CN114827074B - Social message processing method, device, server, terminal and medium - Google Patents

Social message processing method, device, server, terminal and medium Download PDF

Info

Publication number
CN114827074B
CN114827074B CN202110118707.2A CN202110118707A CN114827074B CN 114827074 B CN114827074 B CN 114827074B CN 202110118707 A CN202110118707 A CN 202110118707A CN 114827074 B CN114827074 B CN 114827074B
Authority
CN
China
Prior art keywords
signature
social message
social
message
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110118707.2A
Other languages
Chinese (zh)
Other versions
CN114827074A (en
Inventor
姚俊刚
宋立鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202110118707.2A priority Critical patent/CN114827074B/en
Publication of CN114827074A publication Critical patent/CN114827074A/en
Application granted granted Critical
Publication of CN114827074B publication Critical patent/CN114827074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The embodiment of the application discloses a social message processing method, a device, a server, a terminal and a medium, wherein the method comprises the following steps: a first social messaging request may be received from the first terminal and used to instruct a first social message to be sent to the second terminal, the first key information may be obtained from the first social message, and signature information may be generated in accordance with the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information is matched with the historical signature information, the first social message is sent to the second terminal. By implementing the method and the device, signature information can be introduced to verify the validity of the message content in the social message transmission process, so that the harm of fake messages to users is prevented.

Description

Social message processing method, device, server, terminal and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a social message processing method, a social message processing device, a server, a terminal, and a computer storage medium.
Background
With the rapid development of social applications, functions are increasingly abundant, and various functions such as email, blogs, music, television, games, search and the like are gradually integrated. Social applications are no longer a mere chat tool, and have evolved into integrated information platforms integrating communication, information, entertainment, searching, e-commerce, office collaboration, and business customer services.
Wherein sending and receiving messages is a basic function of a social application, and in the message sending stage, a user a can send a social message to a user B through the social application, and the user B can forward the social message to a user C.
Practice finds that in the propagation process of social messages, some malicious users tamper the original information by illegal means, so that the illegal purpose is achieved. For example, a game initiates an operation activity, the content of the activity is to click the participation activity in the game, the user A sends a target social message associated with the operation activity to the user B through the social application, the user B receives the target social message and sends the target social message to other users (for example, the user C) to invite the other users to play the game together, and the other users click the target social message to accept the invitation to enter the game and then obtain the gold coin. However, in a message forwarding process, after some malicious users (for example, the user B) receive the target social message, malicious counterfeiting is performed on the target social message, and the malicious and counterfeit social message is sent to other users, because the malicious and counterfeit social message is completely the same as the original message in terms of message style, the other users cannot identify the authenticity of the message at all, and after clicking the malicious and counterfeit social message, the user may jump to a malicious website forged by the user B, and after inputting a user name and password, the game account is stolen, and the game currency is lost.
Therefore, how to increase effective verification of the content of the social message becomes a urgent problem to be solved in the propagation process of the social message.
Disclosure of Invention
The embodiment of the application provides a social message processing method, a device, a server, a terminal and a medium, which can introduce signature information to verify the validity of message content in the social message transmission process.
In one aspect, an embodiment of the present application provides a social message processing method, applied to a server, where the method includes:
receiving a first social messaging request from a first terminal, wherein the first social messaging request is used for indicating to send a first social message to a second terminal; the first social message comprises first key information and historical signature information;
acquiring the first key information from the first social message, and generating signature information according to the first key information;
comparing the signature information with the historical signature information;
and if the comparison result indicates that the signature information is matched with the historical signature information, the first social information is sent to the second terminal.
Accordingly, an embodiment of the present application provides a social message processing apparatus, where the apparatus is configured on the server, and the apparatus includes:
The communication unit is used for receiving a first social message sending request from the first terminal, wherein the first social message sending request is used for indicating to send a first social message to the second terminal; the first social message comprises first key information and historical signature information;
the processing unit is used for acquiring the first key information from the first social message and generating signature information according to the first key information;
the processing unit is further used for comparing the signature information with the historical signature information;
the communication unit is further configured to send the first social message to the second terminal if the comparison result indicates that the signature information matches the historical signature information.
Correspondingly, the embodiment of the application also provides a server, which comprises a communication interface, a processor and a storage device; a storage device for storing program instructions; and the processor is used for calling program instructions and executing the social message processing method in the aspect.
On the other hand, the embodiment of the application provides another social message processing method, which is applied to a terminal, and comprises the following steps:
receiving a first social message sent by a server;
When the fact that the target mark is included in the first social message is detected, displaying the first social message according to a display mode matched with the target mark;
the first social message is sent to the terminal by the first terminal through the server; the first social message sent by the first terminal to the server comprises historical signature information and first key information; the target mark is determined according to a comparison result of the signature information and the historical signature information, wherein the first key information is acquired from the first social information after the server receives the first social information sent by the first terminal, and the signature information is generated according to the first key information.
Accordingly, another social message processing apparatus is provided in the embodiments of the present application, where the apparatus is configured in the terminal, and the apparatus includes:
the communication unit is used for receiving the first social message sent by the server;
the processing unit is used for displaying the first social message according to a display mode matched with the target mark when the target mark is detected to be included in the first social message;
the first social message is sent to the terminal by the first terminal through the server; the first social message sent by the first terminal to the server comprises historical signature information and first key information; the target mark is determined according to a comparison result of the signature information and the historical signature information, wherein the first key information is acquired from the first social information after the server receives the first social information sent by the first terminal, and the signature information is generated according to the first key information.
Correspondingly, the embodiment of the application also provides a terminal, which comprises a communication interface, output equipment, a processor and a storage device; a storage device for storing program instructions; and the processor is used for calling the program instruction and executing the social message processing method according to the other aspect.
Correspondingly, the embodiment of the application also provides a computer storage medium, wherein the computer storage medium stores program instructions, and the program instructions are used for realizing the social message processing method when being executed.
Accordingly, according to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the social message processing method provided above.
In this embodiment of the present application, the server may receive a first social message sending request from a first terminal, and is configured to instruct to send a first social message to a second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information is matched with the historical signature information, the first social message is sent to the second terminal. By implementing the method and the device, signature information can be introduced to verify the validity of the message content in the social message transmission process, so that the harm of fake messages to users is prevented.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIGS. 1 a-1 b are schematic views of a social message display scenario provided in an embodiment of the present application;
FIG. 2 is a schematic architecture diagram of a social message processing system provided in an embodiment of the present application;
FIG. 3 is a schematic flow chart of a social message processing scheme provided by an embodiment of the present application;
fig. 4a to fig. 4b are schematic diagrams of a scenario for sending a social message according to an embodiment of the present application;
FIG. 5 is a schematic flow chart of a social message processing method provided in an embodiment of the present application;
FIGS. 6 a-6 b are schematic diagrams of a page displaying social messages according to embodiments of the present application;
FIG. 7 is a schematic flow chart diagram of another social message processing method provided by an embodiment of the present application;
FIG. 8 is a schematic diagram of a scenario for sending a second social message according to an embodiment of the present application;
FIG. 9a is a code schematic diagram corresponding to a second social message according to an embodiment of the present application;
FIG. 9b is a code schematic diagram corresponding to a first social message according to an embodiment of the present application;
FIG. 10 is a schematic flow chart diagram of yet another social message processing method provided by an embodiment of the present application;
FIG. 11 is a schematic structural diagram of a social message processing apparatus according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a server according to an embodiment of the present application;
FIG. 13 is a schematic structural diagram of another social message processing apparatus according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
During use of the social application, user A may send a social message to user B via the social application, which may in turn forward the social message to user C. Currently, in the process of propagating social messages among users a, B and C, malicious tampering of original messages by users may be involved, spurious messages are propagated, and serious harm is brought to receiving users of spurious messages (such as property damage, identity information disclosure, account theft and the like).
The message type of the social message may be an image type, a text type, a video type or a graphics-text type. In the following, taking the message type of the social message as an example of the graphic type, the message forging scene related to the message propagation process is described:
the first step: user a sends a target social message, with message title "123", to user B via the social application, which user B views in the session page with user a (as shown in fig. 1 a).
And a second step of: after the user B views the target social message, the message title of the target social message is modified, wherein the specific content of the modification is as follows: the message header is modified from "123" to "456".
And a third step of: user B sends the modified target social message to user C, who views the modified target social message in the session page with user B (as shown in fig. 1B).
As can be seen from the above, in the whole social message propagation process, the user C cannot perceive that the social message received by the user C has been modified, and the modified social message (hereinafter referred to as a fake message) may cause a great hazard to the user C.
Based on the above, the embodiment of the application provides a social message processing system, which increases effective verification on message content in the propagation process of social messages and prevents falsified messages from causing harm to users. Referring to fig. 2, a social message processing system according to an embodiment of the present application may include: a plurality of terminals (e.g., a first terminal, a second terminal, and a third terminal) running social applications, and a server. Wherein, the social application may refer to an application (e.g., tencel QQ, weChat application, etc.) with online session functionality; the terminal refers to a terminal used by a user of a social application, and can be used for receiving or sending social messages, where the terminal can be any of the following: smart phones, tablet computers, laptop computers, and other portable devices, as well as desktop computers, and the like.
Accordingly, the server may be a background server of the social application, where the server may be an independent service device, or may be a cluster device formed by a plurality of service devices, or may be a cloud server that provides cloud services, a cloud database, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and basic cloud computing services such as big data and artificial intelligence platforms.
It should be noted that, fig. 2 is only an exemplary architecture of the social message processing system according to the embodiment of the present application, and is not limited to a specific architecture of the social message processing system. For example, the social message processing system may include a fourth terminal, a fifth terminal, and so on, in addition to the first terminal, the second terminal, and the third terminal.
Based on the social message processing system, the implementation of the application proposes a social message processing scheme, referring to fig. 3, where the social message processing scheme may be executed by the server, the first terminal, the second terminal, and the third terminal is assumed to be a terminal used by the user a, the first terminal is a terminal used by the user B, the second terminal is a terminal used by the user C, where the related scenario is: the user A sends the social message to the user B, and the user B forwards the social message to the user C, and the social message processing scheme comprises the following specific steps:
S10: the third terminal sends a second social messaging request to the server, wherein the second social messaging request is used for indicating: and sending the second social message to the first terminal. The message type of the second social message may be an image type, a text type, a video type or a graphics text type. For example, referring to fig. 4a, assuming that the second social message is image 1, when user a wants to send image 1 to user B through his own terminal (i.e., the third terminal), the social application may log in, select image 1 as the second social message in the session page with user B, and send a second social message sending request to the server through the third terminal for instructing to send image 1 to the first terminal (i.e., the terminal used by user B).
S11: the server acquires second key information from the second social information, generates historical signature information according to the second key information, and adds the historical signature information to the second social information to obtain the first social information.
In the embodiment of the application, the key information acquired for the social messages of different message types is different. In a specific implementation, after receiving the second social message sending request, the server may acquire a second social message carried by the second social message sending request, and detect a message type of the second social message, so as to acquire different second key information from the second social message according to the message type of the second social message.
Specifically, if the message type of the second social message is a graph text type, the second key information includes any one or more of the following: message titles, message descriptions, message profiles, jump links and message sources corresponding to the second social messages; if the message type of the second social message is the text type, the second key information is text information corresponding to the second social message; if the message type of the second social message is the video type, the second key information is binary data of the video corresponding to the second social message; and if the message type of the second social message is the image type, the second key information is binary data of the image corresponding to the second social message.
S12: the server sends a first social message to the first terminal.
S13: the first terminal sends a first social message sending request to the server, wherein the first social message sending request is used for indicating to send a first social message to the second terminal, and the first social message comprises first key information and historical signature information.
In a specific implementation, after the user B views the first social message through the first terminal, if the first social message is to be forwarded to the user C, a first social message sending request for indicating to send the first social message to the second terminal (i.e. the terminal used by the user C) may be sent to the server through the first terminal.
For example, with continued reference to fig. 4B and with the above example of fig. 4a, the second social message is image 1, and then the first social message herein is image 1 to which the historical signature information is added, after the server sends the first social message to the first terminal, the user B may log in to the social application through the first terminal, and view the image 1 sent to the user a by the user B in the session page with the user a. Further, if the user B wants to forward the image 1 to the image C, a first social message transmission request for instructing to transmit the image 1 (here, the image 1 is the image 1 to which the history signature information is added) to the second terminal may be transmitted to the server through the first terminal.
S14: the server acquires first key information from the first social message, generates signature information according to the first key information, and compares the signature information with historical signature information.
S15: and if the comparison result indicates that the signature information is matched with the historical signature information, the server sends the first social information to the second terminal.
In a specific implementation, if the comparison result indicates that the signature information and the historical signature information are matched, the first social message is identical to the original message (i.e., the second social message sent to the user B by the user a), that is, the original message is not modified by the user B in the message propagation process. In this case, the server sends the first social message to the second terminal, so that the authenticity of the first social message received by the user C can be ensured, and the harm to the user C caused by counterfeiting the message is prevented.
According to the social message processing scheme, signature information is introduced to verify the validity of the message content in the propagation process of the social message, so that the harm of fake messages to users is prevented.
Please refer to fig. 5, which is a flowchart illustrating a social message processing method according to an embodiment of the present application, where the method according to an embodiment of the present application may be executed by a server. The method of the embodiment of the application comprises the following steps.
S20: and receiving a first social message sending request from the first terminal, wherein the first social message sending request is used for indicating to send the first social message to the second terminal, and the first social message comprises first key information and historical signature information.
For example, assuming that the third terminal is a terminal used by the user a, the first terminal is a terminal used by the user B, the second terminal is a terminal used by the user C, the related scenarios are: user a has sent a social message to user B through the server. The specific flow of the user A sending the social message to the user B through the server is as follows: the user A uploads a second social message which is wanted to be sent to the user B to the server through the third terminal, the server obtains second key information in the second social message, historical signature information is generated according to the second key information, the historical signature information is added in the second social message, the first social message is obtained, and the first social message is further sent to the first terminal corresponding to the user B. Further, after the user B views the first social message through the first terminal, if the first social message is to be forwarded to the user C, a first social message sending request for indicating to send the first social message to the second terminal (i.e. the terminal used by the user C) may be sent to the server through the first terminal.
S21: first key information is obtained from the first social message, and signature information is generated according to the first key information.
S22: and comparing the signature information with the historical signature information, and if the comparison result indicates that the signature information is matched with the historical signature information, transmitting the first social message to the second terminal. In a specific implementation, if the signature information obtained by comparison is the same as the historical signature information, a comparison result for indicating that the signature information is matched with the historical signature information can be generated; otherwise, if the signature information obtained by comparison is different from the historical signature information, a comparison result for indicating that the signature information is not matched with the historical signature information can be generated.
In one embodiment, if the comparison result indicates that the signature information matches the historical signature information, the server may directly send the first social message to the second terminal; or in another embodiment, if the comparison result indicates that the signature information is matched with the historical signature information, the server may also add a verification passing flag in the first social message, and send the first social message added with the verification passing flag to the second terminal. Further, after receiving the first social message, the second terminal may display the first social message in a display manner matching the validated passing token, for example, by adding an "unmodified" identifier 60 (as shown in fig. 6 a). By adopting the mode, the user corresponding to the second terminal can be intuitively reminded, and the first social message which is currently checked is not modified in the propagation process.
In one embodiment, if the comparison indicates that the signature information does not match the historical signature information, then target processing may be performed on the first social message. Wherein, the target processing includes the following processing modes:
mode one: the transmission process of the first social message to the second terminal is stopped, that is, the server refuses to forward the first social message to the second terminal.
Mode two: and adding the modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal. Further, after receiving the first social message, the second terminal may display the first social message in a display manner matching the modification mark, for example, adding a "modified" identifier 61 (as shown in fig. 6 b). By adopting the mode, the user corresponding to the second terminal can be intuitively reminded, and the currently viewed first social message is modified by the user corresponding to the first terminal in the propagation process.
Mode three: and stopping sending the first social message to the second terminal, and sending modification warning information aiming at the first social message to the first terminal, wherein the modification warning information is used for reminding a user corresponding to the first terminal of not maliciously modifying the social message.
Mode four: and stopping sending the first social message to the second terminal, acquiring account information of the user corresponding to the first terminal in the social application, adding the account information to a blacklist of the social application, and enabling the user corresponding to the first terminal to be unable to log in the social application.
It will be appreciated that the first to fourth modes are several examples of the target processing, and the target processing may include other processing modes besides the first to fourth modes, such as: the partial processing means in the first to fourth modes are combined, and specific combining modes may be, for example: adding a modification mark in the first social message, sending the first social message added with the modification mark to a second terminal, and sending modification warning information aiming at the first social message to the first terminal; or adding a modification mark in the first social message, sending the first social message added with the modification mark to the second terminal, acquiring account information of a user corresponding to the first terminal in the social application, and adding the account information to a blacklist of the social application. This application is not particularly limited.
In this embodiment of the present application, the server may receive a first social message sending request from a first terminal, and is configured to instruct to send a first social message to a second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information is matched with the historical signature information, the first social message is sent to the second terminal. By implementing the embodiment of the application, signature information can be introduced to verify the validity of the message content in the social message propagation process, so that the harm of fake messages to users is prevented.
Please refer to fig. 7, which is a flowchart illustrating another social message processing method according to an embodiment of the present application, wherein the method according to an embodiment of the present application may be executed by a server. The method of the embodiment of the application comprises the following steps.
S30: receiving a second social messaging request from a third terminal, the second social messaging request being for indicating: and sending the second social message to the first terminal.
S31: and obtaining second key information from the second social message. The message type of the second social message includes an image type, a text type, a video type or an image-text type, and it is known from the foregoing that the second key information obtained for the second social message of different message types is different, and taking the message type of the second social message as the image-text type as an example, the second key information may include any one or more of the following: message titles, message descriptions, message profiles, jump links and message sources corresponding to the second social messages.
For example, assuming that the message type of the second social message is a graph-text type, referring to fig. 8, the second social message sent by the user a to the user B through the social application is a message 80, and the message 80 may be expressed by the code shown in fig. 9a in the actual sending process. In fig. 9a, a field "tile" represents a message header, a field "desc" represents a message description, a field "jumpUrl" represents a jump link, a field "preview" represents a message distribution diagram, and a field "tag" represents a message source, and accordingly, the server may obtain the second key information such as the message header, the message description, the jump link, the message distribution diagram, the message source, and the like corresponding to the second social message by extracting the contents corresponding to the fields "tile", "desc", "jumpUrl", "preview" and "tag" from the second social message, respectively.
S32: historical signature information is generated in accordance with the second key information.
In one embodiment, the second key information may be spliced into a string according to the target order, the signature requirement data is obtained, and the signature string is generated through the signature requirement data and the string. The target sequence is preconfigured for social messages of different message types in advance, and can be adjusted according to actual requirements. Illustratively, taking a text-to-text type message as an example, the target sequence may be: message header, message description, jump link, message profile, and message source.
Wherein the signature demand data includes any one or more of: a time stamp, a random number, and a target signature password, the time stamp being determined based on a current time, the random number being determined based on a random number generation rule. Illustratively, assuming that the signature requirement data includes a Timestamp, a random number, and a target signature password P, the above-described signature string=string+timestamp timestamp+target signature password p+random number.
In a specific implementation, the target signature password is preconfigured, so that the target signature password can be periodically updated to prevent the target signature password from being revealed, and a signature password update record is updated, wherein the signature password update record records the effective time and the expiration time of each signature password. In this case, when the server needs to acquire the target password information, the signature password update record may be acquired, and the signature password in the valid state at the current time may be acquired according to the signature password update record, so as to determine the signature password in the valid state at the current time as the target signature password. That is, in the embodiment of the present application, the target signature password used is a signature password in which the current time is in an effective state.
Further, after the server generates the signature string, the signature string may be hashed by a hash algorithm, and the hash result may be determined as historical signature information.
The hash algorithm may be MD5 (message digest algorithm), SHA1 (secure hash algorithm), SHA256 (secure hash algorithm), SHA512 (secure hash algorithm), or the like. MD5 is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value, typically expressed in text format as a 32-bit hexadecimal number. When the signature string is subjected to hash calculation by the MD5, the hash calculation result is a 128-bit (16-byte) hash value obtained by performing hash calculation on the signature string by the MD 5.
SHA1 (secure hash algorithm) is a cryptographic hash function designed by the american XX security agency. SHA1 generates a 160-bit (20 bytes) hash value, typically represented as a hexadecimal number, 40 bits in length. When hash calculation is performed on the signature string by SHA1, the hash calculation result is a 160-bit (20-byte) hash value obtained by hash calculation on the signature string by SHA 1.
SHA256 (secure hash algorithm) is a cryptographic hash function designed by the american XX security agency. SHA256 generates a 256-bit (32-byte) hash value, typically represented as a hexadecimal number, 64 bits long. When hash calculation is performed on the signature string by SHA256, the hash calculation result is a 256-bit (32-byte) hash value obtained by hash calculation of the signature string by SHA 256.
SHA512 (secure hash algorithm) is a cryptographic hash function designed by the american XX security agency. SHA512 generates a 512-bit (64 bytes) hash value, typically represented as hexadecimal digits, 128 bits long. When the SHA512 performs hash computation on the signature string, the hash computation result is a 512-bit (64-byte) hash value obtained by the SHA512 performing hash computation on the signature string.
S33: and adding historical signature information into the second social message to obtain a first social message, and sending the first social message to the first terminal so that the first terminal sends a first social message sending request in the following step S34 to the server after receiving the first social message.
In a specific implementation, assuming that the historical signature information is generated according to the Timestamp, the random number and the target signature password P, when executing step S33, the server may add the Timestamp and the random number to the second social message in addition to the historical signature information to obtain the first social message. Subsequently, when the server performs step S35 described below, the first key information, the Timestamp and the random number may be acquired from the first social message, and the signature information may be generated according to the first key information, the Timestamp and the random number. The manner in which the server generates the signature information according to the first key information, the Timestamp and the random number is similar to the manner in which the historical signature information is generated according to the second key information, which is not described herein.
For example, taking the example shown in fig. 9a as an example, the second social message is a message 80, and the first social message may be expressed by a code shown in fig. 9b in an actual sending process, and a field "abcdefghigk" corresponding to the field "token" in fig. 9b is the historical signature information.
S34: and receiving a first social message sending request from the first terminal, wherein the first social message sending request is used for indicating to send the first social message to the second terminal, and the first social message comprises first key information and historical signature information.
S35: first key information is obtained from the first social message, and signature information is generated according to the first key information. The method for obtaining the first key information from the first social message is similar to the method for obtaining the second key information from the second social message, and the method for generating signature information according to the first key information is similar to the method for generating historical signature information according to the second key information, which is not described herein.
S36: and comparing the signature information with the historical signature information, and if the comparison result indicates that the signature information is matched with the historical signature information, transmitting the first social message to the second terminal. For the specific implementation of step S34 and step S36, reference may be made to the description of step S20 and step S22 in the above embodiments, which are not repeated here.
Fig. 10 is a schematic flow chart of a social message processing method according to an embodiment of the present application, where the method according to the embodiment of the present application may be performed by a terminal (e.g., the second terminal described above). The method of the embodiment of the application comprises the following steps.
S40: and receiving the first social message sent by the server.
S41: and when the first social message is detected to comprise the target mark, displaying the first social message according to the display mode matched with the target mark.
The first social message is sent to a terminal (for example, the second terminal) by the first terminal through the server, and the first social message sent to the server by the first terminal includes historical signature information and first key information. Specifically, after the server receives the first social message sent by the first terminal, the target mark obtains first key information from the first social message, signature information is generated according to the first key information, and the target mark is determined according to a comparison result of the signature information and the historical signature information.
The target mark comprises a modification mark and a verification passing mark, wherein the modification mark is added in the first social message after the server determines that the signature information is not matched with the historical signature information according to the indication of the comparison result. The verification passing mark is added in the first social message after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
In the embodiment of the present application, if the first social message includes a verification passing flag, it is indicated that the server has verified that the message content of the first social message that is sent this time passes, that is, it is indicated that the corresponding user of the first terminal does not modify the original message in the message propagation process. In this case, the terminal may display the first social message according to a display manner matched with the verification passing mark, and the specific display manner may be, for example: an "unmodified" flag is added (as shown in fig. 6 a). By adopting the mode, the user corresponding to the second terminal can be intuitively reminded, and the first social message which is currently checked is not modified in the propagation process.
If the first social message includes a modification mark, the characterization server does not verify the message content of the first social message sent at this time, namely, the characterization that the first terminal corresponds to the user to modify the original message in the message transmission process is performed. In this case, the terminal may display the first social message according to a display manner matched with the modification mark, and the specific display manner may be, for example: by adding the "modified" identifier (as shown in fig. 6 b), in this way, the user corresponding to the second terminal can be intuitively reminded, and the first social message currently viewed is modified by the user corresponding to the first terminal in the propagation process.
In this embodiment of the present application, the terminal may receive a first social message sent by the server, and when it is detected that the first social message includes a target mark, display the first social message according to a display manner matched with the target mark. The user can be intuitively reminded whether the first social message has been modified in the propagation process.
The present embodiment also provides a computer storage medium having stored therein program instructions for implementing the corresponding method described in the above embodiments when executed.
Referring to fig. 11 again, a schematic structural diagram of a social message processing apparatus according to an embodiment of the present application may be provided in the server, or may be a computer program (including program code) running in the server.
In one implementation manner of the apparatus of the embodiment of the present application, the apparatus includes the following structure.
A communication unit 50 for receiving a first social messaging request from a first terminal, the first social messaging request being for indicating to send a first social message to a second terminal; the first social message comprises first key information and historical signature information;
A processing unit 51, configured to obtain the first key information from the first social message, and generate signature information according to the first key information;
the processing unit 51 is further configured to compare the signature information with the historical signature information;
the communication unit 50 is further configured to send the first social message to the second terminal if the comparison result indicates that the signature information matches the historical signature information.
In one embodiment, before receiving the first social messaging request from the first terminal, the communication unit 50 is further configured to receive a second social messaging request from the third terminal, where the second social messaging request is configured to indicate: sending a second social message to the first terminal; the processing unit 51 is further configured to obtain second key information from the second social message, generate the historical signature information according to the second key information, and add the historical signature information to the second social message to obtain the first social message; the communication unit 50 is further configured to send a first social message to the first terminal, so that after the first terminal receives the first social message, the first social message sending request is sent to the server.
In one embodiment, the processing unit 51 is further configured to perform, if the comparison result indicates that the signature information does not match the historical signature information, a target process on the first social message, where the target process includes:
suspending transmission processing of the first social message to the second terminal;
or adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal;
or, the sending process of the first social message to the second terminal is stopped, and the modification warning information for the first social message is sent to the first terminal.
In one embodiment, the message type of the second social message includes an image type, a text type, a video type, or a text type;
if the message type of the second social message is a graphic type, the second key information includes any one or more of the following: message titles, message descriptions, message profiles, jump links and message sources corresponding to the second social messages;
if the message type of the second social message is a text type, the second key information is text information corresponding to the second social message;
If the message type of the second social message is a video type, the second key information is binary data of a video corresponding to the second social message;
and if the message type of the second social message is the image type, the second key information is binary data of the image corresponding to the second social message.
In one embodiment, the second key information includes one or more processing units 51, specifically configured to:
splicing the second key information into character strings according to the target sequence;
acquiring signature demand data, and generating a signature character string through the signature demand data and the character string;
and carrying out hash calculation on the signature character string through a hash algorithm, and determining a hash calculation result as the historical signature information.
In one embodiment, the signature requirement data includes any one or more of the following: a time stamp, a random number, and a target signature password, the time stamp being determined based on a current time, the random number being determined based on a random number generation rule.
In one embodiment, the signature requirement data includes the target signature password, and the processing unit 51 is further specifically configured to:
Acquiring a signature password updating record, and acquiring a signature password in an effective state at the current time according to the signature password updating record;
and determining the signature password with the current time in an effective state as a target signature password.
In one embodiment, the processing unit 51 is further specifically configured to:
if the comparison result indicates that the signature information is matched with the historical signature information, adding a verification passing mark in the first social message;
the first social message added with the authentication pass flag is transmitted to the second terminal through the communication unit 50.
In the embodiments of the present application, the specific implementation of each unit may refer to the description of the related content in the embodiments corresponding to the foregoing drawings.
The social message processing device in the embodiment of the application can receive a first social message sending request from a first terminal and is used for indicating to send a first social message to a second terminal, acquiring first key information from the first social message and generating signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information is matched with the historical signature information, the first social message is sent to the second terminal. Signature information can be introduced to verify the validity of the message content in the social message transmission process, so that the harm of fake messages to users is prevented.
Referring to fig. 12 again, a schematic structural diagram of a server according to an embodiment of the present application is shown. The server of the embodiment of the present application includes a processor 600, a storage device 601, and a communication interface 602. Data may be interacted between the processor 600, the storage device 601 and the communication interface 602, and corresponding social message processing functions may be implemented by the processor 600.
The storage device 601 may include a volatile memory (RAM) such as a random-access memory (RAM); the storage device 601 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a Solid State Drive (SSD), etc.; the storage means 601 may also comprise a combination of memories of the kind described above.
The processor 600 may be a central processing unit 600 (central processing unit, CPU). In one embodiment, the processor 600 may also be a graphics processor 600 (Graphics Processing Unit, GPU). Processor 600 may also be a combination of a CPU and a GPU. In the server, a plurality of CPUs and GPUs can be included as required to perform corresponding social message processing.
In one embodiment, the storage 601 is used to store program instructions. The processor 600 may invoke program instructions to implement the various methods as referred to above in embodiments of the present application.
In a first possible embodiment, the processor 600 of the server invokes program instructions stored in the storage means 601 for: receiving a first social messaging request from a first terminal through the communication interface 602, the first social messaging request being for indicating to send a first social message to a second terminal; the first social message comprises first key information and historical signature information; acquiring the first key information from the first social message, and generating signature information according to the first key information; comparing the signature information with the historical signature information; and if the comparison result indicates that the signature information is matched with the historical signature information, the first social message is sent to the second terminal through the communication interface 602.
In one embodiment, before receiving the first social messaging request from the first terminal, the processor 600 is further configured to receive, through the communication interface 602, a second social messaging request from the third terminal, where the second social messaging request is configured to indicate: sending a second social message to the first terminal; acquiring second key information from the second social information, generating the historical signature information according to the second key information, and adding the historical signature information into the second social information to obtain the first social information; and sending a first social message to the first terminal through the communication interface 602, so that the first terminal sends the first social message sending request to the server after receiving the first social message.
In one embodiment, the processor 600 is further configured to perform a target process on the first social message if the comparison result indicates that the signature information does not match the historical signature information, where the target process includes:
suspending transmission processing of the first social message to the second terminal;
or adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal;
or, the sending process of the first social message to the second terminal is stopped, and the modification warning information for the first social message is sent to the first terminal.
In one embodiment, the message type of the second social message includes an image type, a text type, a video type, or a text type;
if the message type of the second social message is a graphic type, the second key information includes any one or more of the following: message titles, message descriptions, message profiles, jump links and message sources corresponding to the second social messages;
if the message type of the second social message is a text type, the second key information is text information corresponding to the second social message;
If the message type of the second social message is a video type, the second key information is binary data of a video corresponding to the second social message;
and if the message type of the second social message is the image type, the second key information is binary data of the image corresponding to the second social message.
In one embodiment, the second key information includes one or more of the following, the processor 600 is specifically configured to:
splicing the second key information into character strings according to the target sequence;
acquiring signature demand data, and generating a signature character string through the signature demand data and the character string;
and carrying out hash calculation on the signature character string through a hash algorithm, and determining a hash calculation result as the historical signature information.
In one embodiment, the signature requirement data includes any one or more of the following: a time stamp, a random number, and a target signature password, the time stamp being determined based on a current time, the random number being determined based on a random number generation rule.
In one embodiment, the signature requirement data includes the target signature password, and the processor 600 is further specifically configured to:
Acquiring a signature password updating record, and acquiring a signature password in an effective state at the current time according to the signature password updating record;
and determining the signature password with the current time in an effective state as a target signature password.
In one embodiment, the processor 600 is further specifically configured to:
if the comparison result indicates that the signature information is matched with the historical signature information, adding a verification passing mark in the first social message;
the first social message with the authentication pass flag added is sent to the second terminal through the communication interface 602.
In the embodiments of the present application, the specific implementation of the processor 600 may refer to the descriptions of the related content in the embodiments corresponding to the foregoing respective drawings.
In this embodiment of the present application, the server may receive a first social message sending request from a first terminal, and is configured to instruct to send a first social message to a second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information is matched with the historical signature information, the first social message is sent to the second terminal. Signature information can be introduced to verify the validity of the message content in the social message transmission process, so that the harm of fake messages to users is prevented.
Referring to fig. 13 again, a schematic structural diagram of another social message processing apparatus according to an embodiment of the present application may be provided in the terminal (for example, the second terminal) or may be a computer program (including program code) running in the terminal.
In one implementation manner of the apparatus of the embodiment of the present application, the apparatus includes the following structure.
A communication unit 70, configured to receive a first social message sent by a server;
a processing unit 71, configured to display the first social message according to a display manner matched with the target mark when it is detected that the target mark is included in the first social message;
the first social message is sent to the terminal by the first terminal through the server; the first social message sent by the first terminal to the server comprises historical signature information and first key information; the target mark is determined according to a comparison result of the signature information and the historical signature information, wherein the first key information is acquired from the first social information after the server receives the first social information sent by the first terminal, and the signature information is generated according to the first key information.
In one embodiment, the target mark comprises a modification mark and a verification passing mark, wherein the modification mark is added in the first social message after the server determines that the signature information is not matched with the historical signature information according to the indication of the comparison result;
the verification passing mark is added in the first social message after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
In the embodiments of the present application, the specific implementation of each unit may refer to the description of the related content in the embodiments corresponding to the foregoing drawings.
In this embodiment of the present application, the social message processing device may receive a first social message sent by the server, and when it is detected that the first social message includes a target mark, display the first social message according to a display manner matched with the target mark. The user can be intuitively reminded whether the first social message has been modified in the propagation process.
Referring to fig. 14 again, a schematic structural diagram of a terminal according to an embodiment of the present application may refer to the second terminal. The terminal of the embodiment of the present application comprises a processor 800, a storage 801, an output device 802 and a communication interface 803. Data may be interacted between the processor 800, the storage 801, the output device 802 and the communication interface 803, and corresponding social message processing functions are implemented by the processor 800.
The storage 801 may include volatile memory (RAM) such as random-access memory (RAM); the storage device 801 may also include a nonvolatile memory (non-volatile memory), such as a flash memory (flash memory), a Solid State Drive (SSD), or the like; the storage 801 may also include a combination of the above types of memory.
The processor 800 may be a central processing unit 800 (central processing unit, CPU). In one embodiment, the processor 800 may also be a graphics processor 800 (Graphics Processing Unit, GPU). Processor 800 may also be a combination of a CPU and a GPU. In the terminal, a plurality of CPUs and GPUs can be included as required to perform corresponding social message processing.
The output device 802 may include a display (LCD, etc.), speakers, etc.
In one embodiment, the storage 801 is used to store program instructions. Processor 800 may invoke program instructions to implement the various methods as referred to above in embodiments of the present application.
In a first possible embodiment, the processor 800 of the terminal invokes program instructions stored in the storage means 801 for: receiving a first social message sent by a server through a communication interface 803; when the first social message is detected to comprise a target mark, displaying the first social message according to a display mode matched with the target mark through an output device 802; the first social message is sent to the terminal by the first terminal through the server; the first social message sent by the first terminal to the server comprises historical signature information and first key information; the target mark is determined according to a comparison result of the signature information and the historical signature information, wherein the first key information is acquired from the first social information after the server receives the first social information sent by the first terminal, and the signature information is generated according to the first key information.
In one embodiment, the target mark comprises a modification mark and a verification passing mark, wherein the modification mark is added in the first social message after the server determines that the signature information is not matched with the historical signature information according to the indication of the comparison result;
the verification passing mark is added in the first social message after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
In the embodiments of the present application, the specific implementation of the processor 800 may refer to the descriptions of the related content in the embodiments corresponding to the foregoing respective drawings.
The terminal in the embodiment of the application can receive the first social message sent by the server, and when the first social message is detected to include the target mark, the first social message is displayed according to the display mode matched with the target mark. The user can be intuitively reminded whether the first social message has been modified in the propagation process.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program to instruct related hardware, and the described program may be stored in a computer readable storage medium, which when executed may include the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), or the like.
The above disclosure is only a few examples of the present application, and it is not intended to limit the scope of the claims, and those of ordinary skill in the art will understand that all or a portion of the above-described embodiments may be implemented and that equivalent changes may be made in the claims of the present application while still falling within the scope of the present invention.

Claims (15)

1. A method for processing social messages, wherein the method is applied to a server, and the method comprises:
receiving a first social messaging request from a first terminal, wherein the first social messaging request is used for indicating to send a first social message to a second terminal; the first social message comprises first key information and historical signature information, the historical signature information is generated according to second key information and signature demand data, the second key information is key information of a second social message from a third terminal, the first social message is obtained by adding the historical signature information into the second social message, the signature demand data comprises a target signature password, and the target signature password is a signature password which is obtained from a signature password update record and is in an effective state at the current time;
Acquiring the first key information from the first social message, and generating signature information according to the first key information and the signature demand data;
comparing the signature information with the historical signature information;
and if the comparison result indicates that the signature information is matched with the historical signature information, the first social information is sent to the second terminal.
2. The method of claim 1, wherein prior to receiving the first social messaging request from the first terminal, the method further comprises:
receiving a second social messaging request from a third terminal, wherein the second social messaging request is used for indicating: sending a second social message to the first terminal;
acquiring second key information from the second social message, and generating the historical signature information according to the second key information;
adding the historical signature information to the second social message to obtain the first social message;
and sending a first social message to the first terminal, so that the first terminal can send the first social message sending request to the server after receiving the first social message.
3. The method of claim 1 or 2, wherein the method further comprises:
if the comparison result indicates that the signature information is not matched with the historical signature information, executing target processing on the first social message, wherein the target processing comprises:
suspending transmission processing of the first social message to the second terminal;
or adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal;
or, the sending process of the first social message to the second terminal is stopped, and the modification warning information for the first social message is sent to the first terminal.
4. The method of claim 2, wherein the message type of the second social message comprises an image type, a text type, a video type, or a teletext type;
if the message type of the second social message is a graphic type, the second key information includes any one or more of the following: message titles, message descriptions, message profiles, jump links and message sources corresponding to the second social messages;
If the message type of the second social message is a text type, the second key information is text information corresponding to the second social message;
if the message type of the second social message is a video type, the second key information is binary data of a video corresponding to the second social message;
and if the message type of the second social message is the image type, the second key information is binary data of the image corresponding to the second social message.
5. The method of claim 2, wherein the second key information includes one or more of the historical signature information generated in accordance with the second key information, comprising:
splicing the second key information into character strings according to the target sequence;
acquiring signature demand data, and generating a signature character string through the signature demand data and the character string;
and carrying out hash calculation on the signature character string through a hash algorithm, and determining a hash calculation result as the historical signature information.
6. The method of claim 5, wherein the signature requirement data includes any one or more of: a time stamp, a random number, and a target signature password, the time stamp being determined based on a current time, the random number being determined based on a random number generation rule.
7. The method of claim 5, wherein the signature requirement data comprises a target signature password, and the obtaining signature requirement data comprises:
acquiring a signature password updating record, and acquiring a signature password in an effective state at the current time according to the signature password updating record;
and determining the signature password with the current time in an effective state as a target signature password.
8. The method of claim 1, wherein the sending the first social message to the second terminal if the comparison indicates that the signature information matches the historical signature information comprises:
if the comparison result indicates that the signature information is matched with the historical signature information, adding a verification passing mark in the first social message;
and sending the first social message added with the verification passing mark to the second terminal.
9. A social message processing method, wherein the method is applied to a terminal, and the method comprises:
receiving a first social message sent by a server;
when the fact that the target mark is included in the first social message is detected, displaying the first social message according to a display mode matched with the target mark;
The first social message is sent to the terminal by the first terminal through the server; the first social message sent by the first terminal to the server comprises historical signature information and first key information; the historical signature information is generated according to second key information and signature demand data, the second key information is key information of a second social message from a third terminal, the first social message is obtained by adding the historical signature information into the second social message, the signature demand data comprises a target signature password, and the target signature password is a signature password which is obtained from a signature password update record and is in an effective state at the current time; the target mark is determined according to a comparison result of the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information and the signature demand data.
10. The method of claim 9, wherein the target mark comprises a modification mark and a verification passing mark, the modification mark being added in the first social message after the server determines that the signature information does not match the historical signature information according to the indication of the comparison result;
The verification passing mark is added in the first social message after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
11. A social message processing apparatus, the apparatus being configured in a server, the apparatus comprising:
the communication unit is used for receiving a first social message sending request from the first terminal, wherein the first social message sending request is used for indicating to send a first social message to the second terminal; the first social message comprises first key information and historical signature information, the historical signature information is generated according to second key information and signature demand data, the second key information is key information of a second social message from a third terminal, the first social message is obtained by adding the historical signature information into the second social message, the signature demand data comprises a target signature password, and the target signature password is a signature password which is obtained from a signature password update record and is in an effective state at the current time;
the processing unit is used for acquiring the first key information from the first social message and generating signature information according to the first key information and the signature demand data;
The processing unit is further used for comparing the signature information with the historical signature information;
the communication unit is further configured to send the first social message to the second terminal if the comparison result indicates that the signature information matches the historical signature information.
12. A social message processing apparatus, wherein the apparatus is configured in a terminal, the apparatus comprising:
the communication unit is used for receiving the first social message sent by the server;
the processing unit is used for displaying the first social message according to a display mode matched with the target mark when the target mark is detected to be included in the first social message;
the first social message is sent to the terminal by the first terminal through the server; the first social message sent by the first terminal to the server comprises historical signature information and first key information; the historical signature information is generated according to second key information and signature demand data, the second key information is key information of a second social message from a third terminal, the first social message is obtained by adding the historical signature information into the second social message, the signature demand data comprises a target signature password, and the target signature password is a signature password which is obtained from a signature password update record and is in an effective state at the current time; the target mark is determined according to a comparison result of the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information and the signature demand data.
13. A server comprising a processor and a storage device, the processor and the storage device being interconnected, wherein the storage device is adapted to store a computer program, the computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1-8.
14. A terminal comprising a processor and a storage device, the processor and the storage device being interconnected, wherein the storage device is adapted to store a computer program, the computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 9-10.
15. A computer storage medium having stored therein program instructions which, when executed, are adapted to carry out the method of any one of claims 1-10.
CN202110118707.2A 2021-01-28 2021-01-28 Social message processing method, device, server, terminal and medium Active CN114827074B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110118707.2A CN114827074B (en) 2021-01-28 2021-01-28 Social message processing method, device, server, terminal and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110118707.2A CN114827074B (en) 2021-01-28 2021-01-28 Social message processing method, device, server, terminal and medium

Publications (2)

Publication Number Publication Date
CN114827074A CN114827074A (en) 2022-07-29
CN114827074B true CN114827074B (en) 2024-04-09

Family

ID=82526183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110118707.2A Active CN114827074B (en) 2021-01-28 2021-01-28 Social message processing method, device, server, terminal and medium

Country Status (1)

Country Link
CN (1) CN114827074B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527632A (en) * 2008-03-06 2009-09-09 华为技术有限公司 Method, device and system for authenticating response messages
CN103973695A (en) * 2014-05-16 2014-08-06 浪潮电子信息产业股份有限公司 Signature algorithm for server validation
CN105095729A (en) * 2015-06-19 2015-11-25 赛肯(北京)科技有限公司 Two-dimensional code login method, server and system
CN108401243A (en) * 2018-02-23 2018-08-14 广州大学 Vehicular ad hoc network message authentication method and system
CN109302281A (en) * 2018-11-05 2019-02-01 陈德辉 Realize the method and system of social networks
CN111901221A (en) * 2020-07-03 2020-11-06 上海掌门科技有限公司 Message processing method, device and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527632A (en) * 2008-03-06 2009-09-09 华为技术有限公司 Method, device and system for authenticating response messages
CN103973695A (en) * 2014-05-16 2014-08-06 浪潮电子信息产业股份有限公司 Signature algorithm for server validation
CN105095729A (en) * 2015-06-19 2015-11-25 赛肯(北京)科技有限公司 Two-dimensional code login method, server and system
CN108401243A (en) * 2018-02-23 2018-08-14 广州大学 Vehicular ad hoc network message authentication method and system
CN109302281A (en) * 2018-11-05 2019-02-01 陈德辉 Realize the method and system of social networks
CN111901221A (en) * 2020-07-03 2020-11-06 上海掌门科技有限公司 Message processing method, device and computer storage medium

Also Published As

Publication number Publication date
CN114827074A (en) 2022-07-29

Similar Documents

Publication Publication Date Title
US10803205B1 (en) Retrieving public data for blockchain networks using trusted execution environments
JP6856772B2 (en) Processing blockchain data based on smart contract behavior executed in a reliable execution environment
CN110300985B (en) Parallel execution of transactions in blockchain networks based on smart contract whitelists
TWI672648B (en) Business process method and device, data share system, and storage medium
US10747721B2 (en) File management/search system and file management/search method based on block chain
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
CN109472696B (en) Asset transaction method, device, storage medium and computer equipment
US20200267003A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110998556A (en) Data isolation in blockchain networks
CN108805571B (en) Data protection method, platform, block chain node, system and storage medium
CN109743161B (en) Information encryption method, electronic device and computer readable medium
US20210241270A1 (en) System and method of blockchain transaction verification
KR20220066823A (en) Blockchain - based phishing prevention system, apparatus, and method thereof
JP2009530906A (en) Endpoint verification using call sign
KR20220030925A (en) Valuables Management System
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN114827074B (en) Social message processing method, device, server, terminal and medium
CN113987062A (en) Data uplink storage method, system, device and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN113626848A (en) Sample data generation method and device, electronic equipment and computer readable medium
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment
CN112241513B (en) Digital asset processing system to be authenticated
CN117349895B (en) Block chain-based automobile financial digital archive management method and device
CN110781523B (en) Method and apparatus for processing information
US20230048293A1 (en) Providence certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40071425

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant