CN114785751A - Message transmission method and related device - Google Patents

Message transmission method and related device Download PDF

Info

Publication number
CN114785751A
CN114785751A CN202110013849.2A CN202110013849A CN114785751A CN 114785751 A CN114785751 A CN 114785751A CN 202110013849 A CN202110013849 A CN 202110013849A CN 114785751 A CN114785751 A CN 114785751A
Authority
CN
China
Prior art keywords
user account
message
session
target
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110013849.2A
Other languages
Chinese (zh)
Other versions
CN114785751B (en
Inventor
黄小刚
向航
赵东
李斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202110013849.2A priority Critical patent/CN114785751B/en
Publication of CN114785751A publication Critical patent/CN114785751A/en
Application granted granted Critical
Publication of CN114785751B publication Critical patent/CN114785751B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

In a social platform, after a first user account initiates a privacy session request for a second user account, a target device identifier of the second user account is determined, where the target device identifier may be used to identify a terminal device of the second user account receiving an encrypted session message sent by the first user account, and may also determine a target encryption key according to the target device identifier. If the encrypted session message sent from the first user account to the second user account is obtained, the encrypted session message is forwarded to the second user account according to the target equipment identifier, so that safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the transmitted message is known by a third party is reduced in a message transmission layer. The target device identification not only realizes the security of the message transmission layer, but also further ensures the privacy provided by the privacy session scene from the message display layer.

Description

Message transmission method and related device
Technical Field
The present application relates to the field of data processing, and in particular, to a message transmission method and a related device.
Background
The social software provides social services for users, and the users can use the social software to realize various social requirements.
In some cases, a user needs a social scenario with high privacy requirements, and a message sent and received in the social scenario is expected to be known only by a plurality of users involved in the scenario.
However, the related art does not provide a scheme that can effectively satisfy the social needs of the user privacy.
Disclosure of Invention
In order to solve the technical problem, the application provides a message transmission method and a related device, which are used for meeting the social requirement of user privacy.
The embodiment of the application discloses the following technical scheme:
in one aspect, the present application provides a message transmission method, where the method includes:
the method comprises the steps of obtaining a privacy session request of a first user account aiming at a second user account in a social platform;
determining a target device identification of the second user account;
returning a target encryption key corresponding to the target equipment identifier to the first user account, wherein the target encryption key is used for encrypting a session message sent from the first user account to the second user account, and the display duration of the session message is preset duration;
and if an encrypted session message sent from the first user account to the second user account is obtained, forwarding the encrypted session message to the second user account according to the target equipment identifier, wherein the encrypted session message is encrypted according to the target encryption key.
In another aspect, the present application provides a message transmission method, including:
sending a privacy session request aiming at a second user account to a social platform through a first user account, wherein the first user account and the second user account are social accounts in the social platform;
obtaining a target encryption key returned by the social platform, wherein the target encryption key is determined according to a target device identifier of the second user account;
encrypting a session message sent to the second user account through the target encryption key to obtain an encrypted session message, wherein the display duration of the session message is a preset duration;
and sending the encrypted session message to the second user account through the social platform.
In another aspect, the present application provides a message transmission method, including:
acquiring an encrypted session message sent by a first user account through a second user account, wherein the first user account and the second user account are social accounts in a social platform, and the encrypted session message is obtained by encrypting the session message through a target encryption key by the first user account;
decrypting the encrypted session message through a target decryption key corresponding to the target encryption key to obtain the session message;
and viewing the conversation message within a preset time length.
In another aspect, the present application provides a message transmission method, where the method includes:
sending a target session message to a second user account in a session interface through a first user account, wherein the first user account and the second user account are social accounts in a social platform, and the session interface corresponds to the first user account and the second user account;
obtaining a message type editing operation of the first user account for the target session message in the session interface, wherein the message type editing operation is used for changing the message type of the target session message into a privacy message type or a conventional message type, and the display duration of the target session message with the privacy message type in the session interface is a target display duration;
and changing the message type of the target session message according to the indication of the message type editing operation.
In another aspect, the present application provides a message transmission method, including:
displaying a privacy session prompt through a second user account according to the obtained privacy session message, wherein the privacy session prompt is used for identifying that the privacy session message comes from a first user account, and the first user account and the second user account are social accounts in a social platform;
if the triggering operation aiming at the privacy session prompt through the second user account is determined, displaying the privacy session message through a privacy session interface;
and when the privacy session message is displayed for a preset time length in the privacy session interface, canceling the display of the privacy session message.
In another aspect, the present application provides a message transmission apparatus, including:
the obtaining unit is used for obtaining a privacy session request of a first user account aiming at a second user account in the social platform;
the determining unit is configured to determine a target device identifier of the second user account;
the returning unit is configured to return a target encryption key corresponding to the target device identifier to the first user account, where the target encryption key is used to encrypt a session message sent by the first user account to the second user account, and a display duration of the session message is a preset duration;
the sending unit is configured to, if an encrypted session message sent by the first user account to the second user account is obtained, forward the encrypted session message to the second user account according to the target device identifier, where the encrypted session message is encrypted according to the target encryption key.
In another aspect, the present application provides a message transmission apparatus, including:
the first sending unit is used for sending a privacy session request aiming at a second user account to a social contact platform through a first user account, wherein the first user account and the second user account are social contact accounts in the social contact platform;
the obtaining unit is configured to obtain a target encryption key returned by the social platform, where the target encryption key is determined according to a target device identifier of the second user account;
the encryption unit is used for encrypting a session message sent to the second user account through the target encryption key to obtain an encrypted session message, and the display duration of the session message is a preset duration;
the second sending unit is configured to send the encrypted session message to the second user account through the social platform.
In another aspect, the present application provides a message transmission apparatus, including:
the obtaining unit is configured to obtain, through a second user account, an encrypted session message sent by a first user account, where the first user account and the second user account are social accounts in a social platform, and the encrypted session message is obtained by encrypting the session message through a target encryption key by the first user account;
the decryption unit is configured to decrypt the encrypted session message by using a target decryption key corresponding to the target encryption key to obtain the session message;
and the viewing unit is used for viewing the conversation message within a preset time length.
In another aspect, the present application provides a message transmission apparatus, including:
the sending unit is used for sending a target session message to a second user account in a session interface through a first user account, wherein the first user account and the second user account are social accounts in a social platform, and the session interface corresponds to the first user account and the second user account;
the obtaining unit is configured to obtain a message type editing operation of the first user account for the target session message in the session interface, where the message type editing operation is used to change a message type of the target session message to a privacy message type or a conventional message type, and a display duration of the target session message with the privacy message type in the session interface is a target display duration;
and the changing unit is used for changing the message type of the target session message according to the indication of the message type editing operation.
In another aspect, the present application provides a message transmission apparatus, including:
the display unit is used for displaying a privacy session prompt through a second user account according to the obtained privacy session message, the privacy session prompt is used for identifying that the privacy session message comes from a first user account, and the first user account and the second user account are social contact accounts in a social contact platform; if the triggering operation aiming at the privacy session prompt through the second user account is determined, displaying the privacy session message through a privacy session interface;
and the canceling unit is used for canceling the display of the privacy session message when the privacy session message shows a preset duration in the privacy session interface.
In another aspect, the present application provides a computer device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of the above aspect according to instructions in the program code.
In another aspect, the present application provides a computer-readable storage medium for storing a computer program, where the computer program is configured to execute the method according to the foregoing aspect.
In another aspect, embodiments of the present application provide a computer program product or a computer program, which includes computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method of the above aspect.
According to the technical scheme, for the first user account and the second user account in the social platform, after the first user account initiates a privacy session request for the second user account, a target device identifier of the second user account is determined, the target device identifier can be used for identifying a terminal device of the second user account receiving an encrypted session message sent by the first user account, a target encryption key can be determined according to the target device identifier, and the session message encrypted by the first user account according to the target encryption key can only be decrypted by the terminal device corresponding to the target device identifier. If the encrypted session message sent from the first user account to the second user account is obtained, the encrypted session message is forwarded to the second user account according to the target equipment identifier, so that safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the transmitted message is known by a third party is reduced in a message transmission layer. The target equipment identification enables only the appointed terminal equipment to receive and display the conversation message within the preset time, so that the probability that the conversation message in the conversation scene of the privacy message is viewed by others is reduced, the possibility that the conversation message is viewed by the second user account in time is improved, the safety of a message transmission layer is realized through the target equipment identification, and the privacy provided by the privacy conversation scene is further ensured from the message display layer.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic view of an application scenario of a message transmission method according to an embodiment of the present application;
fig. 2 is a signaling interaction diagram of a message transmission system according to an embodiment of the present application;
fig. 3 is a schematic diagram of sending a privacy session request according to an embodiment of the present application;
fig. 4 is a flowchart of a message transmission method according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating a sending of a privacy session request according to an embodiment of the present application;
fig. 6a is a schematic diagram of a private session prompt of an encrypted session message according to an embodiment of the present application;
fig. 6b is a schematic diagram of a privacy session hint for an encrypted session message according to an embodiment of the present application;
fig. 6c is a schematic diagram of a privacy session hint for an encrypted session message according to an embodiment of the present application;
fig. 6d is a schematic diagram of a private session prompt for an encrypted session message according to an embodiment of the present application;
fig. 6e is a schematic diagram of a message display of a private conversation according to an embodiment of the present application;
fig. 6f is a schematic diagram of a session message display according to an embodiment of the present application;
fig. 6g is a schematic diagram of a content recording prevention operation according to an embodiment of the present application;
fig. 7 is a flowchart of a public key obtaining and updating method provided in an embodiment of the present application;
fig. 8 is a flowchart of a message transmission method according to an embodiment of the present application;
fig. 9a is a schematic diagram of a session interface provided in an embodiment of the present application;
FIG. 9b is a schematic diagram of a session interface according to an embodiment of the present application;
fig. 10 is a schematic diagram of a message type editing operation according to an embodiment of the present application;
fig. 11 is a schematic diagram of a message type editing operation according to an embodiment of the present application;
FIG. 12 is a schematic diagram of a timing manner provided by an embodiment of the present application;
FIG. 13 is a schematic diagram of a timing method according to an embodiment of the present application;
fig. 14 is a schematic diagram of a privacy session interface provided in an embodiment of the present application;
fig. 15 is a flowchart of a message transmission method according to an embodiment of the present application;
FIG. 16 is a schematic diagram of a privacy session interface provided by an embodiment of the present application;
fig. 17 is a schematic diagram of a message transmission apparatus according to an embodiment of the present application;
fig. 18 is a schematic diagram of a message transmission apparatus according to an embodiment of the present application;
fig. 19 is a schematic diagram of a message transmission apparatus according to an embodiment of the present application;
fig. 20 is a schematic diagram of a message transmission apparatus according to an embodiment of the present application;
fig. 21 is a schematic diagram of a message transmission apparatus according to an embodiment of the present application;
fig. 22 is a schematic structural diagram of a server according to an embodiment of the present application;
fig. 23 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings.
In order to ensure the privacy of message sending and receiving in a private social scene, in the related technology, a sending party encrypts a message through a third party encryption service when sending the message, a server of a social platform forwards the encrypted message to a receiving party, the message is stored in the server in a ciphertext form, and the receiving party decrypts the message through the third party encryption service after receiving the message. For some social scenes requiring higher privacy requirements, even if the problem of data leakage of the third-party encryption service is not considered, at least the plaintext of a private message is known by other subjects (such as the third-party encryption service) except for the message sender and the message receiver, and the privacy of the message is difficult to ensure, so that the privacy session scene is only embodied at a literal level.
In order to improve the privacy of a message in a privacy session scenario, embodiments of the present application provide a message transmission method and a related apparatus.
The message transmission method provided by the embodiment of the application can be applied to message transmission equipment with data processing capacity, such as terminal equipment or a server, the method can be independently executed through the terminal equipment, can also be independently executed through the server, and can also be applied to a network scene of communication between the terminal equipment and the server, and the method can be executed through the cooperation of the terminal equipment and the server. The terminal equipment can be a mobile phone, a tablet and the like; the server may be understood as an application server or a Web server, and in actual deployment, the server may be an independent server or a cluster server.
In order to facilitate understanding of the technical solution of the present application, the following describes a message transmission method provided in the embodiments of the present application with a server and a terminal device as a message transmission device in combination with an actual application scenario.
Referring to fig. 1, fig. 1 is a schematic view of an application scenario of a message transmission method according to an embodiment of the present application. In the application scenario shown in fig. 1, the server 200 including the social platform is configured to forward an encrypted session message and the like sent by the terminal device 100 to the terminal device 300.
When a first user account has a privacy session requirement with a second user account, the first user account sends a privacy session request to the server 200 through the terminal device 100.
The embodiment of the present application does not specifically limit the manner in which the first user account triggers the privacy session request. For example, in the scenario shown in fig. 1, a chat interface between a first user account and a second user account is displayed in the terminal device 100, and the terminal device 100 sends a privacy session request for the second user account to the server 200 by determining a trigger operation on the privacy session control in the chat interface.
After obtaining the privacy session request, the server 200 determines the target device identifier of the second user account. In the application scenario, there are a plurality of terminal devices for logging in the second user account, and in order to avoid that the encrypted session message may be forwarded to the plurality of terminal devices and increase the possibility that the encrypted session message is known by the third party, it is necessary to determine that one terminal device receives the encrypted session message from the plurality of terminal devices, and the device identifier corresponding to the determined terminal device is the target device identifier. In the scenario shown in fig. 1, the specified terminal device is the terminal device 300, and the device identifier of the terminal device 300 is determined as the target device identifier of the second user account.
The target device identifier can be used for identifying the terminal device of the second user account receiving the encrypted session message sent by the first user account, and can also determine the target encryption key according to the target device identifier, and the session message encrypted by the target encryption key can only be decrypted by the terminal device corresponding to the target device identifier, so that the safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the session message is known by a third party is reduced in a message transmission layer.
The server 200 returns a target encryption key corresponding to the target device identifier to the terminal device 100, and the first user account encrypts the session message sent to the second user account according to the target encryption key, so that only the terminal device 300 can decrypt the encrypted session message.
In this embodiment, the session message has two types, namely, a private message type session message and a regular message type session message, where the private session type session message is generally applied to a session scenario with a private session requirement, and is displayed in the session interface for only a period of time, and the regular message type session message can be kept displayed in the session interface, and can be viewed by a user at any time.
Although the encryption and decryption transmission manner of the session message is mainly described in the embodiments corresponding to fig. 1 to 7, the present disclosure of the session message at the user interaction level is also related, so in order to effectively distinguish the aforementioned different types of session messages, in the embodiments corresponding to fig. 1 to 7, the session message refers to the session message of the private message type, and the regular message refers to the session message of the regular message type.
In this embodiment, the session message encrypted and transmitted by the target encryption key is a session message of a private message class, and the session message and the normal message may be presented in different arrangement manners, for example, in a scenario shown in fig. 1, the session message and the normal message are mixedly arranged in a session interface currently corresponding to the first user account and the second user account. Before the privacy session control is not triggered, a session interface has shown a conventional message "haha" sent by the first user account and the second user account respectively. After triggering the privacy session control, the first user account sends a session message with privacy session requirements to the second user account, "how do companies profit in the quarter? ", the terminal device 100 encrypts the session message according to the target encryption key at the time of transmission, and transmits the encrypted session message obtained by the encryption to the server 200.
After the server 200 obtains the encrypted session message, the server forwards the encrypted session message to the second user account according to the determined target device identifier, and the second terminal device decrypts the encrypted session message to obtain a session message, "how do company profit in this quarter? ", the conversation message will only be displayed in the conversation interface for a preset duration. In the scenario shown in fig. 1, the preset time duration is 8 seconds, and when the display time in the session interface reaches 8 seconds, the session message is not displayed in the session interface.
Therefore, only the appointed terminal equipment (namely the terminal equipment corresponding to the target equipment identification) can receive the encrypted session message through the target equipment identification, and only the appointed terminal equipment can decrypt the encrypted session message and display the private session message decrypted by the encrypted session message within the preset time length, so that the probability that the encrypted session message is viewed by others in the private message session scene is reduced, the possibility that the encrypted session message is viewed by a second user account in time is improved, the safety of a message transmission layer is realized by the general target equipment identification, and the privacy provided by the private session scene is further ensured from the message display layer.
Referring to fig. 2, fig. 2 is a signaling interaction diagram of a message transmission system according to an embodiment of the present application. As shown in fig. 2, the message transmission system includes terminal devices and a server as the aforementioned message transmission system devices, where the terminal devices include a first terminal device and a second terminal device, the terminal devices mainly implement encrypting a session message, decrypting the encrypted session message, viewing the session message, and the like, and the server mainly implements determining a target device identifier, forwarding the encrypted session message, and the like, and the following describes in detail an interaction process between the terminal device and the server.
S201: a privacy session request for a second user account is sent to the social platform through the first user account.
In a social scenario where a social account in the social platform requires a higher privacy requirement, for example, the user a sends a text message with a higher privacy requirement to the user B through the chat platform, and in this scenario, the session message is the text message. For another example, the user a sends a mail with a higher privacy requirement to the user B through the mail platform, and in this scenario, the conversation message is the mail. The following are two user accounts in a social platform: the first user account and the second user account chat through social software as an example.
The method comprises the steps that a first user account logs in a social contact platform through first terminal equipment, a second user account logs in the social contact platform through second terminal equipment, and when the first user account has a privacy conversation requirement with the second user account, the first user account sends a privacy conversation request aiming at the second user account to a server through the first terminal equipment. Through the privacy session request, the first user account may send a session message with privacy requirements to the second user account.
The embodiment of the present application does not specifically limit the manner in which the first terminal device sends the privacy session request. For example, in a chat interface of a first user account and a second user account, a related control for opening a privacy session is triggered to send a privacy session request, and the related control may be a privacy session control as shown in fig. 1. For another example, the relevant characters such as "open privacy session", "percent%", etc. are input in the input box in the chat interface to send the privacy session request, and as shown in fig. 3, "#####" is input in the input box 301 to send the privacy session request.
S202: the server acquires a privacy session request of a first user account aiming at a second user account in the social platform.
The server acquires a privacy session request sent by a first terminal device, wherein the privacy session request is a privacy session request of a first user account aiming at a second user account in a social platform.
S203: the server determines the target device identification of the second user account.
In order to ensure the privacy of the session message in the privacy session process, the session message in the privacy session process may be encrypted in a manner that only the first user account and the second user account can be viewed, so that only the second terminal device where the second user account is located can decrypt the session message after the first terminal device where the first user account is located is encrypted. It should be noted that, based on the applicability of the social platform where the user account is located, the terminal device logged in by the user account may include such intelligent devices as a mobile phone, a desktop computer, a notebook computer, and the like.
If the second user account can log in the social platform through the multiple terminal devices, in order to avoid that the encrypted session message may be forwarded to the multiple terminal devices of the second user account by the server, and thus the session message with privacy requirements may be respectively displayed on the multiple terminal devices, and the possibility of leakage is increased, the server may determine one terminal device or a part of terminal devices among the multiple terminal devices as the terminal device that receives the encrypted session message, so as to reduce the possibility that the encrypted session message is known by a third party. And determining the device identification of the specified terminal device as the target device identification of the second user account. It can be understood that, if the second user account has only one terminal device capable of logging in, the device identifier of the terminal device is the target device identifier of the second user account.
The embodiment of the present application does not specifically limit the manner of determining the target device identifier of the second user account. For example, the target device identifier of the second user account may be determined from the plurality of device identifiers according to the filtering condition. The content of the screening conditions is not specifically limited in the embodiments of the present application, for example, the screening conditions include one or more combinations of the device types of the multiple device identifiers, the device identifiers used by the second user account to log in the social platform, and the like, which are described below separately.
The first method comprises the following steps: a device type of the plurality of device identifications.
The device identifier may be used to identify a type of the terminal device, for example, the device type of the terminal device is a mobile phone, a tablet, a notebook, or the like. And determining the target equipment identification of the second user account from the plurality of equipment according to the equipment types of the plurality of equipment identifications. For example, the second user account logs in the social platform through the mobile phone and the desktop at the same time, and when the screening condition is that the mobile phone is the mobile phone, the mobile phone is determined as the target device identifier of the second user account. For example, the screen of a mobile phone is generally smaller than that of a desktop computer, the displayed session message is not easy to see by surrounding people, the number of terminal devices for receiving encrypted session messages is reduced, and the privacy of the session messages is improved.
And the second method comprises the following steps: and the second user account logs in the equipment identification adopted by the social platform.
The number of terminal devices of the second user account capable of logging in the social contact platform is multiple, for example, the second user account logs in all of a mobile phone a, a mobile phone B, a notebook computer C, and the like, and a target device identifier of the second user account can be determined from multiple devices through a device identifier adopted by the second user account to log in the social contact platform. For example, the second user account logs in the social platform through the mobile phone a, the mobile phone B, and the notebook computer C, and the current second user account only logs in the social platform through the mobile phone a and the notebook computer C, and determines the device identifiers of the mobile phone a and the notebook computer C as the target device identifiers of the second user account. The equipment adopted by the second user account for logging in the social contact platform is used as the equipment for receiving the encrypted session message, so that the second user account can check the session message sent by the first user account in time, and the number of terminal equipment for receiving the encrypted session message is reduced.
And the third is that: the device types of the multiple device identifications and the device identification adopted by the second user account for logging in the social platform.
And determining a target device identifier of the second user account from the multiple device identifiers according to the device types of the multiple device identifiers and the device identifier adopted by the second user account for logging in the social platform. For example, the second user account logs in the social contact platform through the mobile phone a, the mobile phone B, and the notebook computer C, and when the screening condition is that the second user account logs in the device identifier of the mobile phone used by the social contact platform, the current second user account only logs in the social contact platform through the mobile phone a and the notebook computer C, and the device identifier of the mobile phone a is determined as the target device identifier of the second user account. Therefore, the number of terminal devices for receiving the encrypted session message is reduced, the probability that the session message is viewed by others is reduced, and the possibility that the session message is viewed by the second user account in time is improved.
For another example, the screening condition may also be a target device identifier of the second user account determined according to the user behavior habit. For example, the device identifier of the terminal device used by the second user account to log in the social platform last time is determined as the target device identifier of the second user account, and the possibility that the second user account continues to log in the social platform with the terminal device is high. For another example, if the second user account frequently logs in the social platform on the mobile phone, the device identifier corresponding to the mobile phone may be determined as the target device identifier of the second user account, and the possibility that the second user account logs in the social platform through the mobile phone next time is high. And the screening condition designates a small number of terminal devices to receive the encrypted session message, so that the number of the terminal devices receiving the encrypted session message can be reduced, the possibility that the encrypted session message is known by a third party is reduced, the terminal devices which are possible to log in next time by the second user account can be designated to receive the encrypted session message, and the possibility that the second user account can check the encrypted session message in time is improved.
As a possible implementation manner, an encryption key correspondence relationship may be pre-stored in a certificate authority, such as a certificate authority (ca) certificate authority (certificate authority), where the encryption key correspondence relationship is used to identify a correspondence relationship between a user identifier, a device identifier, and an encryption key, so as to obtain a target device identifier and a target encryption key corresponding to the target device identifier.
For example, after a privacy session request of a first user account for a second user account is obtained, the privacy session request carries a target user identifier of the second user account, and a target device identifier of the second user account and a target encryption key corresponding to the target device identifier may be determined according to a correspondence between the target user identifier of the second user account and an encryption key stored in an authentication center.
For convenience of description, in the following description, the device identifier of the second terminal device is taken as an example of the target device identifier of the second user account.
It is understood that as the usage time of the target encryption key increases, the higher the possibility that the target encryption key is broken, and in order to reduce the possibility that the target encryption key is broken, the target encryption key may be updated at intervals.
For example, the authentication center stores the key validity time of the encryption key, and if the target encryption key is determined to be expired according to the key validity time of the target encryption key, the second user account is instructed to update the target encryption key. Therefore, the security of the target encryption key is improved, and the security of the encrypted session message is further improved.
Of course, the terminal device corresponding to the second user account, for example, the second terminal device, may also determine the timing for updating the target encryption key by itself.
S204: and the server returns a target encryption key corresponding to the target equipment identifier to the first user account.
The target equipment identification and the target encryption key have a corresponding relation, and the server returns the target encryption key corresponding to the target equipment identification to the first terminal equipment, so that the first terminal equipment encrypts the session message according to the target encryption key.
The target device identifier may be used to identify a terminal device of the second user account that receives the encrypted session message sent by the first user account, and may also determine a target encryption key corresponding to the target device identifier according to the target device identifier, where the target encryption key is used to encrypt the session message sent by the first user account to the second user account, so that the encrypted session message obtained through encryption may only be decrypted by the terminal device corresponding to the target device identifier. For example, the target encryption key may be a target public key generated based on a target private key of the second user account. The first terminal equipment encrypts the session message through the target public key, and the second terminal equipment decrypts the encrypted session message according to the target private key. Therefore, the safe end-to-end message transmission in the privacy session scene is realized, and the possibility that the encrypted session message is known by a third party is reduced in the message transmission layer.
It should be noted that, in the privacy session scenario, in order to prevent the session message from being traced back, the session message sent by the first user account to the second user account is only displayed for a preset time. For example, in a chat interface between the first user account and the second user account, when the second user account reads the conversation message for 10 seconds, the conversation message is no longer displayed in the chat interface, so that the possibility that the conversation message is viewed by a third party can be reduced, the possibility that the conversation message is viewed by the second user account in time is also improved, and the privacy of the conversation message is ensured from a message display level.
S205: and the first terminal equipment acquires a target encryption key returned by the social platform.
S206: and the first terminal equipment encrypts the session message sent to the second user account through the target encryption key to obtain an encrypted session message.
The conversation message may be a text message, a picture message, a video message, a file, a mail, and the like, which is not specifically limited in this application.
The first terminal device may encrypt a session message sent to the second user account according to the target encryption key and a private key of the first terminal device using a diffie-hellman algorithm. For example, the first terminal device and the second terminal device each hold a respective private key, and respective public keys are uniformly stored in a third-party storage service, such as a CA authentication center. The target encryption key may be a public key of the second terminal device, and the first terminal device may obtain the public key of the second terminal device from the CA authentication center, and encrypt the session message according to the public key of the second terminal device and a private key of the first terminal device, thereby obtaining an encrypted session message.
The present application also does not specifically limit the manner in which session messages are encrypted. For example, a symmetric encryption algorithm, an asymmetric encryption algorithm, a hash algorithm, or the like may be employed.
S207: and the first terminal equipment sends the encrypted session message to the second user account through the social platform.
S208: and if the server acquires the encrypted session message sent from the first user account to the second user account, forwarding the encrypted session message to the second user account according to the target equipment identifier.
After receiving the encrypted session message sent by the first user account, the server of the social platform determines, according to the target device identifier, a terminal device, such as a second terminal device, of the second user account, where the second user account receives the encrypted session message, so as to forward the encrypted session message to the terminal device, for the second user account to view.
In order to ensure the privacy of the encrypted session message between the first user account and the second user account, the server only forwards the encrypted session message after receiving the encrypted session message sent by the first user account, and the encrypted session message is not stored on the server side when the second user account is logged in during forwarding, so that the problem that the encrypted session message is leaked from the server is avoided, and the possibility that the encrypted session message is known by a third party is reduced.
On the premise of ensuring the privacy of the encrypted session message in the transmission process, in order that the second user account can acquire the encrypted session message, after acquiring the encrypted session message sent by the first user account, the server can determine whether the second user account logs in the social platform through the terminal device corresponding to the target device identifier. If so, the server can directly forward the encrypted session message to the second user account according to the target device identifier, and if not, the server stores the encrypted session message as an offline message corresponding to the second user account, so that the encrypted session message is obtained from the offline message stored in the server after the second user account logs in the social platform through the terminal device corresponding to the target device identifier.
In order to ensure the privacy between the first user account and the second user account, the server may delete the stored encrypted session message after the second user account receives the encrypted session message based on the offline message, so as to reduce the possibility that the encrypted session message is leaked by the server, and further reduce the possibility that the encrypted session message is known by a third party.
S209: and acquiring the encrypted session message sent by the first user account through the second user account.
For example, after the second user account logs in the social platform through the second terminal device, the second terminal device obtains the encrypted session message sent by the first user account forwarded by the server.
S210: and the second terminal equipment decrypts the encrypted session message through the target decryption key corresponding to the target encryption key to obtain the session message.
Based on the foregoing, the target encryption key is determined according to the device identifier of the second terminal device, and the second terminal device has a target decryption key corresponding to the target encryption key. For example, when the target encryption key is a target public key generated based on a target private key of the second user account, the target decryption key is the target private key.
If the target encryption key is a target public key of the second user account and the target decryption key is a target private key of the second user account, in a possible implementation manner, the first user account may further encrypt the session message through a private key of the first user account and the target public key, and correspondingly, when the second user account acquires the encrypted session message, the second user account may decrypt the encrypted session message through the public key of the first user account (which may be acquired through the authentication center) and the target private key thereof, so as to restore the session message.
S211: and the second terminal equipment checks the session message within a preset time length.
Because the session message only displays the preset time length, the second terminal device needs to check the session message within the preset time length, and the preset time length can be set according to actual needs, which is not specifically limited in the present application. For example, after the session message is displayed in the chat interface of the first user account and the second user account for 30 seconds, the session message is canceled from being displayed in the session interface corresponding to the first terminal device and the second terminal device, and the session message is deleted in the storage space of the first terminal device and the second terminal device. For another example, after the second user account exits the session interface, all the session messages read by the second user account or all the session messages with the privacy session requirement in the session interface may be cancelled and displayed in the session interface.
According to the technical scheme, for the first user account and the second user account in the social platform, after the first user account initiates a privacy session request for the second user account, a target device identifier of the second user account is determined, the target device identifier can be used for identifying a terminal device of the second user account for receiving an encrypted session message sent by the first user account, and can also be used for determining a target encryption key according to the target device identifier, and the session message encrypted by the first user account according to the target encryption key can only be decrypted by the terminal device corresponding to the target device identifier. If the encrypted session message sent by the first user account to the second user account is obtained, the encrypted session message is forwarded to the second user account according to the target equipment identification, so that safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the transmitted message is known by a third party is reduced in a message transmission layer. The target equipment identification enables only the appointed terminal equipment to receive and display the conversation message within the preset time length, so that the probability that the conversation message is viewed by others in the conversation scene of the privacy message is reduced, the possibility that the conversation message is viewed by the second user account in time is improved, the safety of a message transmission layer is realized through the target equipment identification, and the privacy provided by the privacy conversation scene is further ensured from the message display layer.
In order to better understand the message transmission method provided by the foregoing embodiment, an application scenario of the message transmission method provided by the embodiment of the present application is described below with reference to fig. 4, fig. 5, and fig. 6a to fig. 6 g.
Referring to fig. 4, this figure is a flowchart of a message transmission method provided in an embodiment of the present application, where the message transmission method includes the following steps:
s401: the first user account sends a privacy session request for the second user account.
As shown in fig. 5, in practical applications, a user may click chat software in the first terminal device, log in the social platform through the first user account, open a chat interface with the second user account, and select to enter a privacy session, where the first user account sends a privacy session request for the second user account to the social platform.
S402: and acquiring the public key of the second terminal equipment from the CA authentication center.
After the server obtains a privacy session request of a first user account aiming at a second user account in the social platform, the server determines that the second terminal equipment is a target equipment identification of the second user account according to an encryption key corresponding relation stored in a CA authentication center, and determines a public key of the second terminal equipment as a target encryption key. And the server sends the public key of the second terminal device to the first terminal device.
The following describes how the CA certificate authority acquires the public key of the terminal device with reference to fig. 7. Referring to fig. 7, this figure is a flowchart of a public key obtaining and updating method provided in an embodiment of the present application. In fig. 7, taking the first user account as an example, the method includes the following steps:
s701: and logging in the first user account on the terminal equipment.
S702: the terminal equipment generates a private key and a public key of the first user account, the private key is stored in the local of the terminal equipment, and the public key is uploaded to a CA authentication center.
Note that, even if one user account has a plurality of terminal devices that can be registered, the public keys generated by these terminal devices are not the same.
The information stored in the CA authentication center may be a user account, a terminal device identifier (e.g., a terminal device ID), a public key, and an expiration time of the public key.
S703: and periodically instructing the terminal equipment to update the public key, and uploading the updated public key to the CA authentication center.
S403: an encryption key is further generated with the private key of the first terminal device and the public key of the second terminal device.
The further generated encryption key may be reserved, so that after the subsequent first user account sends the session message to the second user account again, the session message may be directly encrypted by using the encryption key until the public key of the second terminal device changes.
S404: and encrypting the session message by using the further generated encryption key, and sending the session message to the second user account through the server.
The first terminal device encrypts the session message sent to the second user account by using the further generated encryption key to obtain an encrypted session message, and sends the encrypted session message to the server so that the server forwards the encrypted session message to the second user account.
S405: the server judges whether a second user account logs in the social contact platform through second terminal equipment or not, if not, S406 is executed; if yes, go to step S408.
S406: and the server stores the encrypted session message in an offline message queue corresponding to the second user account.
S407: and pulling the encrypted session message from the offline message queue corresponding to the second user account.
After a second user account logs in the social platform through a second terminal device, pulling an encrypted session message sent by a first user account from an offline message queue corresponding to the second user account stored in the server.
S408: and the server forwards the encrypted session message to the second user account according to the target equipment identifier.
S409: and the second terminal equipment receives the encrypted session message pushed by the server.
S410: the second user account views the session message sent by the first user account.
If the second user account only logs in the social platform and is not in a chat interface with the first user account, a privacy session prompt of the encrypted session message sent by the first user account is displayed in the chat software so that the second user account can conveniently check the privacy session prompt.
The embodiment of the present application does not specifically limit the privacy session prompt form of the encrypted session message. For example, as shown in fig. 6a, in the session homepage of the second user account, a "chat box corresponding to the first user account" is displayed to remind the second user account to view. For another example, as shown in fig. 6b, a chat box with the first user account is separately displayed in the session homepage of the second user account, and a "[ dense chat message ]" is displayed in the chat box to remind the second user account to view, so as to distinguish a conventional session message between the second user account and the first user account. As another example, as shown in fig. 6c, a private conversation prompt of the encrypted conversation message is displayed as an icon in a non-chat box area in the conversation home page of the second user account.
If the second user account is in the chat interface with the first user account, and after the first user account starts private chat, a privacy session prompt is displayed in the chat interface, as shown in fig. 6 d.
Note that, the embodiment of the present application does not specifically limit the icon form of the privacy session prompt. When the encrypted session message is reminded of the second user account, the number of the encrypted session messages can be displayed in areas such as an icon for prompting the private session and a first user account icon, or the number of the encrypted session messages can be reminded only by using the icon without displaying the number of the encrypted session messages, so that the privacy of the encrypted session messages is improved.
The second user account views the session message according to the privacy session prompt. The present application does not specifically limit the presentation manner of the session message. For example, as shown in fig. 1, the conversation message is arranged in a chat interface of the first user account and the second user account in a mixed manner with the regular conversation message. As another example, as shown in fig. 6e, after the second user account triggers the privacy session prompt, the second user account enters a separate chat interface to view the session message sent by the first user account.
After receiving the triggering operation of the chat interface of the quit session message, for example, after the second user account clicks the quit key shown in the upper right corner of fig. 6e, the second user account quits the chat interface, and returns to the normal session message chat interface with the first user account, as shown in fig. 6 f.
In order for the first user account and the second user account to explicitly view some rules of the session messages, the first user account and the second user account may be prompted for relevant reminders regarding the privacy session. For example, as shown in the text mode of fig. 6e, you have entered into a chat with the other party; the messages of both parties are automatically destroyed after being read, and no trace is left at each end; messages cannot be copied or forwarded; the name and the head portrait are hidden, screen capture and screen recording are prevented, privacy and safety of the chat are comprehensively guaranteed, and the like, which is not specifically limited in the embodiment of the application.
In order to improve the privacy of the conversation message, for example, the icons, nicknames, and the like of both parties may be hidden in the chat interface with the conversation message, and the icons of the first user account and the second user account may be replaced with other pictures as shown in fig. 6 e. For another example, if it is found that the screen capture or screen capture operation exists in the first user account or the second user account, the current chat interface is replaced with a content protection image for hiding the content, as shown in fig. 6g, a nickname of the second user account is covered in a mosaic form, and the content protection image is used to remind the second user account that the screen capture or screen capture operation cannot be performed. Further, screen capture or screen recording operation of the second user account can be sent to the first user account, so that the first user account can know the screen capture or screen recording operation. For another example, the functions of copying the session message, forwarding the session message, capturing the screen and the like are forbidden, taking the functions of preventing screen recording and capturing as an example, when the privacy session is entered, if the screen recording or capturing is detected, the privacy session interface is not displayed; and in the privacy session process, starting real-time detection of screen recording and screen capturing functions, and if detecting that screen recording or screen capturing operation occurs on the terminal equipment, replacing the current interface with a blank page and the like.
S411: and acquiring the public key of the first terminal equipment from the CA authentication center.
S412: the decryption key is further generated using the private key of the second terminal device and the public key of the first terminal device.
The encryption key for encrypting the session message by the first terminal device is a private key of the first terminal device and a public key of the second terminal device. According to the diffie-hellman algorithm, the second terminal device can obtain a corresponding decryption key according to the public key of the first terminal device and the private key of the second terminal device.
S413: the encrypted session message is decrypted.
The encrypted session message is decrypted according to the further generated decryption key, and the decrypted session message may be, as shown in fig. 6e, that the first user account sends a session message "how profitable in the quarter of company? ". Similarly, the second user account replies a session message with an operating income of 135.19 billion yuan, which can also be sent to the first user account through the server after being encrypted, and the first user account can also be checked after being decrypted, so that the privacy of the message is ensured.
The application does not limit the timing for the server to delete the encrypted session message, and for example, the encrypted session message may be deleted immediately after the forwarded encrypted session message is read by the second user account. For another example, all messages related to the first user account and the second user account in the privacy session process may be deleted after the first user account or the second user account exits the session interface.
S414: and deleting the session messages in the first terminal equipment and the second terminal equipment after 30 seconds.
The preset time is 30 seconds, and after 30 seconds, the session message is deleted in the terminal equipment. As shown in fig. 6e, after the second user account reads the session message sent by the first user account, the session message is deleted by the first terminal device and the second terminal device after 20 seconds, so as to achieve the effect of burning after reading. And when the state of the session message is changed into read, the first terminal equipment and the second terminal equipment delete the session message after 30 seconds.
The following will introduce a message transmission method provided by the present application by embodiments, and the method mainly and specifically relates to technical improvements at the user interaction level and effects thereof. The target session message mentioned in this method may be a session message of the private message type mentioned in the foregoing embodiments or a session message of the regular message type. In the following, with reference to the accompanying drawings, a further message transmission method provided in the embodiments of the present application is described with a first terminal device as a message transmission device, where the first terminal device is a terminal device that sends a target session message in a message transmission scenario.
Referring to fig. 8, fig. 8 is a flowchart of a message transmission method according to an embodiment of the present application. As shown in fig. 8, the message transmission method includes the steps of:
s801: and sending the target session message to the second user account in the session interface through the first user account.
In this embodiment, the first user account and the second user account are both social contact accounts in the social contact platform, the first user account logs in the social contact platform through the first terminal device, and the second user account logs in the social contact platform through the second terminal device.
As shown in fig. 5, the first user account may log in the social platform through the chat software in the first terminal device, and open a session interface with the second user account. The conversation interface corresponds to a first user account and a second user account, and in the display interfaces of the first terminal device and the second terminal device, the interfaces corresponding to the same conversation message content are conversation interfaces. The area 901 shown in fig. 9a and the area 904 shown in fig. 9b are session interfaces, and the content of the session message between the first user account and the second user account shown in the session interfaces is the same in the first terminal device and the second terminal device.
With continued reference to fig. 9a, the first user account may input a target session message in an input box 902 in the session interface, where the target session message may be a text message, a picture message, a video message, a file, an email, and the like, which is not limited in this application.
After the target session message is input, the sending control 903 is triggered, so that the operation of sending the target session message to the second user account by the first user account is realized. It should be noted that the target session message may also be automatically sent after the target session message in the input box 902 is detected to stop being input for a predetermined time, and the like, which is not specifically limited in this application.
According to different privacy requirements of the first user account and the second user account on the session message, the message type of the target session message can be divided into a conventional message type and a privacy message type. Wherein the target session message belonging to the regular message type may remain displayed in the session interface, and the target session message belonging to the private message type identifies the privacy of the session message, which is only displayed for a period of time in the session interface.
When the message type of the target session message is the privacy message type, there are two display modes at the first terminal device, which are described below with reference to the accompanying drawings.
The first method is as follows: mixed arrangement.
The target conversation messages and the historical conversation messages are arranged in a mixed mode in the conversation interface. As shown in fig. 1, a historical session message "haha" sent by a first user account and a historical session message "haha" sent by a second user account belong to a conventional message type, and what is the quarter of a company is a target session message "how profitable is? The three session messages are all displayed in a session interface corresponding to the first user account and the second user account. The two types of session messages are displayed in the same session interface in a mixed arrangement mode, so that a user can quickly view the previous historical session message belonging to the conventional message type when reading the target session message, and the viewing experience of the user is improved.
The second method comprises the following steps: in a separate arrangement.
The target session message is separated from the session message belonging to the conventional message type and is independently displayed on a different session interface, and the session interface includes two types, namely a privacy session interface shown in fig. 6e and a conventional session interface shown in fig. 6f, wherein the privacy session interface is used for displaying the session message belonging to the privacy message type, such as the target session message, and the conventional session interface is used for displaying the session message belonging to the conventional message type, such as the history session message. The target session message belonging to the type of the private message is independently displayed by using the private session interface, so that the type of the target session message can be better distinguished by a user, and the viewing experience of the user is improved.
It should be noted that, when the type of the target session message is a private message type, the target session message needs to be encrypted and decrypted in the process of being transmitted to the second user account by the server. The embodiment of the present application does not specifically limit the manner of encrypting and decrypting the target session message, for example, refer to the encryption and decryption manners described in the embodiments corresponding to fig. 1 to fig. 7 in the foregoing embodiments, which are not described in detail herein.
S802: and acquiring message type editing operation of the first user account aiming at the target session message in the session interface.
After the first user account sends the target session message to the second user account through the session interface, if the message type of the sent target session message is not satisfactory, the original message type of the target session message can be changed through message type editing operation.
The message type editing operation is used for changing the message type of the target session message which is sent. Specifically, when the message type of the target session message is the privacy message type, the message type of the target session message can be changed into the conventional message type through message type editing operation; when the message type of the target session message is a normal message type, the message type of the target session message can be changed to a private message type through a message type editing operation.
The present application does not specifically limit the form of the message type editing operation, and two modes are described below as examples.
The first method is as follows: long press session message mode.
The first user account may trigger a message type editing operation by long-pressing the target message session. As shown in fig. 10, the first user account may "how do companies profit in the quarter" by pressing the sent target session message for a long time? The long press mode may trigger a control to change the message type to appear so that the first user account changes the message type of the target session message, even without triggering the control to change the message type to directly change the message type of the target session message. The message type of the target session message can be simply and conveniently modified by long-pressing the session message, and the operation experience of the user is improved.
The second method comprises the following steps: and (5) triggering a control.
The first user account may trigger a message type editing operation by changing a message type control, as shown in fig. 11, the first user account triggers a control panel, clicks the change message type control, and then selects a session message requiring a message type change, such as a target session message, "how profitable is in the quarter of company? ". The type of the target session message can be changed in a control triggering mode, the type of the historical session message can be changed, the operation of the user is simplified by changing the types of the session messages in batches, and the operation experience of the user is improved.
It should be noted that, in order to ensure the privacy of the session message between the first user account and the second user account, the display duration of the target session message having the private message type in the session interface is the target display duration. The embodiment of the present application does not specifically limit the timing manner of the target display duration, and two manners are described below as examples.
The first method is as follows: and starting timing after the transmission.
When a target session message sent by a first user account to a second user account in a session interface is a private message type, the first user account starts timing when sending the target session message to the second user account in the session interface. And when the timing duration reaches the target display duration, canceling the display of the target session message in the session interface. In this manner, the targeted session message sent by the first user account may be very private and may not necessarily ensure that the second user account is viewable. Moreover, by starting to count time when the target session message is sent (it is no longer necessary to monitor whether the second user account is viewed), the following "method two" is also used: the timing mode of starting timing after the opposite terminal checks is simpler and more direct, the system overhead can be effectively reduced, and the efficiency is improved.
As shown in fig. 12, the first user account enters a target conversation message "how do companies profit in the quarter" into the conversation interface? "the message type of the target session message belongs to the private message type, when the first user starts to time the target session message, for example, the target display time is 1 minute, and when the time reaches one minute, the target session message" how profitable is in the quarter of the company? "will be canceled from display.
The second method comprises the following steps: and starting timing after the opposite terminal checks.
And if the message type of the target session message in the session interface is the privacy message type, starting to display and time from the viewed time if the target session message is viewed by the second user account. And when the timing duration reaches the target display duration, canceling the display of the target session message in the session interface so as to ensure the privacy provided by the privacy session scene at the message display level.
As shown in fig. 13, the first user account sends a target session message "how do companies profit in the quarter" in the session interface? "the message type of the target session message belongs to the privacy message type, before the second user account is not viewed, the status of the target session message is displayed as an unread status, when the second user account views the target session message, timing is started, for example, the target display duration is 30 seconds, and after the timing time reaches 30 seconds, what is the quarter profit of the company in the session interface for the target session message? "will be canceled from display.
The target display time may not only be empirically set as described above, but may also be dynamically adjusted based on viewing parameters. The following is a detailed description.
If the message type of the target session message sent to the session interface is determined to be the privacy message type, the viewing parameters of the target session message can be obtained. The viewing parameter is a parameter for measuring the speed of the user viewing the target session message. For example, the viewing parameter may be one or more of a content length of the targeted session message, a user viewing parameter when viewed, readability of the targeted session message, and the like. And determining the target display duration corresponding to the target session message according to the viewing parameters.
For example, when the viewing parameter includes the content length of the target session message, the longer the length of the target session message is, the slower the user views the target session message, and the longer the target display duration is. For another example, the viewing parameter includes a user viewing parameter when viewed, the user viewing parameter may be a reading speed of the user, and the faster the reading speed of the user is, the faster the speed of the user viewing the target session message is, the shorter the target display duration is. For another example, the viewing parameters include readability of the target session message, and the poorer the readability of the target session message, the slower the speed of the user viewing the target session message, and the longer the target display duration.
And when the display of the target session message in the session interface reaches the target display duration, canceling the display of the target session message in the session interface. Therefore, the target display duration of the target session message can be dynamically adjusted according to the viewing parameters, the target session message can be guaranteed to be cancelled and displayed immediately after the second user account finishes reading the target session message, and the privacy of the target session message is improved. It should be noted that, when the message type of the target session message is a privacy message type, after the target display duration is reached, the display may be canceled not only in the session interface as described above, but also only on the device where the second user account receives the target session message. The first user account is a party sending the target session message, and can ensure that the target session message sent by the first user account is not leaked, so that the first user account can trace back the target session message sent to the second user account on the premise of ensuring the privacy of the target session.
S803: and according to the indication of the message type editing operation, changing the message type of the target session message.
According to the technical scheme, aiming at the first user account and the second user account in the social platform, the first user account can send the conversation message to the second user account through the conversation interface, the message type of the conversation message can be a privacy message type or a conventional message type, wherein the privacy of the conversation message is identified by the conversation message of the privacy message type, so that the conversation message can be displayed in the conversation interface for a period of time, the conversation message of the conventional message type can be kept displayed in the conversation interface, after the first user account sends the target conversation message to the second user account through the conversation interface, if the message type of the sent target conversation message is not satisfied, the original message type of the target conversation message can be changed through message type editing operation, and message withdrawal, message withdrawal and message withdrawal caused by remorse psychology after the message is sent are effectively reduced, The operation cost of complicated operations such as re-editing and sending and the like is reduced, and the operation convenience and flexibility of the message sending process are improved on the premise of ensuring the message privacy.
In order to better understand the message transmission method provided in the foregoing embodiment, an application scenario of the message transmission method provided in the embodiment of the present application is described below with reference to the accompanying drawings.
The first user account may log in the social platform through the first terminal device in a manner as shown in fig. 5, where a difference is that after the first user account opens a session interface with the second user account, the privacy session control is not triggered.
Send target conversation message "how do companies profit in the quarter" in the conversation interface? When the target session message is of a conventional message type, after the target session message is sent, the first user account is dissatisfied with the message type of the sent target session message, and needs to be changed into a private message type. At this time, the first user account may change the message type of the target session message to the private message type in a long press session message manner as shown in fig. 10 without performing operations such as message revocation, re-editing, and sending on the target session message.
When the conversation messages sent by the first user account are displayed in the separated arrangement mode, after the message type of the target conversation message is changed from the conventional message type to the privacy message type, the target conversation message can be removed from the conventional conversation interface and displayed in the privacy conversation interface. For example, after the message type of the target session message is changed from the normal message type to the private message type, the process jumps from the normal session interface shown in fig. 10 to the private session interface shown in fig. 14, the second user account starts to count the time after reading the target session message, and when the preset time is reached, the process continues to refer to fig. 14, and the target session message is canceled from being displayed in the private session interface.
Similarly, in the privacy session interface, after the message type of the target session message is changed from the privacy message type to the conventional message type, the user jumps from the privacy session interface to the conventional session interface.
The following will introduce a message transmission method provided by the present application by embodiments, and the method mainly and specifically relates to technical improvements at the user interaction level and effects thereof. The private session messages mentioned in the method are session messages of the type of private messages mentioned in the previous embodiments. In the method, the second terminal device is a terminal device that receives a privacy session message in a message transmission scenario.
Referring to fig. 15, fig. 15 is a flowchart of a message transmission method according to an embodiment of the present application. As shown in fig. 15, the message transmission method includes the steps of:
s1501: and displaying the privacy session prompt through the second user account according to the acquired privacy session message.
In this embodiment, the first user account and the second user account are both social contact accounts in the social contact platform, the first user account logs in the social contact platform through the first terminal device, and the second user account logs in the social contact platform through the second terminal device.
It should be noted that, in the process of transmitting the privacy session message to the second user account through the server by the first user account, the transmitted session message needs to be encrypted and decrypted. The embodiment of the present application does not specifically limit the manner of encrypting and decrypting the session message, for example, refer to the encryption and decryption manners described in the embodiments corresponding to fig. 1 to fig. 7 in the foregoing embodiments, and details are not repeated here.
The privacy conversation message is a conversation message with privacy requirements, and only the preset duration can be displayed on the second terminal device. After the second user account receives the privacy session message, the second terminal device displays a privacy session prompt through the second user account to prompt the second user account that the privacy session message is from the first user account. The embodiment of the present application does not specifically limit the form of the privacy session prompt, and two ways are described below as examples.
The first method is as follows: shown in a conventional conversation interface.
Based on the obtained encrypted session message, the private session prompt is presented in a normal session interface for displaying the normal session message, see fig. 6 d. Wherein the regular conversation messages can remain displayed in the conversation interface. Therefore, when the first user account and the second user account transmit the session message in the conventional session interface, after the second user account acquires the privacy session message sent by the first user account, the privacy session message can be directly displayed in the conventional session interface for prompt, so that the second user account can view the privacy session message in time.
The second method comprises the following steps: shown in the session home page.
And displaying a privacy session prompt in a session homepage of the second user account according to the acquired privacy session message. See, for example, fig. 6 a-6 c. Therefore, after the second user logs in the social platform, the privacy session prompt related to the privacy session message can be seen, and the privacy session message can be timely seen.
S1502: and if the triggering operation aiming at the privacy session prompt through the second user account is determined, displaying the privacy session message through a privacy session interface.
And when the second user account triggers the privacy session prompt, entering a privacy session interface, and displaying the privacy session message through the privacy session interface, as shown in fig. 6 e.
In order to improve the privacy of the privacy session message, a content recording operation for the privacy session interface may be detected to prevent the first user account or the second user account from saving the privacy session message displayed in the privacy session interface in the terminal device. The content recording operation is an operation of storing the privacy session message in the privacy session interface in the terminal device, such as screen capturing, screen recording and the like.
And when the content recording operation aiming at the privacy session interface is detected, taking a content protection image for hiding the privacy session message as a content recording result of the privacy session interface. Wherein the content protection image is an image unrelated to the privacy session message in the current privacy session interface, as shown in fig. 6 g.
By adopting the method, the privacy of the privacy session message can be improved, and the account identifications of the first user account and the second user account in the privacy session interface can be cancelled and displayed. The account identifier is an identifier used for representing a user account, such as an avatar used for representing the user account, a nickname used for representing the user account, and the like.
As shown in fig. 16, in the privacy session interface shown in fig. 16, the icons of the first user account and the second user account and the nickname are not displayed. For another example, the head images of the first user account and the second user account are replaced by other images, as shown in fig. 6 e. For another example, the head portrait, the nickname, and the like of the first user account and the second user account are masked in a mosaic form.
S1503: and when the privacy session message shows the preset duration in the privacy session interface, canceling the display of the privacy session message.
In order to ensure the privacy of the privacy session message between the first user account and the second user account, the display duration of the privacy session message in the privacy session interface is a preset duration, and after the preset duration is reached, the display of the privacy session message in the privacy session interface is cancelled, and the storage content of the privacy session message in the terminal equipment is deleted.
The embodiment of the present application does not specifically limit the timing manner, the display manner, and the like of the preset time period, and may refer to the embodiments shown in fig. 1 to 7 or the embodiments shown in fig. 8 to 14.
According to the technical scheme, for the first user account and the second user account in the social platform, after the second user account receives the privacy session message sent by the first user account, the privacy session prompt is displayed through the second user account so as to prompt a user to obtain the privacy session message different from the conventional session message. If the triggering operation for the privacy session prompt through the second user account is determined, the privacy session message is displayed by using the privacy session interface, and the privacy session message is canceled and displayed after being displayed for a certain time, so that the probability that the privacy session message is leaked or seen by a third party is reduced, the privacy session scene required by the user privacy session is realized, and the privacy of the privacy session message in the privacy session process of the first user account and the second user account is ensured.
In order to better understand the message transmission method provided by the foregoing embodiment, an application scenario of the message transmission method provided by the embodiment of the present application is described below with reference to the drawings.
In this application scenario, after the second user account logs in the social platform through the second terminal device, a privacy session prompt is shown in the session homepage, and a privacy session message from the first user account is prompted, see fig. 6 a.
The second user account enters a conventional session interface with the first user account, in which not only the conventional session messages of the first user account and the second user account but also a privacy session prompt are displayed, see fig. 6 d.
After the second user account triggers the privacy session prompt, the second user account enters a privacy session interface, and the privacy session interface displays a privacy session message between the first user account and the second user account, as shown in fig. 6 e.
When the privacy session message is presented in the privacy session interface for a preset duration, the encrypted session message is not displayed, see fig. 14.
In the process of transmitting the privacy session message by the first user account and the second user account, if a content recording operation for the privacy session interface is detected, the current privacy session interface may be replaced with another picture, see fig. 6g, to ensure that the privacy session message is not captured by the content recording operations such as screen recording and screen capturing.
In view of the message transmission method provided in the foregoing embodiment, an embodiment of the present application further provides a message transmission apparatus.
Referring to fig. 17, this figure is a schematic diagram of a message transmission apparatus according to an embodiment of the present application. As shown in fig. 17, the message transmission apparatus 1700 includes: an acquisition unit 1701, a determination unit 1702, a return unit 1703, and a transmission unit 1704;
the obtaining unit 1701 is configured to obtain a privacy session request of a first user account for a second user account in the social platform;
the determining unit 1702, configured to determine a target device identifier of the second user account;
the returning unit 1703 is configured to return a target encryption key corresponding to the target device identifier to the first user account, where the target encryption key is used to encrypt a session message sent by the first user account to the second user account, and a display duration of the session message is a preset duration;
the sending unit 1704 is configured to, if an encrypted session message sent by the first user account to the second user account is obtained, forward the encrypted session message to the second user account according to the target device identifier, where the encrypted session message is encrypted according to the target encryption key.
As a possible implementation manner, the second user account has a plurality of corresponding device identifiers, and the determining unit 1702 is configured to:
determining the target device identifier of the second user account from the plurality of device identifiers according to a screening condition;
the screening condition comprises the device types of the multiple device identifications and/or the device identification adopted by the second user account for logging in the social platform.
As a possible implementation manner, if an encrypted session message sent by the first user account to the second user account is obtained, the apparatus 1700 is further configured to:
determining whether the second user account is logged into the social platform through the target device identification;
if yes, the step of forwarding the encrypted session message to the second user account according to the target equipment identification is executed;
if not, the encrypted session message is stored as an offline message corresponding to the second user account.
As a possible implementation manner, the target encryption key is a target public key generated based on a target private key of the second user account.
As a possible implementation manner, the apparatus 1700 is further configured to:
storing an encryption key corresponding relation through an authentication center, wherein the encryption key corresponding relation is used for identifying the corresponding relation of a user identifier, an equipment identifier and an encryption key;
the determining unit 1702 is configured to:
and determining a target equipment identifier of the second user account and a target encryption key corresponding to the target equipment identifier according to the corresponding relation of the encryption keys through the target user identifier of the second user.
As a possible implementation manner, the apparatus 1700 is further configured to:
the key validity time of the encryption key is saved through the authentication center;
and if the target encryption key is determined to be expired according to the key validity time of the target encryption key, indicating the second user account to update the target encryption key.
As a possible implementation manner, after the forwarding the encrypted session message to the second user account according to the target device identifier, the apparatus 1700 is further configured to:
deleting the encrypted session message.
According to the message transmission device provided by the embodiment of the application, for a first user account and a second user account in a social platform, after the first user account initiates a privacy session request for the second user account, a target device identifier of the second user account is determined, the target device identifier can be used for identifying a terminal device of the second user account for receiving an encrypted session message sent by the first user account, and a target encryption key can be determined according to the target device identifier, and the session message encrypted by the first user account according to the target encryption key can only be decrypted by the terminal device corresponding to the target device identifier. If the encrypted session message sent by the first user account to the second user account is obtained, the encrypted session message is forwarded to the second user account according to the target equipment identification, so that safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the transmitted message is known by a third party is reduced in a message transmission layer. The target equipment identification enables only the appointed terminal equipment to receive and display the conversation message within the preset time length, so that the probability that the conversation message is viewed by others in the conversation scene of the privacy message is reduced, the possibility that the conversation message is viewed by the second user account in time is improved, the safety of a message transmission layer is realized through the target equipment identification, and the privacy provided by the privacy conversation scene is further ensured from the message display layer.
Referring to fig. 18, this figure is a schematic diagram of a message transmission apparatus according to an embodiment of the present application. As shown in fig. 18, the message transmission apparatus 1800 includes: a first transmission unit 1801, an acquisition unit 1802, an encryption unit 1803, and a second transmission unit 1804;
the first sending unit 1801 is configured to send a privacy session request for a second user account to a social contact platform through a first user account, where the first user account and the second user account are social contact accounts in the social contact platform;
the obtaining unit 1802 is configured to obtain a target encryption key returned by the social platform, where the target encryption key is determined according to a target device identifier of the second user account;
the encrypting unit 1803 is configured to encrypt, by using the target encryption key, a session message sent to the second user account to obtain an encrypted session message, where a display duration of the session message is a preset duration;
the second sending unit 1804 is configured to send the encrypted session message to the second user account through the social platform.
As a possible implementation manner, the encrypting unit 1803 is configured to:
and encrypting the session message sent to the second user account by the target encryption key and the private key of the first user account to obtain an encrypted session message.
According to the message transmission device provided by the embodiment of the application, for a first user account and a second user account in a social platform, after the first user account initiates a privacy session request for the second user account, a target device identifier of the second user account is determined, the target device identifier can be used for identifying a terminal device of the second user account for receiving an encrypted session message sent by the first user account, and a target encryption key can be determined according to the target device identifier, and the session message encrypted by the first user account according to the target encryption key can only be decrypted by the terminal device corresponding to the target device identifier. If the encrypted session message sent by the first user account to the second user account is obtained, the encrypted session message is forwarded to the second user account according to the target equipment identification, so that safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the transmitted message is known by a third party is reduced in a message transmission layer. The target equipment identification enables only the appointed terminal equipment to receive and display the conversation message within the preset time, so that the probability that the conversation message in the conversation scene of the privacy message is viewed by others is reduced, the possibility that the conversation message is viewed by the second user account in time is improved, the safety of a message transmission layer is realized through the target equipment identification, and the privacy provided by the privacy conversation scene is further ensured from the message display layer.
Referring to fig. 19, this figure is a schematic diagram of a message transmission apparatus according to an embodiment of the present application. As shown in fig. 19, the message transfer apparatus 1900 includes: an acquisition unit 1901, a decryption unit 1902, and a viewing unit 1903;
the obtaining unit 1901 is configured to obtain, through a second user account, an encrypted session message sent by a first user account, where the first user account and the second user account are social accounts in a social platform, and the encrypted session message is obtained by encrypting, by the first user account, a session message through a target encryption key;
the decrypting unit 1902 is configured to decrypt the encrypted session message with a target decryption key corresponding to the target encryption key to obtain the session message;
the viewing unit 1903 is configured to view the session message within a preset duration.
As a possible implementation manner, if the encrypted session message is obtained by encrypting, by the first user account, a session message through a target encryption key and a private key of the first user account, the message transmission apparatus 1900 is further configured to:
obtaining a public key of the first user account through the social platform;
the decrypting the encrypted session message by the target decryption key corresponding to the target encryption key to obtain the session message includes:
and decrypting the encrypted session message according to the public key and the target decryption key to obtain the session message.
According to the message transmission device provided by the embodiment of the application, for a first user account and a second user account in a social platform, after the first user account initiates a privacy session request for the second user account, a target device identifier of the second user account is determined, the target device identifier can be used for identifying a terminal device of the second user account for receiving an encrypted session message sent by the first user account, a target encryption key can also be determined according to the target device identifier, and the session message encrypted by the first user account according to the target encryption key can only be decrypted by the terminal device corresponding to the target device identifier. If the encrypted session message sent by the first user account to the second user account is obtained, the encrypted session message is forwarded to the second user account according to the target equipment identification, so that safe end-to-end message transmission in a privacy session scene is realized, and the possibility that the transmitted message is known by a third party is reduced in a message transmission layer. The target equipment identification enables only the appointed terminal equipment to receive and display the conversation message within the preset time, so that the probability that the conversation message in the conversation scene of the privacy message is viewed by others is reduced, the possibility that the conversation message is viewed by the second user account in time is improved, the safety of a message transmission layer is realized through the target equipment identification, and the privacy provided by the privacy conversation scene is further ensured from the message display layer.
Referring to fig. 20, this figure is a schematic diagram of a message transmission apparatus according to an embodiment of the present application. As shown in fig. 20, the message transmission apparatus 2000 includes: a transmission unit 2001, an acquisition unit 2002, and a change unit 2003;
the sending unit 2001 is configured to send a target session message to a second user account in a session interface through a first user account, where the first user account and the second user account are social accounts in a social platform, and the session interface corresponds to the first user account and the second user account;
the obtaining unit 2002 is configured to obtain a message type editing operation performed by the first user account for the target session message in the session interface, where the message type editing operation is used to change a message type of the target session message into a private message type or a conventional message type, and a display duration of the target session message with the private message type in the session interface is a target display duration;
the changing unit 2003 is configured to change the message type of the target session message according to the instruction of the message type editing operation.
As a possible implementation manner, if it is determined that the message type of the target session message sent to the session interface is a private message type, the message transmission apparatus 2000 is further configured to:
acquiring the viewing parameters of the target session message, wherein the viewing parameters comprise the content length of the target session message and/or the user viewing parameters when viewed;
determining a target display duration corresponding to the target session message according to the viewing parameter;
and when the display of the target session message in the session interface reaches the target display duration, canceling the display of the target session message in the session interface.
As a possible implementation manner, if the target session message sent to the second user account by the first user account in the session interface is a private message type, the message transmission apparatus 2000 is further configured to:
displaying and timing when a target session message is sent to a second user account in a session interface through a first user account;
and when the timing duration reaches the target display duration, canceling the display of the target session message in the session interface.
As a possible implementation manner, if the message type of the target session message in the session interface is a private message type, the message transmission apparatus 2000 is further configured to:
if the target session message is determined to be viewed through the second user account, starting to display and time from the viewed time;
and when the timing duration reaches the target display duration, canceling the display of the target session message in the session interface.
As a possible implementation manner, the conversation interface is used for displaying the conversation messages with the message types of the regular message type and the conversation messages with the message types of the privacy message type.
As a possible implementation manner, the session interface is a privacy session interface, and the privacy session interface is used for displaying the session message with the message type being the privacy message type.
According to the message transmission device provided by the embodiment of the application, aiming at a first user account and a second user account in a social platform, the first user account can send a session message to the second user account through a session interface, the message type of the session message can be a private message type or a conventional message type, wherein the session message of the private message type identifies the privacy of the session message, so that the session message can be displayed in the session interface for a period of time, the session message of the conventional message type can be kept displayed in the session interface, after the first user account sends a target session message to the second user account through the session interface, if the message type of the sent target session message is not satisfied, the original message type of the target session message can be changed through message type editing operation, and message withdrawal brought by remorse psychology after the message is sent is effectively reduced, The operation cost of complicated operations such as re-editing and sending and the like is reduced, and the operation convenience and flexibility of the message sending process are improved on the premise of ensuring the message privacy.
Referring to fig. 21, this figure is a schematic diagram of a message transmission apparatus according to an embodiment of the present application. As shown in fig. 21, the message transmitting apparatus 2100 includes: a presentation unit 2101 and a cancellation unit 2102;
the presentation unit 2101 is configured to present a privacy session prompt through a second user account according to the obtained privacy session message, where the privacy session prompt is used to identify that the privacy session message is from a first user account, and the first user account and the second user account are social accounts in a social platform; if the triggering operation aiming at the privacy session prompt through the second user account is determined, displaying the privacy session message through a privacy session interface;
the canceling unit 2102 is configured to cancel display of the privacy session message when the privacy session message shows a preset duration in the privacy session interface.
As a possible implementation manner, the message transmitting apparatus 2100 is further configured to:
detecting a content recording operation for the privacy session interface;
and taking the content protection image for hiding the content as the content recording result of the privacy session interface.
As a possible implementation manner, the presentation unit 2101 is configured to:
displaying the privacy session prompt in a conventional session interface according to the acquired privacy session message, wherein the conventional session interface corresponds to the first user account and the second user account; alternatively, the first and second liquid crystal display panels may be,
and displaying the privacy session prompt in a session homepage of the second user account according to the acquired privacy session message.
As a possible implementation manner, the account id of the first user account and the account id of the second user account are not displayed in the privacy session interface.
According to the message transmission device provided by the embodiment of the application, for a first user account and a second user account in a social platform, after the second user account receives a privacy session message sent by the first user account, a privacy session prompt is displayed through the second user account so as to prompt a user to obtain the privacy session message different from a conventional session message. If the triggering operation for the privacy session prompt through the second user account is determined, the privacy session message is displayed by using the privacy session interface, and the privacy session message is canceled and displayed after being displayed for a certain time, so that the probability that the privacy session message is leaked or seen by a third party is reduced, the privacy session scene required by the user privacy session is realized, and the privacy of the privacy session message in the privacy session process of the first user account and the second user account is ensured.
The embodiment of the present application further provides a computer device, and the computer device provided in the embodiment of the present application will be described below from the perspective of hardware materialization.
Referring to fig. 22, fig. 22 is a schematic diagram of a server 1400 provided by an embodiment of the present application, where the server 1400 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 1422 (e.g., one or more processors) and a memory 1432, and one or more storage media 1430 (e.g., one or more mass storage devices) for storing applications 1442 or data 1444. Memory 1432 and storage media 1430, among other things, may be transient or persistent storage. The program stored on storage medium 1430 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a server. Still further, a central processor 1422 may be disposed in communication with storage medium 1430 for executing a series of instruction operations on storage medium 1430 on server 1400.
The server 1400 may also include one or more power supplies 1426, one or more wired or wireless network interfaces 1450, one or more input-output interfaces 1458, and/or one or more operating systems 1441, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The steps performed by the server in the above embodiment may be based on the server structure shown in fig. 22.
The CPU 1422 is configured to perform the following steps:
the method comprises the steps of obtaining a privacy session request of a first user account aiming at a second user account in a social platform;
determining a target device identifier of the second user account;
returning a target encryption key corresponding to the target equipment identifier to the first user account, wherein the target encryption key is used for encrypting a session message sent from the first user account to the second user account, and the display duration of the session message is preset duration;
and if an encrypted session message sent from the first user account to the second user account is obtained, forwarding the encrypted session message to the second user account according to the target equipment identifier, wherein the encrypted session message is encrypted according to the target encryption key.
For the above-described message transmission method, the present application further provides a terminal device for message transmission, so that the above-described message transmission method is implemented and applied in practice.
Referring to fig. 23, fig. 23 is a schematic structural diagram of a terminal device according to an embodiment of the present application. For convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the specific technology are not disclosed. The terminal device may be any terminal device including a mobile phone, a tablet computer, a Personal Digital Assistant (PDA for short), and the like, taking the terminal device as the mobile phone as an example:
fig. 23 is a block diagram illustrating a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present application. Referring to fig. 23, the cellular phone includes: a Radio Frequency (RF) circuit 1510, a memory 1520, an input unit 1530, a display unit 1540, a sensor 1550, an audio circuit 1560, a wireless fidelity (WiFi) module 1570, a processor 1580, and a power supply 1590. Those skilled in the art will appreciate that the handset configuration shown in fig. 23 is not intended to be limiting and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 23:
the RF circuit 1510 may be configured to receive and transmit signals during information transmission and reception or during a call, and in particular, receive downlink information of a base station and then process the received downlink information to the processor 1580; in addition, data for designing uplink is transmitted to the base station. In general, RF circuit 1510 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 1510 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), and the like.
The memory 1520 may be used to store software programs and modules, and the processor 1580 implements various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 1520. The memory 1520 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 1520 may include high-speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The input unit 1530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. In particular, the input unit 1530 may include a touch panel 1531 and other input devices 1532. The touch panel 1531, also referred to as a touch screen, can collect touch operations of a user (e.g., operations of the user on or near the touch panel 1531 using any suitable object or accessory such as a finger or a stylus) and drive corresponding connection devices according to a preset program. Alternatively, the touch panel 1531 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1580, and can receive and execute commands sent by the processor 1580. In addition, the touch panel 1531 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1530 may include other input devices 1532 in addition to the touch panel 1531. In particular, other input devices 1532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 1540 can be used to display information input by the user or information provided to the user and various menus of the mobile phone. The Display unit 1540 may include a Display panel 1541, and optionally, the Display panel 1541 may be configured by using a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 1531 may cover the display panel 1541, and when the touch panel 1531 detects a touch operation on or near the touch panel 1531, the touch operation is transmitted to the processor 1580 to determine the type of the touch event, and then the processor 1580 provides a corresponding visual output on the display panel 1541 according to the type of the touch event. Although in fig. 23 the touch panel 1531 and the display panel 1541 are shown as two separate components to implement the input and output functions of the mobile phone, in some embodiments the touch panel 1531 and the display panel 1541 may be integrated to implement the input and output functions of the mobile phone.
The handset can also include at least one sensor 1550, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 1541 according to the brightness of ambient light and a proximity sensor that turns off the display panel 1541 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing gestures of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometers and taps), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 1560, speaker 1561, microphone 1562 may provide an audio interface between a user and a cell phone. The audio circuit 1560 may transmit the electrical signal converted from the received audio data to the speaker 1561, and convert the electrical signal into an audio signal by the speaker 1561 and output the audio signal; on the other hand, the microphone 1562 converts collected sound signals into electrical signals, which are received by the audio circuit 1560 and converted into audio data, which are processed by the audio data output processor 1580 and then passed through the RF circuit 1510 for transmission to, for example, another cellular phone, or for output to the memory 1520 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through a WiFi module 1570, and provides wireless broadband internet access for the user. Although fig. 23 shows WiFi module 1570, it is understood that it does not belong to the essential constitution of the handset and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 1580 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1520 and calling data stored in the memory 1520, thereby integrally monitoring the mobile phone. Optionally, the processor 1580 may include one or more processing units; preferably, the processor 1580 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It is to be appreciated that the modem processor may not be integrated into the processor 1580.
The handset also includes a power supply 1590 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 1580 via a power management system to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which will not be described herein.
In an embodiment of the present application, the handset includes a memory 1520 that can store program code and transmit the program code to the processor.
The processor 1580 included in the mobile phone may execute the message transmission method provided in the foregoing embodiment according to an instruction in the program code, specifically:
sending a privacy session request aiming at a second user account to a social contact platform through a first user account, wherein the first user account and the second user account are social contact accounts in the social contact platform;
obtaining a target encryption key returned by the social platform, wherein the target encryption key is determined according to a target device identifier of the second user account;
encrypting a session message sent to the second user account through the target encryption key to obtain an encrypted session message, wherein the display duration of the session message is a preset duration;
and sending the encrypted session message to the second user account through the social platform.
The processor 1580 may be further configured to perform the following steps:
acquiring an encrypted session message sent by a first user account through a second user account, wherein the first user account and the second user account are social accounts in a social platform, and the encrypted session message is obtained by encrypting the session message through a target encryption key by the first user account;
decrypting the encrypted session message through a target decryption key corresponding to the target encryption key to obtain the session message;
and viewing the conversation message within a preset time length.
The processor 1580 may be further configured to perform the following steps:
sending a target session message to a second user account through a first user account in a session interface, wherein the first user account and the second user account are social accounts in a social platform, and the session interface corresponds to the first user account and the second user account;
obtaining a message type editing operation of the first user account for the target session message in the session interface, wherein the message type editing operation is used for changing the message type of the target session message into a privacy message type or a conventional message type, and the display duration of the target session message with the privacy message type in the session interface is a target display duration;
and changing the message type of the target session message according to the indication of the message type editing operation.
The processor 1580 may be further configured to perform the following steps:
displaying a privacy session prompt through a second user account according to the obtained privacy session message, wherein the privacy session prompt is used for identifying that the privacy session message comes from a first user account, and the first user account and the second user account are social accounts in a social platform;
if the triggering operation aiming at the privacy session prompt through the second user account is determined, displaying the privacy session message through a privacy session interface;
and when the privacy session message shows a preset duration in the privacy session interface, canceling the display of the privacy session message.
Optionally, the processor 1580 may further execute the method steps of any specific implementation manner of the message transmission method in this embodiment.
The embodiment of the present application further provides a computer-readable storage medium for storing a computer program, where the computer program is configured to execute the message transmission method provided in the foregoing embodiment.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the message transmission method provided in the various alternative implementations of the above aspects.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium may be at least one of the following media: various media that can store program codes, such as read-only memory (ROM), RAM, magnetic disk, or optical disk.
It should be noted that, in the present specification, all the embodiments are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the apparatus and system embodiments, because they are substantially similar to the method embodiments, are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (19)

1. A method for message transmission, the method comprising:
the method comprises the steps of obtaining a privacy session request of a first user account aiming at a second user account in a social platform;
determining a target device identifier of the second user account;
returning a target encryption key corresponding to the target equipment identifier to the first user account, wherein the target encryption key is used for encrypting a session message sent from the first user account to the second user account, and the display duration of the session message is preset duration;
and if an encrypted session message sent from the first user account to the second user account is obtained, forwarding the encrypted session message to the second user account according to the target equipment identifier, wherein the encrypted session message is encrypted according to the target encryption key.
2. The method of claim 1, wherein the second user account has a plurality of corresponding device identifiers, and wherein the determining a target device identifier of the second user account comprises:
determining the target device identifier of the second user account from the plurality of device identifiers according to a screening condition;
the screening condition comprises the device types of the multiple device identifications and/or the device identification adopted by the second user account for logging in the social platform.
3. The method according to claim 1, wherein if an encrypted session message sent by the first user account to the second user account is obtained, the method further comprises:
determining whether the second user account is logged into the social platform through the target device identification;
if yes, the step of forwarding the encrypted session message to the second user account according to the target equipment identification is executed;
if not, the encrypted session message is stored as an offline message corresponding to the second user account.
4. The method according to any one of claims 1 to 3, wherein the target encryption key is a target public key generated based on a target private key of the second user account.
5. The method according to any one of claims 1-3, further comprising:
storing an encryption key corresponding relation through an authentication center, wherein the encryption key corresponding relation is used for identifying the corresponding relation of a user identifier, an equipment identifier and an encryption key;
the determining the target device identifier of the second user account includes:
and determining a target equipment identifier of the second user account and a target encryption key corresponding to the target equipment identifier according to the corresponding relation of the encryption keys through the target user identifier of the second user.
6. The method of claim 5, further comprising:
the key validity time of the encryption key is saved through the authentication center;
and if the target encryption key is determined to be expired according to the key validity time of the target encryption key, indicating the second user account to update the target encryption key.
7. A method for message transmission, the method comprising:
sending a privacy session request aiming at a second user account to a social platform through a first user account, wherein the first user account and the second user account are social accounts in the social platform;
acquiring a target encryption key returned by the social platform, wherein the target encryption key is determined according to a target device identifier of the second user account;
encrypting a session message sent to the second user account through the target encryption key to obtain an encrypted session message, wherein the display duration of the session message is a preset duration;
and sending the encrypted session message to the second user account through the social platform.
8. A method for message transmission, the method comprising:
acquiring an encrypted session message sent by a first user account through a second user account, wherein the first user account and the second user account are social accounts in a social platform, and the encrypted session message is obtained by encrypting the session message through a target encryption key by the first user account;
decrypting the encrypted session message through a target decryption key corresponding to the target encryption key to obtain the session message;
and viewing the conversation message within a preset time length.
9. A method for message transmission, the method comprising:
sending a target session message to a second user account through a first user account in a session interface, wherein the first user account and the second user account are social accounts in a social platform, and the session interface corresponds to the first user account and the second user account;
obtaining a message type editing operation of the first user account for the target session message in the session interface, wherein the message type editing operation is used for changing the message type of the target session message into a privacy message type or a conventional message type, and the display duration of the target session message with the privacy message type in the session interface is a target display duration;
and changing the message type of the target session message according to the indication of the message type editing operation.
10. The method of claim 9, wherein if the message type of the target session message sent to the session interface is determined to be a private message type, the method further comprises:
obtaining the viewing parameters of the target session message, wherein the viewing parameters comprise the content length of the target session message and/or the user viewing parameters when viewed;
determining a target display duration corresponding to the target session message according to the viewing parameter;
and when the display of the target session message in the session interface reaches the target display duration, canceling the display of the target session message in the session interface.
11. The method of claim 9, wherein if the target session message sent to the second user account through the first user account in the session interface is of a private message type, the method further comprises:
displaying and timing when a target session message is sent to a second user account in a session interface through a first user account;
and when the timing duration reaches the target display duration, canceling the display of the target session message in the session interface.
12. The method of claim 9, wherein if the message type of the target session message in the session interface is a private message type, the method further comprises:
if the target session message is checked through the second user account, starting to display and time when the target session message is checked;
and when the timing duration reaches the target display duration, canceling the display of the target session message in the session interface.
13. The method according to any of claims 9-12, wherein the conversation interface is configured to display conversation messages of the type that are the regular message type and conversation messages of the type that are the private message.
14. The method according to any of claims 9-12, wherein the conversation interface is a privacy conversation interface for displaying conversation messages having a message type of the privacy message type.
15. A method for message transmission, the method comprising:
displaying a privacy session prompt through a second user account according to the obtained privacy session message, wherein the privacy session prompt is used for identifying that the privacy session message comes from a first user account, and the first user account and the second user account are social accounts in a social platform;
if the triggering operation aiming at the privacy session prompt through the second user account is determined, displaying the privacy session message through a privacy session interface;
and when the privacy session message shows a preset duration in the privacy session interface, canceling the display of the privacy session message.
16. The method of claim 15, further comprising:
detecting a content recording operation for the privacy session interface;
and taking a content protection image for hiding content as a content recording result of the privacy session interface.
17. The method of claim 15, wherein the presenting the privacy session prompt through the second user account according to the obtained privacy session message comprises:
displaying the privacy session prompt in a conventional session interface according to the acquired privacy session message, wherein the conventional session interface corresponds to the first user account and the second user account; alternatively, the first and second electrodes may be,
and displaying the privacy session prompt in a session homepage of the second user account according to the acquired privacy session message.
18. A computer device, the device comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of any one of claims 1 to 6, or to perform the method of claim 7, or to perform the method of claim 8, or to perform the method of any one of claims 9 to 14, or to perform the method of any one of claims 15 to 17, according to instructions in the program code.
19. A computer-readable storage medium for storing a computer program for performing the method of any one of claims 1-6, or for performing the method of claim 7, or for performing the method of claim 8, or for performing the method of any one of claims 9-14, or for performing the method of any one of claims 15-17.
CN202110013849.2A 2021-01-06 2021-01-06 Message transmission method and related device Active CN114785751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110013849.2A CN114785751B (en) 2021-01-06 2021-01-06 Message transmission method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110013849.2A CN114785751B (en) 2021-01-06 2021-01-06 Message transmission method and related device

Publications (2)

Publication Number Publication Date
CN114785751A true CN114785751A (en) 2022-07-22
CN114785751B CN114785751B (en) 2024-04-26

Family

ID=82407708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110013849.2A Active CN114785751B (en) 2021-01-06 2021-01-06 Message transmission method and related device

Country Status (1)

Country Link
CN (1) CN114785751B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070143423A1 (en) * 2005-12-21 2007-06-21 Oliver Kieselbach Method and system for allowing a session initiating user to select one or more privacy settings to be applied to an instant messaging session from among multiple possible privacy controls
CN105743917A (en) * 2016-04-05 2016-07-06 腾讯科技(深圳)有限公司 Message transmitting method and terminal
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN106685907A (en) * 2016-06-29 2017-05-17 腾讯科技(深圳)有限公司 Method and device for generating session key
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method
CN107852326A (en) * 2015-07-06 2018-03-27 三星电子株式会社 For monitoring the methods, devices and systems of encrypted communication session
CN109104361A (en) * 2018-09-21 2018-12-28 北京达佳互联信息技术有限公司 Instant communicating method, device, electronic equipment and storage medium
CN110932967A (en) * 2019-12-31 2020-03-27 郑州信大捷安信息技术股份有限公司 Seamless session realization method and system for instant messaging message

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070143423A1 (en) * 2005-12-21 2007-06-21 Oliver Kieselbach Method and system for allowing a session initiating user to select one or more privacy settings to be applied to an instant messaging session from among multiple possible privacy controls
CN107852326A (en) * 2015-07-06 2018-03-27 三星电子株式会社 For monitoring the methods, devices and systems of encrypted communication session
CN105743917A (en) * 2016-04-05 2016-07-06 腾讯科技(深圳)有限公司 Message transmitting method and terminal
CN106685907A (en) * 2016-06-29 2017-05-17 腾讯科技(深圳)有限公司 Method and device for generating session key
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method
CN109104361A (en) * 2018-09-21 2018-12-28 北京达佳互联信息技术有限公司 Instant communicating method, device, electronic equipment and storage medium
CN110932967A (en) * 2019-12-31 2020-03-27 郑州信大捷安信息技术股份有限公司 Seamless session realization method and system for instant messaging message

Also Published As

Publication number Publication date
CN114785751B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
US10958459B2 (en) Method and apparatus for processing group chat message
JP6511541B2 (en) Message updating method, apparatus and terminal
CN110830468B (en) Cross-application-based authority management method and device and computer readable storage medium
US10630629B2 (en) Screen display method, apparatus, terminal, and storage medium
US10269163B2 (en) Method and apparatus for switching real-time image in instant messaging
CN109165074B (en) Game screenshot sharing method, mobile terminal and computer-readable storage medium
CN109542287B (en) Message reminding method and device, mobile terminal and storage medium
CN107145794B (en) Data processing method and device and mobile terminal
CN108255683B (en) Method for prompting message in terminal and terminal
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN110188524B (en) Information encryption method, information decryption method and terminal
CN106790009B (en) Information processing method and device and mobile terminal
CN106569910B (en) Data backup and transmission method and mobile terminal
WO2018095216A1 (en) Relationship chain processing method, terminal and storage medium
EP3687118B1 (en) Information search method, terminal, network device, and system
CN111107223B (en) Message processing method and electronic equipment
CN107682541B (en) Audio control method for screen projection, mobile terminal and storage medium
CN107347114B (en) Voice information receiving and sending control method and terminal
CN109525666A (en) A kind of data back up method and mobile terminal
CN112333337B (en) Message checking method, device, equipment and storage medium
CN109922440B (en) Data synchronization method, device, mobile terminal and storage medium
CN108880787B (en) Information key processing method and related equipment
CN107147778B (en) Data processing method and device and mobile terminal
CN107678622B (en) Application icon display method, terminal and storage medium
CN114785751B (en) Message transmission method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant