CN106341390B - A kind of control method and system that information is propagated - Google Patents
A kind of control method and system that information is propagated Download PDFInfo
- Publication number
- CN106341390B CN106341390B CN201610676097.7A CN201610676097A CN106341390B CN 106341390 B CN106341390 B CN 106341390B CN 201610676097 A CN201610676097 A CN 201610676097A CN 106341390 B CN106341390 B CN 106341390B
- Authority
- CN
- China
- Prior art keywords
- information data
- information
- control cooling
- data
- authentication mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Abstract
The present invention is suitable for field of information security technology, provides a kind of control method and system that information is propagated, comprising: receive information data and corresponding information encryption indicator;Judge that the Control Cooling to information data, the information encryption indicator are set before sending the information data by transmitting terminal according to the information encryption indicator;According to the Control Cooling of the information data, the information data is handled, comprising: if the Control Cooling of the information data is the first kind, authentication mode when using identity registration is verified, to obtain the processing authority to the information data.In the present invention, the controllable propagation of information security may be implemented to the control of receiving end information processing permission by transmitting terminal.
Description
Technical field
The invention belongs to control methods and system that field of information security technology more particularly to a kind of information are propagated.
Background technique
Information communication process can easily describe are as follows: information source (source) → channel (the channel) → stay of two nights (sink).Letter
Source is the cradle of information, and the stay of two nights is the arrival of information, and the channel between information source and the stay of two nights is called channel.
In existing information dissemination system, there is the demand for control propagated information, for example, existing mail, i.e.
In the internet information spreadings system such as Shi Tongxin, it often may require that and transmit some secrets or privacy informations, but information receiving end
Forwarding, intentionally forwarding or situations such as the mailbox of information receiving end is invaded, instant messaging is by steal-number accidentally, can all lead to information
Uncontrolled diffusion, to generate information security issue.
Existing information dissemination method and system, information source are only capable of specifying the stay of two nights, after can not reaching the stay of two nights to information
The stay of two nights carries out control management to the processing mode of information, to will lead to the safety problem of information propagation.
Summary of the invention
The embodiment of the present invention is intended to provide a kind of control method and system that information is propagated, to solve information source in the prior art
The stay of two nights carries out control management to the processing mode of information after the stay of two nights can not be reached to information, and caused information propagates safety problem.
In order to solve the above-mentioned technical problem, in a first aspect, the embodiment of the invention provides the controlling parties that a kind of information is propagated
Method, comprising:
Receive information data and corresponding information encryption indicator;
Judge that the Control Cooling of information data, the information encryption indicator are existed by transmitting terminal according to the information encryption indicator
It is set before sending the information data;
According to the Control Cooling of the information data, the information data is handled, comprising:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is tested
Card, to obtain the processing authority to the information data.
Further, identity registration is carried out by preset authentication mode, the authentication mode includes character
Any one authentication mode in string password, fingerprint, face or iris.
Further, if the Control Cooling of the information data is Second Type, after having shown the information data,
Delete operation is executed to the information data.
Further, before showing the information data, content shielding is carried out to the information data.
Further, when being replied to the information data or forwarding operation, to the information data replied or forwarded
Add information encryption indicator.
Second aspect, the embodiment of the invention provides the control systems that a kind of information is propagated, comprising:
Receiving unit, for receiving information data and corresponding information encryption indicator;
Judgement unit, for judging the Control Cooling of the information data, the information according to the information encryption indicator
Encryption indicator is set before sending the information data by transmitting terminal;
Processing unit is handled the information data for the Control Cooling according to the information data, comprising:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is tested
Card, to obtain the processing authority to the information data.
Further, the system also includes identity registration units, for carrying out body by preset authentication mode
Part registration, the authentication mode includes any one authentication side in character string password, fingerprint, face or iris
Formula.
Further, the processing unit is also used to, if the Control Cooling of the information data is Second Type, is being shown
After the complete information data, delete operation is executed to the information data.
Further, the system also includes screen units, are used for before showing the information data, to the information
Data carry out content shielding.
Further, the processing unit is also used to, when being replied to the information data or forwarding operation, to return
Multiple or forwarding information data adds information encryption indicator.
In an embodiment of the present invention, transmitting terminal sends setting information encryption indicator before information data, and with information data
It is sent to receiving end together, receiving end is handled information data according to the information encryption indicator, and information source is being believed
Breath reaches be the stay of two nights after, can also carry out control management to the information processing data mode of the stay of two nights, ensure that information security is controllable
It propagates.
Detailed description of the invention
Fig. 1 is the implementation flow chart for the control method that a kind of information provided in an embodiment of the present invention is propagated;
Fig. 2 is the embodiment schematic diagram that the present invention is applied to mobile phone short message broadcasting system;
Fig. 3 is the embodiment schematic diagram that the present invention is applied to mailing system;
Fig. 4 is the embodiment schematic diagram that the present invention is applied to instantaneous communication system;
Fig. 5 is the structural block diagram for the control system that a kind of information provided in an embodiment of the present invention is propagated.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is described in further detail.It should be appreciated that described herein, specific examples are only used to explain the present invention, and
It is not used in the restriction present invention.
Receiving end of the embodiment of the present invention receives information data and corresponding information encryption indicator;It is encrypted and is marked according to the information
Will judges that the Control Cooling of information data, the information encryption indicator are set before sending the information data by transmitting terminal;Root
According to the Control Cooling of the information data, the information data is handled, comprising: if the Control Cooling of the information data
For the first kind, authentication mode when using identity registration is verified, to obtain the disposal right to the information data
Limit.
Fig. 1 shows the implementation flow chart for the control method that a kind of information provided in an embodiment of the present invention is propagated, and is described in detail such as
Under:
In S101, information data and corresponding information encryption indicator are received.
The reception information data and corresponding information encryption indicator refer to that receiving end receives the information of transmitting terminal sending
Data simultaneously, can also receive the information encryption indicator corresponding with information data of transmitting terminal sending.And corresponding information encryption
Indicate, refer to and information encryption indicator corresponding to every kind of Control Cooling of information data is first preset as transmitting terminal and receiving end,
For the information data that needs are sent, after transmitting terminal determines the corresponding Control Cooling of the information data, obtain and the control class
The corresponding information encryption indicator of type, and the information encryption indicator is sent to receiving end together with information data.
For the ease of identification, corresponding to every kind of Control Cooling of presupposed information data while information encryption indicator,
The mark of information encrypted characters corresponding to every kind of information encryption indicator is preset in transmitting terminal and receiving end, and information encrypted characters mark can
Any character or pattern for selecting transmitting terminal and receiving end all to support indicate.It is marked by information data Control Cooling and information encryption
The corresponding relationship of corresponding relationship and information encryption indicator and information the encrypted characters mark of will, it can be deduced that information data control
The corresponding relationship of type and information encrypted characters mark is identified by information encrypted characters to distinguish different information data controls
Type processed.Indicate different information encrypted characters marks, using finger, scissors and page such as to distinguish corresponding different information
Data Control Cooling.
In S102, the Control Cooling of information data, the information encryption indicator are judged according to the information encryption indicator
It is set before sending the information data by transmitting terminal.
The Control Cooling that information data is judged according to the information encryption indicator, refers to that receiving end is receiving letter
After encryption for information mark, according to the information data Control Cooling and information encryption indicator corresponding relationship preset, information data is judged
Control Cooling.
In S103, according to the Control Cooling of the information data, the information data is handled, comprising: if institute
The Control Cooling for stating information data is the first kind, and authentication mode when using identity registration is verified, with acquisition pair
The processing authority of the information data.
The Control Cooling according to the information data, handles the information data, including three kinds of situations:
If 1, the Control Cooling of the information data is the first kind.Receiving end uses authentication side when identity registration
Formula is verified, ability reading information data after being verified, and is obtained to information data reply, deletion, forwarding and return
Processing authority.Verifying is not by being unable to reading information data then.
It is described using identity registration when authentication mode carry out verifying and refer to:
Identity registration is carried out by preset authentication mode, the authentication mode includes character string password, refers to
Any one receiving device in line, face or iris supports authentication mode.
If 2, the Control Cooling of the information data is Second Type, after having shown the information data, to described
Information data executes delete operation.
Refer to that receiving end can only obtain the processing authority of reply and deletion to the data information data of Second Type, does not delete
Transmitting terminal can not exit the spreading tool before information data, and system does not support Copy Info, to avoid weight after the duplication of receiving end
New edited message is sent.
If 3, the Control Cooling of the information data is third type, receiving end, which obtains, replys information data, deletes, turning
Hair and the processing authority returned.
Above-mentioned three kinds of situations all follow the principles when handling information data:
When carrying out reply or forward process operation to the information data, letter will be added to the information data replied or forwarded
Encryption for information mark.
It replys or when forwarding, the transmitting terminal that receiving end is propagated as new primary information, receiving end is according to oneself wish
Information encryption indicator is added to the information data propagated herein, at the information data to control the receiving end that new primary information is propagated
Permission is managed, so that new primary information propagation is also controllable.
The Control Cooling according to the information data, handles the information data, further includes:
Before showing the information data, content shielding is carried out to the information data.
Content shielding refers to, after judging the Control Cooling of information data, information data is the first kind or the
When two type information datas, receiving end carries out content shielding before showing the information data, to the information data, works as letter
When breath data are third type, receiving end automatic display information data portions contents.In conventional information broadcasting system, Yi Xiexin
Broadcasting system can automatic display information partial content (will be in information list in such as SMS before information data is read for breath
The front two row content of middle automatic display information), the information content can be revealed in this way, causes information security issue, shielded by content
Information security issue caused by being leaked before reading to avoid information.
Fig. 2, Fig. 3 corresponding from Fig. 4 are the part preferred embodiments for applying the present invention to different information dissemination systems, are answered
When it is realized that, application range of the present invention includes but is not limited to system described in the preferred embodiment of the present invention.
It is the preferred embodiment for applying the present invention to mobile phone short message broadcasting system, in detail based on the corresponding embodiment of Fig. 2
It states as follows:
1. information data is edited for transmitting terminal in Fig. 2, and sets corresponding information encryption indicator;2. being transmitting terminal
The process of receiving end is sent to using the information data of this editor as third type information data, as third type information number
According to when, transmitting terminal has added a mark, this is identified as page in this instance.Receiving end need to only click mark page and can read
This message data content, and have to the information data of this mark and reply, delete, forwarding, the information processing permission of return.As 5.
It is exactly the forwarding again to this information data;3. being that information data is sent to reception by transmitting terminal
The process at end, this time information data can be read after needing to verify identity, and add mark finger.For the sake of information security, add
The information of this mark will not show content in receiving end.Receiving end needs to click mark finger after there is this mark, clicks mark hand
After finger, concrete mode when system can be according to receiving end identity registration provides corresponding authentication interface, such as inputs cipher word
Symbol string, scanning fingerprint etc..After authentication passes through, which could completely be shown for reading, and to the letter of this mark
Ceasing data has reply, deletes, forwarding, the information processing permission of return.If authentication does not pass through, this information data be will be unable to
Display.In figure process 6., 7. show receiving end after reading information data to the different disposal method of the information data, 6. table
Show that also intended receiver must verify identity after forwarding for receiving end.7. informing must delete after recipient sees.4. showing hair
Sending end is not intended to the propagation of this information data repeatedly to be spread, and is sent to reception for information data as Second Type information data
The process at end adds scissors mark.The information for adding scissors to identify also does not show content in information list, and receiving end is needed to click mark
All information data content can be shown after knowing scissors.4. process shows that the information data must delete after reading, otherwise only
Can exit the spreading tool after either deleting to transmitting terminal return information.4. process does not delete this information before, it is
System does not support Copy Info, sends to avoid message is updated after the duplication of receiving end.
As another preferred embodiment, it is based on the corresponding embodiment of Fig. 3, is apply the present invention to mailing system excellent
Embodiment is selected, details are as follows:
A is transmitting terminal editing interface in Fig. 3, there is " label " operation button in figure, means and adds mark to editor's information
It is realized by it.1. A in Fig. 3, process set Second Type information data for mail.Operating process are as follows: editor's Mail Contents,
Click " label " button, label list in selection " being deleted after readding " mark, then identify scissors be shown in mark button in, point
Percussion is sent;2. to set first kind information data process for mail.Operating process are as follows: editor's Mail Contents click " mark
Note " button, selects " encryption " mark in label list, then identifies finger and is shown in label button, clicks transmission;3. being
Surface mail transmission flow in first kind information data, that is, the present embodiment.Operating process are as follows: editor's Mail Contents click directly on
" transmission " button (before each mail editor, label button shows " label ", is defaulted as surface mail), completes mail and sends, and
Surface mail mark page is shown in label button frame afterwards.
B is that receiving end receives the list interface after mail in Fig. 3.It can be seen that the mail that A process is shown in Fig. 3 is all by sending out
Sending end 1 is sent to receiving end, thus one side of receiving end show respectively " being deleted after readding " from transmitting terminal 1, " encryption " and
Surface mail, and mail piece identifiers are also placed in letter list as a part of passed content.When Mail Contents are consulted in receiving end,
The identification pattern of every mail need to be only clicked, system provides corresponding reading operations interface according to the difference of mark, for
Mail Contents are checked in receiving end.It, can be because of identity if clicking the non-registered receiving end of mail piece identifiers by taking " encryption " mail as an example
Verifying can not only be read.
It is the preferred embodiment for applying the present invention to instantaneous communication system based on the corresponding embodiment of Fig. 4, is described in detail such as
Under:
Step 2. small red informing Xiao Ming in A in Fig. 4: " contract signed " simultaneously encrypts, text information B Xiao Ming in Fig. 4
2. ' place's display encryption is held, content can not be directly viewable, can read after needing Xiao Ming to verify identity.And Fig. 4 B 1. ' Xiao Ming described in
1. " the first and second the third fourth penta oneself the pungent nonyl last of the ten Heavenly stems in heptan " are located directly because being general information in first kind information data i.e. the present embodiment in Fig. 4 A
Connect display.And the voice messaging 6. sent, 6. ' place can be heard after also needing verifying identity;5. ' it is transmission picture, the picture mark
It is denoted as " deleting after seeing ", so cannot directly display at 5. place, need to click mark scissors can be checked, be done at deletion after finishing watching
Reason, otherwise cannot exit the instantaneous communication system.In instantaneous communication system, all multimedia messages (i.e. text, voice, figures
Picture, video etc.) make Unified Form processing.
In a preferred embodiment of the invention, by being arranged, when sending information data, transmission is set pair transmitting terminal simultaneously
The information encryption indicator answered limits the information reading and processing authority of receiving end, receiving end by identification information encryption indicator come
Decide whether the partial content for showing information in advance, authorizes receiving end different information processing permissions, also, identifying first
When identity verification information, receiving end, which must carry out authentication, to read information.Due to the reading to information
Permission limitation has been carried out with processing, and has added the authentication of encryption information, so that the propagation of information is more safe and reliable, and
The control of relevant operation in the processing authority limitation of information can be set by the information encryption indicator of transmitting terminal, but also
Information, which is propagated, gets rid of the limitation that original information source is unable to control sending information, so that information propagation is more controllable.By to letter
The reading and processing authority for ceasing transmitting terminal and receiving end coordinated management information keep the propagation of information more safe and controllable.
For the control method that information described in foregoing embodiments is propagated, Fig. 5 shows letter provided in an embodiment of the present invention
Cease the structural block diagram for the control system propagated.
Referring to Fig. 5, which includes:
Receiving unit 51, for receiving information data and corresponding information encryption indicator;
Judgement unit 52, for judging the Control Cooling of the information data, the letter according to the information encryption indicator
Encryption for information mark is set before sending the information data by transmitting terminal;
Processing unit 53 is handled the information data for the Control Cooling according to the information data, packet
It includes:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is tested
Card, to obtain the processing authority to the information data.
Identity registration unit, for carrying out identity registration, the authentication mode by preset authentication mode
Including any one authentication mode in character string password, fingerprint, face or iris.
Optionally, the judgement unit 52 includes:
If the Control Cooling of the information data is Second Type, after having shown the information data, to the letter
It ceases data and executes delete operation.
Optionally, the processing unit 53 includes:
Screen unit, for carrying out content shielding to the information data before showing the information data.
Optionally, the processing unit 53 is also used to:
When being replied to the information data or forwarding operation, the information data addition information replied or forwarded is added
Secret mark will.
Embodiment described above is only used for illustrate technical solution of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these are repaired
Change or replace, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (6)
1. the control method that a kind of information is propagated characterized by comprising
Receive information data and corresponding information encryption indicator;
Judge that the Control Cooling of information data, the information encryption indicator are being sent by transmitting terminal according to the information encryption indicator
It is set before the information data;
According to the Control Cooling of the information data, the information data is handled, including;
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is verified,
To obtain the processing authority to the information data;
If the Control Cooling of the information data is Second Type, after having shown the information data, to the Information Number
According to execution delete operation;
If the Control Cooling of the information data is third type, the processing authority to the information data is obtained;
After the reception information data and corresponding information encryption indicator, further includes:
If information data is the first kind or Second Type information data, receiving end is before showing the information data, to institute
It states information data and carries out content shielding;
If information data is third type, receiving end automatic display information data portions contents.
2. the method as described in claim 1, which is characterized in that receive information data and corresponding information encryption indicator it
Before, the method also includes:
Identity registration is carried out by preset authentication mode, the authentication mode includes character string password, fingerprint, people
Any one authentication mode in face or iris.
3. the method as described in claim 1, which is characterized in that the Control Cooling according to the information data, to described
Information data is handled further include:
When being replied to the information data or forwarding operation, to the information data addition information encryption mark replied or forwarded
Will.
4. the control system that a kind of information is propagated characterized by comprising
Receiving unit, for receiving information data and corresponding information encryption indicator;
Judgement unit, for judging the Control Cooling of the information data, the information encryption according to the information encryption indicator
Mark is set before sending the information data by transmitting terminal;
Processing unit is handled the information data for the Control Cooling according to the information data, comprising:
If the Control Cooling of the information data is the first kind, authentication mode when using identity registration is verified,
To obtain the processing authority to the information data;
If the Control Cooling of the information data is Second Type, after having shown the information data, to the Information Number
According to execution delete operation;
If the Control Cooling of the information data is third type, the processing authority to the information data is obtained;
Screen unit, if being the first kind or Second Type information data for information data, receiving end is showing the information
Before data, content shielding is carried out to the information data;
If information data is third type, receiving end automatic display information data portions contents.
5. system as claimed in claim 4, which is characterized in that the system also includes:
Identity registration unit, for carrying out identity registration by preset authentication mode, the authentication mode includes
Any one authentication mode in character string password, fingerprint, face or iris.
6. system as claimed in claim 4, which is characterized in that the processing unit is also used to:
When being replied to the information data or forwarding operation, to the information data addition information encryption mark replied or forwarded
Will.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610676097.7A CN106341390B (en) | 2016-08-16 | 2016-08-16 | A kind of control method and system that information is propagated |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610676097.7A CN106341390B (en) | 2016-08-16 | 2016-08-16 | A kind of control method and system that information is propagated |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106341390A CN106341390A (en) | 2017-01-18 |
CN106341390B true CN106341390B (en) | 2019-06-07 |
Family
ID=57824964
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610676097.7A Expired - Fee Related CN106341390B (en) | 2016-08-16 | 2016-08-16 | A kind of control method and system that information is propagated |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106341390B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110282226B (en) * | 2019-05-31 | 2021-10-26 | 佛山星乔电子科技有限公司 | Method and system for customizing traceability content in personalized mode based on display packaging box |
CN110971608A (en) * | 2019-12-06 | 2020-04-07 | 成都卫士通信息产业股份有限公司 | Information processing method, device and system and server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1848944A (en) * | 2005-04-05 | 2006-10-18 | 华为技术有限公司 | IPTV system, enciphered digital programme issuing and watching method |
CN101150531A (en) * | 2006-09-21 | 2008-03-26 | 华为技术有限公司 | System and method for message intercommunication |
CN101179767A (en) * | 2007-12-13 | 2008-05-14 | 深圳华为通信技术有限公司 | Multimedia information limitation operation method, transmitting terminal, receiving terminal and system |
CN101944168A (en) * | 2009-07-09 | 2011-01-12 | 精品科技股份有限公司 | Electronic file authority control and management system |
CN103095642A (en) * | 2011-10-27 | 2013-05-08 | 中兴通讯股份有限公司 | Multi-media messaging method and multi-media messaging method |
-
2016
- 2016-08-16 CN CN201610676097.7A patent/CN106341390B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1848944A (en) * | 2005-04-05 | 2006-10-18 | 华为技术有限公司 | IPTV system, enciphered digital programme issuing and watching method |
CN101150531A (en) * | 2006-09-21 | 2008-03-26 | 华为技术有限公司 | System and method for message intercommunication |
CN101179767A (en) * | 2007-12-13 | 2008-05-14 | 深圳华为通信技术有限公司 | Multimedia information limitation operation method, transmitting terminal, receiving terminal and system |
CN101944168A (en) * | 2009-07-09 | 2011-01-12 | 精品科技股份有限公司 | Electronic file authority control and management system |
CN103095642A (en) * | 2011-10-27 | 2013-05-08 | 中兴通讯股份有限公司 | Multi-media messaging method and multi-media messaging method |
Also Published As
Publication number | Publication date |
---|---|
CN106341390A (en) | 2017-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7266536B2 (en) | Encryption of cloud-based data | |
US9590949B2 (en) | Confidential message exchange using benign, context-aware cover message generation | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
KR20160009569A (en) | System and method for tracking sms messages | |
CN105227570B (en) | A kind of safe e-mail system of integrated campaign | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN106341390B (en) | A kind of control method and system that information is propagated | |
CN101795315A (en) | System and method for encrypting short messages by using mobile phone terminal | |
CN105281897A (en) | File encryption method and device and file decryption method and device | |
CN104394064A (en) | Novel method and system for limiting forwarding in email transfer | |
CN113472519A (en) | File security sharing method based on instant messaging user side | |
CN108540374B (en) | Information processing method, device, equipment and storage medium based on instant messaging | |
CN106254226A (en) | A kind of information synchronization method and device | |
CN101420430B (en) | Methods and apparatus for information security protection | |
CN111865764B (en) | Customer service message processing system and method based on third-party public platform | |
CN104394065A (en) | Destroy-after-reading system and method of novel email system | |
CN201623859U (en) | System for encrypting short messages through mobile phone terminal | |
KR101644070B1 (en) | Email service method and system for mobile | |
CN107911368A (en) | A kind of Transmission system and its implementation destroyed by fire automatically based on encryption message | |
US11777952B2 (en) | Tracking and securing electronic messages using an embedded identifier | |
KR102146493B1 (en) | Secure Communication System | |
Onwuzurike et al. | POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps | |
CN106685634A (en) | Confidential information transmitting method and device for public platform client | |
CN113886858A (en) | Important information desensitization system based on mobile phone bottom layer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190607 Termination date: 20210816 |