CN104883352A - Message anti-fake method and apparatus for use in social software - Google Patents

Message anti-fake method and apparatus for use in social software Download PDF

Info

Publication number
CN104883352A
CN104883352A CN201510146466.7A CN201510146466A CN104883352A CN 104883352 A CN104883352 A CN 104883352A CN 201510146466 A CN201510146466 A CN 201510146466A CN 104883352 A CN104883352 A CN 104883352A
Authority
CN
China
Prior art keywords
user
terminal equipment
unique identification
mapping table
bound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510146466.7A
Other languages
Chinese (zh)
Other versions
CN104883352B (en
Inventor
胡月鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Changyou Tianxia Network Technologies Co Ltd
Original Assignee
Beijing Changyou Tianxia Network Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Changyou Tianxia Network Technologies Co Ltd filed Critical Beijing Changyou Tianxia Network Technologies Co Ltd
Priority to CN201510146466.7A priority Critical patent/CN104883352B/en
Publication of CN104883352A publication Critical patent/CN104883352A/en
Application granted granted Critical
Publication of CN104883352B publication Critical patent/CN104883352B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a message anti-fake method for use in social software which maintains a binding correspondence table of unique identifiers of a terminal device with friends' names. The method comprises a step A that a first user sends a chatting message to a second user, the chatting message including chatting content and further carrying a unique identifier of a first terminal device; a step B that the second user receives the chatting message, the unique identifier carried in the chatting message is matched with the unique identifier bound to the first user, a step C is performed if the match succeeds, and otherwise, a step D is performed; the step C that the chatting message is displayed normally on a chatting interface of the second user, and then the process ends; and the step D that a warning information is displayed on the chatting interface of the second user to inform that the first user may not be him or herself. The application further discloses a message anti-fake apparatus for use in the social software.

Description

A kind of for the message method for anti-counterfeit in social software and device
Technical field
The application relates to Internet technology, particularly relates to a kind of for the message method for anti-counterfeit in social software and device.
Background technology
Because the rate of mobile communication provider are higher, the social software based on the Internet of expense relative moderate is subject to the favor of people.Along with developing rapidly of social software, function becomes increasingly abundant, and is integrated with the several functions such as Email, blog, music, TV, game and search gradually.Social software is no longer a simple chat tool, and it has developed into the synthesization information platform integrating interchange, information, amusement, search, ecommerce, office cooperation and corporate client service etc.
But popularizing along with social software application, also provide opportunity to lawless person.Such as, lawless person steals the account number cipher of the social software of user by trojan horse or other means, after using this account number cipher to log in social software, send spoofing to other users in the buddy list of social software, particularly relate to the swindle information of property.The user receiving deceptive information lacks the authenticity that effective means differentiates the other side, therefore usually has the situation of having dust thrown into the eyes to occur.
In prior art be all by install on PC or mobile phone fail-safe software reduce equipment by virus steal information may, thus be reduced by the stolen information security issue of the account number ciphers such as social software, but this mode improves the method for device security, the safety of information can not be improved, account number cipher can be allowed by the possibility revealed because there are a lot of other except virus, message receiver does not also know whether the other side is genuine and believable.
Summary of the invention
This application provides a kind of for the information anti-fake method in social software and device, the recipient of social software can be allowed to differentiate the true and false of message.
The embodiment of the present application provides a kind of method false proof for the message in social software, the mapping table that the unique identification of a social software maintenance terminal equipment and good friend's name are bound, and the method comprises:
A, first user send chat messages to the second user, and this chat messages, except comprising chat content, also carries the unique identification of first terminal equipment;
B, the second user receive this chat messages, mated by the unique identification carried, judge whether that the match is successful in chat messages with the unique identification bound with first user in the mapping table of this user, if so, perform step C, otherwise perform step D;
C, on the chat interface of the second user normal display this chat messages, then process ends;
D, on the chat interface of the second user, show information warning, prompting first user may not be for I.
Preferably, the unique identification of described terminal equipment is the MAC address of terminal equipment.
Preferably, taking a step forward of steps A comprises:
First user sends the request requiring to add good friend to the second user, the MAC Address of the first terminal equipment of the additional current use of first user in this request;
Second user agrees to this request, the MAC Address of first terminal equipment is recorded in the mapping table stored in this terminal equipment, and the user name of this MAC Address and first user is bound, the MAC Address of the second terminal equipment of the current use of the second user is carried in the response adding good friend and sends to first user; The MAC Address of the second terminal equipment is recorded in the mapping table stored in this terminal equipment by first user, and the user name of this MAC Address and the second user is bound.
Preferably, step C comprises further: show on the chat interface of the second user and represent N/R mark.
Preferably, step D comprises further: hide this chat messages, and points out the second user to confirm, just shows chat messages after confirmation.
Preferably, step D comprises further: on the chat interface of the second user, eject information prompting frame, points out the second user whether to initiate verification process.
Preferably, the method comprises further: carry out synchronous in this locality with network side by mapping table.
Preferably, the method comprises further:
A, the 3rd user send authentication request to the 4th user, and the social software interface of the 4th user ejects information prompting frame, and prompting the 3rd user will carry out certification to this equipment, perform next step after the 4th user confirms;
B, the 3rd user set up video with the 4th user and are connected, and carry out certification by video;
C, the 3rd user and four-function are clicked its certification separately on social software interface per family and are passed through button;
The third terminal equipment that d, then the 3rd user use obtains the unique identification of the 4th terminal equipment of the current use of the 4th user, is recorded in the mapping table of this terminal equipment, and the user name of this unique identification and the 4th user is bound; Meanwhile, the 4th terminal equipment obtains the unique identification of third terminal equipment, is recorded in the mapping table of this terminal equipment, and the user name of this unique identification and the 3rd user is bound.
Preferably, described in step c, the 4th terminal equipment obtains the unique identification of third terminal equipment, be recorded in the mapping table of this terminal equipment, and after the user name of this unique identification and the 3rd user is bound, comprise further: delete the former unique identification bound with the user name of the 3rd user.
The embodiment of the present application additionally provides a kind of device false proof for the message in social software, the virtual bench that this device is formed for the social software running on terminal equipment, comprising:
Binding relationship maintenance module, the mapping table that unique identification and good friend's name for safeguarding a terminal equipment are bound;
Transceiver module, for sending and receiving chat messages, this chat messages, except comprising chat content, also carries the unique identification of this terminal equipment;
Matching module, mate with the unique identification that described user binds in the mapping table that the unique identification that carries in the chat messages of other users that receives transceiver module and binding relationship maintenance module are safeguarded, judge whether that the match is successful, if, send normal instruction to display module, otherwise send abnormal instruction to display module;
Display module, for after receiving normal instruction, the chat interface of this terminal equipment normally shows chat messages; After receiving abnormal instruction, the chat interface of this terminal equipment shows information warning, prompting other users described may not be me.
Preferably, the unique identification of described terminal equipment is the MAC address of terminal equipment.
Preferably, this device comprises good friend's administration module further,
For sending the request requiring to add good friend to other users, the MAC Address of the terminal equipment of the additional current use of this user in this request; Receive the response from the interpolation good friend of the terminal equipment of the current use of other users, the MAC Address of carrying in this response is sent to binding relationship maintenance module;
Described MAC Address is recorded in mapping table by binding relationship maintenance module, and the user name of this MAC Address and other users described is bound.
Preferably, described display module, is further used for, after receiving normal instruction, chat interface showing and representing N/R mark.
Preferably, described display module, for after receiving abnormal instruction, hides this chat messages, and points out user to confirm, just show chat messages after confirmation.
Preferably, described display module is further used for after receiving abnormal instruction, and chat interface ejects information prompting frame, and whether prompting user initiates verification process.
Preferably, this device comprises further: synchronization module, for carrying out synchronous in this locality with network side by mapping table.
Preferably, this device comprises authentication module, for sending authentication request to other users, if receive the authenticate-acknowledge message of other users described, setting up video communication be connected with the terminal equipment of the current use of other users described; If certification is passed through, obtain the unique identification of the terminal equipment of the described current use of other users, described unique identification is sent to binding relationship maintenance module;
Described unique identification is recorded in mapping table by binding relationship maintenance module, and the user name of this unique identification and other users described is bound.
Preferably, described unique identification is recorded in mapping table by binding relationship maintenance module, and after the user name of this unique identification and other users described being bound, deletes the former unique identification bound with the user name of the 3rd user.
As can be seen from the above technical solutions, in communication process, the information that transmit leg often sends all can attach the equipment unique identification of the machine simultaneously, equipment unique identification corresponding with this transmit leg in mapping table for received equipment unique identification is compared by recipient, and comparison result is presented on the visualization interface of social software, to point out user or to initiate verification process.By the application program, if good friend is chatted by the terminal equipment of unauthenticated, user can realize immediately, thus reduces the risk of being deceived.
Accompanying drawing explanation
Fig. 1 for the embodiment of the present application provide a kind of for the message method for anti-counterfeit schematic flow sheet in social software;
Fig. 2 for the embodiment of the present application provide by Client-initiated verification process schematic diagram;
A kind of logic diagram for the message false proof device in social software that Fig. 3 provides for the embodiment of the present application.
Embodiment
The fundamental design idea of the application is: the mapping table safeguarding an equipment unique identification and buddy list, and it is uniquely corresponding with equipment that this equipment unique identification requires, the unique identification of any two equipment must be different; By equipment uniquely identified verification process, the mutual switching equipment unique identification information of the terminal equipment that two parties uses realizes the binding of equipment unique identification information and friend information, and is recorded in described mapping table; This verification process can realize in the process of adding good friend, also can be special verification process of initiating; In communication process, the information that transmit leg often sends all can attach the equipment unique identification of the machine simultaneously, equipment unique identification corresponding with this transmit leg in mapping table for received equipment unique identification is compared by recipient, and comparison result is presented on the visualization interface of social software, to point out user or to initiate verification process.
For making the know-why of technical scheme, feature and technique effect clearly, below in conjunction with specific embodiment, technical scheme is described in detail.
In the embodiment of the present application, adopt medium education (MAC) address as equipment unique identification.
The embodiment of the present application provide a kind of for the message method for anti-counterfeit flow process in social software as shown in Figure 1, comprise the steps:
Step 101: first user sends the request requiring to add good friend to the second user, carry the MAC Address of the terminal equipment (hereinafter referred to as first terminal equipment) of the current use of first user in this request;
Step 102: the second user agrees to this request, is recorded in the MAC Address of first terminal equipment in the mapping table stored in this terminal equipment, and the user name of this MAC Address and first user is bound.The MAC Address of the terminal equipment (hereinafter referred to as the second terminal equipment) of the current use of the second user is carried in the response adding good friend simultaneously and sends to first user, the MAC Address of the second terminal equipment is recorded in the mapping table stored in this terminal equipment by first user, and the user name of this MAC Address and the second user is bound.
Step 103: first user sends chat messages to the second user, this chat messages, except comprising chat content, also carries the MAC Address of first terminal equipment.
Step 104: the second user receives this chat messages, mates the MAC Address of carrying in chat messages with the MAC Address of binding with first user in the mapping table of this user.
Step 105: judge whether that the match is successful, if so, performs step 106, otherwise performs step 107.
Step 106: normal this chat messages of display on the chat interface of the second user.Preferably, can show further and represent N/R mark, such as, in this chat messages side display slight terre verte to hook.Then process ends.
Step 107: show information warning on the chat interface of the second user, prompting first user may not be for I.
Preferably, this chat messages can be hidden, and point out the second user to confirm, after confirmation, just show chat messages.
According to another embodiment of the application, now also can eject information prompting frame, point out the second user whether to initiate verification process.
Except carrying out verification process after step 107 shown in Fig. 1, user oneself may have a more than terminal equipment.Therefore, except the certification when adding good friend, user, after replacing terminal equipment, initiatively can initiate verification process.
The embodiment of the present application provide by Client-initiated verification process as shown in Figure 2, comprise the steps:
Step 201: the 3rd user initiates the verification process to the 4th user.
Such as, the 3rd user clicks icon ejection function menu corresponding to the 4th user on social software, in function menu, select " device authentication " option, thus initiates verification process.Or the 3rd user chat interface display information warning, prompting the 4th user may be not I, and eject information prompting frame point out whether initiate certification, the ACK button in the 3rd user's click information prompting frame, initiation verification process.
Step 202: the 3rd user sends authentication request to the 4th user, the social software interface of the 4th user ejects information prompting frame, and prompting the 3rd user will carry out certification to this equipment, perform next step after the 4th user confirms.If the 4th user refuses or do not confirm, then flow process terminates.
Step 203: the 3rd user sets up video communication with the 4th user and is connected, and carries out certification by video.
Step 204: by video, the 3rd user confirms that the 4th user is good friend, button is passed through in the certification clicked on the social software interface of the third terminal equipment used; Button is passed through in the certification that 4th user also clicks on the social software interface of the 4th terminal equipment of current use simultaneously.If have any one button clicking authentification failure or do not click any button in the given time in the 3rd user and the 4th user, then this authentification failure, exits this flow process.
Step 205: the third terminal equipment that the 3rd user uses obtains the MAC Address of the 4th terminal equipment of the current use of the 4th user, is recorded in the mapping table of this terminal equipment, and the user name of this MAC Address and the 4th user is bound.Meanwhile, the 4th terminal equipment obtains the MAC Address of third terminal equipment, is recorded in the mapping table of this terminal equipment, and the user name of this MAC Address and the 3rd user is bound.
As can be seen from the above embodiments, same user name can bind multiple MAC Address; In like manner, if a station terminal equipment is shared by multiple user, also multiple user name can be bound.
According to another embodiment of the application, the mapping table stores synchronized stored in terminal equipment is to network side.User A, after replacing terminal equipment, can obtain this mapping table from network side, before certification again, user A can know its good friend be whether I (namely whether good friend uses the terminal equipment of certification); But need new verification process, the good friend of user A just can be made to learn, and whether user A is he or she.
In addition, when user carries out certification after changing terminal equipment, the certification of whether nullifying former terminal equipment can be selected.In example shown in Fig. 2, if the 3rd user selects to nullify former terminal equipment, then the 4th terminal equipment obtains the MAC Address of third terminal equipment, be recorded in the mapping table of this terminal equipment, and after the user name of this MAC Address and the 3rd user being bound, delete the former MAC Address of binding with the user name of the 3rd user.Nullified by certification, can avoid terminal equipment lose or as second-hand selling after, utilized by lawless person.
The application another embodiment still provides a kind of for the message false proof device in social software, the virtual bench that this device is formed for the social software running on terminal equipment, as shown in Figure 3, comprising:
Binding relationship maintenance module 301, the mapping table that unique identification and good friend's name for safeguarding a terminal equipment are bound;
Transceiver module 302, for sending and receiving chat messages, this chat messages, except comprising chat content, also carries the unique identification of this terminal equipment;
Matching module 303, mate with the unique identification that described user binds in the mapping table that the unique identification that carries in the chat messages of other users that receives transceiver module and binding relationship maintenance module are safeguarded, judge whether that the match is successful, if, send normal instruction to display module, otherwise send abnormal instruction to display module;
Display module 304, for after receiving normal instruction, the chat interface of this terminal equipment normally shows chat messages; After receiving abnormal instruction, the chat interface of this terminal equipment shows information warning, prompting other users described may not be me.
Preferably, the unique identification of described terminal equipment is the MAC address of terminal equipment.
According to another embodiment of the application, this device comprises good friend's administration module further, for sending the request requiring to add good friend to other users, and the MAC Address of the terminal equipment of the additional current use of this user in this request; Receive the response from the interpolation good friend of the terminal equipment of the current use of other users, the MAC Address of carrying in this response is sent to binding relationship maintenance module;
Described MAC Address is recorded in mapping table by binding relationship maintenance module, and the user name of this MAC Address and other users described is bound.
Preferably, described display module, is further used for, after receiving normal instruction, chat interface showing and representing N/R mark.
Preferably, described display module, for after receiving abnormal instruction, hides this chat messages, and points out user to confirm, just show chat messages after confirmation.
Preferably, described display module is further used for after receiving abnormal instruction, and chat interface ejects information prompting frame, and whether prompting user initiates verification process.
According to another embodiment of the application, this device comprises further: synchronization module, for carrying out synchronous in this locality with network side by mapping table.
According to another embodiment of the application, this device comprises authentication module, for sending authentication request to other users, if receive the authenticate-acknowledge message of other users described, setting up video communication be connected with the terminal equipment of the current use of other users described; If certification is passed through, obtain the unique identification of the terminal equipment of the described current use of other users, described unique identification is sent to binding relationship maintenance module;
Described unique identification is recorded in mapping table by binding relationship maintenance module, and the user name of this unique identification and other users described is bound.
Preferably, described unique identification is recorded in mapping table by binding relationship maintenance module, and after the user name of this unique identification and other users described being bound, deletes the former unique identification bound with the user name of the 3rd user.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required hardware platform by software and realize, can certainly all be implemented by hardware, but in a lot of situation, the former is better execution mode.Based on such understanding, what technical scheme of the present invention contributed to background technology can embody with the form of software product in whole or in part, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprise some instructions in order to make a station terminal equipment (can be smart mobile phone, panel computer, intelligent watch or other possess the portable digital equipment of accessing Internet function) perform the method described in some part of each embodiment of the present invention or embodiment.
The foregoing is only the preferred embodiment of the application; not in order to limit the protection range of the application; within all spirit in technical scheme and principle, any amendment made, equivalent replacements, improvement etc., all should be included within scope that the application protects.

Claims (18)

1. for the method that the message in social software is false proof, it is characterized in that, the mapping table that the unique identification of a social software maintenance terminal equipment and good friend's name are bound, the method comprises:
A, first user send chat messages to the second user, and this chat messages, except comprising chat content, also carries the unique identification of first terminal equipment;
B, the second user receive this chat messages, mated by the unique identification carried, judge whether that the match is successful in chat messages with the unique identification bound with first user in the mapping table of this user, if so, perform step C, otherwise perform step D;
C, on the chat interface of the second user normal display this chat messages, then process ends;
D, on the chat interface of the second user, show information warning, prompting first user may not be for I.
2. method according to claim 1, is characterized in that, the unique identification of described terminal equipment is the MAC address of terminal equipment.
3. method according to claim 2, is characterized in that, taking a step forward of steps A comprises:
First user sends the request requiring to add good friend to the second user, the MAC Address of the first terminal equipment of the additional current use of first user in this request;
Second user agrees to this request, the MAC Address of first terminal equipment is recorded in the mapping table stored in this terminal equipment, and the user name of this MAC Address and first user is bound, the MAC Address of the second terminal equipment of the current use of the second user is carried in the response adding good friend and sends to first user; The MAC Address of the second terminal equipment is recorded in the mapping table stored in this terminal equipment by first user, and the user name of this MAC Address and the second user is bound.
4. method according to claim 1, is characterized in that, step C comprises further: show on the chat interface of the second user and represent N/R mark.
5. method according to claim 1, is characterized in that, step D comprises further: hide this chat messages, and points out the second user to confirm, just shows chat messages after confirmation.
6. method according to claim 1, is characterized in that, step D comprises further: on the chat interface of the second user, eject information prompting frame, points out the second user whether to initiate verification process.
7. method according to claim 1, it is characterized in that, the method comprises further: carry out synchronous in this locality with network side by mapping table.
8. the method according to any one of claim 1 to 6, is characterized in that, the method comprises further:
A, the 3rd user send authentication request to the 4th user, and the social software interface of the 4th user ejects information prompting frame, and prompting the 3rd user will carry out certification to this equipment, perform next step after the 4th user confirms;
B, the 3rd user set up video with the 4th user and are connected, and carry out certification by video;
C, the 3rd user and four-function are clicked its certification separately on social software interface per family and are passed through button;
The third terminal equipment that d, then the 3rd user use obtains the unique identification of the 4th terminal equipment of the current use of the 4th user, is recorded in the mapping table of this terminal equipment, and the user name of this unique identification and the 4th user is bound; Meanwhile, the 4th terminal equipment obtains the unique identification of third terminal equipment, is recorded in the mapping table of this terminal equipment, and the user name of this unique identification and the 3rd user is bound.
9. method according to claim 8, it is characterized in that, described in step c, the 4th terminal equipment obtains the unique identification of third terminal equipment, be recorded in the mapping table of this terminal equipment, and after the user name of this unique identification and the 3rd user is bound, comprise further: delete the former unique identification bound with the user name of the 3rd user.
10. for the device that the message in social software is false proof, it is characterized in that the virtual bench that this device is formed for the social software running on terminal equipment comprises:
Binding relationship maintenance module, the mapping table that unique identification and good friend's name for safeguarding a terminal equipment are bound;
Transceiver module, for sending and receiving chat messages, this chat messages, except comprising chat content, also carries the unique identification of this terminal equipment;
Matching module, mate with the unique identification that described user binds in the mapping table that the unique identification that carries in the chat messages of other users that receives transceiver module and binding relationship maintenance module are safeguarded, judge whether that the match is successful, if, send normal instruction to display module, otherwise send abnormal instruction to display module;
Display module, for after receiving normal instruction, the chat interface of this terminal equipment normally shows chat messages; After receiving abnormal instruction, the chat interface of this terminal equipment shows information warning, prompting other users described may not be me.
11. devices according to claim 10, is characterized in that, the unique identification of described terminal equipment is the MAC address of terminal equipment.
12. devices according to claim 11, is characterized in that, this device comprises good friend's administration module further,
For sending the request requiring to add good friend to other users, the MAC Address of the terminal equipment of the additional current use of this user in this request; Receive the response from the interpolation good friend of the terminal equipment of the current use of other users, the MAC Address of carrying in this response is sent to binding relationship maintenance module;
Described MAC Address is recorded in mapping table by binding relationship maintenance module, and the user name of this MAC Address and other users described is bound.
13. devices according to claim 10, is characterized in that, described display module, are further used for, after receiving normal instruction, chat interface showing and representing N/R mark.
14. devices according to claim 10, is characterized in that, described display module, for after receiving abnormal instruction, hide this chat messages, and point out user to confirm, just show chat messages after confirmation.
15. devices according to claim 10, is characterized in that, described display module is further used for after receiving abnormal instruction, and chat interface ejects information prompting frame, and whether prompting user initiates verification process.
16. devices according to claim 10, is characterized in that, this device comprises further: synchronization module, for carrying out synchronous in this locality with network side by mapping table.
17. according to claim 11 to the device described in 16 any one, it is characterized in that, this device comprises authentication module, for sending authentication request to other users, if receive the authenticate-acknowledge message of other users described, set up video communication with the terminal equipment of the current use of other users described and be connected; If certification is passed through, obtain the unique identification of the terminal equipment of the described current use of other users, described unique identification is sent to binding relationship maintenance module;
Described unique identification is recorded in mapping table by binding relationship maintenance module, and the user name of this unique identification and other users described is bound.
18. devices according to claim 17, it is characterized in that, described unique identification is recorded in mapping table by binding relationship maintenance module, and after the user name of this unique identification and other users described being bound, deletes the former unique identification bound with the user name of the 3rd user.
CN201510146466.7A 2015-03-31 2015-03-31 A kind of message method for anti-counterfeit and device in social software Expired - Fee Related CN104883352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510146466.7A CN104883352B (en) 2015-03-31 2015-03-31 A kind of message method for anti-counterfeit and device in social software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510146466.7A CN104883352B (en) 2015-03-31 2015-03-31 A kind of message method for anti-counterfeit and device in social software

Publications (2)

Publication Number Publication Date
CN104883352A true CN104883352A (en) 2015-09-02
CN104883352B CN104883352B (en) 2018-09-28

Family

ID=53950686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510146466.7A Expired - Fee Related CN104883352B (en) 2015-03-31 2015-03-31 A kind of message method for anti-counterfeit and device in social software

Country Status (1)

Country Link
CN (1) CN104883352B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030009537A1 (en) * 2000-07-21 2003-01-09 Samsung Electronics Co., Ltd. Architecture for home network on world wide web
CN101521654A (en) * 2008-02-29 2009-09-02 西门子(中国)有限公司 Message protection method, sending terminal equipment and receiving terminal equipment
CN101807944A (en) * 2010-03-03 2010-08-18 中兴通讯股份有限公司 Mobile terminal and data sharing method thereof
CN102332127A (en) * 2011-09-15 2012-01-25 深圳市酷开网络科技有限公司 Network TV (television) online payment service based account binding method and payment method
CN102638468A (en) * 2012-04-12 2012-08-15 华为技术有限公司 Method, sending end, receiving end and system for protecting information transmission safety
CN102868595A (en) * 2012-09-17 2013-01-09 腾讯科技(深圳)有限公司 Method for realizing interaction among terminals, and related equipment and system
CN103227980A (en) * 2012-01-31 2013-07-31 联想(北京)有限公司 Information outputting method and device
CN103905399A (en) * 2012-12-27 2014-07-02 深圳市腾讯计算机系统有限公司 Account registration management method and apparatus
CN103973543A (en) * 2013-02-05 2014-08-06 中国移动通信集团公司 Method and device for instant messaging
CN104301364A (en) * 2013-07-17 2015-01-21 北京千橡网景科技发展有限公司 Method and device for recommending friends in mobile social network in real time

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030009537A1 (en) * 2000-07-21 2003-01-09 Samsung Electronics Co., Ltd. Architecture for home network on world wide web
CN101521654A (en) * 2008-02-29 2009-09-02 西门子(中国)有限公司 Message protection method, sending terminal equipment and receiving terminal equipment
CN101807944A (en) * 2010-03-03 2010-08-18 中兴通讯股份有限公司 Mobile terminal and data sharing method thereof
CN102332127A (en) * 2011-09-15 2012-01-25 深圳市酷开网络科技有限公司 Network TV (television) online payment service based account binding method and payment method
CN103227980A (en) * 2012-01-31 2013-07-31 联想(北京)有限公司 Information outputting method and device
CN102638468A (en) * 2012-04-12 2012-08-15 华为技术有限公司 Method, sending end, receiving end and system for protecting information transmission safety
CN102868595A (en) * 2012-09-17 2013-01-09 腾讯科技(深圳)有限公司 Method for realizing interaction among terminals, and related equipment and system
CN103905399A (en) * 2012-12-27 2014-07-02 深圳市腾讯计算机系统有限公司 Account registration management method and apparatus
CN103973543A (en) * 2013-02-05 2014-08-06 中国移动通信集团公司 Method and device for instant messaging
CN104301364A (en) * 2013-07-17 2015-01-21 北京千橡网景科技发展有限公司 Method and device for recommending friends in mobile social network in real time

Also Published As

Publication number Publication date
CN104883352B (en) 2018-09-28

Similar Documents

Publication Publication Date Title
US11316965B1 (en) Methods and systems for processing an ephemeral con tent message
US10063547B2 (en) Authorization authentication method and apparatus
US20210051119A1 (en) Information transmission control method, apparatus, and system
JP5905105B2 (en) Method, apparatus and storage medium for adding friends in a social network
EP2849411B1 (en) Session establishment methods and corresponding server
CN104734941A (en) Instant communication system and method based on autonym/anonymity switching
WO2013060143A1 (en) Method and device for sending messages to group user through microblog
GB2436412A (en) Authentication of network usage for use with message modifying apparatus
CN102916869A (en) Instant messaging method and system
CN104883367A (en) Method for auxiliary verification login, system, and application client
CN105681154A (en) Method and device for sending message in instant messaging software
CN107347054A (en) A kind of auth method and device
CN103929411A (en) Information displaying method, terminal, safety server and system
CN104935496B (en) Instant communicating method, system, device and instant communication terminal
CN105404800B (en) Account information authorization method, terminal and server
CN103684981B (en) Instant communication interdynamic method, system and server
CN104270357A (en) Service information sending method and device
CN103209113A (en) Method, facility, device and system for transmitting and receiving content information
CN106254226B (en) A kind of information synchronization method and device
CN103391120A (en) Friend relation establishing method and device based on near-field communication
CN104883352A (en) Message anti-fake method and apparatus for use in social software
CN202872816U (en) Instant messaging system
CN103001977B (en) Method for safely transmitting email
CN103312592A (en) Method for sending information to instant messaging client end in batches on webpage
CN106535144A (en) Method and terminal for sending encrypted short message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180928

CF01 Termination of patent right due to non-payment of annual fee