a longtime and requires a large storage space to store. Further the user mayjust want a certain segment in the video file, or audio in the videofile, or images in the video file. For the case that the user wants toshare a certain segment in the video file, it can provide a videocropping function, and the user can select the segment at any time pointand lasting for any length of time as needed. For the case the userwants to share is the audio in the video file, it can provide the userwith a function of data type conversion. The video in the information tobe shared can be converted into audio through data type conversion. Anaudio cropping function can also be provided. The user can select anaudio segment at any time point and lasting for any length of time asneeded. For the case the user wants to share is the images in the videofile, similarly, it can only keep the images and remove the audio fromthe video file. Similarly, the user can select an image at any timepoint in the video file.

Regarding the file types of the information to be shared, one situationis that the information to be shared contains content in anon-frequently used file format, such as video data including MPEG(Motion Picture Experts Group) format, and many mobile phones onlysupport frequently used file formats. For the file formats that are notfrequently used, it generally requires a specific software for formatconversion, such as the format factory. But in daily life, usersgenerally do not use such kind of professional software tool, so, beforesharing information, it needs to determine whether the receivingterminal supports a file format of the information to be shared, if thereceiving terminal does not support the file format of the informationto be shared, there is no need to share the contents in such fileformat. Therefore, during sharing, it can format the contents in thefile format that the receiving terminal does not support at the sendingterminal and convert the contents to any format supported by thereceiving terminal. Another situation is that for some privacy orconfidential files, encryption is usually required during theinformation sharing process. Similarly, for sharing information isrelatively convenient and fast, many times some company internal files(usually documents) are also shared through common software, such asthrough the social software WeChat. To ensure the security of the filesin the sharing process, it needs to encrypt the information to be sharedwith the data type being document.

Storage Information

For the storage information of the receiving terminal, it is necessaryto consider whether a size of the information to be shared by the userexceeds available local storage space of the receiving terminal, so itis necessary to obtain the size of the information to be shared and theavailable local storage space of the receiving terminal before sendingthe information to be shared.

In determining that the storage information of the receiving terminaldoes not meet the preset receiving conditions, that is, in determiningthat the available space of the receiving terminal is less than the sizeof the information to be shared that the user of the sending terminalwants to share, the information to be shared is processed according to asecond preset rule.

Specifically, in determining that the available local storage space ofthe receiving terminal is less than the information to be shared thatthe user wants to share, the larger size pieces of the information to beshared are compressed, that is, the larger size pieces undergo a formatconversion processing, to reduce a size of the information to be shared,of course it can also compress the whole information to be shared. Inaddition, considering that compression will affect the quality of theinformation to be shared, for example, when the information to be sharedcontains a video, for files of the data type such as a video,compression will damage the original files, such as reduce a definition,distort sounds of the original video, and etc. Therefore, there is alimit to compress the information to be shared. For this, it cancompress the information to be shared to obtain the target sharinginformation, and provide the user with a function to preview the targetsharing information. It is up to the user to decide whether to send thetarget sharing information. If the user deems that the content has beenexcessively distorted by compression, the user can reselect theinformation to be shared, such as delete the selected content, etc. Forexample, it prompts that a size of the current available space of thereceiving terminal is smaller than the size of the information to beshared that the user of the sending terminal wants to share for 300 MB,and it recommends to cancel a video with a size of 310 MB from sharingand continue sharing the remaining contents. For example, referring toFIG. 8 , A5000 indicates a sending terminal, A5001, A5002, and A5004indicate some pieces of information that can be shared in a chat log,A5003 and A5005 indicate some pieces of information that cannot beshared in the chat log, A5007 and A5008 indicate views that chatinformation areas of the pieces of information that cannot be shared inthe chat log are set to be unselectable, and A5006 indicates a promptbox that pops up after the user selects A5001 or A5002, prompting thatthe shared contact has insufficient storage space, and asks the user ofthe sending terminal whether to compress the information to be shared,and providing a confirmation button and a cancel button.

Traffic Information, Network Speed Information

The current traffic usage of common mobile phone users is monthlytraffic usage, such as subscribing 10 GB of data traffic per month. Ifthe user's traffic usage exceeds the subscribed amount in a month, itwill cause a lot of charges. Before sending the information to beshared, it needs to obtain the traffic information of the receivingterminal, that is, the available traffic of the receiving terminal.

In determining that the traffic information and/or network speedinformation of the receiving terminal does not meet the preset receivingconditions, that is, in determining that an amount of the availabletraffic of the receiving terminal is smaller than the size of theinformation to be shared the user of the sending terminal want to shareand/or the size of the information to be shared is much larger than adata size that can be received currently by the receiving terminal perunit time, the information to be shared is processed according to athird preset rule.

Specifically, if the available traffic of the receiving terminal isinsufficient to receive the information to be shared, the large sizepieces of the information to be shared can be compressed, that is, thelarge size pieces undergo a format conversion processing, to reduce asize of the information to be shared. Of course, it can also compressthe whole information to be shared. In addition, considering thatcompression will affect the quality of the information to be shared, forexample, when the information to be shared contains a video, for filesof the data type such as a video, compression will damage the originalfiles, such as reduce a definition, distort sounds of the originalvideo, and etc. Therefore, there is a limit to compress the informationto be shared. For this, it can compress the information to be shared toobtain the target sharing information, and provide the user with afunction to preview the target sharing information. It is up to the userto decide whether to send the target sharing information. If the userdeems that the content has been excessively distorted after compression,the user can reselect the information to be shared, such as delete theselected content, etc. For example, it prompts that a size of theavailable traffic of the receiving terminal is smaller than the size ofthe information to be shared that the user of the sending terminal wantsto share for 300 MB, and it recommends to cancel a video with a size of310 MB from sharing and continue sharing the remaining contents.

In addition, when the size of the information to be shared that the userwants to share is much larger than the data size that can be currentlysent per unit time by the receiving terminal, for example, the size ofthe information to be shared that the user wants to share is 1000 MB,and the current network speed of the receiving terminal can only reach10 KB/s, it is conceivable that the sharing will be meaningless.Therefore, in the information sharing process, it is necessary to obtainthe size of the information when the user chooses to share theinformation, and at the same time to obtain the network speed of thereceiving terminal. When the network speed of the terminal is much lowerthan the network speed required by the user of the sending terminal toshare the information to be shared, it can use compression to ensurethat the size of the information to be shared meets the network speed.It can also prompt the user that the current network condition is poorand it may take some time to send the information, and recommend thatuser to allow the sending terminal to automatically send the informationwhen the network condition does not affect the sending. As shown in FIG.9 , A6000 indicates a sending terminal, A6001, A6002, and A6004 indicatesome pieces of information that can be shared in a chat log, A6003 andA6005 indicate some pieces of information that cannot be shared in thechat log, A6007 and A6008 indicate views that chat information areas ofthe pieces of information that cannot be shared are set to beunselectable, and A6006 is a prompt box that pops up after the userselects A6001 or A6002, prompting that the network condition of theshared contact is poor, and asking the user of the sending terminalwhether to automatically send the information to be shared after theshared contact's network is restored, and providing a confirmationbutton and a cancel button. In addition, considering that compressionwill affect the quality of the information to be shared, for example,when the information to be shared contains a video, for files of thedata type such as a video, compression will damage the original files,such as reduce a definition, distort sounds of the original video, andetc. Therefore, there is a limit to compress the information to beshared. For this, it can compress the information to be shared to obtainthe target sharing information, and provide the user with a function topreview the target sharing information. It is up to the user to decidewhether to send the target sharing information. If the user deems thatthe content has been excessively distorted by compression, he canreselect the information to be shared, such as delete the selectedcontent.

In addition, in the same way, there may be a situation where theavailable traffic of the sending terminal is insufficient and/or anetwork speed of the sending terminal does not meet the sendingrequirements. Before sending the information to be shared, the availabletraffic and/or the network speed of the sending terminal must also betaken into account. A processing manner referring to the above-mentionedsituations where the traffic information and/or network speedinformation of the receiving terminal does not meet the preset receivingconditions is adopted, and details of which are not described herein.

If the traffic information and/or network speed information of thesending terminal does not meet the preset sending conditions, that is,if a size of the available traffic of the sending terminal is smallerthan a size of the information to be shared by the user of the sendingterminal and/or the size of the information to be shared is much largerthan a data size that can be sent currently by the sending terminal perunit time, the information to be shared is processed according to aneighth preset rule.

Specifically, when the available traffic of the sending terminal isinsufficient to send the information to be shared, the above-mentionedcompression process may be used. When the network speed of the sendingterminal is much lower than a network speed required by the user toshare the information to be shared, the same processing manner referringto the above-mentioned situations of the receiving terminal can beadopted.

Mode information, time information, location information, languageinformation, status information of the receiving terminal, statusinformation of the user of the receiving terminal

If mode information of the receiving terminal does not meet the presetreceiving conditions, the information to be shared is processedaccording to a fourth preset rule.

Specifically, for the mode information, the user of the sending terminalcan set a mode of the sending terminal as needed. For example, when thesending terminal is in a guest mode, the current user of the sendingterminal is generally not the owner, that is, the owner considersprivacy protection or other situations, and sets the terminal (such as amobile phone) to be in the guest mode when the terminal is lent toothers, thereby to prevent the others from revealing the owner's privacyduring use. In addition, when the sending terminal is in a safe mode, ifthe information chosen to be shared by the user of the sending terminalis a file (such as a video, a document, an image, or the like), theremay be leakage of confidential files and personal privacy. In addition,when the sending terminal is in a child mode, generally at this moment,the user of the sending terminal is not the owner but the owner's childor another junior, the user of the sending terminal may be unfamiliarwith the mobile phone, and in such case, a series of misoperation mayoccur and may trigger a sharing process. It is understandable under sucha situation, the user of the sending terminal does not need to shareinformation. In addition, the sending terminal may also be in an elderlymode. Similarly, the user of the sending terminal at this moment isgenerally the owner's elder, and is unfamiliar with the current mobilephone. When the elder uses the mobile phone, it will also produce aseries of misoperation that lead to a sharing process.

Similarly, the user of the receiving terminal can set a mode of thereceiving terminal as needed. For example, when the receiving terminalis in a guest mode, the user of the receiving terminal is generally notthe owner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information chosen to be shared by the user of thesending terminal is a locally stored file (such as a video, a document,an image, or the like), the user can be prompted that the receivingterminal is currently in the guest mode, continuing to send may revealprivacy and ask the user of the sending terminal whether to still sharethe information or not, or prompt the user to encrypt the information tobe shared. In addition, when the receiving terminal is in a safe mode,if the information chosen to be shared by the user of the sendingterminal is a file (such as a video, a document, an image, or the like),it can prompt the user that the receiving terminal is in a safe mode andprohibit such information sharing, or prompt the user to encrypt theinformation to be shared. In addition, when the receiving terminal is ina child mode, the user of the receiving terminal is generally not theowner at this moment but the child of the owner or another junior. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can remind the user of the sending terminal that the currentreceiving terminal is in a child mode, or it prompts the user to encryptthe information to be shared. In addition, the receiving terminal mayalso be in an elderly mode. Similarly, the user of the receivingterminal at this time is generally the owner's elder. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can prompt the user of the sending terminal that the receivingterminal is currently in the elderly mode, or prompt the user to encryptthe information to be shared.

In addition to the above modes, due to different needs, the receivingterminal may also be in a navigation mode. When the receiving terminalis in the navigation mode, it is obviously inconvenient to receiveinformation. At this time, the sharing of the sending terminal will posea threat to the driving safety of the user of the receiving terminal. Inaddition, when the receiving terminal is in a conference mode, the userof the receiving terminal is also inconvenient to receive information.Therefore, in the information sharing process, it is necessary to obtaina current mode of the receiving terminal before the user of the sendingterminal sends the information to be shared, thus to avoid disturb theuser of the receiving terminal when the user of the receiving terminalis inconvenient to receive information. Therefore, when it is acquiredthat the receiving terminal is in the navigation mode or the conferencemode, the user of the sending terminal may be prompted that thereceiving terminal is currently in the navigation mode or the conferencemode.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in the presetmode may not affect the application being in the preset mode, forexample, the mobile phone is in a smart mode, and the application is ina normal mode. Certain preset modes of the mobile phone may also affecta preset mode of the application, for example, if the mobile phone is ina traffic saving mode, the application cannot be in the normal mode.Specifically, whether a profile mode of the mobile phone has a higherpriority than the profile mode of the application can be preset in thesystem of the mobile phone. When the receiving terminal is in a presetmode, that is, which profile mode of the mobile phone being in and/orwhich profile mode of an application being in determines whether toexecute operation A10 to process the information to be shared.

In addition, for the sending terminal, if the mode information of thesending terminal does not meet the preset sending conditions, theinformation to be shared is processed according to a ninth preset rule.

Specifically, the user of the sending terminal can set a mode of thesending terminal as needed. For example, when the sending terminal is ina guest mode, the current user of the sending terminal is generally notthe owner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information the user of the sending terminal choosesto share is a locally stored files (such as a video, a document, animage, etc.), the user can be prompted to be in the guest mode, and thatsuch information sharing is prohibited. In addition, when the sendingterminal is in a safe mode, if the information the user of the sendingterminal chooses to share is a file (such as a video, a document, animage, etc.), the user can be prompted to be in the safe mode and thatsuch information sharing is prohibited. In addition, when the sendingterminal is in the child mode at the current time, the user of thesending terminal is generally not the owner but the owner's child oranother junior. The current user of the sending terminal may beunfamiliar with the mobile phone, and in such case, a series ofmisoperation may occur and may trigger a sharing process. It isunderstandable under such a situation, the user of the sending terminalat this moment does not have the need to share information. It canprompt the user it is in the child mode and information sharing isprohibited. In addition, the sending terminal may also be in an elderlymode. Similarly, the current user of the sending terminal is generallyan elder of the owner, and is not familiar with the current mobilephone. When the elder uses the mobile phone, it will also produce aseries of misoperation that lead to a sharing process, but the user ofthe sending terminal at this moment does not have the need to shareinformation. It can prompt the user it is in the elderly mode andinformation sharing is prohibited.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in the presetprofile mode may not affect the application being in the preset profilemode, for example, the mobile phone is in a smart mode, and theapplication is in a normal mode. Certain preset modes of the mobilephone may also affect a preset mode of the application, for example, ifthe mobile phone is in a traffic saving mode, the application cannot bein the normal mode. Specifically, whether a profile mode of the mobilephone has a higher priority than a profile mode of the application canbe preset in the system of the mobile phone. When the sending terminalis in a preset mode, that is, which profile mode of the mobile phonebeing in and/or which profile mode of an application being in determineswhether to execute operation A10 to process the information to be sharedaccording to the third processing rule.

In determining that the time information and/or location information ofthe receiving terminal does not meet the preset receiving conditions,that is, in determining that a region of the receiving terminal isdifferent from a region of the sending terminal and/or in determiningthat a time zone of the receiving terminal is different from a time zoneof the sending terminal, the information to be shared is processedaccording to a fifth preset rule.

Specifically, for time information and location information, the user ofthe receiving terminal may be in the same time zone as the user of thesending terminal, or may be in a time zone different from that of theuser of the sending terminal. In the case where the two are in the samezone, the user of the sending terminal generally considers based on thecurrent time whether it is suitable for sharing information; and in thecase where the two are in different time zones, for example, the user ofthe sending terminal is in the east eight time zone, and the user of thereceiving terminal is in the west eight time zone, at this time, it isobviously unsuitable for the user of the sending terminal neglects toconsider the current time information of the user of the receivingterminal, for example, if the current time of the user of the sendingterminal is two o'clock in the afternoon, but the current time of theuser of the receiving terminal is two o'clock in the morning, obviously,it is not suitable for sharing information at this time. Therefore, ifthe user of the receiving terminal and the user of the sending terminalare not in the same time zone, the sending terminal needs to prompt theuser of the sending terminal with the current time information of theuser of the receiving terminal, and prompts the user of the sendingterminal whether it is suitable for the user of the receiving terminalto receive the information to be shared at current time.

In addition, the user of the sending terminal may be in the same regionas the user of the receiving terminal, or may be in a region differentfrom a region of the user of the receiving terminal. In the case wherethe two are in different regions, the user of the sending terminal needsto consider whether the location information of the user of thereceiving terminal is suitable for receiving the information to beshared at current time. For example, the user of the receiving terminalmay be on vacation, and it is obviously inappropriate to sharework-related information to the user of the receiving terminal.Therefore, when sharing information, the sending terminal prompts theuser of the sending terminal with a geographic location of the user ofthe receiving terminal, and prompts the user of the sending terminalwhether it is suitable for the user of the receiving terminal to receivethe information to be shared at current time.

In determining that the language information of the receiving terminaldoes not meet the preset receiving conditions, that is, in determiningthat a system language of the receiving terminal is different from asystem language of the sending terminal and/or an application languageof the receiving terminal is different from an application language ofthe sending terminal, the information to be shared is processedaccording to a sixth preset rule.

Specifically, if the user of the receiving terminal cannot understandthe content of the information shared by the user of the sendingterminal to the user of the receiving terminal due to language barrier,sharing information under such a situation is meaningless. Therefore,during information sharing, the system language and/or currentapplication language of the receiving terminal can be obtained(generally, obtaining the current application language is for instantmessaging software, because such software each usually has a dedicatedterminal client, the acquisition of system language is aimed at thesituation where the receiving terminal does not need to use a dedicatedclient to receive information during the information sharing process).After the system language and/or the current application language of thereceiving terminal is obtained, if the system language and/or thecurrent application language of the receiving terminal is different froma language of the information to be shared by the sending terminal, theuser of the sending terminal is prompted and a function to convert thelanguage of the information to be shared into the system language of thereceiving terminal and/or the current application language is provided.

In determining that status information of the receiving terminal and/orstatus information of the user of the receiving terminal does not meetthe preset receiving conditions, that is, in determining that the statusinformation of the receiving terminal and/or the status information ofthe user of the receiving terminal does not support information sharing,the information to be shared is processed according to a seventh presetrule.

Specifically, for the status information of the receiving terminal, thereceiving terminal's power is too low due to the user forgetting tocharge or being unable to charge currently, and the power is not enoughto complete the information sharing process. At this time, it is obviousnot appropriate if the sending terminal still sends the information tobe shared. Similarly, for the sending terminal, the power also affectsthe process of sharing information. For the status information of theuser of the receiving terminal, when the user of the receiving terminalis in motion, such as the user of the receiving terminal is currentlyusing a software recording an exercise process (running speed, runningtime, etc.), it is inconvenient for the user of the receiving terminalto receive information at current time.

In addition to the above prompts and encryption processing, the sendingterminal can also automatically send the information to be shared whenthe sending terminal exits a mode that does not support informationsharing or when the user of the receiving terminal is convenient toreceive information.

In this embodiment, through operations A10: obtaining processinginformation, the processing information being obtained from the sendingterminal and/or provided by the receiving terminal, A11: processing theshared information according to the processing information to obtaintarget sharing information, A12: sending the target sharing information,when sharing information, the information to be shared can be filtered,hidden, set to be in an unselectable state, displayed with a markindicating sharing not supported, or output with a prompt to avoid thatthe information cannot be opened by the user of the receiving terminal,or avoid sharing the information when the receiving terminal hasinsufficient storage space or insufficient available traffic, accordingto the processing information obtained from the sending terminal and/orprovided by the receiving terminal. The purpose of intelligentlyprocessing the information to be shared is realized.

Further, in an eighth embodiment of the information sharing method ofthe present application, based on the seventh embodiment, beforeoperation A10, the method further includes determining whether a currentmode is a preset mode.

According to the user's selection, it is determined whether aninformation selection mode of selecting information to be shared of thecurrent terminal (such as a mobile phone) is in a smart mode or in anormal mode when to share information. A switch of the smart mode canonly appear when the mobile phone is in the developer mode or in thedebugging mode defined in the system settings. The switch can also bebuilt into an application (such as in the laboratory function of theapplication). In addition, because at the current, a mobile phone canautomatically enters a profile mode according to the current usagescenario, one of the profile modes of the mobile phone can be the smartmode (for example, when the user opens a game application, the mobilephone automatically enters a game mode), and when the user of the mobilephone performs a sharing operation, the information selection mode ofthe mobile phone will automatically enter the smart mode. Specifically,when the mobile phone is in the smart mode, the mobile phone canautomatically enter a traffic saving mode according to certainconditions (such as when the available traffic is insufficient, themobile phone automatically enters the traffic saving mode) or the safemode (such as when the information to be shared contains files, themobile phone automatically enters the safe mode). When the informationselection mode is in the smart mode, operation A10 is performed. Whenthe information selection mode is in the normal mode, a follow-upprocessing is performed according to rules of the system or acorresponding application, such as according to rules of sharingfunction that comes with WeChat.

Of course, even when the information selection mode is in the normalmode, the method can be chose for execution.

In determining that the current mode is a preset mode, performingoperation A10.

In determining that the current mode is a preset mode, operation A10 isexecuted. In addition, the above method may be executed by the sendingterminal or the server. A specific execution manner can be determinedaccording to the user's selection operation or the system settings.

In this embodiment, whether to perform the information sharing afteroperation A10 is determined by judging whether the current profile modeof the mobile phone is any one of the smart mode, the normal mode, thetraffic saving mode, and the safe mode, and the above modes can beselected by the user to turn on or off, thereby making informationprocessing more intelligent.

Further, in a ninth embodiment of the information sharing method of thepresent application, based on the eighth embodiment, the informationsharing method further includes at least one of the following:

in determining that the method is executed by the sending terminal, thetarget sharing information includes at least one of original informationto be shared and processed information to be shared.

The data processing capability of current smart phones is alreadyexcellent, so this method can be directly executed on the sendingterminal, and the sending terminal processes the information to beshared according to the processing information obtained from the sendingterminal and/or provided by the receiving terminal. But the use of amobile phone may be affected due to additional data processing that maycause lags in the mobile phone. When the method is executed at thesending terminal, the information to be shared is processed at thesending terminal according to the processing information to obtain thetarget sharing information, where the target sharing informationincludes original information to be shared and/or processed informationto be shared. When the target sharing information is the originalinformation to be shared, it indicates that the information to be sharedselected by the user of the sending terminal can be shared withoutneeding to be processed, so the information to be shared can be sent.When the target sharing information is the processed information to beshared, or includes the original information to be shared and theprocessed information to be shared, it indicates that the information tobe shared selected by the user of the sending terminal needs to beprocessed before sharing. The case where the target sharing informationincludes the original information to be shared is to provide the user ofthe receiving terminal with choices. The user of the receiving terminalcan choose to display the original information to be shared or theprocessed information to be shared. Of course, the choice of displayingthe original information to be shared or the processed information to beshared can be preset, or the user of the receiving terminal can chooseafter receiving the target sharing information.

In determining that the method is executed by the server, the targetsharing information includes at least one of the following: the originalinformation to be shared, the processed sharing information to beshared, a link address, and a logo.

Although the data processing capability of current smart phones isalready very good, correspondingly, the application software on a mobilephone become more and more. In order to avoid situations such as lags ofthe sending terminal which affect the use of the mobile phone, thismethod can also be executed on the server. Similarly, when the method isexecuted on the server, the information to be shared is processed on theserver according to the processing information to obtain the targetsharing information, where the target sharing information includesoriginal information to be shared and/or processed shared information tobe shared. When the target sharing information is the originalinformation to be shared, it indicates that the information to be sharedselected by the user of the sending terminal can be shared withoutneeding to be processed, thus the information to be shared can bedirectly sent. The target sharing information is the processedinformation to be shared, or includes the original information to beshared and the processed information to be shared, it indicates that theinformation to be shared selected by the user of the sending terminalneeds to be processed before sharing. The case where the target sharinginformation also includes the original information to be shared is toprovide the user of the receiving terminal with choices. The user of thereceiving terminal can choose to display the original information to beshared or the processed information to be shared. Of course, the choiceof displaying the original information to be shared or the processedinformation to be shared can be preset, or the user of the receivingterminal can choose after receiving the target sharing information.

The advantage of sharing information in a form of a link address isthat: for some content (such as documents), users can preview thecontent online without having to download it completely to browse thespecific content. In addition, as compared to the information to beshared, a data size of the link address is very small and easy to share.

In addition, excepting the way of sharing the target sharing informationin the form of a link address, the target sharing information can alsobe shared in a form of a logo, which is essentially an image containinga hyperlink. The advantage of sharing information in the form of a logois that: it avoids a shortcoming of link addresses that cannot indicatedata types of the target sharing information. When sharing informationin the form of a logo, a specific logo can be provided for each datatype in the target sharing information, and the user of the receivingterminal can know which specific data types the shared content includes.In addition, the logos can be conventional data type logos, such as acommon music logo, video logo, document logo, etc. The logos can also bespecially designed, because in the target sharing information, thereexists many data types at the same time, it is very complicated todisplay the logo of each data type through an image. At this moment, itcan put the logo of each data type in a same circle, and represents thelogo of each data type with a fan-shaped area, and a size of eachfan-shaped area can represent a ratio of a data size of a correspondingdata type to a size of the target sharing information. Similarly, a sizeof each fan-shaped area can also be used to represent a ratio of thenumber of pieces of a corresponding data type (such as in a chat log,the number of voice messages and the number of image messages) to thetotal number of pieces of target sharing information.

In addition, the above first preset rule, second preset rule, thirdpreset rule, fourth preset rule, fifth preset rule, sixth preset rule,seventh preset rule, eighth preset rule, ninth preset rule and tenthpreset rule respectively include one or more of preset strategies(filtering, hiding, setting to be an unselectable state, displaying amark indicating not support sharing, and outputting prompt information).

In this embodiment, any method in the above sixth to eighth embodimentscan be executed by the sending terminal or the server, and the executionmanner is determined according to the user's selection operation or thesystem settings, which meets different requirements in different usagescenarios, thereby realizing intelligent selection of informationprocessing methods.

In a tenth embodiment of the information sharing method of the presentapplication, the information sharing method includes:

operation A20, obtaining information to be shared;

operation A21, detecting whether the information to be shared meetssharing conditions; and

operation A22, in determining that the information to be shared does notmeet the sharing conditions, processing the information to be sharedaccording to a preset rule to obtain target sharing information.

It needs to detect whether the information to be shared meets thesharing conditions according to relevant information. If the informationto be shared is found not to meet the sharing conditions through thedetection based on the relevant information, the information to beshared is processed according to the preset rule. The relevantinformation is provided by the sending terminal and/or by the receivingterminal, and the relevant information defines requirements includes atleast one of data type requirement, file type requirement, presentationform requirement, content requirement, and display location informationrequirement. For example, in an embodiment, the relevant informationincludes at least one of the following: data type, file type, storageinformation, traffic information, network speed information, modeinformation, time information, location information, status informationof the receiving terminal, and status information of the user of thereceiving terminal.

Data Type, File Type

The data type and/or file type of the receiving terminal does not meetthe preset receiving condition, that is, the receiving terminal does notsupport the data type and/or file type of the information to be shared.

Specifically, the information to be shared that the user wants to sharemay be of various data types, such as being audio, video, animation,image, document, file, text, and etc. In most cases, the receivingterminal supports reading the information to be shared, but for somenon-smart phones, it may not support reading video files. Therefore, itis unnecessary for the user of the sending terminal to still send thecontents that the receiving terminal does not support to the receivingterminal. Therefore, when sharing information, it is necessary to firstobtain the data type supported by the receiving terminal. In addition,the user may have such a requirement to share a video file, but becausethe video file are particularly large, the sharing process takes a longtime and requires a large storage space to store. Further the user mayjust want a certain segment in the video file, or audio in the videofile, or images in the video file. For the case that the user wants toshare a certain segment in the video file, it can provide a videocropping function, and the user can select the segment at any time pointand lasting for any length of time as needed. For the case the userwants to share is the audio in the video file, it can provide the userwith a function of data type conversion. The video in the information tobe shared can be converted into audio through data type conversion. Anaudio cropping function can also be provided. The user can select anaudio segment at any time point and lasting for any length of time asneeded. For the case the user wants to share is the images in the videofile, similarly, it can only keep the images and remove the audio fromthe video file. Similarly, the user can select an image at any timepoint in the video file.

Regarding the file types of the information to be shared, one situationis that the information to be shared contains content in anon-frequently used file format, such as video data including MPEG(Motion Picture Experts Group) format, and many mobile phones onlysupport frequently used file formats. For the file formats that are notfrequently used, it generally requires a specific software for formatconversion, such as the format factory. But in daily life, usersgenerally do not use such kind of professional software tool, so, beforesharing information, it needs to determine whether the receivingterminal supports a file format of the information to be shared, if thereceiving terminal does not support the file format of the informationto be shared, there is no need to share the contents in such fileformat. Therefore, during sharing, it can format the contents in thefile format that the receiving terminal does not support at the sendingterminal and convert the contents to any format supported by thereceiving terminal. Another situation is that for some privacy orconfidential files, encryption is usually required during theinformation sharing process. Similarly, for sharing information isrelatively convenient and fast, many times some company internal files(usually documents) are also shared through common softwares, such asthrough the social software WeChat. To ensure the security of the filesin the sharing process, it needs to encrypt the information to be sharedwith the data type being document.

Storage Information

The storage information of the receiving terminal does not meet thepreset receiving conditions, that is, the available local storage spaceof the receiving terminal is smaller than a size of the information tobe shared that the user wants to share.

Specifically, for the storage information of the receiving terminal, itis necessary to consider whether the size of the information to beshared that the user of the sending terminal wants to share exceeds theavailable local storage space of the receiving terminal, so it isnecessary to obtain the size of the information to be shared and theavailable local storage space of the receiving terminal. In determiningthat the available local storage space of the receiving terminal is lessthan the size of the information to be shared that the user wants toshare, the large size pieces of the information to be shared arecompressed, that is, the large size pieces undergo a format conversionprocessing, to reduce a size of the information to be shared. Of course,it can also compress the whole information to be shared. In addition,considering that compression will affect the quality of the informationto be shared, for example, when the information to be shared contains avideo, for files of the data type such as videos, compression willdamage the original files, such as reduce definitions, distort sounds ofthe original videos, and etc. Therefore, there is a limit to compressthe information to be shared. For this, it can compress the informationto be shared to obtain the target sharing information, and provide theuser with a function to preview the target sharing information. It is upto the user to decide whether to send the target sharing information. Ifthe user deems that the content has been excessively distorted bycompression, the user can reselect the information to be shared, such asdelete the selected content, etc. For example, it prompts that a size ofthe current available space of the receiving terminal is smaller thanthe size of the information to be shared that the user of the sendingterminal wants to share for 300 MB, and it recommends to cancel a videowith a size of 310 MB from sharing and continue sharing the remainingcontents. For example, referring to FIG. 8 , A5000 indicates a sendingterminal, A5001, A5002, and A5004 indicate some pieces of informationthat can be shared in a chat log, A5003 and A5005 indicate some piecesof information that cannot be shared in the chat history, A5007 andA5008 indicate views that chat information areas of those pieces ofinformation that cannot be shared in the chat history are set to beunselectable, and A5006 indicates a prompt box that pops up after theuser selects A5001 or A5002, prompting that the shared user hasinsufficient storage space, and asks the user of the sending terminalwhether to compress the information to be shared, and providing aconfirmation button and a cancel button.

Traffic Information, Network Speed Information

The traffic information and/or the network speed information of thereceiving terminal does not meet the preset receiving conditions, thatis, the available traffic of the receiving terminal is not enough toreceive the information to be shared and/or the size of the informationto be shared that the user wants to share is much larger than a datasize that can be received currently by the receiving terminal per unittime.

Specifically, the current traffic usage of common mobile phone users ismonthly traffic usage, such as subscribing 10 GB of data traffic permonth. If the user's traffic usage exceeds the subscribed amount in amonth, it will cause a lot of charges. Before sending the information tobe shared, it needs to obtain the traffic information of the receivingterminal, that is, the available traffic of the receiving terminal. Ifthe available traffic of the receiving terminal is insufficient toreceive the information to be shared, likewise, the large size pieces ofthe information to be shared can be compressed, that is, the large sizepieces undergo a format conversion processing, to reduce a size of theinformation to be shared. Of course, it can also compress the wholeinformation to be shared. In addition, considering that compression willaffect the quality of the information to be shared, for example, whenthe information to be shared contains a video, for files of the datatype such as videos, compression will damage the original files, such asreduce definitions, distort sounds of the original videos, and etc.Therefore, there is a limit to compress the information to be shared.For this, it can compress the information to be shared to obtain thetarget sharing information, and provide the user with a function topreview the target sharing information. It is up to the user to decidewhether to send the target sharing information. If the user deems thatthe content has been excessively distorted after compression, the usercan reselect the information to be shared, such as delete the selectedcontent, etc. For example, it prompts that a size of the availabletraffic of the receiving terminal is smaller than the size of theinformation to be shared that the user of the sending terminal wants toshare for 300 MB, and it recommends to cancel a video with a size of 310MB from sharing and continue sharing the remaining contents.

In addition, when the size of the information to be shared that the userwants to share is much larger than the data size that can be currentlysent per unit time by the receiving terminal, for example, the size ofthe information to be shared that the user wants to share is 1000 MB,and the current network speed of the receiving terminal can only reach10 KB/s, it is conceivable that the sharing will be meaningless.Therefore, in the information sharing process, it is necessary to obtainthe size of the information when the user chooses to share theinformation, and at the same time to obtain the network speed of thereceiving terminal. When the network speed of the terminal is much lowerthan the network speed required by the user of the sending terminal toshare the information to be shared, it can use compression to ensurethat the size of the information to be shared meets the network speed.It can also prompt the user that the current network condition is poorand it may take some time to send the information, and recommend theuser to allow the sending terminal to automatically send the informationwhen the network condition does not affect the sending. As shown in FIG.9 , A6000 indicates a sending terminal, A6001, A6002, and A6004 indicatesome pieces of information that can be shared in a chat log, A6003 andA6005 indicate some pieces of information that cannot be shared in thechat log, A6007 and A6008 indicate views that chat information areas ofthose pieces of information that cannot be shared are set to beunselectable, and A6006 is a prompt box that pops up after the userselects A6001 or A6002, prompting that the network condition of theshared user is poor, and asking the user of the sending terminal whetherto automatically send the information to be shared after the shareduser's network is restored, and providing options including automaticsending and canceling automatic sending and returning to the sharinginterface to facilitate the user of the sending terminal to still share.In addition, considering that compression will affect the quality of theinformation to be shared, for example, when the information to be sharedcontains a video, for files of the data type such as videos, compressionwill damage the original files, such as reduce definitions, distortsounds of the original videos, and etc. Therefore, there is a limit tocompress the information to be shared. For this, it can compress theinformation to be shared to obtain the target sharing information, andprovide the user with a function to preview the target sharinginformation. It is up to the user to decide whether to send the targetsharing information. If the user deems that the content has beenexcessively distorted by compression, he can reselect the information tobe shared, such as delete the selected content.

For the case that the traffic information and/or the network speedinformation of the sending terminal does not meet the preset sendingconditions

Specifically, for the sending terminal, there may be a situation wherethe available traffic is insufficient and/or the network speed conditiondoes not meet the sending requirements. Before sending the informationto be shared, the available traffic and/or the network speed conditionof the sending terminal must also be taken into account.

Mode information, time information, location information, statusinformation of the receiving terminal, status information of the user ofthe receiving terminal

The mode information of the receiving terminal does not meet the presetreceiving conditions, that is, the receiving terminal is in a profilemode, an intelligent mode, a safety mode, a navigation mode, aconference mode, a guest mode, a child mode, or an elderly mode.

Specifically, for the mode information, the user of the sending terminalcan set a mode of the sending terminal as needed. For example, when thesending terminal is in a guest mode, the current user of the sendingterminal is generally not the owner, that is, the owner considersprivacy protection or other situations, and sets the terminal (such as amobile phone) to be in the guest mode when the terminal is lent toothers, thereby to prevent the others from revealing the owner's privacyduring use. In addition, when the sending terminal is in a safe mode, ifthe information chosen to be shared by the user of the sending terminalis a file (such as a video, a document, an image, or the like), theremay be leakage of confidential files and personal privacy. In addition,when the sending terminal is in a child mode, generally at this moment,the user of the sending terminal is not the owner but the owner's childor another junior, the user of the sending terminal may be unfamiliarwith the mobile phone, and in such case, a series of misoperation mayoccur and may trigger a sharing process. It is understandable under sucha situation, the user of the sending terminal does not need to shareinformation. In addition, the sending terminal may also be in an elderlymode. Similarly, the user of the sending terminal at this moment isgenerally the owner's elder, and they are unfamiliar with the currentmobile phone. When the elder using the mobile phone, it will alsoproduce a series of misoperation that lead to a sharing process.

Similarly, the user of the receiving terminal can set a mode of thereceiving terminal as needed. For example, when the receiving terminalis in a guest mode, the user of the receiving terminal is generally notthe owner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information chosen to be shared by the user of thesending terminal is a locally stored file (such as a video, a document,an image, or the like), the user can be prompted that the receivingterminal is currently in a guest mode, continuing to send may revealprivacy and the user of the sending terminal is asked whether to stillshare the information or not, or is prompted to encrypt the informationto be shared. In addition, when the receiving terminal is in a safemode, if the information chosen to be shared by the user of the sendingterminal is a file (such as a video, a document, an image, or the like),it can prompt the user that the receiving terminal is in the safe modeand prohibit such information sharing, or prompt the user to encrypt theinformation to be shared. In addition, when the receiving terminal is ina child mode, the user of the receiving terminal is generally not theowner at this moment but the child of the owner or another junior. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can remind the user of the sending terminal that the currentreceiving terminal is in the child mode, or it prompts the user toencrypt the information to be shared. In addition, the receivingterminal may also be in an elderly mode. Similarly, the user of thereceiving terminal at this time is generally the owner's elder. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can prompt the user of the sending terminal that the receivingterminal is currently in the elderly mode, or prompt the user to encryptthe information to be shared.

In addition to the above modes, due to different needs, the receivingterminal may also be in a navigation mode. When the receiving terminalis in the navigation mode, it is obviously inconvenient to receiveinformation. At this time, the sharing of the sending terminal will posea threat to the driving safety of the user of the receiving terminal. Inaddition, when the receiving terminal is in a conference mode, the userof the receiving terminal is also inconvenient to receive information.Therefore, in the information sharing process, it is necessary to obtaina current mode of the receiving terminal before the user of the sendingterminal sends the information to be shared, thus to avoid disturb theuser of the receiving terminal when the user of the receiving terminalis inconvenient to receive information. Therefore, when it is acquiredthat the receiving terminal is in the navigation mode or the conferencemode, the user of the sending terminal may be prompted that thereceiving terminal is currently in the navigation mode or the conferencemode.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in the presetmode may not affect the application being in the preset mode, forexample, the mobile phone is in a smart mode, and the application is ina normal mode. Certain preset modes of the mobile phone may also affecta preset mode of the application, for example, if the mobile phone is ina traffic saving mode, the application cannot be in the normal mode.Specifically, whether a profile mode of the mobile phone has a higherpriority than the profile mode of the application can be preset in thesystem of the mobile phone. When the receiving terminal is in a presetmode, whether to execute operation A10 to process the information to beshared is determined according to which profile mode of the mobile phonebeing in and/or which profile mode of an application being in.

For the case the time information and/or location information of thereceiving terminal does not meet the preset receiving conditions, thatis, the time zone of the receiving terminal is different from the timezone of the sending terminal and/or the region of the receiving terminalis different from the region of the sending terminal.

Specifically, for time information and location information, the user ofthe receiving terminal may be in the same time zone as the user of thesending terminal, or may be in a time zone different from a time zone ofthe user of the sending terminal. In the case where the two are in thesame zone, the user of the sending terminal generally considers based onthe current time whether it is suitable for sharing information; and inthe case where the two are in different time zones, for example, theuser of the sending terminal is in the east eight time zone, and thereceiving terminal end user is in the west eight time zone, at thistime, it is obviously unsuitable for the user of the sending terminalneglects to consider the current time information of the user of thereceiving terminal, for example, if the current time of the user of thesending terminal is two o'clock in the afternoon, but the current timeof the user of the receiving terminal is two o'clock in the morning,obviously, it is not suitable for information sharing at this time.Therefore, if the user of the receiving terminal and the user of thesending terminal are not in the same time zone, the sending terminalneeds to prompt the user of the sending terminal with the current timeinformation of the user of the receiving terminal, and prompts the userof the sending terminal whether it is suitable for the user of thereceiving terminal to receive the information to be shared at currenttime.

In addition, the user of the sending terminal may be in the same regionas the user of the receiving terminal, or may be in a region differentfrom a region of the user of the receiving terminal. In the case wherethe two are in different regions, the user of the sending terminal needsto consider whether the location information of the user of thereceiving terminal is suitable for receiving the information to beshared at current time. For example, the user of the receiving terminalmay be on vacation, and it is obviously inappropriate to sharework-related information to the user of the receiving terminal.Therefore, when sharing information, the sending terminal prompts theuser of the sending terminal with a geographic location of the user ofthe receiving terminal, and prompts the user of the sending terminalwhether it is suitable for the user of the receiving terminal to receivethe information to be shared at current time.

For the case where the language information of the receiving terminaldoes not meet the preset receiving conditions, that is, the systemlanguage and/or current application language of the receiving terminalis different from the language of the information to be shared.

Specifically, if the user of the receiving terminal cannot understandthe content of the information shared by the user of the sendingterminal to the user of the receiving terminal due to language barrier,sharing information under such a situation is meaningless. Therefore,during information sharing, the system language and/or currentapplication language of the receiving terminal can be obtained(generally, obtaining the current application language is for instantmessaging software, because such software each usually has a dedicatedterminal client, the acquisition of system language is aimed at thesituation where the receiving terminal does not need to use a dedicatedclient to receive information during the information sharing process).After the system language and/or the current application language of thereceiving terminal is obtained, if the system language and/or thecurrent application language of the receiving terminal is different froma language of the information to be shared by the sending terminal, theuser of the sending terminal is prompted and a function is provided toconvert the language of the information to be shared into the systemlanguage of the receiving terminal and/or the current applicationlanguage.

For the case where the status information of the receiving terminaland/or the status information of the user of the receiving terminal doesnot meet the preset receiving conditions, that is, the statusinformation of the receiving terminal and/or the status information ofthe user of the receiving terminal is insufficient to support thecompletion of information sharing.

Specifically, for the status information of the receiving terminal, thereceiving terminal's power is too low due to the user forgetting tocharge or being unable to charge currently, and the power is not enoughto complete the information sharing process. At this time, it is obviousnot appropriate if the sending terminal still sends the information tobe shared. For the sending terminal, the power also affects the processof sharing information. For the status information of the user of thereceiving terminal, when the user of the receiving terminal is inmotion, such as the user of the receiving terminal is currently using asoftware recording an exercise process (running speed, running time,etc.), it is inconvenient for the user of the receiving terminal toreceive information at current time.

In operation A23: the target sharing information is sent.

In this embodiment, through operations A20: obtaining information to beshared; A21: detecting whether the information to be shared meetssharing conditions, A22: in determining that the information to beshared does not meet the sharing conditions, processing the informationto be shared according to a preset rule to obtain target sharinginformation, and A23: sending the target sharing information, when theinformation that the user of the sending terminal wants to share isobtained, relevant information obtained from the sending terminal and/orprovided by the receiving terminal is combined with the preset rules tocomplete the processing of the information to be shared, so that theinformation that cannot be shared can be shared after the processing.The purpose of intelligently processing the information to be shared isrealized.

Referring to FIG. 10 , in an eleventh embodiment of the informationsharing method of the present application, the information sharingmethod includes the following operations.

In operation B10, filtering information is obtained.

When the user of the sending terminal sends the sharing information, theuser of the receiving terminal may not be convenient for receiving thesharing information at that time, for example, the user of the receivingterminal is driving. In this case, some information of the user of thereceiving terminal can be obtained to determine whether the user of thereceiving terminal is convenient to receive the sharing information. Inaddition, the sending terminal may also have a time not suitable forsharing, such as the sending terminal has insufficient power to completethe process of sending the information to be shared. All informationobtained from the sending terminal and/or the receiving terminal arecollected to determine whether the receiving terminal and/or the sendingterminal supports information sharing, and used as the filteringinformation. The filtering information obtained from the sendingterminal is the first type filtering information, and the filteringinformation provided by the receiving terminal is the second typefiltering information.

In operation B11, the information to be shared is processed according tothe filtering information.

The information to be shared can be some preset information of aterminal, be information downloaded by a user from the Internet (such asimages, application software, etc.), be information input by the user onthe terminal, or be information on an application of the terminal (suchas news, application update information, etc.). The information to beshared can also be local information of the terminal (such as localfiles, etc.), or be a sharing record on social software (such as chatlogs, shared information, etc.).

The above information to be shared may be one or more of audios, videos,animations, images, documents, files, texts, sharing records, writingnotes, web page information, and web addresses.

When the information to be shared is chat logs, as in the user's WeChatchat logs, not all information can be shared. Before filtering the chatlogs based on the filtering information, when the user selects more thanone piece of information that he wants to share and a piece ofinformation of which cannot be shared, it prompts the user that thepiece of information cannot be shared and hides the piece of informationthat cannot be shared, or makes the piece of information unselectableand gives a prompt (for example, the chat information area of the pieceof information is set to be an unselectable state. Referring to FIG. 11, B3000 indicates a sending terminal, B3001, B3002, B3004 indicate somepieces of information that can be shared in a chat log, B3003 and B3005indicate some pieces of information that cannot be shared in the chatlog, B3006 and B3007 indicate views that chat information areas of thosepieces of information that cannot be shared are set to be unselectable.When the user selects B3003, the chat information area indicated byB3006 and B3007 are set to be unselectable), or a mark indicating thatthe corresponding information cannot be shared is displayed next to theinformation (such as a text prompt), refer to FIG. 12 , B4000 indicatesa sending terminal, B4001, B4002, B4004 indicate some pieces ofinformation that can be shared in a chat log, B4003 and B4005 indicatesome pieces of information that cannot be shared in the chat log, B4006indicates a prompt box that pops up after the user selects B4003 orB4005, prompting that the selected information cannot be shared andproviding a confirmation button, or it does not provide the confirmationbutton, and the prompt box automatically disappears after a certainperiod of time (such as is)). If the information selected by the user tobe shared is sharable, remaining information that cannot be shared isalso hidden, or is made to be unselectable and a prompt (such as thechat information area is set to be an unselectable state) is given, or acorresponding mark (such as a text prompt) indicating not supportsharing is displayed next to the information.

There are many ways for the user to select the information that he wantsto share. For example, the user can obtain the information throughvoices to control the terminal, or directly select the information on aterminal interface, or obtain the information through preset touchgestures or through remote control gestures.

For chat logs, in many cases, users do not just want to share a certainpiece or pieces of information, but a lot of pieces of information,which can generally be divided into several categories according tocategory information, such as display forms of the information, contentsof the information, and data types of the information. The display formscan be URL (Uniform Resource Locator) links. When the user shares aninteresting website or information useful to a contact which has beenrecommended to the user by another contact, the user can directly sharethe URL of the website to the contact. The contact only needs to clickthe URL link to enter an accurate and specific page to obtaininformation. Then, when the information required by the contact isdistributed on different websites, the user needs to select the websitesone by one. In order to facilitate user to share, the sending terminalcan intelligently select other URLs in the chat log according to a URLselected by the user, and finally the user can choose which URL to sharespecifically. The contents of the information can be keywords in theinformation, if a same keyword appears multiple times or there aremultiple identical keywords, multiple times or multiple identicalkeywords can be set and adjusted according to the user experience. Inaddition, the contents of the information can also be locationinformation, such as positioning information, for example, the locationinformation that the user wants to share is the location information ofthe user at different times. The data types can be images, texts,videos, documents, etc. There may also be multiple pieces of informationof a same data type in the user's chat log, when the user is sharinginformation, it can intelligently select information similar to theinformation selected by the user according to the data type, and thenthe user determines a specific piece of information to be shared. Theinformation that the user wants to share can be intelligently selectedthrough the category information.

Specifically, the sending terminal acquires information belonging to asame category with the information selected by the user within a presettime interval according to the acquired category information. Forexample, referring to FIG. 13 , B5000 indicates a sending terminal,B5001 and B5002 indicate voice messages, and B5003, B5004, and B5005indicate text messages. After the user selects the text message B5003,the sending terminal uses the keyword “tomorrow” as the categoryinformation. The sending terminal selects the text message B5004 thatalso contains the keyword “tomorrow”, and the text messages B5003 andB5004 are collectively used under a same category.

In addition, after the chat log is processed according to the abovefiltering information, the pieces of information under a same categoryare intelligently selected from the remaining information that can beshared according to the category information. There may be some piecesof information only partly meeting the above filtering information, orthere may be all of the pieces of the information wholly meeting theabove filtering information. For the situation that some pieces ofinformation only partly meet the above-mentioned filtering information,it is also necessary to continue filtering and processing theinformation through the filtering information.

Not all the information to be shared can be shared. For information thatcannot be shared, part or all of the information that cannot be sharedcan be filtered out or hidden according to the filtering information, orbe made to be unselectable and a prompt (such as the chat informationarea is set to be in an unselectable state) is given, or a correspondingmark (such as a text prompt) indicating not support sharing is displayednext to the information or output through a dialog box, or theinformation that cannot be shared is compressed or encrypted (forexample the information of file type is encrypted). When all theinformation to be shared is not input by the user (such as voicemessages), and the information selected by the user to be shared issharable, remaining information that cannot be shared will also befiltered out or hidden, or be made unselectable and give a prompt (forexample the chat information area of which is set to be unselectable),or it displays a corresponding mark (such as a text prompt) beside theinformation to indicating that the information cannot be shared, or itoutputs a prompt message through a dialog box, or compresses or encrypt(such as encrypting the information of file type) the information thatcannot be shared.

In this embodiment, through operations B10: obtaining filteringinformation, and B11: processing the information to be shared accordingto the filtering information, before sharing information, it obtainsfiltering information from the sending terminal and/or receivingterminal to process the information to be shared, so that the user ofthe sending terminal selects part of the information that is convenientfor sending at the sending terminal according to the result of the aboveprocessing, and the user of the receiving terminal to selects part ofthe information that is convenient for the receiving terminal to receiveat that time according to the result of the above processing. The userof the sending terminal can also choose to directly cancel the sharingprocess according to the result of the above processing, avoiding thesending terminal and/or the receiving terminal not suitable for sharinginformation is still in a sharing progress. The purpose of intelligentlyselecting information to be shared is realized.

Further, in the twelfth embodiment of the information sharing method ofthe present application, based on the above eleventh embodiment, thefirst type filtering information includes at least one of the following:

authentication information of a current user of the sending terminal;

permission information of the information to be shared;

available traffic of the sending terminal;

current network speed of the sending terminal; and

a current mode of the sending terminal.

Authentication information of a current user of the sending terminal

When the current user of the sending terminal who is not the owner or anauthorized user of the owner of the sending terminal shares information(chooses information to be shared or sends information to be shared),especially when the information chosen or sent by the current user'scontains a file, and more especially when the file is an encrypted file,it is necessary to prevent the current user from performing informationsharing. A way to identify an identifier of a current user can be thebiological recognition (such as fingerprint information or faceinformation), passphases or passwords, etc. For identifying a user'sidentifier based on face information, a terminal can detect whether acurrent user is the owner, and directly provides the current user theinformation sharing information function without displaying a promptinformation when the current user is the owner and passes theverification. When the current user is not the owner, the current useris prompted that users not the owner are prohibited from sharinginformation, which thus not affect the user's normal use.

Permission Information of the Information to be Shared

There are many situations in which information of a chat log cannot beshared. For example, if the information the user of the sending terminalwants to share is an article, a video, or the like that is copyrighted,the information is not allowed to be shared until the user is authorizedby the author of the information. For still another example, theinformation involving the privacy of others, or violating national lawsand regulations or social morals that is not allowed to be spread;similarly, the terminal system preset information, the informationdownloaded by the user from the Internet, the information entered by theuser on the terminal, and the information on the terminal applicationare not allowed to be shared when the above conditions are not met.There is also a possibility that the information itself is not supportedto be shared by the application of the sending terminal or not supportedto be received by the application of the receiving terminal. Forexample, voice information in WeChat is not supported to be shared.

Available Traffic of the Sending Terminal

We know that extra traffic used by terminals (such as mobile phones)exceeding the subscribed traffic package is quite expensive. Therefore,it is necessary to take into account whether the data traffic used whensharing information by the sending terminal will exceed the subscribeddata package. So, when selecting information to be shared, it isnecessary to obtain a size of the information to be shared and at thesame time to obtain the available traffic of the sending terminal (referto FIG. 14 , at current mobile phones generally have functions to obtainthe data traffic usage of the mobile phones and the available traffic,B6000 indicates a sending terminal, B6001, B6002, B6004 indicate somepieces of information that can be shared in a chat log, B6003 and B6005indicate some pieces of information that cannot be shared in the chatlog, B6006 indicates a prompt box that pops up after the user selectsB6001, B6002, or B6004 to remind the user that the available traffic isinsufficient and an amount of the available traffic and provide aconfirmation button, or it does not provides the confirmation button,and the prompt box automatically disappears after a certain period oftime (such as is). B6007 indicates a view that chat information area ofthe piece of information indicated by B6002 and having a size exceedingthe amount of the available traffic of the receiving terminal is set tobe in an unselectable state. B6008 and B6009 indicate views that chatinformation areas of the pieces of information that cannot be shared areset to be in an unselectable state).

In determining that the available traffic of the sending terminal doesnot meet preset sending conditions, that is, in determining that anamount of the available traffic of the sending terminal is smaller thanthe size of the information to be shared that the user of the sendingterminal wants to share, the information to be shared is processedaccording to a first preset rule.

Specifically, the user of the sending terminal is prompted that thecurrent available traffic of the sending terminal is insufficient tosend the information to be shared that the user wants to share, and theuser is also prompted with a different between the amount of theavailable traffic of the sending terminal at current and a size of theinformation to be shared, and a specific solution is given. For example,it displays a size of each piece of the information to be shared andsuggests canceling which piece from sharing, for further example, itprompts that an amount of the available traffic of the receivingterminal is smaller than the size of the information to be shared thatthe user of the sending terminal wants to share for 300 MB, and itrecommends to cancel a video with a size of 310 MB from sharing andcontinue sharing the remaining contents. Generally, when there aremultiple pieces of information to be shared, the sizes of those piecesof information are basically different. In such case, it can hide thepiece of information whose size is larger than the amount of theavailable traffic, set it to be unselectable, or output promptinformation. The user determines which piece of information to be sharedis canceled from sharing. Each time the user chooses to send theremaining information to be shared, if the size of the remaininginformation to be shared is still greater than the amount of theavailable traffic, the user is prompted that the current availabletraffic of the sending terminal is not enough to send the information tobe shared, and the user is reminded with a different between the amountof the available traffic of the sending terminal at current and a sizeof the remaining information to be shared. As such, the user reselectsthe pieces of information to be shared till a size of the information tobe shared is less than an amount of the available traffic. In additionto suggesting the user to cancel which piece of information fromsharing, compression can also be used to ensure that the size of theinformation to be shared is less than the amount of the availabletraffic. Of course, the amount of the available traffic does not affectthe specific sharing process. That is to say, when the amount of theavailable traffic is smaller than the size of the information to beshared that the user wants to share, the user is only prompted, and notlimited from sharing. When each time the user is prompted, an option tostill send the information is also given to the user.

Current Network Speed of the Sending Terminal

The network speed of the sending terminal (such as a real-time networkspeed of a mobile phone obtained from a floating window of a certainmanagement tool (such as the Tencent housekeeper)) is also needed to betaken into account.

In determining that the current network speed of the sending terminaldoes not meet the preset sending conditions, that is, when the size ofthe information to be shared by the user of the sending terminal is muchlarger than the data size of that the sending terminal can send per unittime, the information to be shared is processed according to a secondpreset rule.

Specifically, when the size of the information to be shared is muchlarger than the data size that the sending terminal can send per unittime at current, for example, the size of the information to be sharedis 1000 MB, and the current network speed of the sending terminal canonly reach 10 KB/s, the sharing will be meaningless. Therefore, in theinformation sharing process, it is necessary to obtain the size of theinformation when the user chooses to share the information, as well asthe network speed of the sending terminal. In determining that thecurrent network speed of the sending terminal is far less than a networkspeed required by the sending terminal to share the information to beshared, the user is prompted that the current network speed of thesending terminal is too slow to send the information, and a specificsolution is given. For example, a size of each piece of information tobe shared is displayed and which piece of information to be shared thatcan be canceled is recommended. Generally, when there are multiplepieces of information to be shared, the size of the pieces ofinformation are basically different. In such case, it can hide the pieceof information whose size is much larger than the data size that can besent by the sending terminal per unit time at current, set it to beunselectable (refer to FIG. 15 , B7000 indicates a sending terminal,B7001, B7002, and B7004 indicate some pieces of information that can beshared in a chat log, B7003 and B7005 indicate some pieces ofinformation that cannot be shared in the chat log, and B7006 and B7007indicate views that chat information areas of the pieces of informationthat cannot be shared because each of which has a size much larger thanthe data size that can be sent by the sending terminal per unit time atcurrent, are set to be unselectable. B7008 and B7009 indicate views thatchat information areas of the pieces of information that cannot beshared are set to be unselectable. After B7006 is selected by the user,it automatically sets the chat information areas indicated respectivelyby B7006, B7007, B7008, and B7009 to be unselectable) or outputs aprompt. Then the user determines which piece of information to be sharedis canceled from sharing. Each time the user chooses to send theremaining information to be shared, if the size of the remaininginformation to be shared is still much larger than the data size thatcan be sent by the sending terminal per unit time at current, the useris prompted that the current network speed of the sending terminal isinsufficient to send the information to be shared that the user wants toshare, and the user is reminded with a specific value of the currentnetwork speed of the sending terminal, and suggested to wait for thenetwork speed to be restored and sufficient to support the sharing ofthe information that the user wants to share, or the user is prompted tochoose to let the sending terminal to automatically sent the informationthat the user wants to share when the network speed is sufficient tosupport the sending of the information. In addition to the above methodof processing information that does not meet the network speed,compression can also be used to ensure that the size of the informationto be shared meets the network speed. Of course, the network speed willnot affect the specific sharing process. That is to say, when thenetwork speed of the sending terminal is much less than that required bythe sending terminal to share the information to be shared, the user isonly prompted, and not limited from sharing. When each time the user isprompted, an option to still send the information is also given to theuser.

Current Mode of the Sending Terminal

The user of the sending terminal can set a mode of the sending terminalas needed. For example, when the sending terminal is in a guest mode,the current user of the sending terminal is generally not the owner,that is, the owner considers privacy protection or other situations, andsets the terminal (such as a mobile phone) to be in the guest mode whenthe terminal is lent to others, thereby to prevent the others fromrevealing the owner's privacy during use. Therefore, in the guest mode,if the information chosen to be shared by the user of the sendingterminal is a locally stored file (such as a video, a document, animage, or the like), the user can be prompted that the sending terminalis currently in a guest mode and such information sharing is forbidden.In addition, when the sending terminal is in a safe mode, if theinformation chosen to be shared by the user of the sending terminal is afile (such as a video, a document, an image, or the like), the user canbe prompted that the sending terminal is currently in a safety mode andsuch information sharing is forbidden. In addition, when the sendingterminal is in a child mode, generally at this moment, the user of thesending terminal is not the owner but the owner's child or anotherjunior, the user of the sending terminal may be unfamiliar with themobile phone, and in such case, a series of misoperation may occur andmay trigger a sharing process. It is understandable under such asituation, the user of the sending terminal does not need to shareinformation. Thus, the user can be prompted that the sending terminal iscurrently in the child mode and such information sharing is forbidden.In addition, the sending terminal may also be in an elderly mode.Similarly, the user of the sending terminal at this moment is generallythe owner's elder, and they are unfamiliar with the current mobilephone. When the elder use the mobile phone, it will also produce aseries of misoperation that lead to a sharing process. But the user ofthe sending terminal actually does not need to share information. Thus,the user can be prompted that the sending terminal is currently in theelderly mode and such information sharing is forbidden.

In addition, at present most mobile phones' profile modes are stillmanually set by the users. However, in some scenarios, a mobile phonecan automatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in a presetprofile mode may not affect the application being in a preset profilemode, for example, the mobile phone is in a smart mode, and theapplication is in a normal mode. Certain preset modes of the mobilephone may also affect a preset mode of the application, for example, ifthe mobile phone is in a traffic saving mode, the application cannot bein the normal mode. Specifically, whether a profile mode of the mobilephone has a higher priority than a profile mode of the application canbe preset in the system of the mobile phone. When the sending terminalis in a preset mode, that is, which profile mode of the mobile phonebeing in and/or which profile mode of an application being in determineswhether to execute operation B10 to process the information to be sharedaccording to the third processing rule.

In this embodiment, the first type filtering information is obtainedfrom the sending terminal, and the information to be shared is processedaccording to the obtained first type filtering information, so as toensure that the sending terminal does not use extra traffic, and theuser of the sending terminal does not have to wait for the informationto be sent for a long time to protect the privacy of the user of thesending terminal. The purpose of intelligently selecting information tobe shared is realized.

Further, in a thirteenth embodiment of the information sharing method ofthe present application, based on the eleventh embodiment, the secondtype filtering information includes at least one of the following:

the data type and/or file type supported by the receiving terminal;

the available space and/or available traffic of the receiving terminal;

the time information and/or location information of the receivingterminal;

the current network speed of the receiving terminal;

the current mode of the receiving terminal;

the system language and/or current application language of the receivingterminal;

status information of the receiving terminal and/or status informationof the the user of the receiving terminal.

The data type and/or file type supported by the receiving terminal

For the receiving terminal, the data types and file types it can handlehave certain limitations.

In determining that the data types supported by the receiving terminaldo not meet the preset receiving conditions, that is, the receivingterminal does not support a data type of the information to be sharedthat is shared by the sending terminal, the information to be shared isprocessed according to the fourth preset rule. In determining that thefile types supported by the receiving terminal do not meet the presetreceiving conditions, that is, the receiving terminal does not support afile type of the information to be shared that is shared by the sendingterminal, the information to be shared is processed according to thefifth preset rule.

Specifically, the information that the user wants to share may be ofvarious data types, such as voice, video, image, text, etc. Each datatype includes one or more various file types, such as video includingAVI (Audio Video Interleaved) format, MPEG (Motion Picture ExpertsGroup) format, and etc. If the receiving terminal is a non-smart phone,it is unable to view a video in MPEG format. Therefore, it isunnecessary for the user of the sending terminal to still sendinformation that is not supported by the receiving terminal to thereceiving terminal. Therefore, before sharing information, it canfirstly obtain the data types and file types supported by the receivingterminal. Generally, when there are multiple pieces of information to beshared, the data types and/or file types of those pieces of informationmay be different. In such case, the pieces of information to be sharedwhose data types and/or file types are not supported by the receivingterminal are hidden, or set to be unselectable, or a prompt message isoutput.

Available Space and/or Available Traffic of the Receiving Terminal

The local storage space of a phone is limited. In determining that theavailable space of the receiving terminal does not meet the presetreceiving conditions, that is, in determining that a size of theavailable space of the receiving terminal is less than a size of theinformation to be shared that the user of the sending terminal wants toshare, the information to be shared is processed according to the sixthpreset rule.

Specifically, when the user of the sending terminal performs informationsharing, the size of the information to be shared by the user of thesending terminal may exceed the size of the available local storagespace of the receiving terminal, causing failure of the sharing, whichnot only wastes time but also wastes traffic. Therefore, it is necessaryto take into account whether the size of the information to be sharedexceeds the size of the available local storage space of the receivingterminal, so it is necessary to obtain the size of information whenselecting information to be shared and obtain the size of the availablelocal storage space of the receiving terminal at the same time. If theavailable local storage space of the receiving terminal is less than theinformation to be shared that the user wants to share, the user of thesending terminal is prompted that the available local storage space ofthe receiving terminal is not enough to receive the information to beshared, and reminded with a specific difference between the availablelocal storage space of the receiving terminal and the information to beshared that the user wants to share (referring to FIG. 16 , B8000indicates a sending terminal, B8001, B8002, and B8004 indicate somepieces of information that can be shared in a chat log, B8003, B8005indicate some pieces of information that cannot be shared in the chatlog. B8006 indicates a prompt box that pops up after the user selectsB8001 or B8002, prompting that the contact has insufficient storagespace, and how big a sharing information needs to be canceled so as tosupport a continuing sharing, a confirmation button is also provided, orno confirmation button is provided, the prompt box automaticallydisappears after a certain period of time (such as is). B8007 and B8008indicate views that chat information areas of the pieces of informationthat cannot be shared are set to be unselectable). For example, itreminds that that a size of the available space of the receivingterminal is smaller than the size of the information to be shared thatthe user of the sending terminal wants to share for 300 MB, and itrecommends to cancel a video with a size of 310 MB from sharing andcontinue sharing the remaining contents, and it also provide a specificsolutions, for example, it compresses the information to be shared andthen shares the compressed information, for another example, it displaysa size of each piece of the information to be shared that the user wantsto share and recommends to cancel which piece from sharing.

In addition, extra traffic used by a mobile phone exceeding thesubscribed traffic package is quite expensive, the same is true for thereceiving terminal.

In determining that the available traffic of the receiving terminal doesnot meet the preset receiving conditions, that is, in determining thatthe amount of the available traffic of the receiving terminal is smallerthan the size of the information to be shared by the user of the sendingterminal, the information to be shared is processed according to theseventh preset rule.

Specifically, it is necessary to consider whether the traffic used inthe information sharing by the sending terminal exceeds the trafficpackage of the receiving terminal, so it is necessary to obtain the sizeof the information when selecting the information to be shared, andobtain the amount of the available traffic of the receiving terminal atthe same time. If the amount of the available traffic of the receivingterminal is less than the size of the information to be shared that theuser wants to share, then the user of the sending terminal is promptedthat the current available traffic of the receiving terminal isinsufficient to receive the information to be shared that the user wantsto share, and the user is also prompted with a different between theamount of the available traffic of the receiving terminal at current andthe size of the information to be shared, and a specific solution isgiven. For example, it displays a size of each piece of the informationto be shared and suggests canceling which piece from sharing, forfurther example, it prompts that the amount of the available traffic ofthe receiving terminal is smaller than the size of the information to beshared that the user of the sending terminal wants to share for 300 MB,and it recommends to cancel a video with a size of 310 MB from sharingand continue sharing the remaining contents. Generally, when there aremultiple pieces of information to be shared, the sizes of the pieces ofinformation are basically different. In such case, it can hide the pieceof information whose size is larger than the amount of the availabletraffic, set it to be unselectable, or output prompt information. Theuser determines which piece of information to be shared is canceled fromsharing. Each time the user chooses to send the remaining information tobe shared, if the size of the remaining information to be shared isstill greater than the amount of the available traffic, the user isprompted that the current available traffic of the receiving terminal isnot enough to receive the information to be shared, and the user isreminded with a different between the amount of the available traffic ofthe receiving terminal at current and a size of the remaininginformation to be shared. As such, the user reselects the pieces ofinformation to be shared till the size of the information to be sharedis less than the amount of the available traffic. In addition tosuggesting the user to cancel which piece of information from sharing,compression can also be used to ensure that the size of the informationto be shared is less than the amount of the available traffic. Ofcourse, the amount of the available traffic does not affect the specificsharing process. That is to say, when the amount of the availabletraffic is smaller than the size of the information to be shared thatthe user wants to share, the user is only prompted, and not limited fromsharing. When each time the user is prompted, an option to still sendthe information is also given to the user.

Time Information and/or Location Information of the Receiving Terminal

The user of the receiving terminal may be in a same time zone as theuser of the sending terminal, or may be in a time zone different fromthat of the user of the sending terminal.

In determining that the time information of the receiving terminal doesnot meet the preset receiving conditions, that is, in determining thatthe time zone of the receiving terminal is different from the time zoneof the sending terminal, the information to be shared is processedaccording to the tenth preset rule.

Specifically, in the case where the two are in the same zone, the userof the sending terminal generally considers based on the current timewhether it is suitable for sharing information; and in the case wherethe two are in different time zones, for example, the user of thesending terminal is in the east eight time zone, and the receivingterminal end user is in the west eight time zone, at this time, it isobviously unsuitable for the user of the sending terminal neglects toconsider the current time information of the user of the receivingterminal, for example, if the current time of the user of the sendingterminal is two o'clock in the afternoon, but the current time of theuser of the receiving terminal is two o'clock in the morning, obviously,it is not suitable for sharing information at this time. Therefore, ifthe user of the receiving terminal and the user of the sending terminalare not in the same time zone, the sending terminal needs to prompt theuser of the sending terminal with the current time information of theuser of the receiving terminal, and prompts the user of the sendingterminal whether it is suitable for the user of the receiving terminalto receive the information to be shared at current time.

In addition, the user of the sending terminal may be in a same region asthe user of the receiving terminal, or may be in a region different fromthat of the receiving terminal.

In determining that the location information of the receiving terminaldoes not meet the preset receiving conditions, that is, in determiningthat the region of the receiving terminal is different from the regionof the sending terminal, the information to be shared is processedaccording to the eleventh preset rule.

Specifically, in the case where the two are in different regions, theuser of the sending terminal needs to consider whether the locationinformation of the user of the receiving terminal is suitable forreceiving the information to be shared at current time. For example, theuser of the receiving terminal may be on vacation, and it is obviouslyinappropriate to share work-related information to the user of thereceiving terminal. Therefore, when sharing information, the sendingterminal prompts the user of the sending terminal with a geographiclocation of the user of the receiving terminal, and prompts the user ofthe sending terminal whether it is suitable for the user of thereceiving terminal to receive the information to be shared at currenttime.

Of course, the time information and/or location information of thereceiving terminal does not affect the specific sharing process, that isto say, when the user of the receiving terminal and the user of thesending terminal are not in the same time zone and/or the same region,the user is only reminded, and not limited from sharing, so whenprompting the user, an option is also provided to the user to still sendthe information to be shared.

Current Network Speed of the Receiving Terminal

Correspondingly, the network speed of the receiving terminal is alsoneeded to be considered.

In determining that the current network speed of the receiving terminaldoes not meet the preset receiving conditions, that is, in determiningthat a size of the information to be shared by the user of the sendingterminal is much larger than a data size that the receiving terminal cansend per unit time at current, the information to be shared is processedaccording to the eighth preset rule.

Specifically, when the size of the information to be shared is muchlarger than the data size that the receiving terminal can send per unittime at current, for example, the size of the information to be sharedis 1000 MB, and the current network speed of the receiving terminal canonly reach 10 KB/s, the sharing will be meaningless. Therefore, in theinformation sharing process, it is necessary to obtain the size of theinformation when the user chooses to share the information, as well asthe network speed of the receiving terminal. In determining that thecurrent network speed of the receiving terminal is far less than anetwork speed required by the sending terminal to share the informationto be shared, the user of the sending terminal is prompted that thecurrent network speed of the receiving terminal is too slow to receivethe information, and a specific solution is given. For example, a sizeof each piece of information to be shared is displayed and which pieceof information to be shared that can be canceled is recommended.Generally, when there are multiple pieces of information to be shared,the sizes of the pieces of information are basically different. In suchcase, it can hide the piece of information whose size is much largerthan the data size that can be sent by the receiving terminal per unittime at current, set it to be unselectable or output a prompt. Then theuser determines which piece of information to be shared is canceled fromsharing. Each time the user chooses to send the remaining information tobe shared, if the size of the remaining information to be shared isstill much larger than the data size that can be sent by the receivingterminal per unit time at current, the user is prompted that the currentnetwork speed of the receiving terminal is insufficient to send theinformation to be shared that the user wants to share, and the user isreminded with a specific value of the current network speed of thereceiving terminal, and suggested to wait for the network speed to berestored and sufficient to support the sharing of the information thatthe user wants to share, or the user is prompted to choose to let thesending terminal to automatically sent the information that the userwants to share when the network speed is sufficient to support thereceiving of the information. In addition to the above method ofprocessing information that does not meet the network speed, compressioncan also be used to ensure that the size of the information to be sharedmeets the network speed. Of course, the network speed will not affectthe specific sharing process. That is to say, when the network speed ofthe receiving terminal is much less than that required by the sendingterminal to share the information to be shared, the user is onlyprompted, and not limited from sharing. When each time the user isprompted, an option to still send the information is also given to theuser.

Current Mode of the Receiving Terminal

In determining that the receiving terminal is in a preset profile mode,the information to be shared is processed according to the ninth presetrule.

The user of the receiving terminal can set a mode of the receivingterminal as needed. For example, when the receiving terminal is in aguest mode, the user of the receiving terminal is generally not theowner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information chosen to be shared by the user of thesending terminal is a locally stored file (such as a video, a document,an image, or the like), the user can be prompted that the receivingterminal is currently in the guest mode, continuing to send may revealprivacy. It asks the user of the sending terminal whether to still sharethe information or not, or prompts the user to encrypt the informationto be shared. In addition, when the receiving terminal is in a safemode, if the information chosen to be shared by the user of the sendingterminal is a file (such as a video, a document, an image, or the like),it can prompt the user that the receiving terminal is in the safe modeand prohibit such information sharing, or prompt the user to encrypt theinformation to be shared. In addition, when the receiving terminal is ina child mode, the user of the receiving terminal is generally not theowner at this moment but the child of the owner or another junior. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can remind the user of the sending terminal that the currentreceiving terminal is in the child mode, or it prompts the user toencrypt the information to be shared. In addition, the receivingterminal may also be in an elderly mode. Similarly, the user of thereceiving terminal at this time is generally the owner's elder. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can prompt the user of the sending terminal that the receivingterminal is currently in the elderly mode, or prompt the user to encryptthe information to be shared.

For the child mode and the elderly mode do not affect the specificsharing process, that is, when the receiving terminal is in the childmode and/or the elderly mode, it only prompts the user, not restrictsthe user from sharing. When the user is prompted, the user is also givena choice to still send the information to be shared.

In addition to the above modes, due to different needs, the receivingterminal may also be in a navigation mode. When the receiving terminalis in the navigation mode, it is obviously inconvenient to receiveinformation. At this time, the sharing of the sending terminal will posea threat to the driving safety of the user of the receiving terminal. Inaddition, when the receiving terminal is in a conference mode, the userof the receiving terminal is also inconvenient to receive information.Therefore, in the information sharing process, it is necessary to obtaina current mode of the receiving terminal before the user of the sendingterminal sends the information to be shared, thus to avoid disturb theuser of the receiving terminal when the user of the receiving terminalis inconvenient to receive information. Therefore, when it is acquiredthat the receiving terminal is in the navigation mode or the conferencemode, the user of the sending terminal may be prompted that thereceiving terminal is currently in the navigation mode or the conferencemode. Of course, the receiving terminal being in the navigation mode orthe conference mode does not affect the specific sharing process. Thatis to say, when the receiving terminal is in the navigation mode or theconference mode, it only prompts the user, not restricts the user fromsharing. Therefore, when the user is prompted, the user is also given achoice to still send the information to be shared.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in a presetmode may not affect the application being in a preset mode, for example,the mobile phone is in a smart mode, and the application is in a normalmode. Certain preset modes of the mobile phone may also affect a presetmode of the application, for example, if the mobile phone is in atraffic saving mode, the application cannot be in the normal mode.Specifically, whether a profile mode of the mobile phone has a higherpriority than the profile mode of the application can be preset in thesystem of the mobile phone. When the receiving terminal is in a presetmode, that is, which profile mode of the mobile phone being in and/orwhich profile mode of an application being in determines whether toexecute operation B10 to process the information to be shared.

System Language and/or Current Application Language of the ReceivingTerminal

For the user of the sending terminal, when performing the informationsharing operation, the user may be given no attention to whether theuser of the receiving terminal has a language ability to browse theinformation shared by the user of the sending terminal.

If the system language of the receiving terminal is different from thesystem language of the sending terminal, and/or the application languageof the receiving terminal is different from the application language ofthe sending terminal, the information to be shared is processedaccording to the thirteenth preset rule.

Specifically, if the user of the receiving terminal cannot understandthe content of the information shared by the user of the sendingterminal to the user of the receiving terminal due to language barrier,sharing information under such a situation is meaningless. Therefore,during information sharing, the system language and/or currentapplication language of the receiving terminal can be obtained(generally, obtaining the current application language is for instantmessaging software, because such software each usually has a dedicatedterminal client, the acquisition of system language is aimed at thesituation where the receiving terminal does not need to use a dedicatedclient to receive information during the information sharing process).

After the system language and/or the current application language of thereceiving terminal is obtained, if the system language and/or thecurrent application language of the receiving terminal is different froma language of the information to be shared by the sending terminal, theuser of the sending terminal is prompted and a function to convert thelanguage of the information to be shared into the system language of thereceiving terminal and/or the current application language is provided.

Status Information of the Receiving Terminal and/or Status Informationof the User of the Receiving Terminal

The size of the information to be shared affects a time length ofsending and/or receiving the information.

Specifically, when the status of the sending terminal, such as the poweris not enough to complete the process of sending the information to beshared; or when the power of the receiving terminal is not enough tocomplete the process of receiving the information to be shared,information sharing may fail. Therefore, it is necessary to obtain thestatus information of the sending terminal and/or the receiving terminalwhen sharing information to ensure that the process of sharinginformation is successfully completed. If the status information of thereceiving terminal and/or the status information of the user of thereceiving terminal is insufficient to complete the information sharingprocess, then the sharing of information is canceled, or the user isprompted to cancel the sharing of certain piece of information to ensurethe successful sharing of information.

In this embodiment, the second type filtering information is obtainedfrom the receiving terminal, and the information to be shared isprocessed according to the obtained second type filtering information,so as to ensure that the receiving terminal does not use extra traffic,the user of the receiving terminal does not have to wait for theinformation to be sent for a long time to protect the privacy of theuser of the sending terminal, the user of the receiving terminal is notaffect and is facilitated to browse the information, and it enables thesending terminal to complete the sending of the information to be sharedand/or enables the receiving terminal to complete the receiving of theinformation to be shared. The purpose of intelligently selectinginformation to be shared is realized.

Further, in a fourteenth embodiment of the information sharing method ofthe present application, based on the twelfth or thirteenth embodiment,before operation B10, the method further includes: determining whether acurrently selected mode is a preset mode.

According to the user's selection, it is determined whether theinformation selection mode of the current terminal (such as a mobilephone) is currently in the smart mode or the normal mode when to shareinformation. The switch of the smart mode can only appear when the phoneis in the developer mode or the debugging mode in the system settings.The switch can also be built into an application (such as in thelaboratory function of the application). In addition, because at thecurrent, a mobile phone can automatically enters a profile modeaccording to the current usage scenario, one of the profile modes of themobile phone can be the smart mode (for example, when the user opens agame application, the mobile phone automatically enters a game mode),and when the user of the mobile phone performs a sharing operation,information selection mode of the mobile phone will automatically enterthe smart mode. Specifically, when the mobile phone is in the smartmode, the mobile phone can automatically enter a traffic saving modeaccording to certain conditions (such as when the available traffic isinsufficient, the mobile phone automatically enters the traffic savingmode) or enter the safe mode (such as when the information to be sharedcontains files, the mobile phone automatically enters the safe mode).When the information selection mode is in the normal mode, a follow-upprocessing is performed according to the rules of the system or acorresponding application, such as according to the rules of sharingfunction that comes with WeChat.

Of course, even when the selection mode is in the normal mode, themethod can be selected for execution.

In determining that the currently selected profile mode is a presetprofile mode, operation B10 is performed.

In determining that the current profile mode of the mobile phone is anyone of the above-mentioned smart mode, normal mode, traffic saving mode,and security mode, operation B10 is performed.

In this embodiment, whether to perform the information sharing methodafter operation B10 is determined by judging whether the current profilemode of the mobile phone is any one of smart mode, normal mode, trafficsaving mode, and safe mode, and the above modes can be selected by theuser to switch therebetween, thereby making information processing moreintelligent.

Further, in a fifteenth embodiment of the information sharing method ofthe present application, based on the above fourteenth embodiment, thefirst type filtering information includes at least one of the following:

authentication information of a current user of the sending terminal;

permission information of the information to be shared;

the available traffic of the sending terminal;

the current network speed of the sending terminal; and

the current mode of the sending terminal.

Authentication Information of a Current User of the Sending Terminal

When the current user of the sending terminal who is not the owner or anauthorized user of the owner of the sending terminal shares information(chooses information to be shared or sends information to be shared),especially when the information chosen or sent by the current user'scontains a file, and more especially when the file is an encrypted file,it is necessary to prevent the current user from performing informationsharing. A way to identify an identifier of a current user can be thebiological recognition (such as fingerprint information or faceinformation), or passwords, etc. For identifying a user's identifierbased on face information, a terminal can detect whether a current useris the owner, and directly provides the current user the informationsharing information function without displaying a prompt informationwhen the current user is the owner and passes the verification. When thecurrent user is not the owner, the current user is prompted that usersnot the owner are prohibited from sharing information, which thus notaffect the user's normal use.

Permission Information of the Information to be Shared

There are many situations in which information of a chat log cannot beshared. For example, if the information the user of the sending terminalwants to share is an article, a video, or the like that is copyrighted,the information is not allowed to be shared until the user is authorizedby the author of the information. For still another example, theinformation involving the privacy of others, or violating national lawsand regulations or social morals that is not allowed to be spread;similarly, the terminal system preset information, the informationdownloaded by the user from the Internet, the information entered by theuser on the terminal, and the information on the terminal applicationare not allowed to be shared when the above conditions are not met.There is also a possibility that the information itself is not supportedto be shared by the application of the sending terminal or not supportedto be received by the application of the receiving terminal. Forexample, voice information in WeChat is not supported to be shared.

The Available Traffic of the Sending Terminal

We know that extra traffic used by terminals (such as mobile phones)exceeding the subscribed traffic package is quite expensive. Therefore,it is necessary to take into account whether the data traffic used whensharing information by the sending terminal will exceed the subscribeddata package. So, when selecting information to be shared, it isnecessary to obtain a size of the information to be shared and at thesame time to obtain the available traffic of the sending terminal (referto FIG. 14 , at current mobile phones generally have functions to obtainthe data traffic usage of the mobile phones and the available traffic,B6000 indicates a sending terminal, B6001, B6002, B6004 indicate somepieces of information that can be shared in a chat log, B6003 and B6005indicate some pieces of information that cannot be shared in the chatlog, B6006 indicates a prompt box that pops up after the user selectsB6001, B6002, or B6004 to remind the user that the available traffic isinsufficient and an amount of the available traffic and provide aconfirmation button, or it does not provides the confirmation button,and the prompt box automatically disappears after a certain period oftime (such as 1s). B6007 indicates a view that chat information area ofthe piece of information indicated by B6002 and having a size exceedingthe amount of the available traffic of the receiving terminal is set tobe in an unselectable state. B6008 and B6009 indicate views that chatinformation areas of the pieces of information that cannot be shared areset to be in an unselectable state).

In determining that the available traffic of the sending terminal doesnot meet the preset sending conditions, that is, in determining that anamount of the available traffic of the sending terminal is less than thesize of the information to be shared that the user of the sendingterminal wants to share, the information to be shared is processedaccording to the first preset rule.

Specifically, the user of the sending terminal is prompted that thecurrent available traffic of the sending terminal is insufficient tosend the information to be shared that the user wants to share, and theuser is also prompted with a different between the amount of theavailable traffic of the sending terminal at current and a size of theinformation to be shared, and a specific solution is given. For example,it displays a size of each piece of the information to be shared andsuggests canceling which piece from sharing, for further example, itprompts that an amount of the available traffic of the receivingterminal is smaller than the size of the information to be shared thatthe user of the sending terminal wants to share for 300 MB, and itrecommends to cancel a video with a size of 310 MB from sharing andcontinue sharing the remaining contents. Generally, when there aremultiple pieces of information to be shared, the sizes of the pieces ofinformation are basically different. In such case, it can hide the pieceof information whose size is larger than the amount of the availabletraffic, set it to be unselectable, or output prompt information. Theuser determines which piece of information to be shared is canceled fromsharing. Each time the user chooses to send the remaining information tobe shared, if the size of the remaining information to be shared isstill greater than the amount of the available traffic, the user isprompted that the current available traffic of the sending terminal isnot enough to send the information to be shared, and the user isreminded with a different between the amount of the available traffic ofthe sending terminal at current and a size of the remaining informationto be shared. As such, the user reselects the pieces of information tobe shared till a size of the information to be shared is less than anamount of the available traffic. In addition to suggesting the user tocancel which piece of information from sharing, compression can also beused to ensure that the size of the information to be shared is lessthan the amount of the available traffic. Of course, the amount of theavailable traffic does not affect the specific sharing process. That isto say, when the amount of the available traffic is less than the sizeof the information to be shared that the user wants to share, the useris only prompted, and not limited from sharing. When each time the useris prompted, an option to still send the information is also given tothe user.

Current Network Speed of the Sending Terminal

The network speed of the sending terminal (such as a real-time networkspeed of a mobile phone obtained from a floating window of a certainmanagement tool (such as the Tencent housekeeper)) is also needed to betaken into account.

In determining that the current network speed of the sending terminaldoes not meet the preset sending conditions, that is, when the size ofthe information to be shared by the user of the sending terminal is muchlarger than the data size of that the sending terminal can send per unittime, the information to be shared is processed according to a secondpreset rule.

Specifically, when the size of the information to be shared is muchlarger than the data size that the sending terminal can send per unittime at current, for example, the size of the information to be sharedis 1000 MB, and the current network speed of the sending terminal canonly reach 10 KB/s, it is conceivable that the sharing will bemeaningless. Therefore, in the information sharing process, it isnecessary to obtain the size of the information when the user chooses toshare the information, as well as the network speed of the sendingterminal. In determining that the current network speed of the sendingterminal is far less than a network speed required by the sendingterminal to share the information to be shared, the user is promptedthat the current network speed of the sending terminal is too slow tosend the information, and a specific solution is given. For example, asize of each piece of information to be shared is displayed and whichpiece of information to be shared that can be canceled is recommended.Generally, when there are multiple pieces of information to be shared,the sizes of the pieces of information are basically different. In suchcase, it can hide the piece of information whose size is much largerthan the data size that can be sent by the sending terminal per unittime at current, set it to be unselectable (refer to FIG. 15 , B7000indicates a sending terminal, B7001, B7002, and B7004 indicate somepieces of information that can be shared in a chat log, B7003 and B7005indicate some pieces of information that cannot be shared in the chatlog, and B7006 and B7007 indicate views that chat information areas ofthe pieces of information that cannot be shared because each of whichhas a size much larger than the data size that can be sent by thesending terminal per unit time at current, are set be unselectable.B7008 and B7009 indicate views that chat information areas of the piecesof information that cannot be shared are set to be unselectable. AfterB7006 is selected by the user, it automatically sets the chatinformation areas indicated respectively by B7006, B7007, B7008, andB7009 to unselectable) or outputs a prompt. Then the user determineswhich piece of information to be shared is canceled from sharing. Eachtime the user chooses to send the remaining information to be shared, ifthe size of the remaining information to be shared is still much largerthan the data size that can be sent by the sending terminal per unittime at current, the user is prompted that the current network speed ofthe sending terminal is insufficient to send the information to beshared that the user wants to share, and the user is reminded with aspecific value of the current network speed of the sending terminal, andsuggested to wait for the network speed to be restored and sufficient tosupport the sharing of the information that the user wants to share, orthe user is prompted to choose to let the sending terminal toautomatically sent the information that the user wants to share when thenetwork speed is sufficient to support the sending of the information.In addition to the above method of processing information that does notmeet the network speed, compression can also be used to ensure that thesize of the information to be shared meets the network speed. Of course,the network speed will not affect the specific sharing process. That isto say, when the network speed of the sending terminal is much less thanthat required by the sending terminal to share the information to beshared, the user is only prompted, and not limited from sharing. Wheneach time the user is prompted, an option to still send the informationis also given to the user.

Current Mode of the Sending Terminal

The user of the sending terminal can set a mode of the sending terminalas needed. For example, when the sending terminal is in a guest mode,the current user of the sending terminal is generally not the owner,that is, the owner considers privacy protection or other situations, andsets the terminal (such as a mobile phone) to be in the guest mode whenthe terminal is lent to others, thereby to prevent the others fromrevealing the owner's privacy during use. Therefore, in the guest mode,if the information chosen to be shared by the user of the sendingterminal is a locally stored file (such as a video, a document, animage, or the like), the user can be prompted that the sending terminalis currently in the guest mode and such information sharing isforbidden. In addition, when the sending terminal is in a safe mode, ifthe information chosen to be shared by the user of the sending terminalis a file (such as a video, a document, an image, or the like), the usercan be prompted that the sending terminal is currently in the safetymode and such information sharing is forbidden. In addition, when thesending terminal is in a child mode, generally at this moment, the userof the sending terminal is not the owner but the owner's child oranother junior, the user of the sending terminal may be unfamiliar withthe mobile phone, and in such case, a series of misoperation may occurand may trigger a sharing process. It is understandable under such asituation, the user of the sending terminal does not need to shareinformation. Thus the user can be prompted that the sending terminal iscurrently in the child mode and such information sharing is forbidden.In addition, the sending terminal may also be in an elderly mode.Similarly, the user of the sending terminal at this moment is generallythe owner's elder, and they are unfamiliar with the current mobilephone. When the elder use the mobile phone, it will also produce aseries of misoperation that lead to a sharing process. But the user ofthe sending terminal actually does not need to share information. Thusthe user can be prompted that the sending terminal is currently in theelderly mode and such information sharing is forbidden.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in a presetprofile mode may not affect the application being in a preset profilemode, for example, the mobile phone is in a smart mode, and theapplication is in a normal mode. Certain preset modes of the mobilephone may also affect a preset mode of the application, for example, ifthe mobile phone is in a traffic saving mode, the application cannot bein the normal mode. Specifically, whether a profile mode of the mobilephone has a higher priority than a profile mode of the application canbe preset in the system of the mobile phone. When the sending terminalis in a preset mode, that is, which profile mode of the mobile phonebeing in and/or which profile mode of an application being in determineswhether to execute operation B10 to process the information to be sharedaccording to the third processing rule.

In this embodiment, the first type filtering information is obtainedfrom the sending terminal, and the information to be shared is processedaccording to the obtained first type filtering information, so as toensure that the sending terminal does not use extra traffic, and theuser of the sending terminal does not have to wait for the informationto be sent for a long time to protect the privacy of the user of thesending terminal. The purpose of intelligently selecting information tobe shared is realized.

Further, in a sixteenth embodiment of the information sharing method ofthe present application, based on the fourteenth embodiment, the secondtype filtering information includes at least one of the following:

the data type and/or file type supported by the receiving terminal;

the available space and/or available traffic of the receiving terminal;

the time information and/or location information of the receivingterminal;

the current network speed of the receiving terminal;

the current mode of the receiving terminal.

The data type and/or file type supported by the receiving terminal

For the receiving terminal, the data types and file types it can handlehave certain limitations.

In determining that the data types supported by the receiving terminaldo not meet the preset receiving conditions, that is, the receivingterminal does not support a data type of the information to be sharedthat is shared by the sending terminal, the information to be shared isprocessed according to the fourth preset rule. In determining that thefile types supported by the receiving terminal do not meet the presetreceiving conditions, that is, the receiving terminal does not support afile type of the information to be shared that is shared by the sendingterminal, the information to be shared is processed according to thefifth preset rule.

Specifically, the information that the user wants to share may be ofvarious data types, such as voice, video, image, text, etc. Each datatype includes one or more various file types, such as video includingAVI (Audio Video Interleaved) format, MPEG (Motion Picture ExpertsGroup) format, and etc. If the receiving terminal is a non-smart phone,it is unable to view a video in MPEG format. Therefore, it isunnecessary for the user of the sending terminal to still sendinformation that is not supported by the receiving terminals to thereceiving terminal. Therefore, before sharing information, it canfirstly obtain the data types and file types supported by the receivingterminal. Generally, when there are multiple pieces of information to beshared, the data types and/or file types of those pieces of informationmay be different. In such case, the pieces of information to be sharedwhose data types and/or file types are not supported by the receivingterminal are hidden, or set to be unselectable, or a prompt message isoutput.

Available Space and/or Available Traffic of the Receiving Terminal

The local storage space of a phone is limited. In determining that theavailable space of the receiving terminal does not meet the presetreceiving conditions, that is, in determining that a size of theavailable space of the receiving terminal is less than the size of theinformation to be shared that the user of the sending terminal wants toshare, the information to be shared is processed according to the sixthpreset rule.

Specifically, when the user of the sending terminal performs informationsharing, the size of the information to be shared by the user of thesending terminal may exceed the size of the available local storagespace of the receiving terminal, causing failure of the sharing, whichnot only wastes time but also wastes traffic. Therefore, it is necessaryto take into account whether the size of the information to be sharedexceeds the size of the available local storage space of the receivingterminal, so it is necessary to obtain the size of information whenselecting information to be shared and obtain the size of availablelocal storage space of the receiving terminal at the same time. If theavailable local storage space of the receiving terminal is smaller thanthe information to be shared that the user wants to share, the user ofthe sending terminal is prompted that the available local storage spaceof the receiving terminal is not enough to receive the information to beshared, and reminded with a specific different between the availablelocal storage space of the receiving terminal and the information to beshared that the user wants to share (referring to FIG. 16 , B8000indicates a sending terminal, B8001, B8002, and B8004 indicate somepieces of information that can be shared in a chat log, B8003 and B8005indicate some pieces of information that cannot be shared in the chatlog. B8006 indicates a prompt box that pops up after the user selectsB8001 or B8002, prompting that the contact has insufficient storagespace, and how big a piece of sharing information needs to be canceledso as to support a continuing sharing, a confirmation button is alsoprovided, or no confirmation button is provided, the prompt boxautomatically disappears after a certain period of time (such as is).B8007 and B8008 indicate views that chat information areas of the piecesof information that cannot be shared are set to be unselectable). Forexample, it reminds that that the size of the available space of thereceiving terminal is smaller than the size of the information to beshared that the user of the sending terminal wants to share for 300 MB,and it recommends to cancel a video with a size of 310 MB from sharingand continue sharing the remaining contents, and it also provides aspecific solutions, for example, it compresses the information to beshared and then shares the compressed information, for another example,it displays a size of each piece of the information to be shared thatthe user wants to share and recommends to cancel which piece fromsharing.

In addition, extra traffic used by a mobile phone exceeding thesubscribed traffic package is quite expensive, the same is true for thereceiving terminal.

In determining that available traffic of the receiving terminal does notmeet the preset receiving conditions, that is, in determining that theamount of the available traffic of the receiving terminal is smallerthan the size of the information to be shared by the user of the sendingterminal, the information to be shared is processed according to theseventh preset rule.

Specifically, it is necessary to consider whether the traffic used inthe information sharing by the sending terminal exceeds the trafficpackage of the receiving terminal, so it is necessary to obtain the sizeof the information when selecting the information to be shared, andobtain the amount of the available traffic of the receiving terminal atthe same time. If the amount of the available traffic of the receivingterminal is less than the size of the information to be shared that theuser wants to share, then the user of the sending terminal is promptedthat the current available traffic of the receiving terminal isinsufficient to receive the information to be shared that the user wantsto share, and the user is also prompted with a different between theamount of the available traffic of the receiving terminal at current andthe size of the information to be shared, and a specific solution isgiven. For example, it displays a size of each piece of the informationto be shared and suggests canceling which piece from sharing, forfurther example, it prompts that the amount of the available traffic ofthe receiving terminal is smaller than the size of the information to beshared that the user of the sending terminal wants to share for 300 MB,and it recommends to cancel a video with a size of 310 MB from sharingand continue sharing the remaining contents. Generally, when there aremultiple pieces of information to be shared, the sizes of those piecesof information are basically different. In such case, it can hide thepiece of information whose size is larger than the amount of theavailable traffic, set it to be unselectable, or output promptinformation. The user determines which piece of information to be sharedis canceled from sharing. Each time the user chooses to send theremaining information to be shared, if the size of the remaininginformation to be shared is still greater than the amount of theavailable traffic, the user is prompted that the current availabletraffic of the receiving terminal is not enough to receive theinformation to be shared, and the user is reminded with a differentbetween the amount of the available traffic of the receiving terminal atcurrent and a size of the remaining information to be shared. As such,the user reselects the pieces of information to be shared till the sizeof the information to be shared is less than the amount of the availabletraffic. In addition to suggesting the user to cancel which piece ofinformation from sharing, compression can also be used to ensure thatthe size of the information to be shared is less than the amount of theavailable traffic. Of course, the amount of the available traffic doesnot affect the specific sharing process. That is to say, when the amountof the available traffic is smaller than the size of the information tobe shared that the user wants to share, the user is only prompted, andnot limited from sharing. When each time the user is prompted, an optionto still send the information is also given to the user.

The Time Information and/or Location Information of the ReceivingTerminal

The user of the receiving terminal may be in a same time zone as theuser of the sending terminal, or may be in a time zone different fromthat of the user of the sending terminal.

In determining that the time information of the receiving terminal doesnot meet the preset receiving conditions, that is, in determining thatthe time zone of the receiving terminal is different from the time zoneof the sending terminal, the information to be shared is processedaccording to the tenth preset rule.

Specifically, in the case where the two are in the same zone, the userof the sending terminal generally considers based on the current timewhether it is suitable for sharing information; and in the case wherethe two are in different time zones, for example, the user of thesending terminal is in the east eight time zone, and the receivingterminal end user is in the west eight time zone, at this time, it isobviously unsuitable for the user of the sending terminal neglects toconsider the current time information of the user of the receivingterminal, for example, if the current time of the user of the sendingterminal is two o'clock in the afternoon, but the current time of theuser of the receiving terminal is two o'clock in the morning, obviously,it is not suitable for sharing information at this time. Therefore, ifthe user of the receiving terminal and the user of the sending terminalare not in the same time zone, the sending terminal needs to prompt theuser of the sending terminal with the current time information of theuser of the receiving terminal. In addition, the user of the sendingterminal may be in a same region as the user of the receiving terminal,or may be in a region different from that of the receiving terminal.

In determining that the location information of the receiving terminaldoes not meet the preset receiving conditions, that is, in determiningthat the region of the receiving terminal is different from the regionof the sending terminal, the information to be shared is processedaccording to the eleventh preset rule.

Specifically, in the case where the two are in different regions, theuser of the sending terminal needs to consider whether the locationinformation of the user of the receiving terminal is suitable forreceiving the information to be shared at current time. For example, theuser of the receiving terminal may be on vacation, and it is obviouslyinappropriate to share work-related information to the user of thereceiving terminal. Therefore, when sharing information, the sendingterminal prompts the user of the sending terminal with a geographiclocation of the user of the receiving terminal.

Of course, the time information and/or location information of thereceiving terminal does not affect the specific sharing process, that isto say, when the user of the receiving terminal and the user of thesending terminal are not in the same time zone and/or the same region,the user is only reminded, and not limited from sharing, so whenprompting the user, an option is also provided to the user to still sendthe information to be shared.

Current Network Speed of the Receiving Terminal

Correspondingly, the network speed of the receiving terminal is alsoneeded to be considered.

In determining that the current network speed of the receiving terminaldoes not meet the preset receiving conditions, that is, in determiningthat the size of the information to be shared by the user of the sendingterminal is much larger than a data size that the receiving terminal cansend per unit time at current, the information to be shared is processedaccording to the eighth preset rule.

Specifically, when the size of the information to be shared is muchlarger than the data size that the receiving terminal can send per unittime at current, for example, the size of the information to be sharedis 1000 MB, and the current network speed of the receiving terminal canonly reach 10 KB/s, the sharing will be meaningless. Therefore, in theinformation sharing process, it is necessary to obtain the size of theinformation when the user chooses to share the information, as well asthe network speed of the receiving terminal. In determining that thecurrent network speed of the receiving terminal is far less than anetwork speed required by the sending terminal to share the informationto be shared, the user of the sending terminal is prompted that thecurrent network speed of the receiving terminal is too slow to receivethe information, and a specific solution is given. For example, a sizeof each piece of information to be shared is displayed and which pieceof information to be shared that can be canceled is recommended.Generally, when there are multiple pieces of information to be shared,the sizes of those pieces of information are basically different. Insuch case, it can hide the piece of information whose size is muchlarger than the data size that can be sent by the receiving terminal perunit time at current, set it to be unselectable or outputs a prompt.Then the user determines which piece of information to be shared iscanceled from sharing. Each time the user chooses to send the remaininginformation to be shared, if the size of the remaining information to beshared is still much larger than the data size that can be sent by thereceiving terminal per unit time at current, the user is prompted thatthe current network speed of the receiving terminal is insufficient tosend the information to be shared that the user wants to share, and theuser is reminded with a specific value of the current network speed ofthe receiving terminal, and suggested to wait for the network speed tobe restored and sufficient to support the sharing of the informationthat the user wants to share, or the user is prompted to choose to letthe sending terminal to automatically sent the information that the userwants to share when the network speed is sufficient to support thereceiving of the information. In addition to the above method ofprocessing information that does not meet the network speed, compressioncan also be used to ensure that the size of the information to be sharedmeets the network speed. Of course, the network speed will not affectthe specific sharing process. That is to say, when the network speed ofthe receiving terminal is much less than that required by the sendingterminal to share the information to be shared, the user is onlyprompted, and not limited from sharing. When each time the user isprompted, an option to still send the information is also given to theuser.

Current Mode of the Receiving Terminal

The user of the receiving terminal can set a mode of the receivingterminal as needed. For example, when the receiving terminal is in aguest mode, the user of the receiving terminal is generally not theowner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information chosen to be shared by the user of thesending terminal is a locally stored file (such as a video, a document,an image, or the like), the user can be prompted that the receivingterminal is currently in a guest mode, continuing to send may revealprivacy and ask the user of the sending terminal whether to still sharethe information or not, or prompts the user to encrypt the informationto be shared. In addition, when the receiving terminal is in a safemode, if the information chosen to be shared by the user of the sendingterminal is a file (such as a video, a document, an image, or the like),it can prompt the user that the receiving terminal is in the safe modeand prohibit such information sharing, or prompt the user to encrypt theinformation to be shared. In addition, when the receiving terminal is ina child mode, the user of the receiving terminal is generally not theowner at this moment but the child of the owner or another junior. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can remind the user of the sending terminal that the currentreceiving terminal is in the child mode, or it prompts the user toencrypt the information to be shared. In addition, the receivingterminal may also be in an elderly mode. Similarly, the user of thereceiving terminal at this time is generally the owner's elder. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the information to be shared with.It can prompt the user of the sending terminal that the receivingterminal is currently in the elderly mode, or prompt the user to encryptthe information to be shared.

For the child mode and the elderly mode do not affect the specificsharing process, that is, when the receiving terminal is in the childmode and/or the elderly mode, it only prompts the user, not restrictsthe user from sharing. When the user is prompted, the user is also givena choice to still send the information to be shared.

In addition to the above modes, due to different needs, the receivingterminal may also be in a navigation mode. When the receiving terminalis in the navigation mode, it is obviously inconvenient to receiveinformation. In addition, when the receiving terminal is in a conferencemode, the user of the receiving terminal is also inconvenient to receiveinformation. Therefore, in the information sharing process, it isnecessary to obtain a current mode of the receiving terminal before theuser of the sending terminal sends the information to be shared, thus toavoid disturb the user of the receiving terminal when the user of thereceiving terminal is inconvenient to receive information. Therefore,when it is acquired that the receiving terminal is in the navigationmode or the conference mode, the user of the sending terminal may beprompted that the receiving terminal is currently in the navigation modeor the conference mode. Of course, the receiving terminal being in thenavigation mode or the conference mode does not affect the specificsharing process. That is to say, when the receiving terminal is in thenavigation mode or the conference mode, it only prompts the user, notrestricts the user from sharing. Therefore, when the user is prompted,the user is also given a choice to still send the information to beshared.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application or some applicationsof the mobile phone alone in a preset profile mode, and the profilemodes of the mobile phone may not affect the preset modes of theapplication. For example, the mobile phone is in a smart mode, and theapplication is in a normal mode. Certain preset modes of the mobilephone may affect a preset mode of the application, for example, if themobile phone is in a traffic saving mode, the application cannot be inthe normal mode. Specifically, whether a profile mode of the mobilephone has a higher priority than a profile mode of the application canbe preset in the system of the mobile phone. When the receiving terminalis in a preset mode, that is, which profile mode of the mobile phonebeing in and/or which profile mode of an application being in determineswhether to execute operation B10 to process the information to be sharedaccording to the twelfth preset rule.

In this embodiment, the second type filtering information is obtainedfrom the receiving terminal, and the information to be shared isprocessed according to the obtained second type filtering information,so as to ensure that the receiving terminal does not use extra traffic,and the user of the receiving terminal does not have to wait for theinformation to be sent for a long time, and so that the privacy of theuser of the sending terminal is protected and the user of the receivingterminal does not be affected. The purpose of intelligently selectinginformation to be shared is realized.

In addition, the above first preset rule, second preset rule, thirdpreset rule, fourth preset rule, fifth preset rule, sixth preset rule,seventh preset rule, eighth preset rule, ninth preset rule, tenth presetrule, eleventh preset rule, twelfth preset rule, thirteenth preset rule,fourteenth preset rule each includes one or more of filtering, hiding,and setting to an unselectable state, displaying one or more ofcorresponding mark(s) indicating not support sharing, outputting promptinformation, compressing, and encrypting, and those preset rules may bethe same or different.

In addition, on the basis that the information sharing method of thepresent application can be implemented, any two or more embodiments ofthe above information sharing method can be combined, with repeatedschemes in which are appropriately deleted, to form a new embodiment.

Referring to FIG. 17 , in a seventeenth embodiment of the presentapplication, the information sharing method includes the followingoperations.

In operation C10, information to be shared and association informationare obtained.

Before this operation is executed, a condition for determining a currentmode of a terminal may be added. If the current mode of the terminal isa preset mode (including at least one of a smart mode, a normal mode, atraffic saving mode, and a security mode), this operation C10 isexecuted.

According to the user's selection, it is determined whether aninformation selection mode of the current terminal (such as a mobilephone) is in a smart mode or in a normal mode when to share information.A switch of the smart mode can only appear when the mobile phone is inthe developer mode or in the debugging mode defined in the systemsettings. The switch can also be built into an application (such as inthe laboratory function of the application). In addition, because at thecurrent, a mobile phone can automatically enters a profile modeaccording to the current usage scenario, one of the profile modes of themobile phone can be the smart mode (for example, when the user opens agame application, the mobile phone automatically enters a game mode).When the user of the mobile phone performs a sharing operation, theinformation selection mode of the mobile phone will automatically enterthe smart mode. Specifically, when the mobile phone is in the smartmode, the mobile phone can automatically enter a traffic saving modeaccording to certain conditions (such as when the available traffic isinsufficient, the mobile phone automatically enters a traffic savingmode) or a safe mode (such as when the information to be shared containsfiles, the mobile phone automatically enters the safe mode). When theinformation selection mode is in the normal mode, a follow-up processingis performed according to rules of the system or a correspondingapplication, such as according to the rules of sharing function thatcomes with WeChat.

Of course, it is also possible to choose to execute the method even whenthe selection mode is in the normal mode.

The information to be shared can be some preset information of aterminal, be information downloaded by a user from the Internet (such asimages, application software, etc.), be information input by the user onthe terminal, or be information on an application of the terminal (suchas news, application update information, etc.). The information to beshared can also be local information of the terminal (such as localfiles, etc.), or be a sharing record on social software (such as chatlogs, shared information, etc.).

The above information to be shared may be one or more of audios, videos,animations, images, documents, files, texts, sharing records, writingnotes, web page information, and web addresses.

In the information sharing process, the sending terminal generally sendsinformation, and the receiving terminal receives the information. Duringreceiving the information, there may be certain situations causing thereceiving terminal to be unable to obtain the content of the receivedinformation content, or it is inconvenient for the receiving terminal toobtain the content of the received information, or the content of thereceived information cannot be understood by the user of the receivingterminal due to language barrier. Relevant factors that lead to thesesituations are used as association information.

In operation C20, the information to be shared is processed according tothe association information to obtain target sharing information.

After obtaining the above-mentioned association information, accordingto different contents contained in the information to be shared, a datatype conversion or a translation of the information to be shared can beperformed. The convertible types included in data type conversions aretexts, images, animations, voices, audios, videos, and files. Accordingto needs, the texts can be converted into an image (for example, when atext is “Hi”, it is easy to understand, the purpose of the user of thesending terminal sharing such text is to greet the user of the receivingterminal). Likewise, contrary to the conversion of texts to images, itcan also convert an image to texts, texts and files (including onlytexts) to voices. At present, converting texts to voices is already verymature, such as, listening to novels daily. Likewise, it can alsoconvert voices to texts. In addition, it can also convert videos toaudios and images. It's easy to understand that the videos themselvesare composed of audio data and images. Likewise, it can convertanimations to audios and images. For translation, when sharinginformation, if the information shared by the user of the sendingterminal has contents in a language beyond the language ability of theuser of the receiving terminal, it will inevitably cause the user of thereceiving terminal to have difficulty in understanding the information,so the language of the information can be converted into a language thatcan be understood by the receiving terminal.

The target sharing information is got according to the informationobtained after the data type conversion or translation.

In addition to the above processing methods, it also includes acquiringspace information of the receiving terminal. If the space of thereceiving terminal does not match the information to be shared sent bythe sending terminal, the information to be shared is compressed.

In operation C30: the target sharing information is sent.

Further, referring to FIG. 18 , in an eighteenth embodiment of thepresent application, based on the seventeenth embodiment, theassociation information includes at least one of a current mode of thereceiving terminal and a sharing record.

Current Mode of the Receiving Terminal

For the case where the current mode of the receiving terminal meetspreset conditions, that is, when the current mode of the receivingterminal is at least one of a driving mode, a conference mode, and a nodisturbing mode, the information to be shared is processed according toa first preset rule, and the first preset rule is the data typeconversion.

Driving Mode

In order to facilitate users to only use certain functions (such astalking on the phone) of the terminal when driving, and to ensure theuser's driving safety, the terminal provides a driving mode. When thereceiving terminal is in the driving mode, it is inconvenient for theuser of the receiving terminal to receive certain shared information,such as articles, images, etc. For voice information, because the userof the receiving terminal does not lose his vision when acquiringcontent of the voice information, it is possible for the user of thereceiving terminal to receive voice messages. When the receivingterminal is in the driving mode, it can convert files, texts, and otherinformation in the shared information that can be converted from text tovoice into voice information. In particular, for converting image tovoice, it can use the texts on the image to perform conversion,specifically, it first recognizes the texts in the image to convert theimage into texts, and then converts the texts into voices. The purposeof data type conversion is to facilitate the user of the receivingterminal to conveniently obtain the information shared by the sendingterminal during driving. But the data type conversion may causeinconsistency between the converted information and the originalinformation if without human intervention, resulting in what obtained bythe user of the receiving terminal is not the information that the userof the sending terminal shares. Therefore, in order to facilitate theuser of the receiving terminal to correctly understand the content ofthe sending terminal's shared information, the user of the receivingterminal can browse the information without conversion (i.e., theoriginal information shared by the user of the sending terminal) at hisconvenience, that is, after driving. For example, referring to FIG. 18 ,C3000 indicates a sending terminal, and C3001, C3002, C3003, C3004, andC3005 indicate some pieces of information in a chat log. Because thereceiving terminal is in the driving mode at current and it is notconvenient to receive information, when the user selects C3003, a dialogbox indicated by C3006 automatically pops up, to prompt the user of thesending terminal, and provide processing options including automaticsending and cancel sending.

Conference Mode

When a user of a mobile phone participates in a meeting, the mobilephone is generally set to be a conference mode. When participating in ameeting, the user is inconvenient to receive voice messages, but canreceive text messages and other information that can be browsed.Therefore, when it obtains that the current mode of the receivingterminal is the conference mode, if the information to be sharedcontains voice, it needs to convert the voice to another data type, suchas converting the voice to texts, or an image (such as when the voiceinformation is a greeting). For example, referring to FIG. 19 , C4000indicates a sending terminal, C4001 and C4002 indicate videoinformation, C4003 and C4005 indicate audio information, and C4004indicates text information. Because the receiving terminal is in theconference mode at current, it is not convenient for the user of thereceiving terminal to receive voice information. When the user selectsC4003, a dialog box indicated by C4006 automatically pops up to promptthe user of the sending terminal, and provides processing optionsincluding data type conversion and cancel sending. Similarly, thepurpose of the data type conversion is to facilitate the user of thereceiving terminal to receive the information shared by the sendingterminal when participating in a meeting. However the data typeconversion may cause inconsistency between the converted information andthe original information due to no human intervention and result in theinformation received by the user of the receiving terminal is not theinformation that the user of the sending terminal shares. Therefore, inorder to facilitate the user of the receiving terminal to correctlyunderstand the content of the information shared by the sendingterminal, the user of the receiving terminal can browse the originalinformation at his convenience, that is, after the meeting.

No Disturbing Mode

For the no disturbing mode, on one hand, the above driving mode andconference mode are both the no disturbing mode in a broad sense, so theprocessing method of the no disturbing mode is consistent with the abovedescribed data type conversion. On the other hand, it can be understoodthat when the user of the receiving terminal needs personal space, theuser of the receiving terminal can set the profile mode of his phone tobe the no disturbing mode. When the user of the receiving terminal setsthe mobile phone to the no disturbing mode, it is obvious that the userof the receiving terminal does not want to be disturbed by others atthis time, so it is obviously inappropriate for the user of the sendingterminal to share information to the user of the receiving terminal userat this time. When the receiving terminal is in the no disturbing mode,it can output a prompt message at the sending terminal to remind theuser of the sending terminal that the receiving terminal is in the nodisturbing mode and inconvenient to receive information, and it alsoprovide a function of automatically sending the information to be sharedto the receiving terminal at a proper time (the receiving terminal exitout of the no disturbing mode) to facilitate the information sharingoperation of the sending terminal. Of course, it is not impossible forthe receiving terminal to receive information in the no disturbing mode.Therefore, it can provide an option to still send the information to beshared to the user of the sending terminal.

Sharing Records

In determining that the sharing records meets the preset conditions,that is, the sharing records include text information, voiceinformation, and other information capable of converting data typethereof, the information to be shared is processed according to a secondpreset rule, where the second preset rule includes data type conversionand translation.

The sharing records can be previous shared information (including chatlogs, etc.). When the user of the sending terminal shares theinformation, text content of the shared information may beincomprehensible to the user of the receiving terminal because thesource of the information is very wide. After sharing this informationto the user of the receiving terminal, the user of the receivingterminal needs to first translate the information, which is verytroublesome. Therefore, when sharing information, it is necessary toobtain the language information of the receiving terminal. The languageinformation can be the system language of the receiving terminal, thelanguage set in an application, or the language of the chat logs. Ofcourse, the most convenient way is to directly obtain the systemlanguage of the receiving terminal because the system language set bythe user must be understood by the user. After the language informationis obtained, the contents in the information to be shared that isdifferent from the language information can be translated into thelanguage of the language information. For example, referring to FIG. 20, C5000 indicates a sending terminal, and C5001, C5002, C5003, C5004,and C5005 indicate some pieces of information in a chat log. When theuser selects C5005, the sending terminal finds the language of thecurrent piece of information is inconsistent with the system languageprovided by the receiving terminal, and automatically pops up a dialogbox indicated by C5006 to prompt the user of the sending terminal, andprovide a translation option and a cancel sending option.

In addition, according to chat information, it can also obtain habitinformation of the user of the receiving terminal. For example, the useris used to chatting with texts, voices, and images. The information tobe shared can be processed according to the acquired habit information.The processing methods include converting texts into an image, texts tovoices, voices to texts, or voices to an image. Which data type the userof the receiving terminal is used to, the information to be shared isconverted to such data type. Similarly, the purpose of data typeconversion is to facilitate the user of the receiving terminal to browsethe content of the received information to be shared. However the datatype conversion may cause inconsistency between the convertedinformation and the original information due to no human interventionand result in that the information received by the user of the receivingterminal is not the information that the user of the sending terminalwants to share. Therefore, in order to facilitate the user of thereceiving terminal to correctly understand the content of theinformation shared by the sending terminal, it is necessary to providethe original information before the data type conversion to thereceiving terminal, and it is up to the user of the receiving terminalto decide whether to browse the original information before the datatype conversion.

In particular, some applications do not support sharing voiceinformation, such as WeChat. When the application does not support voiceinformation sharing, it can share the voice information through anotherapplication that support voice information sharing.

In this embodiment, the information to be shared is processed accordingto the association information to obtain information that is convenientfor the user of the receiving terminal to browse, avoiding that the userof the receiving terminal receives information of a certain data typethat is inconvenient for the user of the receiving terminal to receiveor containing contents that cannot be understood by the user of thereceiving terminal. The purpose of intelligently processing theinformation to be shared is realized.

Further, in a nineteenth embodiment of the present application, based onthe above seventeenth embodiment, the information sharing method furtherincludes:

the data type conversion is performed by the sending terminal, theserver, or the receiving terminal.

When the data type conversion is assigned to be performed by the sendingterminal, the target sharing information may be the original informationto be shared, or the processed information to be shared, or includesboth the original information to be shared and the processed informationto be shared. Specifically, the target sharing information can bedetermined by the sending terminal or the receiving terminal. When thecurrent mode of the sending terminal is a preset mode and the user ofthe receiving terminal displays the processed information to be sharedthrough a selection operation or according to sets in advance, thetarget sharing information can be the processed information to beshared, or include both the original information to be shared and theprocessed information to be shared, which can be determined according towhether the user of the receiving terminal needs the originalinformation to be shared (for example, the data type conversion functionis perfect, the converted information meets the user's needs, and theuser no longer needs to verify the processed information to be sharedaccording to the original information to be shared). When the currentmode of the sending terminal is a preset mode and the user of thereceiving terminal displays the information to be shared through aselection operation or according to sets in advance, no data typeconversion is needed and the target sharing information sent by thesending terminal is the original information to be shared. Of course,data type conversion can also be performed in such case and the targetsharing information includes both the original information to be sharedand the processed information to be shared, but the receiving terminalchooses to display only the original information to be shared afterreceiving the original information to be shared and the processedinformation to be shared. In addition, after the sending terminalperforms a data type conversion on the original information to beshared, the user of the sending terminal can perform a selectionoperation according to the conversion result. The specific selectionoperation is to reverse the data type of part or all of the processedinformation to be shared to the original data type or delete the part orall of the processed information to be shared.

When the data type conversion is assigned to be performed by the server,the sending terminal does not need to process the information to beshared. Therefore, the target sharing information is the information tobe shared. Whether to display the processed shared information isdetermined by the user of the receiving terminal through a selectionoperation or according to sets in advance. If the receiving terminaldisplays the processed information to be shared, the target sharinginformation can be the processed information to be shared, or includeboth the original information to be shared and the processed informationto be shared, depending on whether the user of the receiving terminalneeds the original information to be shared (for example, the data typeconversion function is perfect, the converted information meets theuser's needs, and the user no longer needs to verify the processedinformation to be shared according to the original information to beshared). If the receiving terminal selects to display the originalinformation to be shared, no data type conversion is needed.

When the data type conversion is assigned to be performed by thereceiving terminal, the sending terminal does not need to process theinformation, and the server terminal also does not need to process theinformation. Therefore, the information received by the receivingterminal is the original information to be shared. Similarly, whether todisplay the processed information to be shared is determined by the userof the receiving terminal through a selection operation or according tosets in advance.

In addition, when the data type conversion is not performed by thesending terminal, but by the server, the sending terminal can send datatype conversion parameters together with the original information to beshared, the data type conversion parameters include the data type and/orfile format of the original information to be shared, the data typeand/or file format of the processed information to be shared, timerequirements, and space requirements. The server performs a data typeconversion to the original information to be shared sent by the sendingterminal according to the parameters, which reduces the data processingpressure of the sending terminal. Similarly, when the data typeconversion is processed by the receiving terminal, the receivingterminal can receive the original information to be shared and the datatype conversion parameters sent by the sending terminal, and process theoriginal information to be shared according to the data type conversionparameters. In addition, the data type conversion parameters can begenerated by the sending terminal or by the server. Specifically, forthe data type and/or file format of the original information to beshared and the data type and/or file format of the processed informationto be shared, when the data type conversion is performed, the data typeand/or file format of the original information to be shared is convertedto the data type and/or file format of the processed information to beshared. The time requirements is considered relative to the processingprocess, the purpose of which is to select a data type conversion of theleast time-consuming to reduce the user's waiting time. The spacerequirements is also considered relative to the processing process, thepurpose of which is to minimize the space occupied by the processedinformation to be shared after the data type conversion without reducingthe quality.

In addition, the generation of the data type conversion parameters canbe determined by the user's selection operation or system presets. Forexample, if the user of the sending terminal prefers to convert voiceinformation to text information, the data type conversion parameters atthis time specifically refer to converting the voice information to textmessages or specifically refer to converting certain piece or pieces ofvoice information of the original information to be shared to textinformation, rather than converting the voice information into images.

In this embodiment, the data type conversion can be performed by thesending terminal, the server, or the receiving terminal, and the datatype conversion parameters can be selected and transmitted to the serveror the receiving terminal when the data type conversion is performed bythe server or the receiving terminal according to requirements. When thedata type conversion is performed by the server, the data typeconversion parameters can be generated by the sending terminal, and whenthe data type conversion is performed by the receiving terminal, thedata type conversion parameters can be generated either by the sendingterminal or the server. The purpose of providing a variety of sites forperforming data type conversions is achieved.

In a twentieth embodiment of the present application, based on theforegoing seventeenth embodiment, eighteenth embodiment, or nineteenthembodiment, the operation C11 further includes:

saving the target sharing information as at least one temporary file.

Rather than directly sending the target sharing information, it can savethe target sharing information as a temporary file; or save each pieceof the information of the target sharing information as a temporaryfile, and then put all the temporary files together to be packaged as atemporary file or folder. Which one of the saving manners is used is upto the user's choice or determined according to presetting.

It can choose to compress the temporary file or folder to reduce anamount of the transmission data, or encrypt the temporary file or folderto increase the security during transmission.

In addition, after the temporary file or folder is sent to the receivingterminal, it can also choose to delete the temporary file or folder toreduce a storage space used.

Specifically, when the data type conversion process is assigned to beexecuted by the sending terminal, the sending terminal directly packagesthe information to be shared into a temporary file or folder. When thedata type conversion process is assigned to be executed by the server,the sending terminal can package the information to be shared into atemporary file or folder before sending the information to be shared tothe server, or directly send the information to be shared to the server.After the data type conversion is completed by the server, the targetsharing information is packaged into a temporary file or folder beforeit is sent to the receiving terminal. When the data type conversionprocess is assigned to be performed by the receiving terminal, likewise,the sending terminal can package the information to be shared into atemporary file or folder, the server sends the temporary file or folderdirectly to the receiving terminal after receiving the temporary file orfolder from the sending terminal, or the sending terminal sends theinformation to be shared to the server, the server receives theinformation to be shared, packages the information to be shared into atemporary file or folder, and then send the temporary file or folder tothe receiving terminal.

In this embodiment, the target sharing information is packaged as atemporary file or folder to facilitate compression, encryption, andtransmission of the target sharing information. The purposes ofimproving the transmission speed of the target sharing information andthe security of the transmission process are achieved.

The related art performing information sharing, the user of thereceiving terminal cannot know whether the received sharing informationhas been processed.

A twenty-first embodiment to a twenty-third embodiment of the presentapplication provide solutions to enable the user of the receivingterminal to know whether the received information has been processed,and perform a corresponding processing according to a processing methodof the received sharing information, thus to achieve the purpose ofimproving the convenience of the user of the receiving terminal whenacquiring the sharing information.

Referring to FIG. 21 , in the twenty-first embodiment of the informationsharing method of the present application, the information sharingmethod includes:

operation D10, obtaining target sharing information;

operation D11, detecting whether the target sharing information is thesame as first sharing information, where the first sharing informationis original information to be shared;

operation D12, in determining that the target sharing information isdifferent from the first sharing information, obtaining descriptioninformation corresponding to the target sharing information, and sendingthe target sharing information and the description information, so thatthe receiving terminal outputs a prompt according to the descriptioninformation; and/or,

operation D13, in determining that the target sharing information is thesame as the first sharing information, only sending the target sharinginformation.

After the target sharing information is obtained, the target sharinginformation may be the original information to be shared or theprocessed information to be shared which is obtained by processing theoriginal shared information. For the case where the target informationis the processed information to be shared, it is also necessary toobtain the corresponding description information, so that the receivingterminal selects a corresponding information prompt manner according tothe description information after receiving the target sharinginformation and the description information, to remind the user of thereceiving terminal that the target sharing information is obtained byprocessing the original shared information. For the case where thetarget sharing information is the original information to be shared,only the original shared information needs to be sent.

According to the user's selection, it is determined whether theinformation selection mode of the current terminal (such as a mobilephone) is in a smart mode or in a normal mode when to share information.A switch of the smart mode can only appear when the mobile phone is inthe developer mode or in the debugging mode defined in the systemsettings. The switch can also be built into an application (such as inthe laboratory function of the application). In addition, because at thecurrent, a mobile phone can automatically enters a profile modeaccording to the current usage scenario, the mobile phone can be set tobe in the smart mode (for example, when the user opens a gameapplication, the mobile phone automatically enters a game mode), andwhen the user of the mobile phone performs a sharing operation, theinformation selection mode of the mobile phone will automatically enterthe smart mode. Specifically, when the mobile phone is in the smartmode, the mobile phone can automatically enter a traffic saving modeaccording to certain conditions (such as when the available traffic isinsufficient, the mobile phone automatically enters the traffic savingmode) or the safe mode (such as when the information to be sharedcontains files, the mobile phone automatically enters the safe mode).When the information selection mode is in the smart mode, operation D10is performed. When the information selection mode is in the normal mode,a follow-up processing is performed according to rules of the system ora corresponding application, such as according to rules of sharingfunction that comes with WeChat. Of course, even when the informationselection mode is in the normal mode, operation D10 may be selected forexecution.

In addition, the above description information includes at least one ofthe following:

the data type of the target sharing information, the file format of thetarget sharing information, the size of the target sharing information,the time information for processing the first sharing information, andexecution body information for processing the first sharing information.

The data type of the target sharing information includes the data typeof the first sharing information or the data type of the processedinformation to be shared which is obtained by processing the firstsharing information. The file format of the target sharing informationincludes the file format of the first sharing information or the fileformat of the processed information to be shared, the size of the targetsharing information includes the size of the first sharing informationor the size of the processed information to be shared, and the timeinformation for processing the first sharing information includes astart time to start the processing, an end time to end the processingand a time interval of the processing process, and the execution bodyinformation for processing the first sharing information includesinformation on the sending terminal, the server, or the receivingterminal. Specifically, the purpose of sending the descriptioninformation to the receiving terminal is to enable the user of thereceiving terminal to know whether the received information has beenprocessed, what type of processing has been carried out, by whom, when,and how long the received information is processed.

In this embodiment, through operations D10: obtaining target sharinginformation, D11: detecting whether the target sharing information isthe same as first sharing information, where the first sharinginformation is the original information to be shared, D12: indetermining that the target sharing information is different from thefirst sharing information, acquiring and sharing description informationcorresponding to the target sharing information, and sending the targetsharing information and the description information, so that thereceiving terminal outputs a corresponding prompt according to thedescription information; and/or, D13: in determining that the targetsharing information is the same as the first sharing information, onlysending the target sharing information, the receiving terminal is ableto select different display manner according to different target sharinginformation. If the target sharing information is the processedinformation which is obtained by processing the original information tobe shared, a processing method of processing the original information tobe shared to obtain the processed information to be shared is sent tothe receiving terminal as the description information, so that thereceiving terminal reminds the user of the receiving terminal that thereceived information is not the original information to be shared butthe processed information to be shared according to the processingmethod, which is convenient for the user of the receiving terminal toprepare for obtaining the received information in advance. For example,when an encrypted file is received by the user of the receivingterminal, the user of the receiving terminal can know that the file isencrypted according to the prompt generated by the receiving terminalwhen receiving the target sharing information, so as to obtain thepassword or a way of obtaining the password from the user of the sendingterminal in advance, and avoid to cause unnecessary trouble to the userof the receiving terminal who know that the file is encrypted only whenhe is opening the file. For example, if the user of the receivingterminal does not have time to process when receiving the target sharinginformation, the user of the receiving terminal starts to process thereceived target sharing information after a long time, but at this timethe user of the sending terminal is inconvenient to communicate with theuser of the receiving terminal (to give a password). The purpose ofimproving the convenience of users in obtaining sharing information isachieved.

Further, referring to FIG. 22 , in a twenty-second embodiment of theinformation sharing method of the present application, based on theforegoing twenty-first embodiment, the operation D10 of obtaining targetsharing information includes:

operation D101, obtaining the first sharing information;

operation D102, obtaining the processing information corresponding tothe first sharing information, and detecting whether the processinginformation meets the preset conditions.

operation D103, in determining that the processing information does notmeet the preset conditions, determining whether an execution body is thesending terminal, where the processing body is the sending terminal orthe server;

operation D104, in determining that the execution body is not thesending terminal but the server, taking the first sharing information asthe target sharing information, so that the execution body performscorresponding processing on the target sharing information according tothe processing information.

In this embodiment, after the user of the sending terminal selects thefirst sharing information, it needs to obtain the processing informationcorresponding to the first sharing information and determines whetherthe processing information meets the preset conditions, in determiningthat the processing information does not meet the preset conditions, thefirst sharing information is processed based on the processinginformation. It determines whether the execution body is the sendingterminal or the server. The selection between the execution bodies maybe preset by the system or selected by the user before sharing. When theexecution body is the sending terminal, the first sharing information isdirectly processed at the sending terminal, and the processed firstsharing information is taken as the target sharing information; when theexecution body is the server, the first sharing information is taken asthe target sharing information and sent to the server. The serverprocesses the first sharing information according to the processinginformation.

Specifically, the processing information is obtained from the sendingterminal and/or provided by the receiving terminal, and the processinginformation includes at least one of the following: data type, filetype, storage information, traffic information, network speedinformation, mode information, time information, location information,language information, status information of the receiving terminal,status information of the user of receiving terminal.

For the case that the data type and/or file type of the receivingterminal does not meet the preset receiving conditions, that is, thereceiving terminal does not support the data type and/or file type ofthe information to be shared

Specifically, the first sharing information that the user wants to sharemay has various data types, such as audios, videos, animations, images,documents, files, texts, and etc. The first sharing information undermost situations, the receiving terminal supports reading the firstsharing information, but for some non-smart phones, it may not supportreading video files. Therefore, it is unnecessary for the user of thesending terminal to still send the contents that the receiving terminaldoes not support to the receiving terminal. Therefore, when sharinginformation, it is necessary to firstly obtain the data type supportedby the receiving terminal. In addition, the user may have such arequirement to share a video file, but because the video file isparticularly large, resulting that the sharing process takes a long timeand requires a large storage space to store the video file. Further theuser may just want a certain segment in the video file, or audio in thevideo file, or images in the video file. For the case that the userwants to share a certain segment in the video file, it can provide avideo cropping function, and the user can select the segment at any timepoint and lasting for any length of time as needed. For the case theuser wants to share is the audio in the video file, it can provide theuser with a function of data type conversion. The data in the firstsharing information can be converted into audio through data typeconversion. An audio cropping function can also be provided. The usercan select an audio segment at any time point and lasting for any lengthof time as needed. For the case the user want to share is the images inthe video files, similarly, it can only keep the images and remove theaudio from the video file. Similarly, the user can select an image atany time point in the video file.

Regarding the file types of the first sharing information, one situationis that the first sharing information contains content in anon-frequently used file format, such as video data including MPEG(Motion Picture Experts Group) format, and many mobile phones onlysupport frequently used file formats. For the file formats that are notfrequently used, it generally requires a specific software for formatconversion, such as the format factory. But in daily life, usersgenerally do not use such kind of professional software tool. So, beforesharing information, it needs to determine whether the receivingterminal supports a file format of the first sharing information, if thereceiving terminal does not support the file format of the first sharinginformation, there is no need to share the contents in such file format.Therefore, during sharing, it can format the contents in the file formatthat the receiving terminal does not support at the sending terminal andconvert the contents to any format supported by the receiving terminal.Another situation is that for some privacy or confidential files,encryption is usually required during the information sharing process.Similarly, for sharing information is relatively convenient and fast,many times some company internal files (usually documents) are alsoshared through common softwares, such as through the social softwareWeChat. To ensure the security of the files in the sharing process, itneeds to encrypt the first sharing information with the data type beingdocument.

For the case that the storage information of the receiving terminal doesnot meet the preset receiving conditions, that is, the available localstorage space of the receiving terminal is smaller than a size of thefirst sharing information that the user wants to share

Specifically, for storage information of the receiving terminal, it isnecessary to take into account whether the size of the first sharinginformation exceeds the available local storage space of the receivingterminal, so, it is necessary to obtain the size of the first sharinginformation before sending the first sharing information, and at thesame time, to obtain the available local storage space of the receivingterminal. If the available local storage space of the receiving terminalis smaller than the size of the first sharing information, for example,if the size of the first sharing information is 300 MB, and theavailable local storage space is only 200 MB, it then compresses thelarger size contents of the first sharing information, that is, performsa format conversion, to obtain smaller size first sharing information.Of course, the whole first sharing information can be compressed. Forexample, referring to FIG. 23 , D4000 indicates a sending terminal,D4001, D4002, D4003, D4004, and D4005 indicate some pieces ofinformation in a chat log, and D4006 indicates a prompt box that pops upafter the user selects D4001 or D4002, indicating that the user of thereceiving terminal has insufficient storage space, and asks the user ofthe sending terminal whether to compress the first sharing information,and provide a confirmation button and a cancel button. In addition,considering that compression will affect the quality of the firstsharing information, for example, when the first sharing informationcontains a video, for files of the data type such as videos, compressionwill damage the original files, such as reduce a definition, distortsounds of the video, and etc. Therefore, there is a limit to compressthe first sharing information. For this, it can compress the firstsharing information to obtain target sharing information, and providethe user with a function to preview the target sharing information. Itis up to the user to decide whether to send the target sharinginformation, if the user deems that the content has been excessivelydistorted by compression, the user can reselect the first sharinginformation, such as deleting the selected content.

For the case that the traffic information and/or network speedinformation of the receiving terminal does not meet the preset receivingconditions, that is, the available traffic of the receiving terminal isinsufficient to receive the first sharing information and/or the size ofthe first sharing information that the user wants to share is muchlarger than a data size that can be sent by the receiving terminal perunit time at current

Specifically, the current traffic usage of common mobile phone users ismonthly traffic usage, such as subscribing 10 GB of data traffic permonth. If the user's traffic usage exceeds the subscribed amount in amonth, it will cause a lot of charges. Thus, before sending the firstsharing information, it needs to obtain the traffic information of thereceiving terminal, that is, the available traffic of the receivingterminal. If the available traffic of the receiving terminal is notenough to receive the first sharing information, similarly, the largersize contents of the first sharing information can be compressed, thatis, the larger size pieces can undergo a format conversion in order toreduce a size of the first sharing information to a smaller size. Ofcourse, the whole of the first sharing information can be compressed. Inaddition, considering that the compression will affect the quality ofthe first sharing information, for example, when the first sharinginformation contains a video, for files of the data type such as videos,compression will damage the original files, resulting in a reduction ina definition of the video and sound distortion, and etc. Therefore,there is a limit to compress the first sharing information. For this, itcan compress the first sharing information to obtain target sharinginformation, and provide the user with a function to preview the targetsharing information. It is up to the user to decide whether to send thetarget sharing information, if the user deems that the content has beenexcessively distorted by compression, the user can reselect the firstsharing information, such as deleting the selected content. For example,it prompts that the available traffic of the receiving terminal is lessthan the size of first sharing information that the user of the sendingterminal wants to share for 300 MB and recommends to cancel a video witha size of 310 MB from sharing and to continue to share the remaininginformation.

Specifically, when the size of the first sharing information that theuser wants to share is much larger than a data size that can be receivedcurrently by the receiving unit per unit time, for example, the size ofthe first sharing information that the user wants to share is 1000 MB,and the current network speed of the receiving terminal can only reach10 KB/s, it is conceivable that the sharing will be meaningless.Therefore, in the information sharing process, it is necessary to obtainthe size of the first sharing information when the user selects thefirst sharing information, and at the same time to obtain the networkspeed of the receiving terminal. When the network speed of the receivingterminal is much lower than a network speed required to share the firstsharing information, it can use compression to ensure that the size ofthe first sharing information meets the network speed. It can alsoprompt the user that the current network condition is poor and it maytake some time to send the information, and recommend the user to allowthe sending terminal to automatically send the information when thenetwork condition does not affect the sending. In addition, consideringthat compression will affect the quality of the first sharinginformation, for example, when the first sharing information contains avideo, for files of data type such as videos, compression will damagethe original files, such as reduce definitions, distort sounds of thevideos, and etc. Therefore, there is a limit to compress the firstsharing information. For this, it can compress the first sharinginformation to obtain target sharing information, and provide the userwith a function to preview the target sharing information. It is up tothe user to decide whether to send the target sharing information, ifthe user deems that the content has been excessively distorted bycompression, the user can reselect the first sharing information, suchas deleting the selected content.

For the case that the traffic information and/or network speedinformation of the sending terminal does not meet the preset sendingconditions

Specifically, for the mode information, the user of the sending terminalcan set a mode of the sending terminal as needed. For example, when thesending terminal is in a guest mode, the current user of the sendingterminal is generally not the owner, that is, the owner considersprivacy protection or other situations, and sets the terminal (such as amobile phone) to be in the guest mode when the terminal is lent toothers, thereby to prevent the others from revealing the owner's privacyduring use. In addition, when the sending terminal is in a safe mode, ifthe information chosen to be shared by the user of the sending terminalis a file (such as a video, a document, an image, or the like), theremay be leakage of confidential files and personal privacy. In addition,when the sending terminal is in a child mode, generally at this moment,the user of the sending terminal is not the owner but the owner's childor another junior, the user of the sending terminal may be unfamiliarwith the mobile phone, and in such case, a series of misoperation mayoccur and may trigger a sharing process. It is understandable under sucha situation, the user of the sending terminal does not need to shareinformation. In addition, the sending terminal may also be in an elderlymode. Similarly, the user of the sending terminal at this moment isgenerally the owner's elder, and they are unfamiliar with the currentmobile phone. When the elder using the mobile phone, it will alsoproduce a series of misoperation that lead to a sharing process.

Similarly, the user of the receiving terminal can set a mode of thereceiving terminal as needed. For example, when the receiving terminalis in a guest mode, the user of the receiving terminal is generally notthe owner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information chosen to be shared by the user of thesending terminal is a locally stored file (such as a video, a document,an image, or the like), the user can be prompted that the receivingterminal is currently in the guest mode, continuing to send may revealprivacy, it asks the user of the sending terminal whether to still sharethe information or not, or prompts the user to encrypt the first sharinginformation. In addition, when the receiving terminal is in a safe mode,if the information chosen to be shared by the user of the sendingterminal is a file (such as a video, a document, an image, or the like),it can prompt the user that the receiving terminal is in the safe modeand prohibit such information sharing, or prompt the user to encrypt thefirst sharing information. In addition, when the receiving terminal isin a child mode, the user of the receiving terminal is generally not theowner at this moment but the child of the owner or another junior. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the target sharing information to beshared with. It can remind the user of the sending terminal that thecurrent receiving terminal is in the child mode, or it prompts the userto encrypt the target sharing information. In addition, the receivingterminal may also be in an elderly mode. Similarly, the user of thereceiving terminal at this time is generally the owner's elder. It isunderstandable it is not largely another but the owner that the user ofthe sending terminal wants to share the target sharing information with.It can prompt the user of the sending terminal that the receivingterminal is currently in the elderly mode, or prompt the user to encryptthe target sharing information.

In addition to the above modes, due to different needs, the receivingterminal may also be in a navigation mode. When the receiving terminalis in the navigation mode, it is obviously inconvenient to receiveinformation. At this time, the sharing of the sending terminal will posea threat to the driving safety of the user of the receiving terminal. Inaddition, when the receiving terminal is in a conference mode, the userof the receiving terminal is also inconvenient to receive information.Therefore, in the information sharing process, it is necessary to obtaina current mode of the receiving terminal before the user of the sendingterminal sends the information to be shared, thus to avoid disturb theuser of the receiving terminal when the user of the receiving terminalis inconvenient to receive information. Therefore, when it is acquiredthat the receiving terminal is in the navigation mode or the conferencemode, the user of the sending terminal may be prompted that thereceiving terminal is currently in the navigation mode or the conferencemode.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in a presetmode may not affect the application being in a preset mode, for example,the mobile phone is in a smart mode, and the application is in a normalmode. Certain preset modes of the mobile phone may affect a preset modeof the application, for example, if the mobile phone is in a trafficsaving mode, the application cannot be in the normal mode. Specifically,whether a profile mode of the mobile phone has a higher priority thanthe profile mode of the application can be preset in the system of themobile phone. When the receiving terminal is in a preset mode, that is,which profile mode of the mobile phone being in and/or which profilemode of an application being in determines whether to execute operationD101 to process the first sharing information.

In addition, for the sending terminal, if the mode information of thesending terminal does not meet the preset sending conditions, theinformation to be shared is processed according to a ninth preset rule.

Specifically, the user of the sending terminal can set a mode of thesending terminal as needed. For example, when the sending terminal is ina guest mode, the current user of the sending terminal is generally notthe owner, that is, the owner considers privacy protection or othersituations, and sets the terminal (such as a mobile phone) to be in theguest mode when the terminal is lent to others, thereby to prevent theothers from revealing the owner's privacy during use. Therefore, in theguest mode, if the information the user of the sending terminal choosesto share is a locally stored files (such as a video, a document, animage, etc.), the user can be prompted to be in the guest mode, and thatsuch information sharing is prohibited. In addition, when the sendingterminal is in a safe mode, if the information the user of the sendingterminal chooses to share is a file (such as a video, a document, animage, etc.), the user can be prompted to be in the safe mode and thatsuch information sharing is prohibited. In addition, when the sendingterminal is in a child mode at the current time, the user of the sendingterminal is generally not the owner but the owner's child or anotherjunior. The current user of the sending terminal may be unfamiliar withthe mobile phone, and in such case, a series of misoperation may occurand may trigger a sharing process. It is understandable under such asituation, the user of the sending terminal at this moment does not havethe need to share information. It can prompt the user it is in the childmode and information sharing is prohibited. In addition, the sendingterminal may also be in an elderly mode. Similarly, the current user ofthe sending terminal is generally an elder of the owner, and is notfamiliar with the current mobile phone. When the elder using the mobilephone, it will also produce a series of misoperation that lead to asharing process, but the user of the sending terminal at this momentdoes not have the need to share information. It can prompt the user itis in the elderly mode and information sharing is prohibited.

In addition, at present most mobile phones' profile modes are stillmanually set by the user. However, in some scenarios, a mobile phone canautomatically enter a profile mode according to a current usagescenario. For example, when entering a game application, the mobilephone will automatically enter a game mode. Therefore, regardless ofwhether the above-mentioned guest mode, safety mode, child mode, andelderly mode are manually set or automatically entered by the mobilephone, those modes all belong to the category of profile modes.

In addition, it can be known from the above that the mobile phone canautomatically enter a corresponding profile mode according to thecurrent usage scenario, and the mobile phone can also be set to be in acorresponding smart mode to enter the corresponding profile mode in afaster and smarter way. Considering the problem of a degree ofintelligence in the smart mode, it may affect the normal use of themobile phone by the user at the beginning, so a switch for entering thesmart mode can be set in a developer mode or a debugging mode.

In addition, in addition to that the mobile phone can be set to a presetprofile mode, it can also put a certain application of the mobile phonealone in a preset profile mode, and the mobile phone being in a presetprofile mode may not affect the application being in a preset profilemode, for example, the mobile phone is in a smart mode, and theapplication is in a normal mode. Certain preset modes of the mobilephone may affect a preset mode of the application, for example, if themobile phone is in a traffic saving mode, the application cannot be inthe normal mode. Specifically, whether a profile mode of the mobilephone has a higher priority than a profile mode of the application canbe preset in the system of the mobile phone. When the sending terminalis in a preset mode, that is, which profile mode of the mobile phonebeing in and/or which profile mode of an application being in determineswhether to execute operation D101 to process the first sharinginformation according to the third processing rule.

For the case that the time information and/or location information ofthe receiving terminal does not meet the preset receiving conditions,that is, a time zone of the receiving terminal is different from a timezone of the sending terminal and/or a region of the receiving terminalis different from a region of the sending terminal

Specifically, for time information and location information, the user ofthe receiving terminal may be in the same time zone as the user of thesending terminal, or may be in a time zone different from that of theuser of the sending terminal. In the case where the two are in the samezone, the user of the sending terminal generally considers based on thecurrent time whether it is suitable for sharing the target sharinginformation; and in the case where the two are in different time zones,for example, the user of the sending terminal is in the east eight timezone, and the receiving terminal end user is in the west eight timezone, at this time, it is obviously unsuitable for the user of thesending terminal neglects to consider the current time information ofthe user of the receiving terminal. For example, if the current time ofthe user of the sending terminal is two o'clock in the afternoon, butthe current time of the user of the receiving terminal is two o'clock inthe morning, obviously, it is not suitable for sharing information atthis time. Therefore, if the user of the receiving terminal and the userof the sending terminal are not in the same time zone, the sendingterminal needs to prompt the user of the sending terminal with thecurrent time information of the user of the receiving terminal, andprompts the user of the sending terminal whether the user of thereceiving terminal is suitable for receiving the target sharinginformation at current time.

In addition, the user of the sending terminal may be in the same regionas the user of the receiving terminal, or may be in a region differentfrom a region of the user of the receiving terminal. In the case wherethe two are in different regions, the user of the sending terminal needsto consider whether the location information of the user of thereceiving terminal is suitable for receiving the information at currenttime. For example, the user of the receiving terminal may be onvacation, and it is obviously inappropriate to share work-relatedinformation to the user of the receiving terminal. Therefore, whensharing information, the sending terminal prompts the user of thesending terminal with a geographic location of the user of the receivingterminal, and prompts the user of the sending terminal whether it issuitable for the user of the receiving terminal to receive theinformation to be shared at current time.

For the case where the language information of the receiving terminaldoes not meet the preset receiving conditions, that is, the systemlanguage and/or current application language of the receiving terminalis different from a language of the sharing information

Specifically, if the user of the receiving terminal cannot understandthe content of the information shared by the user of the sendingterminal to the user of the receiving terminal due to language barrier,sharing information under such a situation is meaningless. Therefore,during information sharing, the system language and/or currentapplication language of the receiving terminal can be obtained(generally, obtaining the current application language is for instantmessaging software, because such software each usually has a dedicatedterminal client, the acquisition of system language is aimed at thesituation where the receiving terminal does not need to use a dedicatedclient to receive information during the information sharing process).After the system language and/or the current application language of thereceiving terminal is obtained, if the system language and/or thecurrent application language of the receiving terminal is different froma language of the information to be shared by the sending terminal, theuser of the sending terminal is prompted and a function to convert thelanguage of the sharing information into the system language of thereceiving terminal and/or the current application language is provided.

For the case that the status information of the receiving terminaland/or the status information of the user of the receiving terminal doesnot meet the preset receiving conditions, that is, the statusinformation of the receiving terminal and/or the status information ofthe user of the receiving terminal is insufficient to support thecompletion of information sharing

Specifically, for the status information of the receiving terminal, thereceiving terminal's power is too low due to the user forgetting tocharge or being unable to charge currently, and the power is not enoughto complete the information sharing process. At this time, it is obviousnot appropriate if the sending terminal still sends the target sharinginformation. Similarly, for the sending terminal, the power also affectsthe process of sharing information.

For the status information of the user of the receiving terminal, whenthe user of the receiving terminal is in motion, such as the user of thereceiving terminal is currently using a software recording an exerciseprocess (running speed, running time, etc.), it is inconvenient for theuser of the receiving terminal to receive information at current time.

In addition to the above prompts and encryption processing, the sendingterminal can also automatically send the information when the sendingterminal exits a mode that does not support information sharing or whenthe user of the receiving terminal is convenient to receive information.

In this embodiment, the first sharing information is processed accordingto the processing information acquired from the sending terminal and/orprovided by the receiving terminal, so that information that cannot beshared before processing can be shared after processing. The purpose ofintelligent processing and sharing of information is realized.

Further, in the twenty-third embodiment of the information sharingmethod of the present application, the information sharing methodincludes operation D20: receiving sharing information.

The receiving terminal receives the sharing information sent by thesending terminal, where the sharing information includes first sharinginformation, second sharing information, description information, or alink address of the first sharing information and/or the second sharinginformation and the description information on the server, the secondsharing information is obtained by processing the first sharinginformation. Specific contents of the received sharing information isdetermined by the selection operation of the user of the receivingterminal or sets in advance.

Operation D21, in determining that the sharing information includesdescription information, performing a corresponding processing accordingto the description information.

The description information may include: the data type of the targetsharing information, the file format of the target sharing information,the size of the target sharing information, the time information forprocessing the first sharing information, and the execution bodyinformation for processing the first sharing information. The targetsharing information includes the first sharing information and/or thesecond sharing information, and the second sharing information isobtained by processing the first sharing information.

Specifically, the data type of the target sharing information includes adata type of the first sharing information or a data type of the secondsharing information, and the file format of the target sharinginformation includes a file format of the first sharing information or afile format of the second sharing information, the size of the targetsharing information includes a size of the first sharing information ora size of the second sharing information. The time information forprocessing the first sharing information includes a start time when theprocessing starts, an end time when the processing ends, and a timeinterval for the processing process. The execution body informationincludes information on the sending terminal, information on the server,or information on the receiving terminal. Specifically, the purpose ofsending description information to the receiving terminal is to enablethe user of the receiving terminal to know whether the sharinginformation has been processed, what type of processing has been carriedout, by whom, when, and how long the sharing information has beenprocessed when the sharing information is received.

Corresponding processing can be performed according to the abovedescription information, such as outputting prompt information,intercepting the sharing information, etc.

Specifically, when the sharing information is the target sharinginformation, the prompt information is the first sharing information,the second sharing information, the description information, and aprocessing identifier. When the sharing information is a link address,the prompt information is the first sharing information corresponding tothe link address, content preview of the first sharing information, thesecond sharing information corresponds to the link address, contentpreview of the second sharing information, and the descriptioninformation. In addition, for the case where the sharing information isa link address, the user of the receiving terminal can also preview thecontent of the sharing information in a display window, which supportsthe user to selectively receive the sharing information in the displaywindow as needed. In addition, we know that the description informationis not updated in real time, that is to say, after the sending terminalobtains the description information, a corresponding status of thereceiving terminal may change because there is a time difference fromthe sending terminal preparing the sharing information to sending thefirst sharing information, for example, the available storage space ofthe receiving terminal obtained by the sending terminal duringinformation sharing is 300 MB, and the first sharing information is only200 MB. Therefore, the sending terminal sends the first sharinginformation, but when the first sharing information actually reaches thereceiving terminal, the receiving terminal's available storage space isonly 150 MB, so the receiving terminal can refuse to receive the firstsharing information according to the size of the target sharinginformation displayed in the description information, which is 200 MB.Referring to FIG. 25 , D6000 indicates the receiving terminal, D6001,D6002, and D6003 indicate chat records in a current chat window, andD6004 indicates a window which pops up when the receiving terminaldetects the first sharing information reaches but the available storagespace is insufficient, and provides an option whether to cancel toreceive the first sharing information. The user clicks “Yes” to cancelto receive the first sharing information.

In addition, the processing identifier is an identifier of a manner ofprocessing the first sharing information to obtain the second sharinginformation, which is convenient for the user of the receiving terminalto know how the second sharing information is obtained. The advantage ofsharing information in the form of a link address is that for certaincontent (such as documents), users can preview the content onlinewithout having to download it completely to know the specific content.In addition, the data size of the link address is very small and easy toshare relative to the target sharing information. The link address maybe a URL (Uniform Resource Location).

In addition, excepting the way of sharing the target sharing informationin the form of a link address, the target sharing information can alsobe shared in a form of a logo, which is essentially an image containinga hyperlink. The advantage of sharing information in the form of a logois that: it avoids a shortcoming of link addresses that cannot indicatedata types of the target sharing information. When sharing informationin the form of a logo, a specific logo can be provided for each datatype in the target sharing information, and the user of the receivingterminal can know which specific data types the shared content includes.In addition, the logos can be conventional data type logos, such as acommon music logo, video logo, document logo, etc. The logos can also bespecially designed, because in the target sharing information, thereexists many data types at the same time, it is very complicated todisplay the logo of each data type through an image. At this moment, itcan put the logo of each data type in a same circle, and represents thelogo of each data type with a fan-shaped area, and a size of eachfan-shaped area can represent a ratio of a data size of a correspondingdata type to a size of the target sharing information. Similarly, a sizeof each fan-shaped area can also be used to represent a ratio of thenumber of pieces of a corresponding data type (such as in a chat log,the number of voice messages and the number of image messages) to thetotal number of pieces of target sharing information.

In this embodiment, a corresponding prompt is given to the user of thereceiving terminal according to the description information in thesharing information, so that the user of the receiving terminal can knowwhether the sharing information has been processed, and a previewfunction is also provided to facilitate the user of the receivingterminal to browse the sharing information content without downloadingit, and can also selectively download required information as needed.The purpose of intelligent information sharing is realized.

In the embodiments, the information sharing method provided by theembodiments of the present application can detect whether information tobe shared meets preset rules, and send the information to be sharedaccording to a preset strategy in determining that the information to beshared meets the preset rules. The preset strategy may be sendinginformation to be shared through another application different from acurrent application, through another communication mode different from acurrent communication mode, or through another communication carddifferent from a current communication card. Among them, term “current”of the current application, the current communication mode, and thecurrent communication card refers to those which are currently in use,running in the foreground, in an active state, or configured or selectedby default, objects defined with the term “current” are different fromobjects those that are not used, running in the background, inactive, ornot configured or selected by default. Or, the preset strategy mayfurther include processing the information to be shared using processinginformation to obtain target sharing information, and then sending thetarget sharing information. The processing may be using filteringinformation to filter sthe information to be shared to obtain the targetsharing information. By filtering, those pieces of information that arenot suitable for sharing are filtered out, only those pieces ofinformation suitable for sharing can be shared. Or, those pieces ofinformation that is not suitable for sharing can be further processed.For example, it can compress and/or encrypt those pieces of informationthat are not suitable for sharing to make them suitable for sharing. Theprocessing may be using association information or relevant informationto process the information to be shared to obtain the target sharinginformation, and the association information may be a current mode ofthe receiving terminal, a current mode of the sending terminal, sharingrecords of the sending terminal, and/or sharing records of the receivingterminal, which avoids that the user of the receiving terminal receivesthe information to be shared whose data types is inconvenient for theuser of the receiving terminal to receive or the content of which cannotbe understood by the user of the receiving terminal. After processing,the target sharing information may be the same as the originalinformation to be shared. For example, after filtering, it is found thatthere is no information that is not suitable for sharing. The targetsharing information is thus the same as the original information to beshared. The target sharing information may be different from theoriginal information to be shared. Therefore, the information sharingmethod provided in the embodiments of the present application canfurther include determining whether the target sharing information isthe same as the original information to be shared. In the case that thetarget sharing information is the same as the original information to beshared, only the target sharing information is sent, and in the casethat the target sharing information is different from the originalinformation to be shared, the target sharing information and descriptioninformation related is sent, so that the receiving terminal outputs acorresponding prompt according to the description information.

In some embodiments, the preset strategy may include filtering theinformation to be shared using the filtering information, and then usingthe processing information to process the information after beingfiltered to make it suitable for sharing.

In summary, the information sharing method provided by the embodimentsof the present application solves some problems in the related art whensharing information by intelligently processing the information to beshared and sending the information to be shared, making informationsharing more intelligent, safer, more convenient, more effective and insome cases, saving users' costs.

The information sharing method provided in this embodiment of thepresent application may run on some terminal devices, including but notlimited to PCs (Personal Computers), smart phones, tablet computers,e-book readers, and MP3 (Moving Picture Experts Group Audio Layer III)players, MP4 (Moving Picture Experts Group Audio Layer IV) players,portable computers and other mobile terminal devices with displayfunctions.

Please refer to FIG. 26 , which is a schematic diagram of a hardwareoperating environment of a device running the solutions of theembodiments of the present application.

As shown in FIG. 26 , the device 10 may include a processor 1001, suchas a CPU, a network interface 1004, a user interface 1003, a memory1005, and a communication bus 1002. Among them, the communication bus1002 is used to implement connection and communication between thesecomponents. The user interface 1003 may include a display, an input unitsuch as a keyboard, and the user interface 1003 may optionally include astandard wired interface and a wireless interface. The network interface1004 may optionally include a standard wired interface and a wirelessinterface (such as a WI-FI interface). The memory 1005 may be ahigh-speed RAM memory or a stable memory (non-volatile memory), such asa disk memory. The memory 1005 may optionally be a storage deviceindependent of the foregoing processor 1001.

In some embodiments, the device 10 may further include a camera, an RF(Radio Frequency) circuit, a sensor, an audio circuit, a WiFi module,and so on. Among them, the sensor may be such as a light sensor, amotion sensor or another type sensor. Specifically, the light sensor mayinclude an ambient light sensor and a proximity sensor, the ambientlight sensor may adjust a brightness of a display screen according tothe brightness of the ambient light, and the proximity sensor may turnoff the display screen and/or a backlight when the mobile terminal movesto the ear. As a type of motion sensor, the gravity acceleration sensorcan detect the magnitude of acceleration in various directions(generally three axes), and can detect the magnitude and direction ofgravity when at rest. It can be used for applications that recognize theposture of mobile terminals (such as horizontal and vertical screenswitching, related games, magnetometer posture calibration), vibrationrecognition related functions (such as pedometer, tap), etc. Of course,the mobile terminal can also be configured with other sensors such asgyroscopes, barometers, hygrometers, thermometers, infrared sensors,etc., which are no longer described.

Those skilled in the art may understand that the structure shown in FIG.26 does not constitute a limitation on the device 10, and the device 10may include more or less components than shown, or a combination ofcertain components, or be arranged in a different component layout.

As shown in FIG. 26 , the memory 1005, which is a non-volatile computerstorage medium, may store an operating system, a network communicationmodule, a user interface module, and an information sharing program.

In the device 10 shown in FIG. 26 , the network interface 1004 is mainlyused to connect to a back-end server 20 to perform data communicationwith the server 20. The user interface 1003 is mainly used to connect toa client (user side) and perform data communication with the client. Theprocessor 1001 can be used to call the information sharing programstored in the memory 1005 and execute at least one of the informationsharing methods as described above. The device 10 can act as a sendingterminal or a receiving terminal when at least one of the informationsharing methods as described above is carried out.

A specific implementation manner of the processor 1001 of the device 10of the present application running the information sharing programstored in the memory 1005 and executing at least one of the informationsharing method can make reference to the foregoing first to twenty-thirdembodiments, and details of which are not described herein again.

Based on the above disclosure, the present application also provides adevice including a memory, a processor, and an information sharingprogram stored on the memory and executable on the processor. Theinformation sharing program is executable by the processor to realizethe above information sharing method.

Based on the above disclosure, the present application also provides anon-volatile computer-readable storage medium storing an informationsharing program, and the information sharing program is executable bythe processor to implement the above information sharing method.

The embodiments of the device for sharing information and thecomputer-readable storage medium of the present application include allthe technical features of the above embodiments of the informationsharing method. The deployed contents and description are basically thesame as those of the above embodiments of the information sharing methodand are not described here again.

An embodiment of the present application further provides a computerprogram product, where the computer program product includes computerprogram code, and when the computer program code runs on a computer, thecomputer is caused to perform the method described in various possibleimplementation manners above.

An embodiment of the present application further provides a chip,including a memory and a processor, where the memory is configured tostore a computer program, and the processor is configured to call andrun the computer program from the memory, so that a device equipped withthe chip performs the method described in the various possibleembodiments above.

It should be understood that, in the present disclosure, the purpose ofusing labels such as S10, S20 before each of the operations is to morebriefly and clearly describe the corresponding contents, the labels doesnot constitute a substantial restrictions on an order of the operations.In fact, those skilled in the art may perform the operations accordingto a sequence as needed, such as performing the operation S20 before theoperation S10. The various orders of performing the operations should bewithin the scope of protection of this application.

It should be understood that although the terms first, second, third,etc., may be used herein to describe various types of information, theinformation should not be limited to these terms. These terms are onlyused to distinguish the same type of information from each other. Forexample, without departing from the scope of this article, a firstinformation may also be referred to as a second information, andsimilarly, a second information may also be referred to as a firstinformation. Depending on the context, the word “if” as used herein maybe interpreted as “when” or “at the moment” or “responsive todetermination”. Furthermore, as used herein, the singular forms “a”,“an”, and “the” are intended to include the plural forms as well, unlessthe context indicates otherwise. The terms “or” and “and/or” as usedherein are to be interpreted as inclusive or mean any one or anycombination. Therefore, “A, B or C” or “A, B and/or C” means “any of thefollowing: A, B, C, A and B, A and C, B and C, A and B and C”. Theexception to this definition only occurs when a combination of elements,functions, operations, or operations are inherently mutually exclusivein certain ways.

It should be understood that although the operations in the flowchart inthe above embodiment are displayed sequentially according to the arrows,the operations are not necessarily executed in the order indicated bythe arrows. Unless there is a clear description in this article, theexecution of these operations is not strictly limited in order, and theycan be executed in other orders. Moreover, at least some of theoperations in the figures may include multiple sub-operations ormultiple stages. Those sub-operations or stages are not necessarilyexecuted at the same time, but may be executed at different times, andthe order of executing those sub-operations or stages is not necessarilysequential. Instead, those sub-operations or stages can be executed inturn or alternately with at least a part of other operations orsub-operations or stages of other operations.

It should be noted that in this article, the terms “include”, “comprise”or any other variant thereof are intended to cover non-exclusiveinclusion, so that a process, method, article or system that includes aseries of elements includes not only those elements, but also includesother elements that are not explicitly listed, or include elementsinherent to this process, method, article, or system. Without morerestrictions, the element defined by the sentence “include a . . . ”does not exclude that there are other identical elements in the process,method, article or system that includes the element. In addition, thecomponents, features, and elements having a same name in differentembodiments may have a same meaning, or may have different meanings, andthe specific meaning thereof need to be determined by the explanation inthe specific embodiment or further in conjunction with the contexts inthe specific embodiment.

The sequence numbers of the above embodiments of the present applicationare for description only, and do not represent the advantages anddisadvantages of the embodiments.

Through the description of the above embodiments, those skilled in theart can clearly understand that the methods in the above embodiments canbe implemented by means of software plus a necessary general hardwareplatform, and of course, can also be implemented by hardware, but inmany cases the former is better. Based on this understanding, thetechnical solution of the present application can be embodied in theform of a software product in essence or part that contributes to theexisting technology, and the computer software product is stored in astorage medium (such as a ROM/RAM as described above, a magnetic disk,an optical disk), including several instructions to make a terminaldevice (which can be a mobile phone, a computer, a server, an airconditioner, or a network equipment, etc.) to perform the methoddescribed in each embodiment of the present application.

The above are only the preferred embodiments of the present application,and do not limit the scope of the patent of the present application. Anyequivalent structure or equivalent process transformation made by thedescription and drawings of this application, or directly or indirectlyused in other related technical fields, is included in the scope ofpatent protection in this application.

What is claimed is:
 1. An information sharing method, comprising: S10:obtaining information to be shared that a sending terminal wants toshare to a receiving terminal; S20: detecting whether the information tobe shared meets a preset rule, the preset rule comprising: theinformation meeting a first preset condition, wherein the information tobe shared meeting the first preset condition comprises the informationto be shared comprising at least one preset data type; and S30: indetermining that the information to be shared meets the preset rule,sending the information according to a preset strategy, comprising:performing data type conversion on the information to be shared, andproviding editing functions after the conversion is completed.
 2. Aninformation sharing method, comprising: A10: obtaining processinginformation, wherein the processing information is obtained from asending terminal and/or provided by a receiving terminal; A11:processing information to be shared according to the processinginformation to obtain target sharing information, wherein the operationA11 comprises: performing data type conversion on the information to beshared, and providing editing functions after the conversion iscompleted; D11: detecting whether the target sharing information is thesame as first sharing information, wherein the first sharing informationis original information to be shared; D12: in responding to adetermination that the target sharing information is different from theoriginal information to be shared, obtaining description informationcorresponding to the target sharing information, and sending the targetsharing information and the description information to the receivingterminal; and/or, D13: in responding to a determination that the firstsharing information is the same as the original information to beshared, only sending the target information to the receiving terminal.3. The method according to claim 2, wherein before the operation A10 orin the operation A11, the method further comprises: processing a pieceof information to be shared that does not meet a preset rule or asharing condition according to a preset strategy, the preset strategycomprising at least one of the following: filtering out the piece ofinformation, hiding the piece of information, setting the piece ofinformation to an unselectable state, displaying a mark indicatingsharing of the piece of the information not supported, and outputtingprompt information; and/or, before the operation A11, the method furthercomprises: selecting the information to be shared according to aselection operation, the selection operation comprising at least one ofthe following: voice controlling operation, selection operation on aninterface, preset touch gesture on a screen, and preset remote controlgesture.
 4. The method according to claim 2, wherein before operationA10 or in the operation A11, the method further comprises: B10:obtaining filtering information; and B11: processing the information tobe shared according to the filtering information.
 5. The methodaccording to claim 4, wherein the filtering information comprises firsttype filtering information, the first type filtering information isobtained from the sending terminal; and/or, the filtering informationcomprises second type filtering information the second type filteringinformation is provided by the receiving terminal.
 6. The methodaccording to claim 5, wherein the first type filtering informationcomprises at least one of the following: authentication information of acurrent user of the sending terminal, permission information of theinformation to be shared, available traffic of the sending terminal,current network speed of the sending terminal, and a current mode of thesending terminal; and/or the method further comprises at least one ofthe following: in determining that the authentication information of thecurrent user of the sending terminal meets a preset requirement,performing operation B11; in determining that the permission informationof the information to be shared meets another preset requirement,performing operation B11; and in determining that available trafficand/or a current network speed of the sending terminal does not meet apreset sending condition, and/or, in determining that the sendingterminal is in a preset mode, processing the information to be sharedaccording to a preset rule, wherein the preset mode comprises at leastone of the following: a profile mode, an intelligent mode, a securitymode, a guest mode, a child mode, and an elderly mode.
 7. The methodaccording to claim 5, further comprising: obtaining at least one pieceof relevant information for selecting information to be shared, therelevant information defining requirements comprising at least one ofdata type requirement, file type requirement, presentation formrequirement, content requirement, and display location informationrequirement; and automatically selecting information to be shared thatmeets the requirements according to the relevant information.
 8. Themethod according to claim 2, wherein before operation A10, the methodfurther comprises: determining whether a current information selectionmode is a smart mode; and in determining that the current informationselection mode is the smart mode, performing operation A10.
 9. Themethod according to claim 2, wherein the processing information isassociation information of the information to be shared, and theassociation information comprises at least one of the following: acurrent mode of the receiving terminal or a current mode of the sendingterminal, sharing records of the sending terminal and/or sharing recordsof the receiving terminal.
 10. The method according to claim 2, whereinbefore operation of sending the target sharing information anddescription information, the method further comprises: determiningwhether a current mode of the receiving terminal is a preset mode; andin determining that the current mode of the receiving terminal is apreset mode, sending the target sharing information and descriptioninformation.
 11. The method according to claim 2, wherein thedescription information comprises at least one of the following: a datatype of the target sharing information, a file format of the targetsharing information, a size of the target sharing information, timeinformation for processing the first sharing information, and executionbody information for processing the first sharing information.
 12. Themethod according to claim 2, wherein the data type conversion parameterscomprise at least one of the following: a data type and/or a file formatof the information to be shared, a data type and/or a file format ofprocessed information to be shared, time requirements, spacerequirements; and/or, the data type conversion parameters are determinedaccording to selection operations of a user or system settings, whereinthe time requirements are configured for selecting a data typeconversion of a least time-consuming, and the space requirements areconfigured for minimizing a space occupied by the target sharinginformation.
 13. The method according to claim 2, wherein operation A12further comprises: in determining that there is a piece of informationin the target sharing information that cannot be shared h a currentfirst application, utilizing a second application different from thecurrent first application to share the piece of information.
 14. Themethod according to claim 2, wherein operation D10 comprises: D101:obtaining the first sharing information; D102: obtaining processinginformation corresponding to the first sharing information, anddetecting whether the processing information meets preset conditions;D103: in determining that the processing information corresponding tothe first sharing information does not meet preset conditions,determining whether an execution body is the sending terminal; and D104:in determining that the execution body is not the sending terminal but aserver, taking the first sharing information as the target sharinginformation, thereby the execution body performs correspondingprocessing on the target sharing information according to the processinginformation.
 15. The method according to claim 2, wherein the method isexecuted by a server, and the target sharing information comprises atleast one of the following: original information to be shared, processedinformation to be shared, a link address, and a logo.
 16. The methodaccording to claim 2, wherein the processing information comprises afile type; and processing the information to be shared comprisesperforming a file format conversion.
 17. The method according to claim2, wherein the processing information is association information of theinformation to be shared, and the association information comprises atleast one of the following: a current mode of the receiving terminal ora current mode of the sending terminal, sharing records of the sendingterminal and/or sharing records of the receiving terminal.
 18. Themethod according to claim 2, wherein operation of processing informationto be shared comprises: performing the data type conversion comprisesconverting from a first data type to a second data type different fromthe first data type.
 19. A device, comprising a memory, a processor, andan information sharing program stored on the memory and executable onthe processor, when the information sharing program is executed by theprocessor, the information sharing method according to claim 2 iscarried out.
 20. A non-volatile computer-readable storage medium,wherein a computer program is stored on the non-volatilecomputer-readable storage medium, and when the computer program isexecuted by a processor, the information sharing method according toclaim 2 is carried out.