CN106453052B - Message interaction method and device - Google Patents

Message interaction method and device Download PDF

Info

Publication number
CN106453052B
CN106453052B CN201610899194.2A CN201610899194A CN106453052B CN 106453052 B CN106453052 B CN 106453052B CN 201610899194 A CN201610899194 A CN 201610899194A CN 106453052 B CN106453052 B CN 106453052B
Authority
CN
China
Prior art keywords
message
encryption
encrypted
identifier
display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610899194.2A
Other languages
Chinese (zh)
Other versions
CN106453052A (en
Inventor
刘洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610899194.2A priority Critical patent/CN106453052B/en
Publication of CN106453052A publication Critical patent/CN106453052A/en
Application granted granted Critical
Publication of CN106453052B publication Critical patent/CN106453052B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The disclosure relates to a message interaction method and a message interaction device, and belongs to the technical field of communication. The method comprises the following steps: judging whether a first message is encrypted and displayed or not, wherein the first message is a message to be sent, when the first message is determined to be encrypted and displayed, adding an encryption identifier in the first message to generate a second message, and sending the second message to a target terminal to indicate the target terminal to encrypt and display the first message. According to the method and the device, whether each message to be sent is encrypted to be displayed is judged, and when the message to be sent is determined to be encrypted to be displayed, the target terminal is indicated to encrypt and display the message to be sent, so that the safety and the flexibility of message interaction are improved.

Description

Message interaction method and device
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a message interaction method and apparatus.
Background
With the development of communication technology and the improvement of living standard of users, more and more terminals can be used in the life of the users. In order to enable the terminal to implement some functions during the process of using the terminal, a user generally needs to send a message between the terminal and another terminal to interact with the other terminal, and therefore a message interaction method is needed.
In the related art, in order to improve the security of message interaction between the terminal and other terminals and protect the information security of a user, the terminal may set a start password, the terminal may prompt the user to input the start password when starting up, when the start password input by the user is correct, the terminal starts up successfully, and then the terminal may receive and display messages sent by other terminals.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a message interaction method and apparatus.
According to a first aspect of the embodiments of the present disclosure, a message interaction method is provided, where the method includes:
judging whether a first message is encrypted and displayed or not, wherein the first message is a message to be sent;
when the first message is determined to be encrypted and displayed, adding an encryption identifier in the first message to generate a second message;
and sending the second message to a target terminal to indicate the target terminal to encrypt and display the first message.
Optionally, the determining whether to perform encrypted display on the first message includes:
when an indication of an encryption operation for the first message is detected, determining to encrypt and display the first message.
Optionally, the determining whether to perform encrypted display on the first message includes:
and when detecting that the first message comprises the specified characters, determining to carry out encrypted display on the first message.
According to a second aspect of the embodiments of the present disclosure, there is provided a message interaction method, the method including:
receiving a message sent by a terminal;
detecting whether the message carries an encryption identifier;
and when the message carries the encryption identifier, encrypting and displaying the message.
Optionally, the displaying the message in an encrypted manner includes:
displaying an encrypted message icon, the encrypted message icon being used to indicate that the message is an encrypted message;
displaying a user privacy protection interface when a specified operation is received based on the encrypted message icon;
and when a decryption operation is received based on the user privacy protection interface, displaying the message content of the message.
Optionally, the method further comprises:
displaying encryption mode setting prompt information, wherein the encryption mode setting prompt information comprises at least one encryption mode;
receiving an encryption mode selection instruction, wherein the encryption mode selection instruction indicates one encryption mode in the at least one encryption mode;
and determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selection instruction.
According to a third aspect of the embodiments of the present disclosure, there is provided a message interaction apparatus, the apparatus including:
the judging module is used for judging whether to encrypt and display a first message, wherein the first message is a message to be sent;
the adding module is used for adding an encryption identifier in the first message to generate a second message when the first message is determined to be encrypted and displayed;
and the sending module is used for sending the second message to a target terminal so as to indicate the target terminal to encrypt and display the first message.
Optionally, the determining module includes:
the first determining sub-module is used for determining to encrypt and display the first message when the indication encryption operation for the first message is detected; alternatively, the first and second electrodes may be,
and the second determining submodule is used for determining to encrypt and display the first message when detecting that the first message comprises the specified characters.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a message interaction apparatus, the apparatus including:
the first receiving module is used for receiving a message sent by a terminal;
the detection module is used for detecting whether the message carries an encryption identifier;
and the first display module is used for encrypting and displaying the message when the message carries the encryption identifier.
Optionally, the first display module includes:
a first display sub-module for displaying an encrypted message icon, the encrypted message icon being for indicating that the message is an encrypted message;
the second display sub-module is used for displaying a user privacy protection interface when receiving a specified operation based on the encrypted message icon;
and the third display sub-module is used for displaying the message content of the message when the decryption operation is received based on the user privacy protection interface.
Optionally, the apparatus further comprises:
the second display module is used for displaying the encryption mode setting prompt information, and the encryption mode setting prompt information comprises at least one encryption mode;
a second receiving module, configured to receive an encryption mode selection instruction, where the encryption mode selection instruction indicates one encryption mode of the at least one encryption mode;
and the determining module is used for determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selecting instruction.
According to a fifth aspect of the embodiments of the present disclosure, there is provided a message interaction apparatus, the apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
judging whether a first message is encrypted and displayed or not, wherein the first message is a message to be sent;
when the first message is determined to be encrypted and displayed, adding an encryption identifier in the first message to generate a second message;
and sending the second message to a target terminal to indicate the target terminal to encrypt and display the first message.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a message interaction apparatus, the apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a message sent by a terminal;
detecting whether the message carries an encryption identifier;
and when the message carries the encryption identifier, encrypting and displaying the message.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in the embodiment of the present disclosure, it is determined whether to encrypt and display the first message, that is, for each message to be sent, it may be determined whether to encrypt and display the message, so that the security and flexibility of message interaction are improved. When the first message is determined to be encrypted and displayed, the encryption identifier can be added in the first message, so that the target terminal receiving the first message is indicated to encrypt and display the first message, and the corresponding decryption mode is not required to be sent to the target terminal in advance, so that the decryption mode is prevented from being acquired by other users, and the message interaction safety is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1A is a diagram illustrating a messaging interaction system architecture in accordance with an exemplary embodiment.
FIG. 1B is a flow chart illustrating a method of message interaction in accordance with an exemplary embodiment.
Fig. 2 is a flow chart illustrating another message interaction method in accordance with an exemplary embodiment.
Fig. 3A is a flow chart illustrating yet another message interaction method in accordance with an exemplary embodiment.
Fig. 3B is a diagram illustrating a display interface of a terminal according to an example embodiment.
Fig. 3C is a diagram illustrating a display interface of a target terminal according to an example embodiment.
Fig. 3D is a schematic diagram illustrating a display interface of another target terminal according to an example embodiment.
Fig. 3E is a schematic diagram illustrating a display interface of another target terminal according to an example embodiment.
FIG. 3F is a schematic diagram illustrating a display interface of yet another target terminal, according to an example embodiment.
FIG. 3G is a schematic diagram illustrating a display interface of yet another target terminal, according to an example embodiment.
Fig. 4 is a schematic structural diagram illustrating a message interaction device according to an exemplary embodiment.
Fig. 5 is a schematic structural diagram illustrating another message interaction device according to an example embodiment.
Fig. 6 is a schematic structural diagram illustrating yet another message interaction device according to an example embodiment.
Fig. 7 is a schematic structural diagram illustrating yet another message interaction device according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1A is an architecture diagram illustrating an instant messaging system according to an exemplary embodiment, and referring to fig. 1A, the instant messaging system includes a terminal 01, a server 02 and a target terminal 03, and the terminal 01, the server 02 and the target terminal 03 may be connected to each other through a network.
The terminal 01 and the target terminal 03 may be electronic devices such as a mobile phone, a computer, a smart watch, smart glasses, and the like, which can be installed with applications capable of sending and receiving messages to realize message interaction, and the terminal 01 may send a message to the target terminal 03 through the server 02 and receive the message sent by the target terminal 03. The server 02 may be a server of the terminal 01 and the target terminal 03, or may be a server of an application capable of transmitting and receiving a message, which is installed in the terminal 01 and the target terminal 03, for transmitting or receiving a message.
Taking the example that the terminal 01 sends a message to the target terminal 03, when the terminal 01 receives a message sending instruction, the message is sent to the target terminal 03, and the message carries an encryption identifier; when the target terminal 03 receives the message and detects that the message carries the encrypted identifier, the message may be encrypted and displayed.
Fig. 1B is a flowchart illustrating a message interaction method according to an exemplary embodiment, and referring to fig. 1B, the method is used in a terminal and includes the following steps.
In step 101, it is determined whether to encrypt and display a first message, where the first message is a message to be sent;
in step 102, when the first message is determined to be displayed in an encrypted mode, an encrypted identifier is added to the first message, and a second message is generated;
in step 103, the second message is sent to the target terminal to instruct the target terminal to perform encrypted display on the first message.
In the embodiment of the present disclosure, the terminal can determine whether to encrypt and display the first message, that is, for each message to be sent in the terminal, the terminal can determine whether to encrypt and display the message, thereby improving the security and flexibility of message interaction. When the first message is determined to be encrypted and displayed, the terminal can add the encryption identifier in the first message, so that the target terminal receiving the first message is indicated to encrypt and display the first message.
Optionally, the determining whether to perform encrypted display on the first message includes:
when an indication of an encryption operation for the first message is detected, it is determined that the first message is to be displayed encrypted.
Optionally, the determining whether to perform encrypted display on the first message includes:
and when detecting that the first message comprises the specified characters, determining to carry out encrypted display on the first message.
All the above optional technical solutions can be combined arbitrarily to form optional embodiments of the present disclosure, and the embodiments of the present disclosure are not described in detail again.
Fig. 2 is a flowchart illustrating an instant messaging method according to an exemplary embodiment, referring to fig. 2, the method is used in a target terminal and includes the following steps.
In step 201, receiving a message sent by a terminal;
in step 202, detecting whether the message carries an encryption identifier;
in step 203, when the message carries the encrypted identifier, the message is encrypted and displayed.
In the embodiment of the disclosure, the target terminal can detect whether the message carries the encryption identifier or not when receiving the message sent by the terminal, and further determine whether to encrypt and display the message, so that for each received message, the target terminal can encrypt and display the message when the message carries the encryption identifier, thereby improving the security and flexibility of message interaction. And because the terminal adds the encryption identifier in the message, the target terminal encrypts and displays the first message when receiving the message, so that a decryption mode does not need to be obtained from the terminal in advance, the decryption mode is prevented from being obtained by other users, and the safety of message interaction is further improved.
Optionally, the displaying the message in an encrypted manner includes:
displaying an encrypted message icon, the encrypted message icon for indicating that the message is an encrypted message;
displaying a user privacy protection interface when a specified operation is received based on the encrypted message icon;
and when a decryption operation is received based on the user privacy protection interface, displaying the message content of the message.
Optionally, the method further comprises:
displaying an encryption mode setting prompt message, wherein the encryption mode setting prompt message comprises at least one encryption mode;
receiving an encryption mode selection instruction, wherein the encryption mode selection instruction indicates one encryption mode in the at least one encryption mode;
and determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selection instruction.
All the above optional technical solutions can be combined arbitrarily to form optional embodiments of the present disclosure, and the embodiments of the present disclosure are not described in detail again.
Fig. 3A is a flowchart illustrating an instant messaging method according to an exemplary embodiment, and referring to fig. 3A, the instant messaging method is used in the interaction between a terminal and a target terminal, and includes the following steps.
In step 301, the terminal acquires a first message, where the first message is a message to be sent.
In order to ensure that the terminal can send a message to other terminals so as to interact with other terminals, the terminal can acquire a message to be sent and take the message as a first message.
The terminal may obtain the first message when receiving a message sending instruction.
It should be noted that the message sending instruction may be triggered based on any application installed in the terminal and capable of sending and receiving a message to instruct the terminal to send a message to another terminal, the message sending instruction may be triggered by a user by performing a preset operation, the message sending instruction may be triggered by the user by performing a preset operation, the preset operation may be a click operation, a slide operation, a touch operation, a key operation, or the like, and of course, in an actual application, the preset operation may also be another operation.
It should also be noted that the terminal may be configured to install at least one application capable of sending and receiving messages in the terminal before the first message is acquired.
The message may be a text message, a multimedia message, or other communication message, such as an instant communication message, or of course, the message may also be a request message or a signaling message for requesting to establish a communication channel with another terminal, such as an incoming call request message, a voice communication request message, or a video communication request message, or of course, in practical applications, the message may also be other messages that the terminal can send to another terminal.
Further, in order to accurately send the first message to the target terminal, the message sending instruction may further carry a target terminal identifier, where the target terminal identifier is used to uniquely identify one target terminal, and the target terminal identifier may be an IP (Internet Protocol) address and an MAC (Media Access Control) address of the target terminal, and of course, in practical applications, the target terminal identifier may also be another identifier capable of uniquely identifying the target terminal.
In addition, because the message sending instruction may be triggered based on any application capable of sending and receiving a message installed by the terminal, the message sending instruction may also carry a target contact identifier instead of a target terminal identifier, where the target contact identifier may be a contact identifier in an application capable of sending and receiving a message currently logged in the target terminal, and the contact identifier may be a user ID (Identification, identity card), a user nickname, or the like.
In step 302, the terminal determines whether to display the first message in an encrypted manner.
Because the message sent by the terminal to the target terminal may include relatively important information such as personal privacy, in order to protect the privacy security of the user, the security of the terminal in message interaction with other terminals is improved, and the flexibility of protecting the message interaction process is improved, for any first message sent by the terminal, the terminal can judge whether to encrypt and display the first message.
Further, in order to improve the accuracy of the terminal for determining whether to encrypt and display the first message, the terminal may determine whether to encrypt and display the first message through the following two possible implementation manners:
in a first possible implementation manner, when an indication of an encryption operation for the first message is detected, the terminal determines to perform encryption display on the first message.
The indication encryption operation may be performed by the user when determining to encrypt and display the first message, and the indication encryption operation may be a click operation, a slide operation, a touch operation, a key operation, or the like.
It should be noted that, in order to facilitate the terminal to detect the indication encryption operation and improve the accuracy of determining whether to encrypt the message, the terminal may further display an encryption prompt message before detecting the indication encryption operation, and may detect the indication encryption operation according to the encryption prompt message.
It should be further noted that the terminal may display the encryption prompting information in a window or pop-up window manner, and the display manner of the encryption prompting information is not specifically limited in the embodiment of the present disclosure.
For example, the terminal may display an interface as shown in fig. 3B, where the display interface includes a contact input box, a message input box, a check box for encryption or not, and a send button, the terminal may receive a target contact identifier input by a user based on the contact input box, receive a message to be sent input by the user based on the message input box, trigger the message send instruction when the terminal receives a click operation based on the send button, and determine to encrypt and display the message when the terminal detects that the check box for encryption or not is checked.
It should be noted that when the indication encryption operation is not detected, the terminal may determine not to encrypt and display the message.
In a second possible implementation manner, in order to reduce the number of times of interaction between a user and the terminal and improve the efficiency of the terminal for determining whether to encrypt and display the message, when the terminal detects that the first message includes a specified character, it determines to encrypt and display the first message.
Wherein the designated character may be determined by the terminal before detecting whether the designated character is included in the first message, such as one possible implementation strategy that the terminal displays a designated character input prompt message and determines a received character as the designated character when the character input by the user is received based on the designated character input prompt message. The designated character may include "account", "password", "internet bank", "asset", "secret", etc., but in practical applications, the designated character may include other characters.
It should be further noted that the terminal may display the encrypted prompt information in a window or pop-up window manner, and the display manner of inputting the prompt information for the specified character in the embodiment of the present disclosure is not particularly limited.
For example, the content of message 1 is: "my bank account is XXXXXX and the password is XXXXXX", the terminal detects that "bank", "account" and "password" are included in message 1, and thus, the terminal determines to encrypt message 1.
It should be noted that when the terminal detects that the specified character is not included in the first message, it may be determined not to encrypt the first message.
In addition, the terminal may also determine whether to encrypt the instant messaging message by other manners, for example, in another possible implementation manner, when the target terminal identifier carried in the message sending instruction is the designated terminal identifier or the target contact identifier carried in the message sending instruction is the designated contact identifier, it is determined to encrypt and display the first message.
The terminal may receive a terminal identifier or a contact identifier specified by a user before determining whether to encrypt and display the first message, and determine the received terminal identifier as the specified target terminal identifier or determine the received contact identifier as the specified contact identifier.
In step 303, when the terminal determines to display the first message in an encrypted manner, an encrypted identifier is added to the first message, and a second message is generated.
Because the first message needs to be encrypted and displayed, the encryption identifier can be added to the first message to generate a second message carrying the encryption identifier.
The encryption identifier is used to indicate that the first message is a message that needs to be encrypted, and the encryption identifier may be a character, such as a boolean value 1, + or the like.
It should be noted that, the terminal may determine the encryption identifier before adding the encryption identifier to the first message, for example, one possible implementation strategy is that the terminal may receive a character input by a user and determine the received character as the encryption identifier.
In addition, in another possible implementation strategy, the encryption identifier is carried in all messages sent by the terminal to the target terminal, where when the terminal determines to encrypt the message, a first encryption identifier is carried in the message, and when the terminal determines not to encrypt the message, a second encryption identifier is carried in the message, for example, the first encryption identifier may be a boolean value 1, the second encryption identifier may be a boolean value 0, or the first encryption identifier may be a + and the second encryption identifier may be a-. Of course, in practical applications, the first encrypted identifier and the second encrypted identifier may also be other characters, which is not specifically limited in this disclosure.
In step 304, the terminal sends the second message to the target terminal to instruct the target terminal to display the first message in an encrypted manner.
When the first message needs to be encrypted and displayed, if the terminal encrypts the first message and then sends the encrypted first message to the target terminal, in order to ensure that a user of the target terminal can obtain the message content of the first message, the terminal needs to send a corresponding decryption mode to the target terminal in advance, so that the message interaction efficiency is reduced, the decryption mode can be obtained by other users, and the message interaction safety is further reduced. Therefore, in order to improve the efficiency and the safety of message interaction, when the first message needs to be encrypted and displayed, the terminal instructs the target terminal to encrypt the first message.
The terminal may send the second message to the target terminal based on the target terminal identifier or the target contact identifier through the server.
In step 305, the target terminal receives the message sent by the terminal.
In order to realize the message interaction between the terminal and the target terminal, the target terminal may receive the message sent by the terminal.
It should be noted that the message received by the target terminal may also be a first message or a second message, that is, the message received by the target terminal may or may not carry the encryption identifier, so that after receiving the message sent by the terminal, the target terminal may execute step 306 to detect whether the message carries the encryption identifier.
In step 306, the target terminal detects whether the message carries an encrypted identifier.
Since the message content of the message may include relatively important information, in order to ensure privacy security of the user and improve security of information interaction, the target terminal may detect whether the message carries the encrypted identifier.
For example, the encryption flag is a boolean value 1, and the target terminal receives the message 1, so the target terminal can detect whether the message 1 carries the boolean value 1.
In step 307, when the message carries the encrypted identifier, the message is encrypted and displayed.
Because the message carries the encrypted identifier, which indicates that the message includes more important information, the target terminal can encrypt and display the message in order to ensure the privacy security of the user and improve the security of the message interaction.
The target terminal may determine an encryption manner for displaying the message in an encrypted manner before displaying the message in an encrypted manner, for example, one possible implementation manner is that the target terminal displays an encryption manner setting prompt message, the encryption manner setting prompt message includes at least one encryption manner currently supported by the target terminal, the terminal receives an encryption manner selection instruction, the encryption manner selection instruction indicates one of the at least one encryption manner, and the encryption manner indicated by the encryption manner selection instruction is determined to display the message in an encrypted manner.
It should be noted that the target terminal may display the encryption mode setting prompt information in a window, pop-up window, or the like.
It should be noted that the selection instruction is used to select one encryption scheme from the at least one encryption scheme, and the selection instruction may be triggered by the user by performing a preset operation.
For example, the target terminal displays an encryption mode setting prompt message including encryption modes such as password encryption, fingerprint encryption, voice encryption, retina encryption, gesture encryption, and the like as shown in fig. 3C, and a cancel button selects fingerprint encryption when a selection instruction is received based on fingerprint encryption. When a cancel operation is received based on the cancel button, the operation of setting the encryption manner is cancelled.
In addition, as can be seen from the foregoing, in another possible implementation strategy, when the terminal determines to encrypt the message, the first encryption identifier is carried in the message, and when the terminal determines not to encrypt the message, the second encryption identifier is carried in the message. Therefore, in step 307, the target terminal may determine to encrypt and display the message when detecting that the message carries the first encrypted message.
Further, in order to improve an interaction effect of the target terminal with a user in the process of displaying the first message, the operation of the target terminal for encrypting and displaying the message may be: and displaying an encrypted message icon, wherein the encrypted message icon is used for indicating that the message is an encrypted message, displaying a user privacy protection interface when a specified operation is received based on the encrypted message icon, and displaying the message content of the message when a decryption operation is received based on the user privacy protection interface.
The target terminal can display the encrypted message icon through a window or a popup window.
It should be noted that the encrypted message icon may be determined by the target terminal before displaying the encrypted message icon.
For example, the message 1 is a text message, and the target terminal encrypts and displays the message 1 as shown in fig. 3D, wherein the display interface does not include the message content of the message 1 and includes a lock-shaped icon to indicate that the currently displayed message 1 is the encrypted message 1. The message 2 is an incoming call request, the target terminal displays the message 2 as shown in fig. 3E, the display interface includes a shape-locked icon, text such as "incoming call" and a reject button, and when the terminal receives a reject operation based on the reject button, the terminal does not respond to the incoming call request.
The specifying operation may be an operation of instructing the target terminal to display or play the message content of the message, or an operation of responding to an incoming call request or the like, and may be an operation such as a click operation, a slide operation, a touch operation, or a key operation.
The user privacy protection interface is used for instructing a user to execute decryption operation, and the target terminal may display the user privacy protection interface corresponding to the encryption mode based on the encryption mode for displaying the message in an encrypted manner, for example, when the encryption mode for displaying the message in an encrypted manner is password encryption, the user privacy protection interface may include a prompt message such as "please input a password" and a password input box, and may further include a virtual keyboard for receiving password input; when the encryption mode for encrypting and displaying the message is fingerprint encryption, the user privacy protection interface may include prompt information such as "please input your fingerprint"; when the encryption mode for encrypting and displaying the message is gesture encryption, the user privacy protection interface may include prompt information such as "please draw a graphic" and an area for receiving the user drawn graphic.
It should be noted that the target terminal may display the user privacy protection interface in a window or pop-up window manner.
It should be noted that the decryption operation may be an operation corresponding to an encryption manner for displaying the message in an encrypted manner, for example, when the encryption manner for displaying the message in an encrypted manner is password encryption, the decryption operation may be inputting a password; when the encryption mode for encrypting and displaying the message is fingerprint encryption, the decryption operation can be inputting a fingerprint; when the encryption mode for encrypting and displaying the message is voice encryption, the decryption operation can be input voice; when the encryption mode for encrypting and displaying the message is retina encryption, the decryption operation can be inputting a retina image; when the message is encrypted by the encryption mode gesture for encrypted display, the decryption operation can be drawing a graph in a screen.
It should be noted that the target terminal may display the message content of the message through a window or a pop-up window.
For example, the message 1 is a text message, the target terminal may display the message content of the message 1 as shown in fig. 3F, and the display interface includes the message content of the message 1: "My bank account is XXXXXXX, and password is XXXXXXX". The message 2 is an incoming call request, the target terminal can use the message content of the message 2 as shown in fig. 3G, the display interface includes characters such as "incoming call", an answering button and a rejection button, and when the target terminal receives an answering operation based on the answering button, the target terminal responds to the incoming call request.
In the embodiment of the disclosure, the terminal can acquire the message to be sent as the first message and determine whether to encrypt and display the first message, that is, for each message to be sent in the terminal, the terminal can determine whether to encrypt and display the message, so that the security and flexibility of message interaction are improved. When the first message is determined to be encrypted and displayed, the terminal can add the encryption identifier in the first message, so that the target terminal receiving the first message is indicated to encrypt and display the first message. Secondly, the terminal can determine to encrypt the first message when detecting the indication encryption operation aiming at the first message or when the first message comprises the specified character, so that the flexibility and the accuracy of judging whether to encrypt the first message are improved, and the safety of instant communication is further improved. In addition, the target terminal can display the first message in a mode of displaying the encrypted message icon, protect the message content of the first message, display a user privacy interface when receiving a specified operation for displaying the message content of the first message based on the encrypted message icon, receive a decryption operation based on the user privacy interface, and further display the message content of the first message, so that the interaction effect between the target terminal and a user in the process of displaying the first message is improved.
FIG. 4 is a block diagram illustrating a message interaction device, according to an example embodiment. Referring to fig. 4, the apparatus includes a determination module 401, an addition module 402, and a transmission module 403.
A determining module 401, configured to determine whether to encrypt and display a first message, where the first message is a message to be sent;
an adding module 402, configured to add an encrypted identifier to the first message to generate a second message when it is determined that the first message is encrypted for display;
a sending module 403, configured to send the second message to a target terminal to instruct the target terminal to perform encrypted display on the first message.
Optionally, the determining module 401 includes:
the first determining sub-module is used for determining to encrypt and display the first message when the indication encryption operation for the first message is detected; alternatively, the first and second electrodes may be,
and the second determining submodule is used for determining to encrypt and display the first message when detecting that the first message comprises the specified characters.
In the embodiment of the present disclosure, the terminal can determine whether to encrypt and display the first message, that is, for each message to be sent in the terminal, the terminal can determine whether to encrypt and display the message, thereby improving the security and flexibility of message interaction. When the first message is determined to be encrypted and displayed, the terminal can add the encryption identifier in the first message, so that the target terminal receiving the first message is indicated to encrypt and display the first message.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 5 is a block diagram illustrating a message interaction device, according to an example embodiment. Referring to fig. 5, the apparatus includes a first receiving module 501, a detecting module 502 and a first display module 503.
A first receiving module 501, configured to receive a message sent by a terminal;
a detecting module 502, configured to detect whether the message carries an encryption identifier;
a first display module 503, configured to encrypt and display the message when the message carries the encrypted identifier.
Optionally, the first display module 503 includes:
a first display sub-module for displaying an encrypted message icon, the encrypted message icon for indicating that the message is an encrypted message;
the second display sub-module is used for displaying a user privacy protection interface when receiving a specified operation based on the encrypted message icon;
and the third display sub-module is used for displaying the message content of the message when a decryption operation is received based on the user privacy protection interface.
Optionally, the apparatus further comprises:
the second display module is used for displaying the encryption mode setting prompt information, and the encryption mode setting prompt information comprises at least one encryption mode;
a second receiving module, configured to receive an encryption mode selection instruction, where the encryption mode selection instruction indicates one encryption mode of the at least one encryption mode;
and the determining module is used for determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selecting instruction.
In the embodiment of the disclosure, the target terminal can detect whether the message carries the encryption identifier or not when receiving the message sent by the terminal, and further determine whether to encrypt and display the message, so that for each received message, the target terminal can encrypt and display the message when the message carries the encryption identifier, thereby improving the security and flexibility of message interaction. And because the terminal adds the encryption identifier in the message, the target terminal encrypts and displays the first message when receiving the message, so that a decryption mode does not need to be obtained from the terminal in advance, the decryption mode is prevented from being obtained by other users, and the safety of message interaction is further improved.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 6 is a block diagram illustrating an apparatus 600 for message interaction in accordance with an example embodiment. For example, the apparatus 600 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 6, apparatus 600 may include one or more of the following components: processing component 602, memory 604, power component 606, multimedia component 608, audio component 610, input/output (I/O) interface 612, sensor component 614, and communication component 616.
The processing component 602 generally controls overall operation of the device 600, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 602 may include one or more processors 620 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 602 can include one or more modules that facilitate interaction between the processing component 602 and other components. For example, the processing component 602 can include a multimedia module to facilitate interaction between the multimedia component 608 and the processing component 602.
The memory 604 is configured to store various types of data to support operations at the apparatus 600. Examples of such data include instructions for any application or method operating on device 600, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 604 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power supply component 606 provides power to the various components of device 600. The power components 606 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power supplies for the apparatus 600.
The multimedia component 608 includes a screen that provides an output interface between the device 600 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 608 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 600 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 610 is configured to output and/or input audio signals. For example, audio component 610 includes a Microphone (MIC) configured to receive external audio signals when apparatus 600 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 604 or transmitted via the communication component 616. In some embodiments, audio component 610 further includes a speaker for outputting audio signals.
The I/O interface 612 provides an interface between the processing component 602 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 614 includes one or more sensors for providing status assessment of various aspects of the apparatus 600. For example, the sensor component 614 may detect an open/closed state of the device 600, the relative positioning of components, such as a display and keypad of the device 600, the sensor component 614 may also detect a change in position of the device 600 or a component of the device 600, the presence or absence of user contact with the device 600, orientation or acceleration/deceleration of the device 600, and a change in temperature of the device 600. The sensor assembly 614 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 614 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 614 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 616 is configured to facilitate communications between the apparatus 600 and other devices in a wired or wireless manner. The apparatus 600 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 616 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 616 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 600 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 604 comprising instructions, executable by the processor 620 of the apparatus 600 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of a mobile terminal, enable the mobile terminal to perform a message interaction method, the method comprising:
judging whether a first message is encrypted and displayed or not, wherein the first message is a message to be sent;
when the first message is determined to be encrypted and displayed, adding an encryption identifier in the first message to generate a second message;
and sending the second message to a target terminal to instruct the target terminal to carry out encrypted display on the first message.
Optionally, the determining whether to perform encrypted display on the first message includes:
when an indication of an encryption operation for the first message is detected, it is determined that the first message is to be displayed encrypted.
Optionally, the determining whether to perform encrypted display on the first message includes:
and when detecting that the first message comprises the specified characters, determining to carry out encrypted display on the first message.
In the embodiment of the present disclosure, the terminal can determine whether to encrypt and display the first message, that is, for each message to be sent in the terminal, the terminal can determine whether to encrypt and display the message, thereby improving the security and flexibility of message interaction. When the first message is determined to be encrypted and displayed, the terminal can add the encryption identifier in the first message, so that the target terminal receiving the first message is indicated to encrypt and display the first message.
Fig. 7 is a block diagram illustrating an apparatus 700 for message interaction in accordance with an example embodiment. For example, the apparatus 700 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 7, apparatus 700 may include one or more of the following components: a processing component 702, a memory 704, a power component 706, a multimedia component 708, an audio component 710, an input/output (I/O) interface 712, a sensor component 714, and a communication component 716.
The processing component 702 generally controls overall operation of the device 700, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 702 may include one or more processors 720 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 702 may include one or more modules that facilitate interaction between the processing component 702 and other components. For example, the processing component 702 may include a multimedia module to facilitate interaction between the multimedia component 708 and the processing component 702.
The memory 704 is configured to store various types of data to support operations at the apparatus 700. Examples of such data include instructions for any application or method operating on device 700, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 704 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 706 provides power to the various components of the device 700. The power components 706 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power supplies for the apparatus 700.
The multimedia component 708 includes a screen that provides an output interface between the device 700 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 708 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 700 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 710 is configured to output and/or input audio signals. For example, audio component 710 includes a Microphone (MIC) configured to receive external audio signals when apparatus 700 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 704 or transmitted via the communication component 716. In some embodiments, audio component 710 also includes a speaker for outputting audio signals.
The I/O interface 712 provides an interface between the processing component 702 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 714 includes one or more sensors for providing status assessment of various aspects of the apparatus 700. For example, sensor assembly 714 may detect an open/closed state of device 700, the relative positioning of components, such as a display and keypad of device 700, sensor assembly 714 may also detect a change in position of device 700 or a component of device 700, the presence or absence of user contact with device 700, orientation or acceleration/deceleration of device 700, and a change in temperature of device 700. The sensor assembly 714 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 714 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 714 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 716 is configured to facilitate wired or wireless communication between the apparatus 700 and other devices. The apparatus 700 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 716 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 716 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 700 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 704 comprising instructions, executable by the processor 720 of the device 700 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein which, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a messaging method, the method comprising:
receiving a message sent by a terminal;
detecting whether the message carries an encryption identifier;
and when the message carries the encrypted identifier, encrypting and displaying the message.
Optionally, the displaying the message in an encrypted manner includes:
displaying an encrypted message icon, the encrypted message icon for indicating that the message is an encrypted message;
displaying a user privacy protection interface when a specified operation is received based on the encrypted message icon;
and when a decryption operation is received based on the user privacy protection interface, displaying the message content of the message.
Optionally, the method further comprises:
displaying an encryption mode setting prompt message, wherein the encryption mode setting prompt message comprises at least one encryption mode;
receiving an encryption mode selection instruction, wherein the encryption mode selection instruction indicates one encryption mode in the at least one encryption mode;
and determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selection instruction.
In the embodiment of the disclosure, the target terminal can detect whether the message carries the encryption identifier or not when receiving the message sent by the terminal, and further determine whether to encrypt and display the message, so that for each received message, the target terminal can encrypt and display the message when the message carries the encryption identifier, thereby improving the security and flexibility of message interaction. And because the terminal adds the encryption identifier in the message, the target terminal encrypts and displays the first message when receiving the message, so that a decryption mode does not need to be obtained from the terminal in advance, the decryption mode is prevented from being obtained by other users, and the safety of message interaction is further improved.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A method of message interaction, the method comprising:
when a message sending instruction is received, acquiring a first message, wherein the first message is a message to be sent;
judging whether the first message is encrypted and displayed;
when the first message is determined to be encrypted and displayed, adding a first encryption identifier into the first message to generate a second message, wherein the first encryption identifier is a character input by a user, the first encryption identifier is used for indicating that the first message is a message needing to be encrypted and displayed, and the second message comprises the first message and the first encryption identifier; sending the second message to a target terminal to indicate the target terminal to encrypt and display the first message;
when the first message is determined not to be encrypted and displayed, adding a second encryption identifier into the first message to generate a third message, wherein the second encryption identifier is a character input by the user, the second encryption identifier is used for indicating that the second message is a message which does not need to be encrypted and displayed, and the third message comprises the first message and the second encryption identifier; sending the third message to the target terminal to instruct the target terminal to display the message content of the first message;
wherein, the judging whether to encrypt and display the first message comprises:
displaying an encryption check box corresponding to the encryption prompt information in a display interface, and determining to encrypt and display the first message when checking operation for the encryption check box is detected; alternatively, the first and second electrodes may be,
when detecting that the first message comprises a specified character, determining to carry out encrypted display on the first message, wherein the determination process of the specified character comprises the following steps: displaying specified character input prompt information, receiving characters input by a user based on the specified character input prompt information, and determining the characters input by the user as the specified characters; alternatively, the first and second electrodes may be,
and when the target terminal identification carried in the message sending instruction is the appointed terminal identification or the carried target contact person identification is the appointed contact person identification, determining to encrypt and display the first message.
2. A method of message interaction, the method comprising:
receiving a message sent by a terminal;
detecting the type of an encryption identifier carried in the message, wherein the encryption identifier is a character input by a user;
when the message carries a first encryption identifier, displaying an encryption message icon, wherein the encryption message icon is used for indicating that the message is an encrypted message; when a specified operation is received based on the encrypted message icon, displaying a user privacy protection interface, wherein the user privacy protection interface is used for executing decryption operation, the user privacy protection interface is an interface corresponding to an encryption mode, the encryption mode is a mode for displaying the message in an encrypted mode, and the decryption operation is an operation corresponding to the encryption mode; when a decryption operation is received based on the user privacy protection interface, displaying the message content of the message, wherein the first encryption identifier is used for indicating that the message is a message needing encryption display and comprises the message content and the first encryption identifier;
and when the message carries a second encryption identifier, displaying the message content of the message, wherein the second encryption identifier is used for indicating that the message is a message which does not need to be encrypted and displayed, and the message comprises the message content and the second encryption identifier.
3. The method of claim 2, wherein the method further comprises:
displaying encryption mode setting prompt information, wherein the encryption mode setting prompt information comprises at least one encryption mode;
receiving an encryption mode selection instruction, wherein the encryption mode selection instruction indicates one encryption mode in the at least one encryption mode;
and determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selection instruction.
4. A message interaction apparatus, the apparatus comprising:
the judging module is used for acquiring a first message when receiving a message sending instruction; judging whether a first message is encrypted and displayed or not, wherein the first message is a message to be sent;
an adding module, configured to add a first encryption identifier to the first message to generate a second message when it is determined that the first message is encrypted and displayed, where the first encryption identifier is a character input by a user, the first encryption identifier is used to indicate that the first message is a message that needs to be encrypted and displayed, and the second message includes the first message and the first encryption identifier; the sending module is used for sending the second message to a target terminal so as to indicate the target terminal to encrypt and display the first message;
the adding module is further configured to add a second encryption identifier to the first message to generate a third message when it is determined that the first message is not to be encrypted and displayed, where the second encryption identifier is a character input by the user, the second encryption identifier is used to indicate that the second message is a message that does not need to be encrypted and displayed, and the third message includes the first message and the second encryption identifier; the sending module is further configured to send the third message to the target terminal, so as to instruct the target terminal to display the message content of the first message;
the judgment module is further configured to display an encryption check box corresponding to the encryption prompt information in a display interface, and when checking operation for the encryption check box is detected, determine to encrypt and display the first message; alternatively, the first and second electrodes may be,
the determining module is further configured to determine to encrypt and display the first message when it is detected that the first message includes a specified character, where the determining process of the specified character includes: displaying specified character input prompt information, receiving characters input by a user based on the specified character input prompt information, and determining the characters input by the user as the specified characters; alternatively, the first and second electrodes may be,
the judging module is further configured to determine to encrypt and display the first message when the target terminal identifier carried in the message sending instruction is the designated terminal identifier or the target contact identifier carried in the message sending instruction is the designated contact identifier.
5. A message interaction apparatus, the apparatus comprising:
the first receiving module is used for receiving a message sent by a terminal;
the detection module is used for detecting the type of an encrypted identifier carried in the message, wherein the encrypted identifier is a character input by a user;
the first display module is used for displaying an encrypted message icon when the message carries a first encrypted identifier, wherein the encrypted message icon is used for indicating that the message is an encrypted message; when a specified operation is received based on the encrypted message icon, displaying a user privacy protection interface, wherein the user privacy protection interface is used for executing decryption operation, the user privacy protection interface is an interface corresponding to an encryption mode, the encryption mode is a mode for displaying the message in an encrypted mode, and the decryption operation is an operation corresponding to the encryption mode; when a decryption operation is received based on the user privacy protection interface, displaying the message content of the message, wherein the first encryption identifier is used for indicating that the message is a message needing encryption display and comprises the message content and the first encryption identifier;
the first display module is further configured to display a message content of the message when the message carries a second encryption identifier, where the second encryption identifier is used to indicate that the message is a message that does not need to be encrypted and displayed, and the message includes the message content and the second encryption identifier.
6. The apparatus of claim 5, wherein the apparatus further comprises:
the second display module is used for displaying the encryption mode setting prompt information, and the encryption mode setting prompt information comprises at least one encryption mode;
a second receiving module, configured to receive an encryption mode selection instruction, where the encryption mode selection instruction indicates one encryption mode of the at least one encryption mode;
and the determining module is used for determining that the message is encrypted and displayed by the encryption mode indicated by the encryption mode selecting instruction.
7. A message interaction apparatus, the apparatus comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a message sending instruction is received, acquiring a first message, wherein the first message is a message to be sent;
judging whether the first message is encrypted and displayed;
when the first message is determined to be encrypted and displayed, adding a first encryption identifier into the first message to generate a second message, wherein the first encryption identifier is a character input by a user, the first encryption identifier is used for indicating that the first message is a message needing to be encrypted and displayed, and the second message comprises the first message and the first encryption identifier; sending the second message to a target terminal to indicate the target terminal to encrypt and display the first message;
when the first message is determined not to be encrypted and displayed, adding a second encryption identifier into the first message to generate a third message, wherein the second encryption identifier is a character input by the user, the second encryption identifier is used for indicating that the second message is a message which does not need to be encrypted and displayed, and the third message comprises the first message and the second encryption identifier; sending the third message to the target terminal to instruct the target terminal to display the message content of the first message;
wherein, the judging whether to encrypt and display the first message comprises:
displaying an encryption check box corresponding to the encryption prompt information in a display interface, and determining to encrypt and display the first message when checking operation for the encryption check box is detected; alternatively, the first and second electrodes may be,
when detecting that the first message comprises a specified character, determining to carry out encrypted display on the first message, wherein the determination process of the specified character comprises the following steps: displaying specified character input prompt information, receiving characters input by a user based on the specified character input prompt information, and determining the characters input by the user as the specified characters; alternatively, the first and second electrodes may be,
and when the target terminal identification carried in the message sending instruction is the appointed terminal identification or the carried target contact person identification is the appointed contact person identification, determining to encrypt and display the first message.
8. A messaging apparatus, the apparatus comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a message sent by a terminal;
detecting the type of an encryption identifier carried in the message, wherein the encryption identifier is a character input by a user;
when the message carries a first encryption identifier, displaying an encryption message icon, wherein the encryption message icon is used for indicating that the message is an encrypted message; when a specified operation is received based on the encrypted message icon, displaying a user privacy protection interface, wherein the user privacy protection interface is used for executing decryption operation, the user privacy protection interface is an interface corresponding to an encryption mode, the encryption mode is a mode for displaying the message in an encrypted mode, and the decryption operation is an operation corresponding to the encryption mode; when a decryption operation is received based on the user privacy protection interface, displaying the message content of the message, wherein the first encryption identifier is used for indicating that the message is a message needing encryption display and comprises the message content and the first encryption identifier;
and when the message carries a second encryption identifier, displaying the message content of the message, wherein the second encryption identifier is used for indicating that the message is a message which does not need to be encrypted and displayed, and the message comprises the message content and the second encryption identifier.
9. A computer-readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to implement operations executed in the message interaction method as recited in claim 1.
10. A computer-readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to implement operations executed in the message interaction method according to any one of claims 2 to 3.
CN201610899194.2A 2016-10-14 2016-10-14 Message interaction method and device Active CN106453052B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610899194.2A CN106453052B (en) 2016-10-14 2016-10-14 Message interaction method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610899194.2A CN106453052B (en) 2016-10-14 2016-10-14 Message interaction method and device

Publications (2)

Publication Number Publication Date
CN106453052A CN106453052A (en) 2017-02-22
CN106453052B true CN106453052B (en) 2020-06-19

Family

ID=58174951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610899194.2A Active CN106453052B (en) 2016-10-14 2016-10-14 Message interaction method and device

Country Status (1)

Country Link
CN (1) CN106453052B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850416A (en) * 2017-03-31 2017-06-13 努比亚技术有限公司 Message processing apparatus and method
WO2019042022A1 (en) * 2017-08-28 2019-03-07 天地融科技股份有限公司 Security display method and device, and security terminal
CN108681664B (en) * 2018-05-28 2020-05-19 维沃移动通信有限公司 Encryption method and device
CN110827176B (en) * 2018-08-11 2023-04-07 冯兴 Legal consultation operation management system and method thereof
CN109165517A (en) * 2018-08-16 2019-01-08 腾讯科技(深圳)有限公司 A kind of method, apparatus preventing information leakage, medium and equipment
CN109829526B (en) * 2019-01-25 2023-09-26 深圳市优博讯科技股份有限公司 Bar code management method and device and electronic equipment
CN109951604B (en) * 2019-02-27 2021-10-15 维沃移动通信有限公司 Message processing method, mobile terminal and user identity identification module
US20200314070A1 (en) * 2019-03-29 2020-10-01 Popsockets Llc Obscured media communication
CN111600847A (en) * 2020-04-22 2020-08-28 维沃移动通信有限公司 Information processing method and electronic equipment
CN112416210A (en) * 2020-11-11 2021-02-26 珠海格力电器股份有限公司 Information encryption and decryption method, system, storage medium and electronic equipment
CN113378241B (en) * 2021-06-23 2023-07-28 安徽中电光达通信技术有限公司 Safety technology protection engineering design system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815267A (en) * 2010-03-05 2010-08-25 惠州Tcl移动通信有限公司 Method for encrypting short message of mobile communication terminal
CN105162693A (en) * 2015-09-16 2015-12-16 小米科技有限责任公司 Message display method and device
CN105162804A (en) * 2015-09-30 2015-12-16 北京奇虎科技有限公司 Communication information protection method and apparatus
CN105184183A (en) * 2015-07-30 2015-12-23 努比亚技术有限公司 Chatting record encryption method and mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7349538B2 (en) * 2002-03-21 2008-03-25 Ntt Docomo Inc. Hierarchical identity-based encryption and signature schemes
KR20140110639A (en) * 2013-03-08 2014-09-17 삼성전자주식회사 Data security method and electronic device implementing the same
CN106020587A (en) * 2016-04-29 2016-10-12 北京小米移动软件有限公司 Method and device for message display

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815267A (en) * 2010-03-05 2010-08-25 惠州Tcl移动通信有限公司 Method for encrypting short message of mobile communication terminal
CN105184183A (en) * 2015-07-30 2015-12-23 努比亚技术有限公司 Chatting record encryption method and mobile terminal
CN105162693A (en) * 2015-09-16 2015-12-16 小米科技有限责任公司 Message display method and device
CN105162804A (en) * 2015-09-30 2015-12-16 北京奇虎科技有限公司 Communication information protection method and apparatus

Also Published As

Publication number Publication date
CN106453052A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN106453052B (en) Message interaction method and device
EP3133528B1 (en) Method and apparatus for fingerprint identification
CN111670571B (en) Method and terminal for viewing information content
US9769667B2 (en) Methods for controlling smart device
CN106790043B (en) Method and device for sending message in live broadcast application
EP3076632B1 (en) Method and apparatus for accessing a network
CN105847243B (en) Method and device for accessing intelligent camera
US10313870B2 (en) Identity verification method and apparatus, and storage medium
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
CN107959757B (en) User information processing method and device, APP server and terminal equipment
US10922444B2 (en) Method and apparatus for displaying application interface
CN107147815B (en) Call processing method and device based on taxi taking
EP2940977A1 (en) Method and device for sending information in voice service
US20180341953A1 (en) Method and apparatus for reporting loss of card or device associated with account number or stolen of account number
US9667784B2 (en) Methods and devices for providing information in voice service
US10263925B2 (en) Method, device and medium for sending message
CN109246094B (en) User terminal verification method, device and storage medium
CN107656616B (en) Input interface display method and device and electronic equipment
CN106506808B (en) Method and device for prompting communication message
CN111541922A (en) Method, device and storage medium for displaying interface input information
CN114124462B (en) Verification code transmission method and device, electronic equipment and storage medium
US20230037475A1 (en) Network connection method and device and readable storage medium
CN107133531B (en) Application lock use reminding method and device
CN106791200B (en) Information display method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant