CN106341390B - A kind of control method and system that information is propagated - Google Patents

A kind of control method and system that information is propagated Download PDF

Info

Publication number
CN106341390B
CN106341390B CN201610676097.7A CN201610676097A CN106341390B CN 106341390 B CN106341390 B CN 106341390B CN 201610676097 A CN201610676097 A CN 201610676097A CN 106341390 B CN106341390 B CN 106341390B
Authority
CN
China
Prior art keywords
information data
information
control cooling
data
authentication mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610676097.7A
Other languages
Chinese (zh)
Other versions
CN106341390A (en
Inventor
高金铎
王哲
高峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shendun Electronic Technology Co Ltd
Original Assignee
Shenzhen Shendun Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shendun Electronic Technology Co Ltd filed Critical Shenzhen Shendun Electronic Technology Co Ltd
Priority to CN201610676097.7A priority Critical patent/CN106341390B/en
Publication of CN106341390A publication Critical patent/CN106341390A/en
Application granted granted Critical
Publication of CN106341390B publication Critical patent/CN106341390B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

The present invention is suitable for field of information security technology, provides a kind of control method and system that information is propagated, comprising: receive information data and corresponding information encryption indicator;Judge that the Control Cooling to information data, the information encryption indicator are set before sending the information data by transmitting terminal according to the information encryption indicator;According to the Control Cooling of the information data, the information data is handled, comprising: if the Control Cooling of the information data is the first kind, authentication mode when using identity registration is verified, to obtain the processing authority to the information data.In the present invention, the controllable propagation of information security may be implemented to the control of receiving end information processing permission by transmitting terminal.

Description

A kind of control method and system that information is propagated
Technical field
The invention belongs to control methods and system that field of information security technology more particularly to a kind of information are propagated.
Background technique
Information communication process can easily describe are as follows: information source (source) → channel (the channel) → stay of two nights (sink).Letter Source is the cradle of information, and the stay of two nights is the arrival of information, and the channel between information source and the stay of two nights is called channel.
In existing information dissemination system, there is the demand for control propagated information, for example, existing mail, i.e. In the internet information spreadings system such as Shi Tongxin, it often may require that and transmit some secrets or privacy informations, but information receiving end Forwarding, intentionally forwarding or situations such as the mailbox of information receiving end is invaded, instant messaging is by steal-number accidentally, can all lead to information Uncontrolled diffusion, to generate information security issue.
Existing information dissemination method and system, information source are only capable of specifying the stay of two nights, after can not reaching the stay of two nights to information The stay of two nights carries out control management to the processing mode of information, to will lead to the safety problem of information propagation.
Summary of the invention
The embodiment of the present invention is intended to provide a kind of control method and system that information is propagated, to solve information source in the prior art The stay of two nights carries out control management to the processing mode of information after the stay of two nights can not be reached to information, and caused information propagates safety problem.
In order to solve the above-mentioned technical problem, in a first aspect, the embodiment of the invention provides the controlling parties that a kind of information is propagated Method, comprising:
Receive information data and corresponding information encryption indicator;
Judge that the Control Cooling of information data, the information encryption indicator are existed by transmitting terminal according to the information encryption indicator It is set before sending the information data;
According to the Control Cooling of the information data, the information data is handled, comprising:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is tested Card, to obtain the processing authority to the information data.
Further, identity registration is carried out by preset authentication mode, the authentication mode includes character Any one authentication mode in string password, fingerprint, face or iris.
Further, if the Control Cooling of the information data is Second Type, after having shown the information data, Delete operation is executed to the information data.
Further, before showing the information data, content shielding is carried out to the information data.
Further, when being replied to the information data or forwarding operation, to the information data replied or forwarded Add information encryption indicator.
Second aspect, the embodiment of the invention provides the control systems that a kind of information is propagated, comprising:
Receiving unit, for receiving information data and corresponding information encryption indicator;
Judgement unit, for judging the Control Cooling of the information data, the information according to the information encryption indicator Encryption indicator is set before sending the information data by transmitting terminal;
Processing unit is handled the information data for the Control Cooling according to the information data, comprising:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is tested Card, to obtain the processing authority to the information data.
Further, the system also includes identity registration units, for carrying out body by preset authentication mode Part registration, the authentication mode includes any one authentication side in character string password, fingerprint, face or iris Formula.
Further, the processing unit is also used to, if the Control Cooling of the information data is Second Type, is being shown After the complete information data, delete operation is executed to the information data.
Further, the system also includes screen units, are used for before showing the information data, to the information Data carry out content shielding.
Further, the processing unit is also used to, when being replied to the information data or forwarding operation, to return Multiple or forwarding information data adds information encryption indicator.
In an embodiment of the present invention, transmitting terminal sends setting information encryption indicator before information data, and with information data It is sent to receiving end together, receiving end is handled information data according to the information encryption indicator, and information source is being believed Breath reaches be the stay of two nights after, can also carry out control management to the information processing data mode of the stay of two nights, ensure that information security is controllable It propagates.
Detailed description of the invention
Fig. 1 is the implementation flow chart for the control method that a kind of information provided in an embodiment of the present invention is propagated;
Fig. 2 is the embodiment schematic diagram that the present invention is applied to mobile phone short message broadcasting system;
Fig. 3 is the embodiment schematic diagram that the present invention is applied to mailing system;
Fig. 4 is the embodiment schematic diagram that the present invention is applied to instantaneous communication system;
Fig. 5 is the structural block diagram for the control system that a kind of information provided in an embodiment of the present invention is propagated.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is described in further detail.It should be appreciated that described herein, specific examples are only used to explain the present invention, and It is not used in the restriction present invention.
Receiving end of the embodiment of the present invention receives information data and corresponding information encryption indicator;It is encrypted and is marked according to the information Will judges that the Control Cooling of information data, the information encryption indicator are set before sending the information data by transmitting terminal;Root According to the Control Cooling of the information data, the information data is handled, comprising: if the Control Cooling of the information data For the first kind, authentication mode when using identity registration is verified, to obtain the disposal right to the information data Limit.
Fig. 1 shows the implementation flow chart for the control method that a kind of information provided in an embodiment of the present invention is propagated, and is described in detail such as Under:
In S101, information data and corresponding information encryption indicator are received.
The reception information data and corresponding information encryption indicator refer to that receiving end receives the information of transmitting terminal sending Data simultaneously, can also receive the information encryption indicator corresponding with information data of transmitting terminal sending.And corresponding information encryption Indicate, refer to and information encryption indicator corresponding to every kind of Control Cooling of information data is first preset as transmitting terminal and receiving end, For the information data that needs are sent, after transmitting terminal determines the corresponding Control Cooling of the information data, obtain and the control class The corresponding information encryption indicator of type, and the information encryption indicator is sent to receiving end together with information data.
For the ease of identification, corresponding to every kind of Control Cooling of presupposed information data while information encryption indicator, The mark of information encrypted characters corresponding to every kind of information encryption indicator is preset in transmitting terminal and receiving end, and information encrypted characters mark can Any character or pattern for selecting transmitting terminal and receiving end all to support indicate.It is marked by information data Control Cooling and information encryption The corresponding relationship of corresponding relationship and information encryption indicator and information the encrypted characters mark of will, it can be deduced that information data control The corresponding relationship of type and information encrypted characters mark is identified by information encrypted characters to distinguish different information data controls Type processed.Indicate different information encrypted characters marks, using finger, scissors and page such as to distinguish corresponding different information Data Control Cooling.
In S102, the Control Cooling of information data, the information encryption indicator are judged according to the information encryption indicator It is set before sending the information data by transmitting terminal.
The Control Cooling that information data is judged according to the information encryption indicator, refers to that receiving end is receiving letter After encryption for information mark, according to the information data Control Cooling and information encryption indicator corresponding relationship preset, information data is judged Control Cooling.
In S103, according to the Control Cooling of the information data, the information data is handled, comprising: if institute The Control Cooling for stating information data is the first kind, and authentication mode when using identity registration is verified, with acquisition pair The processing authority of the information data.
The Control Cooling according to the information data, handles the information data, including three kinds of situations:
If 1, the Control Cooling of the information data is the first kind.Receiving end uses authentication side when identity registration Formula is verified, ability reading information data after being verified, and is obtained to information data reply, deletion, forwarding and return Processing authority.Verifying is not by being unable to reading information data then.
It is described using identity registration when authentication mode carry out verifying and refer to:
Identity registration is carried out by preset authentication mode, the authentication mode includes character string password, refers to Any one receiving device in line, face or iris supports authentication mode.
If 2, the Control Cooling of the information data is Second Type, after having shown the information data, to described Information data executes delete operation.
Refer to that receiving end can only obtain the processing authority of reply and deletion to the data information data of Second Type, does not delete Transmitting terminal can not exit the spreading tool before information data, and system does not support Copy Info, to avoid weight after the duplication of receiving end New edited message is sent.
If 3, the Control Cooling of the information data is third type, receiving end, which obtains, replys information data, deletes, turning Hair and the processing authority returned.
Above-mentioned three kinds of situations all follow the principles when handling information data:
When carrying out reply or forward process operation to the information data, letter will be added to the information data replied or forwarded Encryption for information mark.
It replys or when forwarding, the transmitting terminal that receiving end is propagated as new primary information, receiving end is according to oneself wish Information encryption indicator is added to the information data propagated herein, at the information data to control the receiving end that new primary information is propagated Permission is managed, so that new primary information propagation is also controllable.
The Control Cooling according to the information data, handles the information data, further includes:
Before showing the information data, content shielding is carried out to the information data.
Content shielding refers to, after judging the Control Cooling of information data, information data is the first kind or the When two type information datas, receiving end carries out content shielding before showing the information data, to the information data, works as letter When breath data are third type, receiving end automatic display information data portions contents.In conventional information broadcasting system, Yi Xiexin Broadcasting system can automatic display information partial content (will be in information list in such as SMS before information data is read for breath The front two row content of middle automatic display information), the information content can be revealed in this way, causes information security issue, shielded by content Information security issue caused by being leaked before reading to avoid information.
Fig. 2, Fig. 3 corresponding from Fig. 4 are the part preferred embodiments for applying the present invention to different information dissemination systems, are answered When it is realized that, application range of the present invention includes but is not limited to system described in the preferred embodiment of the present invention.
It is the preferred embodiment for applying the present invention to mobile phone short message broadcasting system, in detail based on the corresponding embodiment of Fig. 2 It states as follows:
1. information data is edited for transmitting terminal in Fig. 2, and sets corresponding information encryption indicator;2. being transmitting terminal The process of receiving end is sent to using the information data of this editor as third type information data, as third type information number According to when, transmitting terminal has added a mark, this is identified as page in this instance.Receiving end need to only click mark page and can read This message data content, and have to the information data of this mark and reply, delete, forwarding, the information processing permission of return.As 5. It is exactly the forwarding again to this information data;3. being that information data is sent to reception by transmitting terminal The process at end, this time information data can be read after needing to verify identity, and add mark finger.For the sake of information security, add The information of this mark will not show content in receiving end.Receiving end needs to click mark finger after there is this mark, clicks mark hand After finger, concrete mode when system can be according to receiving end identity registration provides corresponding authentication interface, such as inputs cipher word Symbol string, scanning fingerprint etc..After authentication passes through, which could completely be shown for reading, and to the letter of this mark Ceasing data has reply, deletes, forwarding, the information processing permission of return.If authentication does not pass through, this information data be will be unable to Display.In figure process 6., 7. show receiving end after reading information data to the different disposal method of the information data, 6. table Show that also intended receiver must verify identity after forwarding for receiving end.7. informing must delete after recipient sees.4. showing hair Sending end is not intended to the propagation of this information data repeatedly to be spread, and is sent to reception for information data as Second Type information data The process at end adds scissors mark.The information for adding scissors to identify also does not show content in information list, and receiving end is needed to click mark All information data content can be shown after knowing scissors.4. process shows that the information data must delete after reading, otherwise only Can exit the spreading tool after either deleting to transmitting terminal return information.4. process does not delete this information before, it is System does not support Copy Info, sends to avoid message is updated after the duplication of receiving end.
As another preferred embodiment, it is based on the corresponding embodiment of Fig. 3, is apply the present invention to mailing system excellent Embodiment is selected, details are as follows:
A is transmitting terminal editing interface in Fig. 3, there is " label " operation button in figure, means and adds mark to editor's information It is realized by it.1. A in Fig. 3, process set Second Type information data for mail.Operating process are as follows: editor's Mail Contents, Click " label " button, label list in selection " being deleted after readding " mark, then identify scissors be shown in mark button in, point Percussion is sent;2. to set first kind information data process for mail.Operating process are as follows: editor's Mail Contents click " mark Note " button, selects " encryption " mark in label list, then identifies finger and is shown in label button, clicks transmission;3. being Surface mail transmission flow in first kind information data, that is, the present embodiment.Operating process are as follows: editor's Mail Contents click directly on " transmission " button (before each mail editor, label button shows " label ", is defaulted as surface mail), completes mail and sends, and Surface mail mark page is shown in label button frame afterwards.
B is that receiving end receives the list interface after mail in Fig. 3.It can be seen that the mail that A process is shown in Fig. 3 is all by sending out Sending end 1 is sent to receiving end, thus one side of receiving end show respectively " being deleted after readding " from transmitting terminal 1, " encryption " and Surface mail, and mail piece identifiers are also placed in letter list as a part of passed content.When Mail Contents are consulted in receiving end, The identification pattern of every mail need to be only clicked, system provides corresponding reading operations interface according to the difference of mark, for Mail Contents are checked in receiving end.It, can be because of identity if clicking the non-registered receiving end of mail piece identifiers by taking " encryption " mail as an example Verifying can not only be read.
It is the preferred embodiment for applying the present invention to instantaneous communication system based on the corresponding embodiment of Fig. 4, is described in detail such as Under:
Step 2. small red informing Xiao Ming in A in Fig. 4: " contract signed " simultaneously encrypts, text information B Xiao Ming in Fig. 4 2. ' place's display encryption is held, content can not be directly viewable, can read after needing Xiao Ming to verify identity.And Fig. 4 B 1. ' Xiao Ming described in 1. " the first and second the third fourth penta oneself the pungent nonyl last of the ten Heavenly stems in heptan " are located directly because being general information in first kind information data i.e. the present embodiment in Fig. 4 A Connect display.And the voice messaging 6. sent, 6. ' place can be heard after also needing verifying identity;5. ' it is transmission picture, the picture mark It is denoted as " deleting after seeing ", so cannot directly display at 5. place, need to click mark scissors can be checked, be done at deletion after finishing watching Reason, otherwise cannot exit the instantaneous communication system.In instantaneous communication system, all multimedia messages (i.e. text, voice, figures Picture, video etc.) make Unified Form processing.
In a preferred embodiment of the invention, by being arranged, when sending information data, transmission is set pair transmitting terminal simultaneously The information encryption indicator answered limits the information reading and processing authority of receiving end, receiving end by identification information encryption indicator come Decide whether the partial content for showing information in advance, authorizes receiving end different information processing permissions, also, identifying first When identity verification information, receiving end, which must carry out authentication, to read information.Due to the reading to information Permission limitation has been carried out with processing, and has added the authentication of encryption information, so that the propagation of information is more safe and reliable, and The control of relevant operation in the processing authority limitation of information can be set by the information encryption indicator of transmitting terminal, but also Information, which is propagated, gets rid of the limitation that original information source is unable to control sending information, so that information propagation is more controllable.By to letter The reading and processing authority for ceasing transmitting terminal and receiving end coordinated management information keep the propagation of information more safe and controllable.
For the control method that information described in foregoing embodiments is propagated, Fig. 5 shows letter provided in an embodiment of the present invention Cease the structural block diagram for the control system propagated.
Referring to Fig. 5, which includes:
Receiving unit 51, for receiving information data and corresponding information encryption indicator;
Judgement unit 52, for judging the Control Cooling of the information data, the letter according to the information encryption indicator Encryption for information mark is set before sending the information data by transmitting terminal;
Processing unit 53 is handled the information data for the Control Cooling according to the information data, packet It includes:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is tested Card, to obtain the processing authority to the information data.
Identity registration unit, for carrying out identity registration, the authentication mode by preset authentication mode Including any one authentication mode in character string password, fingerprint, face or iris.
Optionally, the judgement unit 52 includes:
If the Control Cooling of the information data is Second Type, after having shown the information data, to the letter It ceases data and executes delete operation.
Optionally, the processing unit 53 includes:
Screen unit, for carrying out content shielding to the information data before showing the information data.
Optionally, the processing unit 53 is also used to:
When being replied to the information data or forwarding operation, the information data addition information replied or forwarded is added Secret mark will.
Embodiment described above is only used for illustrate technical solution of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these are repaired Change or replace, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (6)

1. the control method that a kind of information is propagated characterized by comprising
Receive information data and corresponding information encryption indicator;
Judge that the Control Cooling of information data, the information encryption indicator are being sent by transmitting terminal according to the information encryption indicator It is set before the information data;
According to the Control Cooling of the information data, the information data is handled, including;
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is verified, To obtain the processing authority to the information data;
If the Control Cooling of the information data is Second Type, after having shown the information data, to the Information Number According to execution delete operation;
If the Control Cooling of the information data is third type, the processing authority to the information data is obtained;
After the reception information data and corresponding information encryption indicator, further includes:
If information data is the first kind or Second Type information data, receiving end is before showing the information data, to institute It states information data and carries out content shielding;
If information data is third type, receiving end automatic display information data portions contents.
2. the method as described in claim 1, which is characterized in that receive information data and corresponding information encryption indicator it Before, the method also includes:
Identity registration is carried out by preset authentication mode, the authentication mode includes character string password, fingerprint, people Any one authentication mode in face or iris.
3. the method as described in claim 1, which is characterized in that the Control Cooling according to the information data, to described Information data is handled further include:
When being replied to the information data or forwarding operation, to the information data addition information encryption mark replied or forwarded Will.
4. the control system that a kind of information is propagated characterized by comprising
Receiving unit, for receiving information data and corresponding information encryption indicator;
Judgement unit, for judging the Control Cooling of the information data, the information encryption according to the information encryption indicator Mark is set before sending the information data by transmitting terminal;
Processing unit is handled the information data for the Control Cooling according to the information data, comprising:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is verified, To obtain the processing authority to the information data;
If the Control Cooling of the information data is Second Type, after having shown the information data, to the Information Number According to execution delete operation;
If the Control Cooling of the information data is third type, the processing authority to the information data is obtained;
Screen unit, if being the first kind or Second Type information data for information data, receiving end is showing the information Before data, content shielding is carried out to the information data;
If information data is third type, receiving end automatic display information data portions contents.
5. system as claimed in claim 4, which is characterized in that the system also includes:
Identity registration unit, for carrying out identity registration by preset authentication mode, the authentication mode includes Any one authentication mode in character string password, fingerprint, face or iris.
6. system as claimed in claim 4, which is characterized in that the processing unit is also used to:
When being replied to the information data or forwarding operation, to the information data addition information encryption mark replied or forwarded Will.
CN201610676097.7A 2016-08-16 2016-08-16 A kind of control method and system that information is propagated Expired - Fee Related CN106341390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610676097.7A CN106341390B (en) 2016-08-16 2016-08-16 A kind of control method and system that information is propagated

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610676097.7A CN106341390B (en) 2016-08-16 2016-08-16 A kind of control method and system that information is propagated

Publications (2)

Publication Number Publication Date
CN106341390A CN106341390A (en) 2017-01-18
CN106341390B true CN106341390B (en) 2019-06-07

Family

ID=57824964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610676097.7A Expired - Fee Related CN106341390B (en) 2016-08-16 2016-08-16 A kind of control method and system that information is propagated

Country Status (1)

Country Link
CN (1) CN106341390B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110282226B (en) * 2019-05-31 2021-10-26 佛山星乔电子科技有限公司 Method and system for customizing traceability content in personalized mode based on display packaging box
CN110971608A (en) * 2019-12-06 2020-04-07 成都卫士通信息产业股份有限公司 Information processing method, device and system and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848944A (en) * 2005-04-05 2006-10-18 华为技术有限公司 IPTV system, enciphered digital programme issuing and watching method
CN101150531A (en) * 2006-09-21 2008-03-26 华为技术有限公司 System and method for message intercommunication
CN101179767A (en) * 2007-12-13 2008-05-14 深圳华为通信技术有限公司 Multimedia information limitation operation method, transmitting terminal, receiving terminal and system
CN101944168A (en) * 2009-07-09 2011-01-12 精品科技股份有限公司 Electronic file authority control and management system
CN103095642A (en) * 2011-10-27 2013-05-08 中兴通讯股份有限公司 Multi-media messaging method and multi-media messaging method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848944A (en) * 2005-04-05 2006-10-18 华为技术有限公司 IPTV system, enciphered digital programme issuing and watching method
CN101150531A (en) * 2006-09-21 2008-03-26 华为技术有限公司 System and method for message intercommunication
CN101179767A (en) * 2007-12-13 2008-05-14 深圳华为通信技术有限公司 Multimedia information limitation operation method, transmitting terminal, receiving terminal and system
CN101944168A (en) * 2009-07-09 2011-01-12 精品科技股份有限公司 Electronic file authority control and management system
CN103095642A (en) * 2011-10-27 2013-05-08 中兴通讯股份有限公司 Multi-media messaging method and multi-media messaging method

Also Published As

Publication number Publication date
CN106341390A (en) 2017-01-18

Similar Documents

Publication Publication Date Title
JP7266536B2 (en) Encryption of cloud-based data
US9590949B2 (en) Confidential message exchange using benign, context-aware cover message generation
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
KR20160009569A (en) System and method for tracking sms messages
CN105227570B (en) A kind of safe e-mail system of integrated campaign
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN107666395A (en) One population file management method, user terminal, group chat system
CN106341390B (en) A kind of control method and system that information is propagated
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
CN105281897A (en) File encryption method and device and file decryption method and device
CN104394064A (en) Novel method and system for limiting forwarding in email transfer
CN113472519A (en) File security sharing method based on instant messaging user side
CN108540374B (en) Information processing method, device, equipment and storage medium based on instant messaging
CN106254226A (en) A kind of information synchronization method and device
CN101420430B (en) Methods and apparatus for information security protection
CN111865764B (en) Customer service message processing system and method based on third-party public platform
CN104394065A (en) Destroy-after-reading system and method of novel email system
CN201623859U (en) System for encrypting short messages through mobile phone terminal
KR101644070B1 (en) Email service method and system for mobile
CN107911368A (en) A kind of Transmission system and its implementation destroyed by fire automatically based on encryption message
US11777952B2 (en) Tracking and securing electronic messages using an embedded identifier
KR102146493B1 (en) Secure Communication System
Onwuzurike et al. POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps
CN106685634A (en) Confidential information transmitting method and device for public platform client
CN113886858A (en) Important information desensitization system based on mobile phone bottom layer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190607

Termination date: 20210816