CN103368831A - Anonymous instant messaging system based on frequent visitor recognition - Google Patents

Anonymous instant messaging system based on frequent visitor recognition Download PDF

Info

Publication number
CN103368831A
CN103368831A CN2013103425757A CN201310342575A CN103368831A CN 103368831 A CN103368831 A CN 103368831A CN 2013103425757 A CN2013103425757 A CN 2013103425757A CN 201310342575 A CN201310342575 A CN 201310342575A CN 103368831 A CN103368831 A CN 103368831A
Authority
CN
China
Prior art keywords
anonymous
identity characteristic
buffer field
user
adhoc buffer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013103425757A
Other languages
Chinese (zh)
Other versions
CN103368831B (en
Inventor
沈剑
朱为
陈东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 58 Information Technology Co Ltd
Original Assignee
Beijing 58 Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 58 Information Technology Co Ltd filed Critical Beijing 58 Information Technology Co Ltd
Priority to CN201310342575.7A priority Critical patent/CN103368831B/en
Publication of CN103368831A publication Critical patent/CN103368831A/en
Application granted granted Critical
Publication of CN103368831B publication Critical patent/CN103368831B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides an anonymous instant messaging system based on frequent visitor recognition. The anonymous instant messaging system comprises the following steps: (a) receiving an anonymous messaging request sent by a client; (b) identifying whether an identity characteristic string sent along the anonymous messaging request of a user is null or not; if so, entering the step (c); if not, identifying the identity characteristic string; if the identity characteristic string passes the identification, entering the step (e); if the identity characteristic string does not pass the identification, entering the step (c); step (c), applying for an anonymous UID (User Identifier) for the client; (d) generating an anonymous identity characteristic string according to the generated anonymous UID; step (e), returning the generated identity characteristic string to the client; and (f) starting the communication of the client. According to an instant messaging method for supporting anonymous login of a user disclosed by the invention, a frequent visitor method can be supported so that the user is remembered and historical messages can be saved to be convenient for the user to look over in the further; the instant messaging system can be more conveniently used by the user in a flexible manner.

Description

A kind of anonymous instant communicating system based on frequent visitor's identification
Technical field
The present invention relates to the instant messaging field, particularly a kind of anonymous instant communicating system and the means of communication based on frequent visitor's identification.
Background technology
Instant messaging (Instant Messenger is called for short IM) is a kind of business of instant interchange message of Internet-based.Instant messaging allows two people or many people to use the instant transmission message language in networking, archives, voice to exchange with video.Because its instantaneity is for communication two party brings great convenience.Traditional instant communicating system carries out communication by the special-purpose MSN that the user installs at terminal.At present, as a kind of easily communication tool, instant communicating system extends to portable terminal gradually from PC, such as mobile phone, panel computer etc.Another development trend is webpage version immediate communication tool, the instant messaging service provider is integrated into the IM technology in the middle of community, forum and the generic web page, realize immediately exchanging when the user browses web sites, not only made things convenient for the user to need not to download and mounting software, can also improve site visitor's liveness, website user's viscosity and visitor's conversion ratio, often be applied to the real-time communication of both parties in a lot of e-commerce websites.
Existing instant communicating system requires the user to register an account number, and perhaps chartered account number is associated with in the native system in other websites by the user, and does not often support that the user logins with anonymous way.In addition, existing instant communicating system is not also supported implicit login.Only login with anonymous way even there are some support users of system to need not registration, it does not support anonymous deferred information yet, be the user sign-on access once after, next time is when carrying out instant messaging with same target again, this user's of the other side's None-identified identity, the user still need restart a new anonymity login, and is very loaded down with trivial details.
In some occasion, for example in e-commerce transaction, the user may for the purpose of the immediate communication tool that does not frequently use this website to provide, therefore not expect to register account number.Perhaps, the user bothered etc. for fear of advertisement from now in when transaction, was unwilling to allow others know the true account number of oneself.In addition, registering an instant messaging account number needs 5 minutes time usually at least, and a lot of users dislike the loaded down with trivial details account number of also being unwilling to register of process.Particularly under some transaction occasion, the seller is perhaps always not online, and the user wishes can promptly engage in the dialogue with the seller when seeing that the seller is online, and avoids because the chance of missing communication that loaded down with trivial details registration process causes.Yet, although these users do not wish to register account number, but still all wish and can use instant communication function in the mode of anonymity, for example exchange in real time with the seller.
Therefore, need a kind of method and communication system that can allow user anonymity log-in instant communication system, can effectively improve the existing instant communicating system of not supporting anonymous login, thereby and can support frequent visitor's method to remember the user, can keeping track of history message to make things convenient for the user to check from now on, embody the instantaneity of instant messaging, conveniently use instant communicating system in the user in mode flexibly.
Summary of the invention
The object of the present invention is to provide a kind of anonymous instant communication method based on frequent visitor's identification, comprise the steps: the Anonymous communication request of receiving that a) client is sent; B) verify whether the identity characteristic string of sending with user's Anonymous communication request is empty, if empty string then enters step c); If not empty string then verifies this identity characteristic string, if checking is passed through, then enter step e); If checking is not passed through, then enter step c); C) be this client application anonymous UID; D) generate anonymous identity characteristic string according to the anonymous UID that generates; E) the identity characteristic string that generates is returned to client; F) communication of unlatching client.
Preferably, the identity characteristic string checking of sending as user in step b) by the time, this user of mark be the frequent visitor, the permission user checks history message.
Preferably, described history message is kept at client terminal local or server end.
Preferably, the method that generates described anonymous identity characteristic string in the described step d) comprises the steps: steps d 1): anonymous UID and time parameter and a random number are spliced, generate the first adhoc buffer field; Steps d 2): the first adhoc buffer field is carried out data shuffling, the second adhoc buffer field after obtaining shuffling; Steps d 3): the second adhoc buffer field that will generate is signed, and generates the 3rd adhoc buffer field; Steps d 4): the 3rd adhoc buffer field after will signing is carried out data shuffling, obtains the 4th adhoc buffer field; Steps d 5): the 4th adhoc buffer field and the steps d 2 that will generate utilize key to be encrypted after the second adhoc buffer field that) generates is spliced into new character string, generate described anonymous identity characteristic string.
Preferably, the data shuffling algorithm and the steps d 4 that described steps d 2) adopt) in shuffle arithmetic be different algorithms.
Preferably, the method for the described anonymous identity characteristic string of checking comprises the steps: step b1 in the described step b)): with described identity characteristic string deciphering, then split and generate the second adhoc buffer field and the 4th adhoc buffer field; Step b2): the 4th adhoc buffer field that will generate is carried out contrary shuffling, and obtains the 3rd adhoc buffer field; Step b3): the second adhoc buffer field that will generate is carried out contrary shuffling, and generates the first adhoc buffer field; Step b4): the first adhoc buffer field is split, obtain user anonymity UID, time parameter and a random number; Step b5): the second adhoc buffer field that generates is signed, with step b2 the 3rd adhoc buffer field that) obtains compares, if difference is not then by checking; If identical, verify then whether described time parameter meets term of validity requirement, if meet then by checking, if do not meet then not by checking.
Preferably, the term of validity that described time parameter is corresponding is set up on their own by server system.
Preferably, described identity characteristic string is kept at described client in this locality, in order to send to server authentication when in the future again initiating communication.
Preferably, described client is the web-browsing device of PC terminal, client software or mobile phone terminal app.
Preferably, described communication request is to initiate instant dialogue or send deferred information.
Instant communication method according to support user anonymity login of the present invention, can effectively improve the existing instant communicating system of not supporting anonymous login, thereby and can support frequent visitor's method to remember the user, can keeping track of history message making things convenient for the user to check from now on, conveniently use instant communicating system in the user in mode flexibly.
The description and the follow-up detailed description that should be appreciated that aforementioned cardinal principle are exemplary illustration and explanation, should not use the restriction of doing the claimed content of the present invention.
Description of drawings
With reference to the accompanying drawing of enclosing, the more purpose of the present invention, function and advantage will be illustrated by the following description of embodiment of the present invention, wherein:
Fig. 1 schematically shows the flow chart according to Anonymous communication method of the present invention;
Fig. 2 schematically shows the flow chart of the method for the anonymous identity characteristic string of generation according to the present invention;
Fig. 3 schematically shows the flow chart according to the method for identity verification feature string of the present invention.
Hereinafter, embodiments of the invention will be described with reference to the drawings.In the accompanying drawings, identical Reference numeral represents same or similar parts, perhaps same or similar step.
Embodiment
By the reference example embodiment, purpose of the present invention and function and be used for to realize these purposes and the method for function will be illustrated.Yet the present invention is not limited to following disclosed example embodiment; Can be realized it by multi-form.The essence of specification only is to help various equivalent modifications Integrated Understanding detail of the present invention.
The inventive method general introduction
Fig. 1 schematically shows the flow chart according to Anonymous communication method of the present invention.Shown in Fig. 1, in step 105, server system is received the Anonymous communication request that the user sends by client.According to the present invention, client can be the web-browsing device of PC terminal, and anonymous logging request is initiated in the website that the user provides by access server system, for example the respective links on the webpage clicking.Client also can be the form of client software or the mobile phone terminal app of PC terminal.In use, the user can need not to fill out the user name password, directly opens communication function.Communication request for example can be to initiate instant dialogue, transmission deferred information etc.
Server system is after receiving the Anonymous communication request that client sends, and in step 110, whether the identity characteristic string that checking is sent with user's Anonymous communication request is empty.The identity characteristic string to anonymous, is used for identifying the feature string of anonymous identity information by server-assignment.
When the user is when initiating the Anonymous communication request for the first time, because server did not also distribute the identity characteristic string to client, therefore it is empty string that client sends to the identity characteristic string of server, when being judged as empty string, enter step 120, server system is this client application anonymous ID(User-ID, be called for short UID), concrete generating algorithm will be explained below.Then in step 130, generate anonymous identity characteristic string according to the UID that generates, concrete generating algorithm will be explained below.Then in step 135, the identity characteristic string that generates is returned to client, in client this identity characteristic string is kept at this locality, use when again initiating communication in order to future.Then, enter step 140.
If the identity characteristic string that checking is sent with user's Anonymous communication request in step 110, illustrates then that the user initiates the Anonymous communication request for the first time for empty, then enter the identity characteristic string that step 115 pair client sends and verify.The process of checking is specific as follows: in step 125, the identity characteristic string is carried out reverse resolution, carry out legitimate verification, concrete verification algorithm will be explained below.If find that the identity characteristic string is illegal, for example find that size error, signature mistake or time of identity characteristic string is expired etc., namely can't be by checking, then this identity characteristic string can't use, turn back to step 120 this moment, it is a new anonymous that this user is considered as, and repeats as mentioned above step 120-135; If checking finds that the identity characteristic string is legal in step 125, then server system is identified as the frequent visitor with this identity characteristic string, then enter step 135, the identity characteristic string that client is sent directly returns to client storage in this locality, then carry out step 140.
If identity verification feature string is legal in step 125, namely identify this client and be the frequent visitor, then this user can also check and be kept at local history message.Because the anonymous UID that generates according to the present invention and the physical support (such as PC, panel computer etc.) of client are bound by the identity characteristic string, therefore when the frequent visitor uses same physical support again to send communication request, then can check the history message that is kept in this physical support, make things convenient for user's communication process.Alternatively, history message also can the presence service end, and need user's anonymous UID to go server end to pull history message this moment.The fail safe meeting of so local storage history message is higher.
In step 140, the user begins to carry out communication by client.For example, open the chat conversations frame in client and begin session.According to the method for Anonymous communication of the present invention, client can not be similar to traditional registered user to user's prompting and " login successfully " message, and namely " implicit login " process is transparent to the user.Like this, the process of having guaranteed anonymous login can not separated by the user is counter, has improved the fail safe of the means of communication of the present invention.
The generation method of anonymous UID
Server system is similar for the personal code work of the anonymous UID of this client application management in server system and common normal registration in step 120, and it all is the sign of user in server system.In order to distinguish, anonymous UID and normal registration user's UID can be assigned in the same memory space different sections, perhaps are distributed in the same section in the same memory space, and use different allocation rule.For example, if be distributed in different sections in the same memory space, the named range that then can set the UID of domestic consumer is 0-20 hundred million, and the named range of anonymous UID is 3,000,000,000-4,000,000,000.Again for example, if use different rules that anonymous UID and normal registration user UID are managed, the registered user can be distributed mantissa is the UID of odd number, is the UID of even number and anonymous is distributed mantissa.
Anonymous is designated anonymous UID in server system, this UID is transparent to the user, and namely the user can't see this UID in the process of using anonymous UID communication.Anonymous account number is the account number character string identification based on anonymous UID of an intended for end consumers, and the algorithm that can generate UID with general registered user in addition modification generates.For example, anonymous account number can adopt following character string forms, namely
Anonymous account number=" anonymous "+UID
Wherein " anonymous " can be certain character string of mark anonymous, and anonymous for example, UID are that system is the unique code that this anonymous generates.Concrete example as, anonymous account number can be the form of " anonymous_53924 ".As long as the ID of this character string latter half is unique, the anonymous UID of generation also is unique.Compare UID, the form user oriented of account number, more friendly for the user, and by adding the character string prefix, make it readable better, and unique.
The generation method of anonymous identity characteristic string
The anonymous identity characteristic string that generates according to anonymous UID in step 130 is the character string of sign anonymous identity.The generation of anonymous identity characteristic string must guarantee its fail safe and can anti-counterfeiting and anti-tamper.Preferably, can also set certain term of validity to the identity characteristic string that generates, thus with the term of validity also as an identity verification feature string legal option whether.
As shown in Figure 2, the algorithm of the anonymous identity characteristic string of generation according to the present invention is as follows:
Step 201): anonymous UID is spliced, generate the first adhoc buffer field buf1.Anonymous UID can be stitched together with the random number of time parameter and system's generation, that is,
buf1=uid(8bytes)+time(4bytes)+random(4bytes)
Time parameter has identified this identity characteristic string, and the term of validity that also namely should anonymity UID can be set up by server system on their own for example 1 month.
According to a specific embodiment of the present invention, anonymous UID can be 8 bytes, and time parameter can be 4 bytes, and the random number that system generates can be 4 bytes, and the result splices the first adhoc buffer field buf1 of 16 bytes.
Step 202): with step 201 the first adhoc buffer field buf1 that) generates carries out data shuffling, and namely data are upset, the second adhoc buffer field buf2 after obtaining shuffling.The purpose of shuffling method is to upset the order of character string, for example can adopt the mode of odd bytes and even bytes exchange to shuffle, also can adopt first byte and trail byte exchange, and with the second byte and byte second from the bottom exchange, by that analogy etc.
Step 203): with step 202 the second adhoc buffer field buf2 that) generates signs, and generates the 3rd adhoc buffer field buf3.The effect of signature is to allow buf2 information be become a kind of secret form by " compression ", for example the byte serial of a random length is transformed into the hexadecimal number word string of a fixed length.Can adopt this area signature algorithm commonly used, for example the md5 algorithm.
Step 204): the 3rd adhoc buffer field buf3 after will signing carries out data shuffling again, the data shuffling algorithm that adopts can with step 202) in algorithm consistent or inconsistent.In order to improve the fail safe of identity characteristic string, preferably adopt different shuffle arithmetic.Shuffle rear generation the 4th adhoc buffer field buf4.
Step 205): utilize key to be encrypted after the second adhoc buffer field buf2 that the 4th adhoc buffer field buf4 and the step 202 that will shuffle rear generation) generates is spliced into new character string, generate final anonymous identity characteristic string.Encryption can be adopted this area cryptographic algorithm commonly used, for example AES.For fail safe, key storage at server end, and can be transferred to client on the net, guaranteed that client can't instead separate the identity characteristic string.
The process that generates the identity characteristic string according to above algorithm is carried out at server end, owing to having used cryptographic algorithm, as long as cryptographic algorithm is not cracked, the identity characteristic string just can be thought safe, and its fail safe is equal to the safety of cryptographic algorithm.In addition, because the various signatures and the shuffle arithmetic that use all carry out at server end, so these algorithms all are transparent to client, therefore the identity characteristic string can't be forged.Therefore the identity characteristic string that generates possesses very high fail safe, and is ageing, and can anti-counterfeiting and anti-tamper.
The verification method of anonymous identity characteristic string
In the step 115 of Fig. 1, if the identity characteristic string that client is sent needs that then client is sent the identity characteristic string to verify not for empty, as shown in Figure 3, the step of checking is specific as follows:
Step 301): adopt key to be decrypted the identity characteristic string of sending, the character string after will deciphering again splits and obtains the second adhoc buffer field buf2 and the 4th adhoc buffer field buf4.The corresponding decipherment algorithm of cryptographic algorithm when the key of deciphering adopts with generation identity characteristic string with decipherment algorithm.
Step 302): the 4th adhoc buffer field buf4 that generates is adopted contrary shuffle arithmetic, obtain the 3rd adhoc buffer field buf3.The contrary shuffle arithmetic that adopts is and above-mentioned steps 204) in the corresponding algorithm for inversion of shuffle arithmetic, namely to the recovery of the process of shuffling.
Step 303): the second adhoc buffer field buf2 that generates is adopted contrary shuffle arithmetic, obtain the first adhoc buffer field buf1.The contrary shuffle arithmetic that adopts is and above-mentioned steps 202) in the corresponding algorithm for inversion of shuffle arithmetic, namely to the recovery of the process of shuffling.
Step 304): the first adhoc buffer field buf1 that will obtain splits, and obtains user anonymity UID, time parameter time and a random number.
Step 305) the second adhoc buffer field buf2 that step 301 is generated signs, and the algorithm of signature is consistent with signature algorithm in the above-mentioned steps 203.With the 3rd adhoc buffer field buf3 of generation in the second adhoc buffer field buf2 and the step 302 behind the signature compare see whether identical.If identical, then by checking, enter step 306) the continuation checking term of validity; If different, illustrate that then the identity characteristic string may be distorted by the user, think that then this client is a new anonymous, enters step 307) and regenerating anonymous UID, checking finishes.
Step 306) judges whether time crosses the term of validity.If do not surpass the term of validity, then the checking of this identity characteristic string is passed through, and allows the user to initiate communication with anonymous frequent visitor's identity; If surpassed the term of validity, thought that then this client is a new anonymous, enters step 307) regenerate anonymous UID, checking finishes.
Be to carry out at server end according to above-mentioned verification algorithm, guaranteed the fail safe of checking.In addition owing to needing the checking term of validity, thereby guaranteed the ageing of identity characteristic string, in case the identity characteristic string is expired, can find at once during checking.
Instant communication method according to support user anonymity login of the present invention, can effectively improve the existing instant communicating system of not supporting anonymous login, thereby and can support frequent visitor's method to remember the user, can keeping track of history message making things convenient for the user to check from now on, conveniently use instant communicating system in the user in mode flexibly.
In conjunction with the explanation of the present invention and the practice that disclose here, other embodiment of the present invention are easy to expect and understand for those skilled in the art.Illustrate with embodiment only to be considered to exemplary, true scope of the present invention and purport limit by claim.

Claims (10)

1. the anonymous instant communication method based on frequent visitor's identification comprises the steps:
A) receive the Anonymous communication request that client is sent;
B) verify whether the identity characteristic string of sending with user's Anonymous communication request is empty, if empty string then enters step c); If not empty string then verifies this identity characteristic string, if checking is passed through, then enter step e); If checking is not passed through, then enter step c);
C) be this client application anonymous UID;
D) generate anonymous identity characteristic string according to the anonymous UID that generates;
E) the identity characteristic string that generates is returned to client;
F) communication of unlatching client.
2. anonymous instant communication method as claimed in claim 1, the identity characteristic string checking of wherein sending as user in step b) by the time, this user of mark be the frequent visitor, the permission user checks history message.
3. anonymous instant communication method as claimed in claim 2, wherein said history message is kept at client terminal local or server end.
4. anonymous instant communication method as claimed in claim 1, the method that generates described anonymous identity characteristic string in the wherein said step d) comprises the steps:
Steps d 1): anonymous UID and time parameter and a random number are spliced, generate the first adhoc buffer field;
Steps d 2): the first adhoc buffer field is carried out data shuffling, the second adhoc buffer field after obtaining shuffling;
Steps d 3): the second adhoc buffer field that will generate is signed, and generates the 3rd adhoc buffer field;
Steps d 4): the 3rd adhoc buffer field after will signing is carried out data shuffling, obtains the 4th adhoc buffer field;
Steps d 5): the 4th adhoc buffer field and the steps d 2 that will generate utilize key to be encrypted after the second adhoc buffer field that) generates is spliced into new character string, generate described anonymous identity characteristic string.
5. the data shuffling algorithm and the steps d 4 that anonymous instant communication method as claimed in claim 4, wherein said steps d 2) adopt) in shuffle arithmetic be different algorithms.
6. anonymous instant communication method as claimed in claim 1 verifies in the wherein said step b) that the method for described anonymous identity characteristic string comprises the steps:
Step b1): with described identity characteristic string deciphering, then split and generate the second adhoc buffer field and the 4th adhoc buffer field;
Step b2): the 4th adhoc buffer field that will generate is carried out contrary shuffling, and obtains the 3rd adhoc buffer field;
Step b3): the second adhoc buffer field that will generate is carried out contrary shuffling, and generates the first adhoc buffer field;
Step b4): the first adhoc buffer field is split, obtain user anonymity UID, time parameter and a random number;
Step b5): the second adhoc buffer field that generates is signed, with step b2 the 3rd adhoc buffer field that) obtains compares, if difference is not then by checking; If identical, verify then whether described time parameter meets term of validity requirement, if meet then by checking, if do not meet then not by checking.
7. anonymous instant communication method as claimed in claim 5, the term of validity that wherein said time parameter is corresponding is set up on their own by server system.
8. anonymous instant communication method as claimed in claim 1, wherein said identity characteristic string is kept at described client in this locality, in order to send to server authentication when again initiating communication in the future.
9. anonymous instant communication method as claimed in claim 1, wherein said client is the web-browsing device of PC terminal, client software or mobile phone terminal app.
10. anonymous instant communication method as claimed in claim 1, wherein said communication request are to initiate instant dialogue or send deferred information.
CN201310342575.7A 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor Active CN103368831B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310342575.7A CN103368831B (en) 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310342575.7A CN103368831B (en) 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor

Publications (2)

Publication Number Publication Date
CN103368831A true CN103368831A (en) 2013-10-23
CN103368831B CN103368831B (en) 2016-08-24

Family

ID=49369400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310342575.7A Active CN103368831B (en) 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor

Country Status (1)

Country Link
CN (1) CN103368831B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595618A (en) * 2013-11-08 2014-02-19 北京奇虎科技有限公司 Method, server and system for maintaining instant communication session continuity
CN104580983A (en) * 2015-01-15 2015-04-29 深圳市捷视飞通科技有限公司 Method for achieving video communication PTT
CN104796317A (en) * 2014-01-22 2015-07-22 阿里巴巴集团控股有限公司 Instant messaging method and device
CN105391676A (en) * 2014-09-05 2016-03-09 腾讯科技(深圳)有限公司 Instant communication message processing method, device and system
CN107483389A (en) * 2016-06-07 2017-12-15 武汉斗鱼网络科技有限公司 A kind of temporary authority management method and device
CN108156273A (en) * 2017-12-14 2018-06-12 北京奇艺世纪科技有限公司 A kind of anonymous ID generation methods, device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653829A (en) * 2002-01-22 2005-08-10 雅虎公司 Providing instant messaging functionality in non-instant messaging environments
CN101207482A (en) * 2007-12-13 2008-06-25 深圳市戴文科技有限公司 System and method for implementation of single login
CN102238213A (en) * 2010-04-29 2011-11-09 腾讯科技(深圳)有限公司 Internet application login method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653829A (en) * 2002-01-22 2005-08-10 雅虎公司 Providing instant messaging functionality in non-instant messaging environments
CN101207482A (en) * 2007-12-13 2008-06-25 深圳市戴文科技有限公司 System and method for implementation of single login
CN102238213A (en) * 2010-04-29 2011-11-09 腾讯科技(深圳)有限公司 Internet application login method and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595618A (en) * 2013-11-08 2014-02-19 北京奇虎科技有限公司 Method, server and system for maintaining instant communication session continuity
CN103595618B (en) * 2013-11-08 2016-12-14 北京奇立软件技术有限公司 One is used for keeping the successional method of instant communication session, server and system
CN104796317A (en) * 2014-01-22 2015-07-22 阿里巴巴集团控股有限公司 Instant messaging method and device
CN105391676A (en) * 2014-09-05 2016-03-09 腾讯科技(深圳)有限公司 Instant communication message processing method, device and system
CN105391676B (en) * 2014-09-05 2019-09-17 腾讯科技(深圳)有限公司 Instant communication information processing method and processing device and system
CN104580983A (en) * 2015-01-15 2015-04-29 深圳市捷视飞通科技有限公司 Method for achieving video communication PTT
CN104580983B (en) * 2015-01-15 2018-05-29 深圳市捷视飞通科技有限公司 A kind of method for realizing video communication PTT functions
CN107483389A (en) * 2016-06-07 2017-12-15 武汉斗鱼网络科技有限公司 A kind of temporary authority management method and device
CN107483389B (en) * 2016-06-07 2020-03-17 武汉斗鱼网络科技有限公司 Temporary authority management method and device
CN108156273A (en) * 2017-12-14 2018-06-12 北京奇艺世纪科技有限公司 A kind of anonymous ID generation methods, device and electronic equipment

Also Published As

Publication number Publication date
CN103368831B (en) 2016-08-24

Similar Documents

Publication Publication Date Title
CN109983466B (en) Account management system and method based on block chain and storage medium
CN105850073B (en) Information system access authentication method and device
US8209744B2 (en) Mobile device assisted secure computer network communication
AU2013272184B2 (en) Enhanced 2CHK authentication security with query transactions
CN105515783B (en) Identity identifying method, server and certification terminal
CN114679293A (en) Access control method, device and storage medium based on zero trust security
KR101744747B1 (en) Mobile terminal, terminal and method for authentication using security cookie
CN105577612B (en) Identity authentication method, third-party server, merchant server and user terminal
TWI632798B (en) Server, mobile terminal, and network real-name authentication system and method
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN103269270A (en) Real-name authentication safe login method and system based on cell phone number
US20100293376A1 (en) Method for authenticating a clent mobile terminal with a remote server
CN102739708A (en) System and method for accessing third party application based on cloud platform
CN103368831B (en) A kind of anonymous instant communicating system identified based on frequent visitor
US20200196143A1 (en) Public key-based service authentication method and system
CN104967597A (en) Third-party application message authentication method and system based on secure channel
KR20090089394A (en) Secure password distribution to a client device of a network
CN101304318A (en) Safe network authentication system and method
US20210241270A1 (en) System and method of blockchain transaction verification
CN108777673B (en) Bidirectional identity authentication method in block chain
CN102333085A (en) Security network authentication system and method
US20180159865A1 (en) System and method for message recipient verification
CN103546292A (en) Third-party certification system or method with multiple identification codes
CN103546290A (en) Third party certification system with user groups or third party certification method
CN103401686A (en) User Internet identity authentication system and application method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant