WO2016175647A1 - A secured instant messaging (im) system structure based on identification - Google Patents

A secured instant messaging (im) system structure based on identification Download PDF

Info

Publication number
WO2016175647A1
WO2016175647A1 PCT/MY2015/050073 MY2015050073W WO2016175647A1 WO 2016175647 A1 WO2016175647 A1 WO 2016175647A1 MY 2015050073 W MY2015050073 W MY 2015050073W WO 2016175647 A1 WO2016175647 A1 WO 2016175647A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
user
router
servers
identification
Prior art date
Application number
PCT/MY2015/050073
Other languages
French (fr)
Inventor
Hao Lin
Xi GAO
Li Zhong
Original Assignee
Linkdood Technologies Sdn Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linkdood Technologies Sdn Bhd filed Critical Linkdood Technologies Sdn Bhd
Publication of WO2016175647A1 publication Critical patent/WO2016175647A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • a secured Instant Messaging(IM) system structure based on identification Technical Field This invention is classified under information technology involving how to create a secured Instant Messaging(IM) system, more specifically to offer individual, institution, enterprises or organizations a secured IM system across various networks.
  • IM is the process of mobile phones, tablet PCs and computer user to send and receive text, picture, audio clips, video clips via a network; it is one of the common applications on internet. Typical usage of IM including WeChat, QQ, Skype, RTX(Real Time eXpert), e-contact and more. The first three players are targeted for public users; the last two players are targeted for users from enterprise or organizations.
  • e-contact is an IM service platform that targets small organization or enterprise, whereby all enterprises and organizations will be assigned to various IM servers according to predefined rules; connectivity among various servers are managed by the primary and secondary controllers; users from enterprises and organizations internally and users from various enterprises and organizations are able to connect IM on the same platform.
  • the present public internet IM system does not provide secure data storage and transmission service; Enterprise version of IM system can provide users secure data transmission, but doesn't provide a secure storage of local data, and will not able to securely transfer and store data when conducting P2P(Peer-to-Peer)or group messaging among enterprises or organizations users, various enterprises or organizations users. Disclosure of Invention
  • the objective of this invention is to provide a secured IM system structure that enables connectivity and communication amongst internet, enterprises intranet, cloud computing platform and other complex network environments, formed by a three layer "Routing + Service + User” structure to build a flexible, secure, and controllable IM system.
  • This invention discloses a secured IM system structure base on identification, comprising of IM user, IM server and IM router. Details are as below: (1) IM user. Every IM user has a unique Identification User ID(UID) across all networks, the UID includes the server identification Host ID(HID) that the user registered; two or more IM users can securely use IM through IM server; the UID includes a username and the server identification host HID that the user registered; other information of IM user includes: nickname, real name, gender, birthdate, 2-dimensional code and etc.
  • UID Identification User ID
  • IM server Every IM sever has a unique identification HID across all networks, IM servers which its IM users conduct P2P(Peer-to-Peer) or group messaging will interconnects and communicate to form an IM service network, providing the IM users a secured IM service; pre-configured information of IM server includes: name, Identification HID , description, network address, status, identification Router ID(RID) of associated IM router, connection relation table and etc.
  • Every IM router has a unique identification RID across all networks, manages one or multiple IM servers, IM routers form a routing service network, to provide a secure addressing service based on IM server's identification HID to facilitate the network connection among IM servers; pre-configured information of IM router includes: name, identification router RID, description, network address, status, list of the IM server HID it manages, neighbor IM router identification router RID list, routing table and etc.
  • connection relation table of IM server stores the information of name, server identification host HID , network address and status of the other IM servers that previously connected to this IM server; For a newly added IM server that IM router fed back, after verifying it is in normal working condition, its relevant information of name, server identification host HID , network address, status will be added to the connection relation table.
  • IM user initiates P2P(Peer-to peer) or group messaging
  • the source IM server will forward the identification HID of the target servers to its associated IM server, and send addressing request;
  • the IM router will search the target IM servers' network address based on routing strategy; subsequently feed them back to the source server after the target IM servers' network address are found.
  • strategy used by IM router to conduct addressing for IM servers will be maximum speed priority strategy or shortest path priority strategy.
  • a secured IM system structure based on identification of this invention also include the data security module, the network connection from IM user to IM server, amongst IM servers, and network conversation data amongst IM users are being encrypted.
  • the IM router provides a secure addressing service, the confirmation of neighbor relationship among IM routers, IM routers and the IM servers that they manage are required to authenticate each other.
  • FIG.l Structure diagram of the invention - A secured IM system structure
  • FIG.2 Deployment diagram of the invention - A secured IM system structure
  • FIG.l is the structure diagram of the secured IM system structure.
  • the system is based on a three layered structure, base structure is user layer, comprising of IM users; Middle layer is service layer, to provide IM service to user layer; top layer is routing layer, to provide addressing and other services to service layer.
  • This Layer comprises of IM users. User will acquire an IM account and becoming IM user upon successful registration at an IM server. User can register various user accounts at various IM servers, becoming a different IM user, to login and use on one or multiple mobile phones, tablet computers or personal computer terminals.
  • Every IM user has a unique Identification User ID (UID) across all networks, the UID includes the server identification HID that the user registered; two or more IM users can securely use IM through IM servers; the UID includes the username and IM server identification HID that the user registered; other information of IM user includes: nickname, real name, gender, birth date, 2-dimensional code and etc.
  • UID Identification User ID
  • This Service layer comprises of IM servers. Every IM server has a unique identification HID across all networks, IM servers will interconnects and communicate to form an IM service network, providing IM users a secured IM service; pre-configured information of IM server includes: name, Identification HID, description, network address, status, identification RID of associated IM router, connection relation table and etc.
  • IM server integrates access point, IM application and database in one place; it can be an actual server or virtual machine. Equipped with encrypted storage and access control functions on IM, the network connection from IM user to IM server, amongst IM servers, and network conversation data amongst IM users are being encrypted. Before conducting routing lookup and management operations, the IM server will perform authentications with IM router.
  • This layer comprises of IM routers. Every IM router has a unique identification RID across all networks, manages one or multiple IM servers, IM routers form a routing service network, to provide a secure addressing service based on IM server's identification HID. Pre-configured information of IM router includes: name, identification RID, description, network address, status, list of the IM server HID it manages, neighbor IM router identification RID list, routing table and etc.
  • FIG.2 Deployment diagram of the invention - A secured IM system structure IM routers can establish IM routing service network in flat mesh topology or hierarchical tree topology, based on the scale of IM servers and the addressing efficiency. They are on the top level of the IM system structure, responsible for providing addressing service for IM servers that they manage. In this diagram, the routing service network of IM network comprises of IM router Rl, R2, R3, R4 to Rm.
  • IM server is the provider of network IM service, various IM servers forms IM service network, data exchange of IM only store and circulate among IM servers. Every IM server will have an IM router to provide its addressing service. If the IM server of the IM user initiating IM doesn't know the network address of target IM server associated with the target IM user, it will send a network addressing request to its associated IM router.
  • IM server SI and S3 is associated with IM router Rl
  • IM Server S2, S6 and S7 is associated with IM router R3
  • Instant Messing Server S4 and S5 is associated with IM router R2
  • Instant Messing Server S8 is associated with IM router R4
  • IM Server Sn is associated with IM router Rm.
  • IM user is the user of IM service; every IM user will register and login at their respective
  • IM server In reality, users can register multiple IM user account at the same or various
  • U 1 , U2 and U3 are the IM users of IM server S 1 ,
  • U4, and U5 are the IM users of IM server S2,
  • U6 are the IM users of IM server S3,
  • U 10 are the IM users of IM server S4,
  • U7 and U8 are the IM users of IM server S5
  • U9 are the IM users of IM server S6.
  • All IM users can initiate P2P(Peer-to-Peer)or group messaging, to conduct IM with the target user.
  • IM server S2 is in the connection relation table of IM server SI (Because S I and S2 have previously conducted IM, The connection relation table of SI have the network address and status information of S2),IM server S3, S4 and S5 haven't previously establish connection with IM server S 1.
  • the actual steps consists the folio wings:
  • IM user Ul creates a group chat (group messaging), invites IM user U2, U3, U4, U5, U6, U7 and U8 to join;
  • IM server SI analyze the Identification UID data of U4, U5, U6, U7 and U8, identify the IM server names and identification HID that the users registered and logged in, is S2, S3 and S5;
  • IM server S 1 checks its connection relation table, identify that IM server S2 is already in it, and subsequently establish connection with S2, User U4 and U5 are connected to group chat;
  • SI doesn't know the network address of IM server S3 and S5, subsequently SI sends addressing request to its associated IM router Rl;
  • SI and S3 establish network connection according to the network address of S3, user U6 is connected to group chat;
  • Rl check its neighbor IM router identification RID list, forward addressing request on IM server S5 to neighbor IM router R2 and R3;
  • IM router R2 receives the addressing request; identify S5 in HID list of IM server that it manages, feedback the network address of S5 to Rl. (9) Rl will send back network address of S5 to SI, SI establish network connection with S5 based on the network address response from SI, subsequently user U7 and U8 join the group chat;
  • IM server SI establishes network connection with IM server S2, S3, S5 that are connected with all the users, network addressing completed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention discloses a secured Instant Messaging(IM) system structure based on identification, including IM user, IM server and IM router. Every IM user has a unique identification User ID(UID) across all networks, the UID includes the server identification Host ID(HID) that the user registered; Every IM sever has a unique identification HID across all networks, they interconnect and communicate to form an IM service network, to provide secured IM service for IM user. Every IM router has a unique identification Router ID(RID) across all networks, they form a routing service network, to provide a secure addressing service to facilitate the network connection of IM servers. The significance of this invention is: Establishing a new secured IM network structure, so that users can either deploy private servers, or public servers and even securely connects the private and public servers, in order to satisfy the user's needs in conducting secured IM in various network environments.

Description

Title: A secured Instant Messaging(IM) system structure based on identification Technical Field This invention is classified under information technology involving how to create a secured Instant Messaging(IM) system, more specifically to offer individual, institution, enterprises or organizations a secured IM system across various networks.
Background Art
IM is the process of mobile phones, tablet PCs and computer user to send and receive text, picture, audio clips, video clips via a network; it is one of the common applications on internet. Typical usage of IM including WeChat, QQ, Skype, RTX(Real Time eXpert), e-contact and more. The first three players are targeted for public users; the last two players are targeted for users from enterprise or organizations.
Enterprises and organizations are able to conveniently deploy their own internal IM system using RTX(Real Time eXpert) software, but do not address the connectivity, communication and security issues between different enterprises or organization, and public IM. e-contact is an IM service platform that targets small organization or enterprise, whereby all enterprises and organizations will be assigned to various IM servers according to predefined rules; connectivity among various servers are managed by the primary and secondary controllers; users from enterprises and organizations internally and users from various enterprises and organizations are able to connect IM on the same platform. These systems are still having the following imperfections:
(1) Even if the IM servers deployed by various enterprises or organizations and the public IM servers are using the same IM system, they still won't be able to interconnect and communicate, this will reduce the flexibility of group messaging, seriously affecting the collaborative work efficiency of enterprises and organizations. If they're not using the same IM system, it would be even harder to interconnect and communicate, although there is some protocol converter gateway technology that can tackle this issue, but greatly increase the complexity of implementing the system, as of today, it still doesn't become practical yet.
(2) The present public internet IM system does not provide secure data storage and transmission service; Enterprise version of IM system can provide users secure data transmission, but doesn't provide a secure storage of local data, and will not able to securely transfer and store data when conducting P2P(Peer-to-Peer)or group messaging among enterprises or organizations users, various enterprises or organizations users. Disclosure of Invention
The objective of this invention is to provide a secured IM system structure that enables connectivity and communication amongst internet, enterprises intranet, cloud computing platform and other complex network environments, formed by a three layer "Routing + Service + User" structure to build a flexible, secure, and controllable IM system.
This invention discloses a secured IM system structure base on identification, comprising of IM user, IM server and IM router. Details are as below: (1) IM user. Every IM user has a unique Identification User ID(UID) across all networks, the UID includes the server identification Host ID(HID) that the user registered; two or more IM users can securely use IM through IM server; the UID includes a username and the server identification host HID that the user registered; other information of IM user includes: nickname, real name, gender, birthdate, 2-dimensional code and etc.
(2) IM server. Every IM sever has a unique identification HID across all networks, IM servers which its IM users conduct P2P(Peer-to-Peer) or group messaging will interconnects and communicate to form an IM service network, providing the IM users a secured IM service; pre-configured information of IM server includes: name, Identification HID , description, network address, status, identification Router ID(RID) of associated IM router, connection relation table and etc.
(3) IM router. Every IM router has a unique identification RID across all networks, manages one or multiple IM servers, IM routers form a routing service network, to provide a secure addressing service based on IM server's identification HID to facilitate the network connection among IM servers; pre-configured information of IM router includes: name, identification router RID, description, network address, status, list of the IM server HID it manages, neighbor IM router identification router RID list, routing table and etc. The functionality of the connection relation table of IM server are :The connection relation table of every IM server stores the information of name, server identification host HID , network address and status of the other IM servers that previously connected to this IM server; For a newly added IM server that IM router fed back, after verifying it is in normal working condition, its relevant information of name, server identification host HID , network address, status will be added to the connection relation table.
When an IM user initiate P2P(Peer-to peer) or group messaging, if the target IM servers of relevant IM users are already in the connection relation table of the IM user's source IM server, then the source IM server will directly establish network connection with the target IM servers without going through IM router.
When an IM user initiate P2P(Peer-to peer) or group messaging, if the target IM servers of relevant IM users are not in the connection relation table of the IM user's source IM server, then the source IM server will forward the identification HID of the target servers to its associated IM server, and send addressing request; The IM router will search the target IM servers' network address based on routing strategy; subsequently feed them back to the source server after the target IM servers' network address are found. Regarding a secured IM system structure based on identification mentioned in this invention, strategy used by IM router to conduct addressing for IM servers will be maximum speed priority strategy or shortest path priority strategy.
A secured IM system structure based on identification of this invention also include the data security module, the network connection from IM user to IM server, amongst IM servers, and network conversation data amongst IM users are being encrypted. Moreover the IM router provides a secure addressing service, the confirmation of neighbor relationship among IM routers, IM routers and the IM servers that they manage are required to authenticate each other.
Description Of Drawings and Best Mode for Carrying Out The Invention
The following will further elaborate the appendix and detailed description:
FIG.l: Structure diagram of the invention - A secured IM system structure
FIG.2: Deployment diagram of the invention - A secured IM system structure
FIG.l is the structure diagram of the secured IM system structure.
The system is based on a three layered structure, base structure is user layer, comprising of IM users; Middle layer is service layer, to provide IM service to user layer; top layer is routing layer, to provide addressing and other services to service layer.
(1) User layer
This Layer comprises of IM users. User will acquire an IM account and becoming IM user upon successful registration at an IM server. User can register various user accounts at various IM servers, becoming a different IM user, to login and use on one or multiple mobile phones, tablet computers or personal computer terminals.
Every IM user has a unique Identification User ID (UID) across all networks, the UID includes the server identification HID that the user registered; two or more IM users can securely use IM through IM servers; the UID includes the username and IM server identification HID that the user registered; other information of IM user includes: nickname, real name, gender, birth date, 2-dimensional code and etc.
(2) Service layer
This Service layer comprises of IM servers. Every IM server has a unique identification HID across all networks, IM servers will interconnects and communicate to form an IM service network, providing IM users a secured IM service; pre-configured information of IM server includes: name, Identification HID, description, network address, status, identification RID of associated IM router, connection relation table and etc.
IM server integrates access point, IM application and database in one place; it can be an actual server or virtual machine. Equipped with encrypted storage and access control functions on IM, the network connection from IM user to IM server, amongst IM servers, and network conversation data amongst IM users are being encrypted. Before conducting routing lookup and management operations, the IM server will perform authentications with IM router.
(3) Routing layer
This layer comprises of IM routers. Every IM router has a unique identification RID across all networks, manages one or multiple IM servers, IM routers form a routing service network, to provide a secure addressing service based on IM server's identification HID. Pre-configured information of IM router includes: name, identification RID, description, network address, status, list of the IM server HID it manages, neighbor IM router identification RID list, routing table and etc. FIG.2: Deployment diagram of the invention - A secured IM system structure IM routers can establish IM routing service network in flat mesh topology or hierarchical tree topology, based on the scale of IM servers and the addressing efficiency. They are on the top level of the IM system structure, responsible for providing addressing service for IM servers that they manage. In this diagram, the routing service network of IM network comprises of IM router Rl, R2, R3, R4 to Rm.
IM server is the provider of network IM service, various IM servers forms IM service network, data exchange of IM only store and circulate among IM servers. Every IM server will have an IM router to provide its addressing service. If the IM server of the IM user initiating IM doesn't know the network address of target IM server associated with the target IM user, it will send a network addressing request to its associated IM router. In this scenario, IM server SI and S3 is associated with IM router Rl, IM Server S2, S6 and S7 is associated with IM router R3, Instant Messing Server S4 and S5 is associated with IM router R2, Instant Messing Server S8 is associated with IM router R4, IM Server Sn is associated with IM router Rm.
IM user is the user of IM service; every IM user will register and login at their respective
IM server. In reality, users can register multiple IM user account at the same or various
IM servers, and login at the same or different terminal. In this scenario:
U 1 , U2 and U3 are the IM users of IM server S 1 ,
U4, and U5 are the IM users of IM server S2,
U6 are the IM users of IM server S3,
U 10 are the IM users of IM server S4,
U7 and U8 are the IM users of IM server S5,
U9 are the IM users of IM server S6.
All IM users can initiate P2P(Peer-to-Peer)or group messaging, to conduct IM with the target user.
Here we use a typical IM system to elaborate the details of this invention. Assuming user Ul, U2, U3, U4, U5, U6, U7, and U8 are registered to the IM servers and pass the user authentication. User Ul, U2 and U3 are registered and login at IM server S I,
User U4, and U5 are registered and login at IM server S2,
User U6 are registered and login at IM server S3,
User U7, and U8 are registered and login at IM server S5.
Assuming IM server S2 is in the connection relation table of IM server SI (Because S I and S2 have previously conducted IM, The connection relation table of SI have the network address and status information of S2),IM server S3, S4 and S5 haven't previously establish connection with IM server S 1.
As shown in Diagram 2, the actual steps consists the folio wings:
(1) IM user Ul creates a group chat (group messaging), invites IM user U2, U3, U4, U5, U6, U7 and U8 to join;
(2) The IM server SI associated with Ul discovered that user Ul, U2, and U3 are its own associated users, but U4, U5, U6, U7, and U8 is not its own associated users.
(3) IM server SI analyze the Identification UID data of U4, U5, U6, U7 and U8, identify the IM server names and identification HID that the users registered and logged in, is S2, S3 and S5;
(4) IM server S 1 checks its connection relation table, identify that IM server S2 is already in it, and subsequently establish connection with S2, User U4 and U5 are connected to group chat;
(4) SI doesn't know the network address of IM server S3 and S5, subsequently SI sends addressing request to its associated IM router Rl;
(5) Rl check the HID list of IM server that it manages, identify S3 in the list, subsequently feedback the network address of S3 to S I;
(6) SI and S3 establish network connection according to the network address of S3, user U6 is connected to group chat;
(7) Rl check its neighbor IM router identification RID list, forward addressing request on IM server S5 to neighbor IM router R2 and R3;
(8) IM router R2 receives the addressing request; identify S5 in HID list of IM server that it manages, feedback the network address of S5 to Rl. (9) Rl will send back network address of S5 to SI, SI establish network connection with S5 based on the network address response from SI, subsequently user U7 and U8 join the group chat;
(10) IM server SI establishes network connection with IM server S2, S3, S5 that are connected with all the users, network addressing completed.

Claims

CLAIMS:
1. A secured Instant Messaging(IM) system structure based on identification, including IM user, IM server and IM router, the main features are:
Every IM user has a unique identification User ID(UID) across all networks, the UID includes the server identification Host ID(HID) that the user registered; two or more IM users can securely use IM through IM server; Every IM server has a unique identification HID across all networks, IM servers which its IM users conduct P2P(Peer-to-Peer) or group messaging will interconnects and communicate to form an IM service network, providing IM users secured IM service;
Every IM router has a unique identification Router ID(RID) across all networks, manages one or multiple IM servers, IM routers form a routing service network, to provide a secure addressing service based on IM server's identification HID.
2. Referring to "IM system structure" mentioned in claim 1 of claim statement, the features are: IM user has a unique Identification UID across all networks, the UID includes a username and the server identification HID that a user has registered; other information of IM user includes: nickname, real name, gender, birth date, 2-dimensional code and etc.
3. Referring to "IM system structure" mentioned in claim 1 of claim statement, the features are: pre-configured information of IM server includes: name, identification HID , description, network address, status, identification RID of associated IM router, connection relation table and etc.
4. Referring to "IM server" mentioned in claim 1 or 3 of claim statement, the features are: the connection relation table of every IM server stores the information of name, server identification HID , network address and status of other IM servers that was previously connected to this IM server; For a newly added IM server that IM router fed back, after verifying it is in normal working condition, its relevant information of name, server identification HID , network address, status will be added to the connection relation table.
5. Referring to "connection relation table" mentioned in claim 4 of claim statement, the features are: when an IM user initiates P2P(Peer-to peer) or group messaging with other IM users, if the target IM servers that the other IM users registered are already in the connection relation table of the EVI user's source EVI server, then the source IM server will directly establish network connection with the target IM servers without going through IM router.
6. Referring to "IM system structure " mentioned in claim 1 of claim statement, the features are: pre-configured information of IM router includes: name, identification RID, description, network address, status, list of the IM servers HID it manages, neighbor IM router identification RID list, routing table and etc.
7. Referring to "EVI router" mentioned in claim 1 or 6 of claim statement, the features are: when an IM user initiates P2P(Peer-to peer) or group messaging with other IM users, if the target IM servers that the other IM users registered are not in the connection relation table of the EVI user's source EVI server, then the source EVI server will forward the identification HID of the target IM servers to its associated IM router, and send addressing request; The EVI router will search the target EVI servers' network addresses based on its routing strategy; and feed them back to the source IM server after the target EVI servers' network addresses are found.
8. Referring to "EVI router" mentioned in claim 1 or 6 or 7 of claim statement, the features are: the strategies for conducting network addressing for the IM server are based on maximum speed priority strategy or shortest path priority strategy.
9. Referring to "secured IM" mentioned in claim 1 of claim statement, the features are: the network connection from IM user to IM server, amongst IM servers, and the messaging data amongst IM users are being encrypted.
10. Referring to "secure addressing service" mentioned in claim 1 of claim statement, the features are: the confirmation of neighbor relationship among IM routers, IM routers and the IM servers that they manage are required to authenticate from each other.
PCT/MY2015/050073 2015-04-27 2015-07-15 A secured instant messaging (im) system structure based on identification WO2016175647A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510203774.9 2015-04-27
CN201510203774.9A CN104811370B (en) 2015-04-27 2015-04-27 A kind of security instant communication system framework based on mark

Publications (1)

Publication Number Publication Date
WO2016175647A1 true WO2016175647A1 (en) 2016-11-03

Family

ID=53695879

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2015/050073 WO2016175647A1 (en) 2015-04-27 2015-07-15 A secured instant messaging (im) system structure based on identification

Country Status (2)

Country Link
CN (1) CN104811370B (en)
WO (1) WO2016175647A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347730A (en) * 2018-12-07 2019-02-15 合肥万户网络技术有限公司 One kind being based on semantic analysis office instant chat platform
CN113824628A (en) * 2021-09-30 2021-12-21 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533894B (en) * 2015-09-11 2019-05-21 北京北信源软件股份有限公司 A kind of instant messaging system of completely new safety
CN106101267A (en) * 2016-07-29 2016-11-09 安徽和信科技发展有限责任公司 A kind of File Transfer Crossovers Network Segments system and method
CN107888474A (en) * 2016-09-30 2018-04-06 江苏神州信源系统工程有限公司 A kind of method of controlling security and device for the interconnection of different instantaneous communication systems
CN106789571A (en) * 2016-12-16 2017-05-31 邦彦技术股份有限公司 A kind of cross-domain instant communication method and its system based on IMS architecture
CN109639565B (en) * 2018-12-14 2022-02-25 杭州安司源科技有限公司 Decentralized instant messaging multi-service node interconnection and intercommunication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002171286A (en) * 2000-12-01 2002-06-14 Jepro:Kk Network system and internet communication management method
JP2009288894A (en) * 2008-05-27 2009-12-10 Nippon Telegr & Teleph Corp <Ntt> Im client device, im server, im system and method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006511152A (en) * 2002-12-20 2006-03-30 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ System and method for establishing communication between client and server in heterogeneous IP network
CN101292478A (en) * 2005-10-07 2008-10-22 雅虎公司 Instant messaging interoperability between disparate service providers
CN101227419A (en) * 2007-01-15 2008-07-23 阿里巴巴公司 Instant communication processing system and method
CN102035655A (en) * 2009-09-30 2011-04-27 中兴通讯股份有限公司 Implementation method for end-to-end instant messaging, and end-to-end instant messaging terminal and system
CN102546646B (en) * 2012-01-17 2015-06-24 深圳市乐唯科技开发有限公司 System and method for realizing voice talkback function
CN102571591B (en) * 2012-01-18 2014-09-17 中国人民解放军国防科学技术大学 Method, edge router and system for realizing marked network communication
CN103457828B (en) * 2012-06-05 2018-04-06 深圳中兴网信科技有限公司 The instant communication method and system of a kind of inter-network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002171286A (en) * 2000-12-01 2002-06-14 Jepro:Kk Network system and internet communication management method
JP2009288894A (en) * 2008-05-27 2009-12-10 Nippon Telegr & Teleph Corp <Ntt> Im client device, im server, im system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
P.SAINT-ANDRE: "Extensible Messaging and Presence Protocol (XMPP): Core, rfc 3920", IETF, 31 October 2004 (2004-10-31), pages 58, Retrieved from the Internet <URL:https://www.ietf.org/rfc/rfc3920.txt> [retrieved on 20151110] *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347730A (en) * 2018-12-07 2019-02-15 合肥万户网络技术有限公司 One kind being based on semantic analysis office instant chat platform
CN113824628A (en) * 2021-09-30 2021-12-21 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM
CN113824628B (en) * 2021-09-30 2023-04-07 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM

Also Published As

Publication number Publication date
CN104811370A (en) 2015-07-29
CN104811370B (en) 2018-05-08

Similar Documents

Publication Publication Date Title
WO2016175647A1 (en) A secured instant messaging (im) system structure based on identification
CN104811371B (en) A kind of brand-new instantaneous communication system
EP2681939B1 (en) Methods, systems, and computer readable media for sharing diameter binding data
US8566474B2 (en) Methods, systems, and computer readable media for providing dynamic origination-based routing key registration in a diameter network
CN110601906B (en) Data transmission method and device based on block chain
CN102244845B (en) The method of access IM operation system storage server and IM operation system
CN105897444B (en) Multicast group management method and device
CN107787050A (en) The method and apparatus with dynamic Sexual behavior mode are supported for multiple personality
US20150350601A1 (en) Domain trusted video network
CN102893572A (en) Device for registering client computing devices for online communication sessions
US20130035079A1 (en) Method and system for establishing data commuication channels
CN106817294A (en) A kind of enterprise-level instantaneous communication system for supporting cross-system to communicate and method
US20130244622A1 (en) Method and System for Transferring Mobile Device Contact Information
CN104821908A (en) Exclusive service-supporting instant messaging method and system
EP3155772B1 (en) A new instant messaging(im) routing method and router
CN106533894A (en) Brand new secure instant messaging system
US20150143458A1 (en) Techniques for identity and policy based routing
CN109639565B (en) Decentralized instant messaging multi-service node interconnection and intercommunication system
CN104811379A (en) Router addressing method for instant communication server interoperability
WO2017219816A1 (en) Data transmission method and network address translation device
CN104301197B (en) It is a kind of to realize the method and system mutually found between user multiple terminals
US11848923B2 (en) Secure peer-to-peer connection network and associated protocols for a group-based communication system
Lai et al. A novel NAT-based approach for resource load balancing in fog computing architecture
Toth Design of a social messaging system using stateful multicast
Wolinsky et al. Oversoc: Social profile based overlays

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15890866

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15890866

Country of ref document: EP

Kind code of ref document: A1