CN104980397A - Instant messaging method, system and terminal - Google Patents

Instant messaging method, system and terminal Download PDF

Info

Publication number
CN104980397A
CN104980397A CN201410134175.1A CN201410134175A CN104980397A CN 104980397 A CN104980397 A CN 104980397A CN 201410134175 A CN201410134175 A CN 201410134175A CN 104980397 A CN104980397 A CN 104980397A
Authority
CN
China
Prior art keywords
party
terminal
message data
message
message content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410134175.1A
Other languages
Chinese (zh)
Other versions
CN104980397B (en
Inventor
梁佛木
潘林锋
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410134175.1A priority Critical patent/CN104980397B/en
Publication of CN104980397A publication Critical patent/CN104980397A/en
Application granted granted Critical
Publication of CN104980397B publication Critical patent/CN104980397B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an instant messaging method. The method comprises that a first terminal obtains an target subscriber identification and information content; the first terminal adopts an encryption mode provided by a first party to encrypt the information content, so as to obtain the encrypted information content; the first terminal generates information data which comprises the encrypted information content and the target subscriber identification; the first terminal sends the information data to a server of a second party; the second terminal receives information data which is sent by the server of the second party to a second terminal according to the target subscriber identification; and the second terminal adopts a decryption mode provided by the first party to decrypt the encrypted information content in the information data, so as to obtain the information content. The instant messaging method provided by the invention technically ensures communication safety. The invention also provides an instant messaging system and a terminal.

Description

Instant communicating method, system and terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of instant communicating method, system and terminal.
Background technology
SAAS(Software-as-a-servic, namely software serve) refer to that all-network infrastructure required for informationization and software, hardware running platform are built for enterprise by SAAS provider, and be responsible for a series of service such as the enforcement in all early stages, the maintenance in later stage, enterprise is without the need to buying software and hardware, building machine room, recruiting IT personnel, namely by the technology of internet use information system.
Under SAAS pattern, enterprise customer uses IM(Instant Messenger, instant messaging) message data that produces in process all can through the server of SAAS service provider, and these servers are outside the local area network (LAN) of enterprise itself, this can make enterprise worry may to be intercepted or be revealed by SAAS service provider in these data transmission procedures, thus expose the security information of enterprise, there is security risk.SAAS service provider can provide cryptographic services to ensure the safety of the message data of instant messaging under SAAS pattern, but due to the cryptographic algorithm of cryptographic services be that SAAS service provider provides, there is the security risk of being divulged a secret by SAAS service provider.
Summary of the invention
Based on this, be necessary the problem that there is security risk for the instant messaging based on SAAS in conventional art, a kind of instant communicating method, system and terminal are provided.
A kind of instant communicating method, described method comprises:
First terminal obtains the message content of targeted customer's mark and input;
The cipher mode that described first terminal adopts first party to provide is encrypted described message content, obtains the message content of encryption;
Described first terminal generating messages data, described message data comprises message content and the described targeted customer mark of encryption;
Described message data is sent to the server of second party by described first terminal;
The message data that the server that described second terminal receives described second party sends to described second terminal according to the described targeted customer's mark in described message data;
The message content of manner of decryption to the described encryption in described message data that described second terminal adopts first party to provide is decrypted, and obtains described message content.
A kind of instantaneous communication system, described system comprises first terminal and the second terminal;
Described first terminal is for obtaining the message content of targeted customer's mark and input;
The cipher mode of described first terminal also for adopting first party to provide is encrypted described message content, obtains the message content of encryption;
Described first terminal is also for generating messages data, and described message data comprises message content and the described targeted customer mark of encryption;
Described first terminal is also for sending to the server of second party by described message data;
The message data that described second terminal sends to described second terminal according to the described targeted customer's mark in described message data for the server receiving described second party;
The manner of decryption message content to described encryption in described message data of described second terminal also for adopting first party to provide is decrypted, and obtains described message content.
Above-mentioned instant communicating method and system, the cipher mode encrypting messages content that first terminal adopts first party to provide, thus the server message data of the message content and targeted customer's mark that comprise encryption being sent to second party.Message data is sent to the second terminal according to targeted customer's mark by the server of second party, and the message content that the manner of decryption that the second terminal adopts first party to provide again deciphers this encryption obtains message content.
Message content like this owing to transmitting in communication process is through encryption, can not reveal to third party.And, that the cipher mode that first party that second party cannot be known provides is encrypted message content due to what adopt, the server of second party can carry out various management to the message content of encryption but cannot decipher, the manner of decryption that only first party can be adopted to provide by the terminal of the message content receiving encryption is deciphered and is obtained message content, ensure that the fail safe of communication technically.
A kind of instant communicating method, described method comprises:
First terminal obtains the message content of targeted customer's mark and input; Described targeted customer identifies corresponding second terminal;
The cipher mode that described first terminal adopts first party to provide is encrypted described message content, obtains the message content of encryption;
Described first terminal generating messages data, described message data comprises the message content of encryption, first party encrypted indicia and described targeted customer mark;
Described message data is sent to the server of second party by described first terminal, makes the server of described second party send described message data according to the described targeted customer's mark in described message data to described second terminal;
Wherein, described first party encrypted indicia is decrypted for the message content of manner of decryption to the described encryption in described message data making described second terminal and adopt first party to provide according to described first party encrypted indicia, obtains described message content.
A kind of terminal, described terminal comprises:
Acquisition module, for obtaining the message content of targeted customer's mark and input; Described targeted customer identifies corresponding another or multiple terminal;
Encryption Executive Module, the cipher mode provided for adopting first party is encrypted described message content, obtains the message content of encryption;
Message data generation module, for generating messages data, described message data comprises the message content of encryption, first party encrypted indicia and described targeted customer mark;
Message data sending module, for described message data being sent to the server of second party, makes the server of described second party send described message data according to the described targeted customer mark in described message data to described another or multiple terminal;
Wherein, described first party encrypted indicia is decrypted for the message content of manner of decryption to the described encryption in described message data making described another or multiple terminal and adopt first party to provide according to described first party encrypted indicia, obtains described message content.
Above-mentioned instant communicating method and terminal, terminal for another or multiple terminal finds message time, first obtain the message content of targeted customer's mark and input, then the cipher mode adopting first party to provide is encrypted message content, generate the message data of message content, first party encrypted indicia and the targeted customer's mark comprising encryption, and message data is sent to the server of second party.And the first party encrypted indicia in message data is used for making another or multiple terminal after receiving message data, is decrypted according to the message content of manner of decryption to encryption that this first party encrypted indicia adopts first party to provide, thus obtains message content.
Message content like this owing to transmitting in communication process is through encryption, can not reveal to third party.And, what adopt due to terminal is that the cipher mode that first party that second party cannot be known provides is encrypted message content, the server of second party can carry out various management to the message content of encryption but cannot decipher, the manner of decryption that only first party can be adopted to provide by another or multiple terminal is deciphered and is obtained message content, ensure that the fail safe of communication technically.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of instant communicating method in an embodiment;
Fig. 2 is the structured flowchart of instantaneous communication system in an embodiment;
Fig. 3 is the schematic flow sheet of instant communicating method in an embody rule scene;
Fig. 4 is the schematic flow sheet of instant communicating method in another embodiment;
Fig. 5 is the structured flowchart of instantaneous communication system in another embodiment;
Fig. 6 is the structured flowchart of a kind of terminal in an embodiment;
Fig. 7 is the module map of a computer system that can realize the embodiment of the present invention in an embodiment.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Unless context separately has the description of specific distinct, the element in the present invention and assembly, the form that quantity both can be single exists, and form that also can be multiple exists, and the present invention does not limit this.Although the step in the present invention arranges with label, and be not used in and limit the precedence of step, the order of step or the execution of certain step need based on other steps unless expressly stated, otherwise the relative rank of step is adjustable.Be appreciated that term "and/or" used herein relates to and contains the one or more any and all possible combination in the Listed Items be associated.
As shown in Figure 1, in one embodiment, provide a kind of instant communicating method, the present embodiment is applied to a kind of instantaneous communication system to illustrate in this way.Wherein, the structure chart of this instantaneous communication system as shown in Figure 2, comprises the some terminals belonging to first party, and each terminal is run instant communication client, and the terminal of first party is by the server communication of the Internet and second party.This instant communicating method specifically comprises the steps:
Step 102, first terminal obtains the message content of targeted customer's mark and input.
First terminal is the terminal of the transmission message of first party, and wherein first party refers to the side using SAAS service.Targeted customer identifies the second terminal of corresponding first party, and the second terminal is the terminal of receipt message.First terminal and second terminal of first party may have access to the Internet, thus by the server communication of the Internet and second party.Second party is to provide a side of SAAS service.First terminal is connected with the local area network (LAN) of the second terminal by first party, thus first terminal and the second terminal pass through the gateway connecting Internet of the local area network (LAN) of first party.
The instant communication client display contacts list that first terminal runs by it, user selects user ID corresponding to the contact person for carrying out with it communicating to identify as targeted customer.First terminal by its run instant communication client display to should targeted customer mark session interface, user inputs the message content of corresponding targeted customer mark by this session interface, thus first terminal can obtain the message content of targeted customer's mark and input.Wherein, message content can comprise at least one in character, picture, file, expression information, voice messaging etc.
In one embodiment, also comprising after step 102: the message content of first terminal to input carries out Validation of Data, continuing when being verified to perform subsequent step 104.Then first terminal can show the prompting of authentication failed when failing the authentication.Particularly, first terminal is by checking the information such as form, length of the message content of input thus carrying out validation verification to message content.Then first terminal can show the information of authentication failed when failing the authentication, and this information is used for prompting and re-enters effective message content.
Step 104, the cipher mode that first terminal adopts first party to provide is encrypted message content, obtains the message content of encryption.
The cipher mode that first party provides is the cipher mode using a side of SAAS service to provide, the cipher mode that this first party provides can be by the cipher mode of the side's stand-alone development using SAAS to serve, also can be the cipher mode providing cryptographic algorithm by third party authoritative institution and customized key by the side using SAAS to serve, the cipher mode that first party is provided only knows dawn by use SAAS to serve one.Third party refers to other side being different from first party and second party.Corresponding with the cipher mode that first party provides is the manner of decryption that first party provides.Such as, can use based on Base64(mono-kind for transmitting the coded system of octet code) cipher mode message content is encrypted.
Step 106, first terminal generating messages data, message data comprises message content and targeted customer's mark of encryption.
After first terminal obtains the message content of encryption, according to the message content generating messages data of this encryption.Message data specifically comprises message content and targeted customer's mark of encryption, can also comprise the originating user mark of corresponding first terminal.The wherein terminal (i.e. second terminal) of targeted customer's mark for determining receipt message content, makes the server of second party identify corresponding terminal to targeted customer and sends message content.Originating user mark identifies for the server and targeted customer making second party the information that corresponding terminal knows message content sender.
In one embodiment, message data also comprises first party encrypted indicia, the cipher mode the encryption whether message content for representing in message data provides through first party.In the present embodiment, the cipher mode whether adopting first party to provide can be selected neatly to be encrypted message content by adding first party encrypted indicia, thus switch between coded communication and common communications two kinds of patterns.If the cipher mode encrypting messages content not adopting first party to provide, then what message data comprised is message content itself, instead of the message content of encryption.
Illustrate, the field of " whether encrypting " can be added in message data, if the value of this field is " TRUE ", then represent the cipher mode encryption that message content provides through first party; If the value of this field contrary is " FALSE ", then represent the cipher mode encryption that message content provides without first party.
Step 108, message data is sent to the server of second party by first terminal.
After first terminal generating messages data, through the gateway of the local area network (LAN) of first party, then by the server transmission message data of the Internet to second party.All terminals in the local area network (LAN) of first party, by gateway connecting Internet, can monitor the local area network (LAN) of first party and the communication of the Internet, to ensure communication security at gateway.
Step 110, the message data that the server that the second terminal receives second party sends to the second terminal according to the targeted customer's mark in message data.
The instant communication client that each terminal is run can report the network address and the user ID of its place terminal when logging in, the server of second party can record the network address of terminal and the corresponding relation of user ID.Wherein this network address can be IP address and/or MAC(Media Access Control, media access control layer) address.
After the server of second party receives the message data that first terminal sends, identify this targeted customer of acquisition according to the targeted customer in message data and identify the corresponding network address, thus according to this network address, send message data by the Internet to the second terminal, the second terminal receives this message data.Wherein targeted customer's mark can be multiple, and therefore the second terminal can be multiple.User can rely on user ID log in multiple terminal, and therefore targeted customer's mark can corresponding multiple network address, and the server of second party can identify corresponding multiple network addresss according to targeted customer and send message data to multiple second terminal.
In one embodiment, message data also comprises the network address of originating user mark and/or first terminal, then step 110 comprises: the server that the second terminal receives second party carries out authentication according to the originating user mark in message data and/or the network address of first terminal and after authentication success, the message data that the server of second party sends to the second terminal according to the targeted customer's mark in message data.In the present embodiment, by judging whether originating user mark is legal first party user ID, and/or by judging whether the network address of first terminal carries out authentication in the network address range of the local area network (LAN) of first party, the fail safe communicated can be ensured further.
In one embodiment, step 110 comprises: the server that the second terminal receives second party according to the targeted customer in message data identify judge that targeted customer identifies corresponding presence time, the message data that the server of second party sends to the second terminal according to the targeted customer's mark in message data.
The instant communication client of each terminal is with after user ID login, the server of second party can record presence corresponding to this user ID, and each terminal can send online signal every prefixed time interval to the server of second party, thus remain on line states.When the server of terminal log-down or second party exceed the default time limit do not receive online signal time then can change presence corresponding to user ID for not presence.
In the present embodiment, after the server of second party receives message data, the whether corresponding presence of first query aim user ID, if then identify the second corresponding terminal to targeted customer to send message data; If not corresponding presence, this message data of buffer memory, until identify to targeted customer the message data that the second corresponding terminal sends buffer memory when targeted customer identifies corresponding presence.The scheme of the present embodiment receives message data when can ensure that the second terminal is online, avoid because of the second terminal online time send the loss that message data causes message data.
Step 112, the message content of manner of decryption to the encryption in message data that the second terminal adopts first party to provide is decrypted, and obtains message content.
The manner of decryption that first party provides is the manner of decryption corresponding with the cipher mode that first party provides, and is provided by the side using SAAS to serve.Particularly, step 112 comprises: the second terminal judges according to the first party encrypted indicia in message data the cipher mode encryption whether message content provides through first party, if the message content of manner of decryption to the encryption in message data then adopting first party to provide is decrypted, obtain message content; Then directly if not from message data, obtain message content.
In one embodiment, after step 112, also comprise: the second terminal display message content.Particularly, originating user mark can be comprised in message data, namely send the user ID that the terminal of message data is corresponding, then show message content in the message display area that the second terminal can identify at corresponding originating user.In addition, the second terminal also can show animation and/or plays sound while displaying message content, the animation preferably shown and/or the sound of broadcasting relevant to message content.If than when there is the keyword of " happily " in message content, then first terminal can be play and animation relevant happily, or broadcasting laugh audio frequency.
In one embodiment, message data also comprises message display parameter, then also comprise after step 112: the second terminal is according to the message display parameter display message content in message data.Particularly, message display parameter comprises at least one in character script, font color, font size size, background color etc.How first terminal shows message content by arranging message display parameter to control the second terminal, can pass on abundanter information.
Above-mentioned instant communicating method, the cipher mode encrypting messages content that first terminal adopts first party to provide, thus the server message data of the message content and targeted customer's mark that comprise encryption being sent to second party.Message data is sent to the second terminal according to targeted customer's mark by the server of second party, and the message content that the manner of decryption that the second terminal adopts first party to provide again deciphers this encryption obtains message content.
The first party of such use SAAS service only need install instant communication client in its each terminal, the second party providing SAAS to serve then provides the server of second party to provide communication required hardware environment, and each terminal of first party is connected by the Internet with the server of second party, then the cost of first party realization communication is extremely low, without the need to increasing hardware cost.
Further, the message content transmitted in communication process is through encryption, can not reveal to third party.And, that the cipher mode that first party that second party cannot be known provides is encrypted message content due to what adopt, the server of second party can carry out various management to the message content of encryption but cannot decipher, the manner of decryption that only first party can be adopted to provide by the terminal of the message content receiving encryption is deciphered and is obtained message content, ensure that the fail safe of communication technically.
In one embodiment, step 104 specifically comprises: first terminal obtains the encrypting module that first party provides, and the encipher interface that the encrypting module provided by first party is provided is encrypted message content, obtains the message content of encryption.And step 112 specifically comprises: the second terminal obtains the deciphering module that first party provides, and the decryption interface that the deciphering module provided by first party is provided is decrypted message content, obtain message content.
Particularly, in the present embodiment, first terminal can obtain the encrypting module that first party provides from other node the local area network (LAN) of local or first party, thus is encrypted message content by the encipher interface that the encrypting module that first party provides provides; If there is not the encrypting module that first party provides in other node in the local area network (LAN) of local or first party, then not encrypting messages content.Second terminal can according to first party encrypted indicia, and obtain from other node the local area network (LAN) of local or first party the deciphering module that first party provides, the decryption interface that the deciphering module provided by first party is provided is decrypted message content.The encrypting module that first party provides and the deciphering module that first party provides can be DLL(Dynamic Link Library, dynamic link library) form or COM(Component Object Model, the Component Object Model) form, or can also be can carry out mutual mode with the instant communication client operated in terminal arbitrarily.The encrypting module that first party provides and the deciphering module that first party provides can be same module, call to facilitate.
In the present embodiment, the encrypting module provided by first party realizes encryption, the deciphering module provided by first party accordingly realizes deciphering, module is easily installed and is unloaded, and the deciphering module that the encrypting module that can be provided by adjustment first party and first party are provided adjusts enciphering and deciphering algorithm, facilitates follow-up maintenance, amendment.
In one embodiment, step 108 specifically comprises: after the cipher mode encrypted message data that first terminal adopts second party to provide, the message data of encryption is sent to the server of second party.And step 110 specifically comprises: after the manner of decryption that the server employing second party that the second terminal receives second party provides is deciphered and obtained targeted customer's mark from the message data of encryption, the server of second party is according to the message data of targeted customer's mark to the encryption of the second terminal transmission.And step 112 specifically comprises: the message data of the manner of decryption enabling decryption of encrypted that the second terminal adopts second party to provide, obtains message data.
In the present embodiment, first terminal encrypts this message data sending the cipher mode adopting second party to provide before message data, and the cipher mode that second party provides is to provide, and the second party of SAAS service provides.The manner of decryption adopting second party to provide after the server of second party receives the message data of encryption deciphers the message data of this encryption, thus can obtain targeted customer's mark from message data, but the server of second party cannot the message content of encryption in decrypt data.The server of second party sends the message data of above-mentioned encryption again to the second terminal according to this targeted customer mark.After the manner of decryption deciphering that second terminal adopts second party to provide after receiving the message data of encryption obtains message data, then the manner of decryption deciphering adopting first party to provide obtains message content.
In the present embodiment, the cipher mode adopting second party to provide is encrypted message data, the cipher mode that the cipher mode simultaneously using first party to provide and second party provide, can ensure that third party cannot know the content of the message data of transmission, has ensured the fail safe of communication further.
The principle of above-mentioned instant communicating method is described by an embody rule scene below.As shown in Figure 3, specifically comprise the steps:
First terminal obtains that originating user is designated 10001, targeted customer is designated 10002, the message content of input is " hello " and to should the message display parameter of message content be font color be black.First terminal obtains the encrypting module that first party provides, and the encipher interface that the encrypting module provided by first party is provided adopts BASE64 algorithm to be encrypted message content, and the message content obtaining encryption is " xOOww==".First terminal generating messages data, message data comprises the message content of encryption, first party encrypted indicia, message display parameter, originating user mark and targeted customer's mark.The message data of concrete generation is as follows:
<MSG>
<SourceID>10001</SourceID> (representing originating user mark)
<TargetID>10002</TargetID> (representing targeted customer's mark)
<Content>xOO6ww==LEssT.LTssT. LT/Content> (representing the message content of encryption)
<Encrypt>TRUE</E ncrypt> (representing first party encrypted indicia)
<Color>0x000000</Color> (representing font color code)
</MSG>
Then first terminal adopts the cipher mode encrypted message data that second party provides, and the message data of encryption is sent to the server of second party.
The manner of decryption that the server of second party adopts second party to provide deciphering from the message data of encryption obtain originating user be designated 10001 and targeted customer be designated 10002, authentication is carried out according to originating user mark, after authentication is passed through, identify to targeted customer the message data that the second corresponding terminal sends encryption according to targeted customer's mark.
The manner of decryption that second terminal adopts second party to provide deciphers the message data of the encryption received, obtain message data, detect that the first party encrypted indicia in message data is " TRUE ", then obtain the deciphering module that first party provides, the decryption interface that the deciphering module provided by first party is provided is decrypted message content, and obtaining message content is " hello ".Second terminal, according to the message display parameter in message data, shows " hello " that message content is black font in the message display area of corresponding originating user mark 10001.
As shown in Figure 4, in one embodiment, additionally provide a kind of instant communicating method, the method comprises the steps:
Step 402, first terminal obtains the message content of targeted customer's mark and input; Targeted customer identifies corresponding second terminal.
First terminal is the terminal of the transmission message of first party, and wherein first party refers to the side using SAAS service.Targeted customer identifies the second terminal of corresponding first party, and the second terminal is the terminal of receipt message.First terminal and second terminal of first party may have access to the Internet, thus by the server communication of the Internet and second party.Second party is to provide a side of SAAS service.First terminal is connected with the local area network (LAN) of the second terminal by first party, thus first terminal and the second terminal pass through the gateway connecting Internet of the local area network (LAN) of first party.
The instant communication client display contacts list that first terminal runs by it, user selects user ID corresponding to the contact person for carrying out with it communicating to identify as targeted customer.This targeted customer mark is corresponding with the second terminal of first party.First terminal by its run instant communication client display to should targeted customer mark session interface, user inputs the message content of corresponding targeted customer mark by this session interface, thus first terminal can obtain the message content of targeted customer's mark and input.Wherein, message content can comprise at least one in character, picture, file, expression information, voice messaging etc.
In one embodiment, also comprising after step 402: the message content of first terminal to input carries out Validation of Data, continuing when being verified to perform subsequent step 404.Then first terminal can show the prompting of authentication failed when failing the authentication.Particularly, first terminal is by checking the information such as form, length of the message content of input thus carrying out validation verification to message content.Then first terminal can show the information of authentication failed when failing the authentication, and this information is used for prompting and re-enters effective message content.
Step 404, the cipher mode that first terminal adopts first party to provide is encrypted message content, obtains the message content of encryption.
The cipher mode that first party provides is the cipher mode using a side of SAAS service to provide, the cipher mode that this first party provides can be by the cipher mode of the side's stand-alone development using SAAS to serve, also can be the cipher mode providing cryptographic algorithm by third party authoritative institution and customized key by the side using SAAS to serve, the cipher mode that first party is provided only knows dawn by use SAAS to serve one.Third party refers to other side being different from first party and second party.Corresponding with the cipher mode that first party provides is the manner of decryption that first party provides.The cipher mode based on Base64 can be used to be encrypted message content.
Step 406, first terminal generating messages data, message data comprises the message content of encryption, first party encrypted indicia and targeted customer's mark.
After first terminal obtains the message content of encryption, according to the message content generating messages data of this encryption.Message data specifically comprises the message content of encryption, first party encrypted indicia and targeted customer's mark, can also comprise the originating user mark of corresponding first terminal.The wherein terminal (i.e. second terminal) of targeted customer's mark for determining receipt message content, makes the server of second party identify corresponding terminal to targeted customer and sends message content.Originating user mark identifies for the server and targeted customer making second party the information that corresponding terminal knows message content sender.
First party encrypted indicia is for representing the message content whether being through the cipher mode encryption that first party provides that message data comprises.According to the cipher mode encrypting messages content that first party provides, then what message data comprised is message content itself, instead of the message content of encryption.The field of " whether encrypting " can be added in message data, if the value of this field is " TRUE ", then represent the cipher mode encryption that message content provides through first party; If the value of this field contrary is " FALSE ", then represent the cipher mode encryption that message content provides without first party.
Step 408, message data is sent to the server of second party by first terminal, makes the server of second party send message data according to the targeted customer's mark in message data to the second terminal.
And first party encrypted indicia adopts the message content of manner of decryption to the encryption in message data that provide of first party to be decrypted for making the second terminal according to first party encrypted indicia, obtains message content.
After first terminal generating messages data, through the gateway of the local area network (LAN) of first party, then by the server transmission message data of the Internet to second party.All terminals in the local area network (LAN) of first party, by gateway connecting Internet, can monitor the local area network (LAN) of first party and the communication of the Internet, to ensure communication security at gateway.
After the server of second party receives the message data that first terminal sends, identify this targeted customer of acquisition according to the targeted customer in message data and identify the corresponding network address, thus according to this network address, send message data by the Internet to the second terminal, the second terminal receives this message data.Wherein targeted customer's mark can be multiple, and therefore the second terminal can be multiple.User can rely on user ID log in multiple terminal, and therefore targeted customer's mark can corresponding multiple network address, and the server of second party can identify corresponding multiple network addresss according to targeted customer and send message data to multiple second terminal.
The manner of decryption that first party provides is the manner of decryption corresponding with the cipher mode that first party provides, and is provided by the side using SAAS to serve.First party encrypted indicia judges according to the first party encrypted indicia in message data the cipher mode encryption whether message content provides through first party for making the second terminal, if the message content of manner of decryption to the encryption in message data then adopting first party to provide is decrypted, obtain message content; Then directly if not from message data, obtain message content.
Above-mentioned instant communicating method, when a terminal in the local area network (LAN) of first party is for finding message to another or multiple terminal, first obtain the message content of targeted customer's mark and input, then the cipher mode adopting first party to provide is encrypted message content, generate the message data of message content, first party encrypted indicia and the targeted customer's mark comprising encryption, and message data is sent to the server of second party.And the first party encrypted indicia in message data is used for making another or multiple terminal after receiving message data, is decrypted according to the message content of manner of decryption to encryption that this first party encrypted indicia adopts first party to provide, thus obtains message content.
Message content like this owing to transmitting in communication process is through encryption, can not reveal to third party.And, what adopt due to terminal is that the cipher mode that first party that second party cannot be known provides is encrypted message content, the server of second party can carry out various management to the message content of encryption but cannot decipher, the manner of decryption that only first party can be adopted to provide by another or multiple terminal of first party is deciphered and is obtained message content, ensure that the fail safe of communication technically.
In one embodiment, step 404 comprises: first terminal obtains the encrypting module that first party provides, and the encipher interface that the encrypting module provided by first party is provided is encrypted message content, obtains the message content of encryption.And first party encrypted indicia is also for making the second terminal according to first party encrypted indicia, obtain the deciphering module that first party provides, the decryption interface that the deciphering module provided by first party is provided is decrypted message content, obtains message content.
Particularly, in the present embodiment, first terminal can obtain the encrypting module that first party provides from other node the local area network (LAN) of local or first party, thus is encrypted message content by the encipher interface that the encrypting module that first party provides provides; If there is not the encrypting module that first party provides in other node in the local area network (LAN) of local or first party, then not encrypting messages content.After first party encrypted indicia is used for making the second terminal receive message data, obtain from other node the local area network (LAN) of local or first party the deciphering module that first party provides according to this first party encrypted indicia, the decryption interface that the deciphering module provided by first party is provided is decrypted message content.The encrypting module that first party provides and the deciphering module that first party provides can be DLL form or COM form, or can also be can carry out mutual mode with the instant communication client operated in terminal arbitrarily.The encrypting module that first party provides and the deciphering module that first party provides can be same module, call to facilitate.
In the present embodiment, the encrypting module provided by first party realizes the cipher mode that first party provides, the deciphering module provided by first party accordingly realizes the manner of decryption that first party provides, module is easily installed and is unloaded, and the deciphering module that the encrypting module that can be provided by adjustment first party and first party are provided adjusts enciphering and deciphering algorithm, facilitates follow-up maintenance, amendment.
In one embodiment, message data also comprises message display parameter, and message display parameter is used for making the second terminal according to message display parameter display message content.Particularly, message display parameter can be used for making the second terminal in the message display area that corresponding originating user identifies, show message content according to this message display parameter.Message display parameter comprises at least one in character script, font color, font size size, background color etc.In addition, the second terminal also for showing animation and/or play sound while displaying message content, the animation preferably shown and/or the sound of broadcasting relevant to message content.In the present embodiment, how first terminal shows message content by arranging message display parameter to control the second terminal, can pass on abundanter information.
In one embodiment, message data also comprises the network address of originating user mark and/or first terminal, then step 408 comprises: message data is sent to the server of second party by first terminal, the server of second party is made to carry out authentication according to the network address of the originating user mark in message data and/or first terminal, and when after authentication success, make the server of second party send message data according to the targeted customer's mark in message data to the second terminal.
In the present embodiment, after the server of second party receives message data, the server triggering second party carries out authentication, the server of second party is by judging whether originating user mark is legal first party user ID particularly, and/or by judging whether the network address of first terminal carries out authentication in the network address range of the local area network (LAN) of first party, the fail safe communicated can be ensured further.
In one embodiment, step 408 comprises: after the cipher mode encrypted message data that first terminal adopts second party to provide, the message data of encryption is sent to the server of second party, after the manner of decryption making the server of second party adopt second party to provide deciphering from the message data of encryption obtains targeted customer's mark, send the message data of encryption according to targeted customer's mark to the second terminal.Second terminal, for the message data of the manner of decryption enabling decryption of encrypted that adopts second party to provide, obtains message data.
In the present embodiment, first terminal encrypts this message data sending the cipher mode adopting second party to provide before message data, and the cipher mode that second party provides is to provide, and the second party of SAAS service provides.The manner of decryption adopting the second party corresponding with the cipher mode that second party provides to provide after making the server of second party receive the message data of encryption deciphers the message data of this encryption, thus can obtain targeted customer's mark from message data, but the server of second party cannot the message content of encryption in decrypt data.The server of second party sends the message data of above-mentioned encryption again to the second terminal according to this targeted customer mark.After second terminal obtains message data for the manner of decryption deciphering adopting second party to provide after receiving the message data of encryption, then the manner of decryption deciphering adopting first party to provide obtains message content.
In the present embodiment, the cipher mode adopting second party to provide is encrypted message data, the cipher mode that the cipher mode simultaneously using first party to provide and second party provide, can ensure that third party cannot know the content of the message data of transmission, second party cannot know the message content of the encryption in message data, has ensured the fail safe of communication further.
In one embodiment, step 408 comprises: message data is sent to the server of second party by first terminal, the server of second party being identified according to the targeted customer in message data and judges targeted customer's mark whether corresponding presence, making when being judged as YES the server of second party send message data according to the targeted customer's mark in message data to the second terminal.
The instant communication client of each terminal is with after user ID login, the server of second party can record presence corresponding to this user ID, and each terminal can send online signal every prefixed time interval to the server of second party, thus remain on line states.When the server of terminal log-down or second party exceed the default time limit do not receive online signal time then can change presence corresponding to user ID for not presence.
In the present embodiment, after the server of second party receives message data, make the whether corresponding presence of the first query aim user ID of the server of second party, if then identify the second corresponding terminal to targeted customer to send message data; If not corresponding presence, this message data of buffer memory, until identify to targeted customer the message data that the second corresponding terminal sends buffer memory when targeted customer identifies corresponding presence.The scheme of the present embodiment receives message data when can ensure that the second terminal is online, avoid because of the second terminal online time send the loss that message data causes message data.
As shown in Figure 5, in one embodiment, provide a kind of instantaneous communication system 500, this instantaneous communication system 500 comprises the first terminal 502 and the second terminal 504 that are connected by the local area network (LAN) of first party.
First terminal 502 is for obtaining the message content of targeted customer's mark and input.
First terminal 502 is terminals for sending message of first party, and wherein first party refers to the side using SAAS service.The second terminal 504, second terminal 504 that targeted customer identifies corresponding first party is the terminals for receipt message.The first terminal 502 of first party and the second terminal 504 can be used for accessing the Internet, thus can be used for the server communication by the Internet and second party.Second party is to provide a side of SAAS service.First terminal 502 and the second terminal 504 can be used for being connected by the local area network (LAN) of first party, thus first terminal and the second terminal are used for the gateway connecting Internet by the local area network (LAN) of first party.
First terminal 502 can be used for showing contacts list, and user selects user ID corresponding to the contact person for carrying out with it communicating to identify as targeted customer.First terminal 502 for show to should targeted customer mark session interface, user by this session interface input corresponding targeted customer mark message content, thus first terminal can be used for obtain targeted customer mark and input message content.Wherein, message content can comprise at least one in character, picture, file, expression information, voice messaging etc.
The cipher mode of first terminal 502 also for adopting first party to provide is encrypted message content, obtains the message content of encryption.
The cipher mode that first party provides is the cipher mode using a side of SAAS service to provide, the cipher mode that this first party provides can be by the cipher mode of the side's stand-alone development using SAAS to serve, also can be the cipher mode providing cryptographic algorithm by third party authoritative institution and customized key by the side using SAAS to serve, the cipher mode that first party is provided only knows dawn by use SAAS to serve one.Third party refers to other side being different from first party and second party.Corresponding with the cipher mode that first party provides is the manner of decryption that first party provides.First terminal 502 can be used for using the cipher mode based on Base64 to be encrypted message content.
In one embodiment, first terminal 502 is also for carrying out Validation of Data to the message content of input, and when being verified, first terminal 502 is encrypted message content for the cipher mode adopting first party to provide, and obtains the message content of encryption; First terminal 502 can be used for the prompting showing authentication failed when failing the authentication.Particularly, first terminal 502 for by check input message content the information such as form, length thus validation verification is carried out to message content.Then first terminal 502 can be used for the information showing authentication failed when failing the authentication, and this information is used for prompting and re-enters effective message content.
First terminal 502 is also for generating messages data, and message data comprises message content and targeted customer's mark of encryption.
First terminal 502 for obtain encryption message content after, according to the message content generating messages data of this encryption.Message data specifically comprises message content and targeted customer's mark of encryption, can also comprise the originating user mark of corresponding first terminal 502.Wherein second terminal of targeted customer's mark for determining receipt message content, makes the server of second party identify the second corresponding terminal to targeted customer and sends message content.Originating user mark identifies for the server and targeted customer making second party the information that corresponding terminal knows message content sender.
In one embodiment, message data also comprises first party encrypted indicia, the cipher mode the encryption whether message content for representing in message data provides through first party.In the present embodiment, the cipher mode whether adopting first party to provide can be selected neatly to be encrypted message content by adding first party encrypted indicia, thus switch between coded communication and common communications two kinds of patterns.If the cipher mode encrypting messages content not adopting first party to provide, then what message data comprised is message content itself, instead of the message content of encryption.
First terminal 502 is also for sending to the server of second party by message data.
First terminal 502 for after generating messages data, through the gateway of the local area network (LAN) of first party, then by server from the Internet to second party send message data.All terminals in the local area network (LAN) of first party are used for by gateway connecting Internet, can monitor the local area network (LAN) of first party and the communication of the Internet, to ensure communication security at gateway.
The message data that second terminal 504 sends to the second terminal 504 according to the targeted customer's mark in message data for the server receiving second party.
The server of second party is for after the message data that receives first terminal 502 and send, identify this targeted customer of acquisition according to the targeted customer in message data and identify the corresponding network address, thus for according to this network address, send message data by the Internet to the second terminal 504, the second terminal 504 is for receiving this message data.Wherein targeted customer's mark can be multiple, and therefore the second terminal 504 can be multiple.User can rely on user ID log in multiple terminal, and therefore targeted customer's mark can corresponding multiple network address, and the server of second party can be used for identifying corresponding multiple network addresss according to targeted customer and sends message data to multiple second terminal 504.
The manner of decryption message content to encryption in message data of the second terminal 504 also for adopting first party to provide is decrypted, and obtains message content.
The manner of decryption that first party provides is the manner of decryption corresponding with the cipher mode that first party provides, and is provided by the side using SAAS to serve.Particularly, second terminal 504 is for judging the cipher mode encryption whether message content provides through first party according to the first party encrypted indicia in message data, if the message content of manner of decryption to the encryption in message data then for adopting first party to provide is decrypted, obtain message content; If not then for directly obtaining message content from message data.
Above-mentioned instantaneous communication system 500, the cipher mode encrypting messages content of first terminal 502 for adopting first party to provide, thus the server message data of the message content and targeted customer's mark that comprise encryption being sent to second party.The message content that the manner of decryption that the server of second party is used for sending to the second terminal 504, second terminal 504 to be used further to adopt first party to provide message data according to targeted customer's mark deciphers this encryption obtains message content.
The first party of such use SAAS service only need install instant communication client in its each terminal, the second party providing SAAS to serve then provides the server of second party to provide communication required hardware environment, and first terminal and the second terminal are used for being connected by the Internet with the server of second party, then the cost of first party realization communication is extremely low, without the need to increasing hardware cost.
Further, the message content transmitted in communication process is through encryption, can not reveal to third party.And, that the cipher mode that first party that second party cannot be known provides is encrypted message content due to what adopt, the server of second party can carry out various management to the message content of encryption but cannot decipher, the manner of decryption that only first party can be adopted to provide by the terminal of the message content receiving encryption is deciphered and is obtained message content, ensure that the fail safe of communication technically.
In one embodiment, message data also comprises the network address of originating user mark and/or first terminal 502, second terminal 504 also carries out authentication for the server that receives second party according to the network address of the originating user mark in message data and/or first terminal 502 and after authentication success, the message data that the server of second party sends to the second terminal 504 according to the targeted customer's mark in message data.In the present embodiment, by judging whether originating user mark is legal first party user ID, and/or by judging whether the network address of first terminal 502 carries out authentication in the network address range of the local area network (LAN) of first party, the fail safe communicated can be ensured further.
In one embodiment, second terminal 504 also for the server that receives second party according to the targeted customer in message data identify judge that targeted customer identifies corresponding presence time, the message data that the server of second party sends to the second terminal 504 according to the targeted customer's mark in message data.
The instant communication client of each terminal is with after user ID login, the server of second party can record presence corresponding to this user ID, and each terminal can send online signal every prefixed time interval to the server of second party, thus remain on line states.When the server of terminal log-down or second party exceed the default time limit do not receive online signal time then second party for changing presence corresponding to user ID for not presence.
In the present embodiment, after the server of second party is used for receiving message data, the whether corresponding presence of first query aim user ID, if then identify the second corresponding terminal 504 to targeted customer to send message data; If not corresponding presence, this message data of buffer memory, until identify to targeted customer the message data that the second corresponding terminal 504 sends buffer memory when targeted customer identifies corresponding presence.The scheme of the present embodiment receives message data when can ensure that the second terminal 504 is online, avoid because of the second terminal 504 online time transmission message data cause the loss of message data.
In one embodiment, first terminal 502 is also for obtaining the encrypting module that first party provides, and the encipher interface that the encrypting module provided by first party is provided is encrypted message content, obtains the message content of encryption.Second terminal 504 is also for obtaining the deciphering module that first party provides, and the decryption interface that the deciphering module provided by first party is provided is decrypted message content, obtains message content.
Particularly, in the present embodiment, first terminal 502 can be used for obtaining from other node the local area network (LAN) of local or first party the encrypting module that first party provides, thus the encipher interface that the encrypting module for being provided by first party is provided is encrypted message content; If there is not the encrypting module that first party provides in other node in the local area network (LAN) of local or first party, then not encrypting messages content.Second terminal 504 can be used for according to first party encrypted indicia, and obtain from other node the local area network (LAN) of local or first party the deciphering module that first party provides, the decryption interface that the deciphering module provided by first party is provided is decrypted message content.The encrypting module that first party provides and the deciphering module that first party provides can be DLL form or COM form, or can also be can carry out mutual mode with the instant communication client operated in terminal arbitrarily.The encrypting module that first party provides and the deciphering module that first party provides can be same module, call to facilitate.
In the present embodiment, the encrypting module provided by first party realizes encryption, the deciphering module provided by first party accordingly realizes deciphering, module is easily installed and is unloaded, and the deciphering module that the encrypting module that can be provided by adjustment first party and first party are provided adjusts enciphering and deciphering algorithm, facilitates follow-up maintenance, amendment.
In one embodiment, first terminal 502 also for adopt second party to provide cipher mode encrypted message data after, the message data of encryption is sent to the server of second party.After the manner of decryption that the server of the second terminal 504 also for receiving second party adopts second party to provide is deciphered and obtained targeted customer's mark from the message data of encryption, the server of second party identifies the message data of the encryption sent to the second terminal 504 according to targeted customer.Second terminal 504, also for the message data of the manner of decryption enabling decryption of encrypted that adopts second party to provide, obtains message data.
In the present embodiment, first terminal 502 is for encrypting this message data sending the cipher mode adopting second party to provide before message data, and the cipher mode that second party provides is to provide, and the second party of SAAS service provides.The server of second party for receive encryption message data after to decipher the message data of this encryption for the manner of decryption adopting the second party corresponding with the cipher mode that second party provides to provide, thus can obtain targeted customer's mark from message data, but the server of second party cannot the message content of encryption in decrypt data.The server of second party is used for the message data sending above-mentioned encryption again according to this targeted customer mark to the second terminal 504.After second terminal 504 obtains message data for the manner of decryption deciphering adopting second party to provide after receiving the message data of encryption, the manner of decryption deciphering being used further to adopt first party to provide obtains message content.
In the present embodiment, the cipher mode adopting second party to provide is encrypted message data, the cipher mode that the cipher mode simultaneously using first party to provide and second party provide, can ensure that third party cannot know the content of the message data of transmission, has ensured the fail safe of communication further.
In one embodiment, the second terminal 504, also for showing message content, can comprise originating user mark particularly in message data, then the second terminal 504 is used in the message display area of corresponding originating user mark and shows message content.In addition, the second terminal 504 is also used in shows and shows animation while message content and/or play sound, the animation preferably shown and/or the sound of broadcasting relevant to message content.
In one embodiment, message data also comprises message display parameter; Second terminal 504 is also for according to the message display parameter display message content in message data.Particularly, message display parameter comprises at least one in character script, font color, font size size, background color etc.First terminal 502 can be used for how showing message content by arranging message display parameter to control the second terminal 504, can pass on abundanter information.
As shown in Figure 6, in one embodiment, a kind of terminal 600 is provided.This terminal 600 comprises: acquisition module 602, encryption Executive Module 604, message data generation module 606 and message data sending module 608.
Acquisition module 602, for obtaining the message content of targeted customer's mark and input; Targeted customer identifies corresponding another or multiple terminal 610.
Terminal 600 is terminals for sending message of first party, and wherein first party refers to the side using SAAS service.Targeted customer identifies another or multiple terminal 610 of corresponding first party, and another or multiple terminal 610 are terminals of receipt message.Terminal 600 and another or multiple terminal 610 of first party can be used for accessing the Internet, thus can be used for the server communication by the Internet and second party.Second party is to provide a side of SAAS service.Terminal 600 and another or multiple terminal 610 can be used for being connected by the local area network (LAN) of first party, thus terminal 600 can be used for the gateway connecting Internet of the local area network (LAN) by first party with another or multiple terminal 610.
Acquisition module 602 can be used for showing contacts list, and the user ID corresponding for the contact person carrying out with it communicating selected for obtaining user identifies as targeted customer, and this targeted customer identifies corresponding another or multiple terminal 610.Acquisition module 602 for showing should the session interface of targeted customer's mark, for obtaining the message content of the corresponding targeted customer mark by the input of this session interface.Wherein, message content can comprise at least one in character, picture, file, expression information, voice messaging etc.
Encryption Executive Module 604, the cipher mode provided for adopting first party is encrypted message content, obtains the message content of encryption.
The cipher mode that first party provides is the cipher mode using a side of SAAS service to provide, the cipher mode that this first party provides can be by the cipher mode of the side's stand-alone development using SAAS to serve, also can be the cipher mode providing cryptographic algorithm by third party authoritative institution and customized key by the side using SAAS to serve, the cipher mode that first party is provided only knows dawn by use SAAS to serve one.Third party refers to other side being different from first party and second party.Corresponding with the cipher mode that first party provides is the manner of decryption that first party provides.The cipher mode based on Base64 can be used to be encrypted message content.
Terminal 600 also comprises input validation module in one embodiment, for carrying out Validation of Data to the message content of input, encrypting Executive Module 604 to be encrypted message content for the cipher mode adopting first party to provide when being verified, obtaining the message content of encryption; Input validation module is also for the prompting of to be that be authentication failed when failing the authentication.Particularly, input validation module is used for the information such as form, length of the message content by checking input thus carries out validation verification to message content.Input validation module is for showing the information of authentication failed when failing the authentication, and this information is used for prompting and re-enters effective message content.
Message data generation module 606, for generating messages data, message data comprises the message content of encryption, first party encrypted indicia and targeted customer's mark.
Message data generation module 606 for obtain encryption message content after, according to the message content generating messages data of this encryption.Message data specifically comprises the message content of encryption, first party encrypted indicia and targeted customer's mark, can also comprise the originating user mark of counterpart terminal 600.The wherein terminal of targeted customer's mark for determining receipt message content, makes the server of second party identify corresponding terminal to targeted customer and sends message content.Originating user mark identifies for the server and targeted customer making second party the information that corresponding terminal knows message content sender.
First party encrypted indicia is for representing the message content whether being through the cipher mode encryption that first party provides that message data comprises.According to the cipher mode encrypting messages content that first party provides, then what message data comprised is message content itself, instead of the message content of encryption.Message data generation module 606 is used in the field that message data adds " whether encrypting ", if the value of this field is " TRUE ", then represents the cipher mode encryption that message content provides through first party; If the value of this field contrary is " FALSE ", then represent the cipher mode encryption that message content provides without first party.
Message data sending module 608, for message data being sent to the server of second party, makes the server of second party send message data according to the targeted customer's mark in message data to another or multiple terminal 610.
Wherein, first party encrypted indicia is decrypted for the message content of manner of decryption to the encryption in message data making another or multiple terminal 610 and adopt first party to provide according to first party encrypted indicia, obtains message content.
After generating messages data, message data sending module 608 for the gateway of the local area network (LAN) through first party, then by server from the Internet to second party send message data.All terminals in the local area network (LAN) of first party are used for by gateway connecting Internet, can monitor the local area network (LAN) of first party and the communication of the Internet, to ensure communication security at gateway.
After the server of second party is used for receiving message data, identify this targeted customer of acquisition according to the targeted customer in message data and identify the corresponding network address, thus according to this network address, send message data by the Internet to another or multiple terminal 610, by this another or multiple terminal 610 receive this message data.Wherein targeted customer mark can be multiple, therefore can in addition multiple 610 terminals transmission message datas.User can rely on user ID log in multiple terminal, and therefore targeted customer's mark can corresponding multiple network address, and the server of second party can identify corresponding multiple network addresss according to targeted customer and send message data to other multiple terminal 610.
The manner of decryption that first party provides is the manner of decryption corresponding with the cipher mode that first party provides, and is provided by the side using SAAS to serve.First party encrypted indicia judges according to the first party encrypted indicia in message data the cipher mode encryption whether message content provides through first party for making another or multiple terminal 610, if the message content of manner of decryption to the encryption in message data then adopting first party to provide is decrypted, obtain message content; Then directly if not from message data, obtain message content.
Above-mentioned terminal 600, when for another or multiple terminal 610 sends message time, first obtain the message content of targeted customer's mark and input, then the cipher mode adopting first party to provide is encrypted message content, generate the message data of message content, first party encrypted indicia and the targeted customer's mark comprising encryption, and message data is sent to the server of second party.And the first party encrypted indicia in message data is used for making another or multiple terminal 610 after receiving message data, is decrypted according to the message content of manner of decryption to encryption that this first party encrypted indicia adopts first party to provide, thus obtains message content.
Message content like this owing to transmitting in communication process is through encryption, can not reveal to third party.And, what adopt due to terminal is that the cipher mode that first party that second party cannot be known provides is encrypted message content, the server of second party can carry out various management to the message content of encryption but cannot decipher, the manner of decryption deciphering that only first party can be adopted to provide by another in the local area network (LAN) of first party or multiple terminal 610 obtains message content, ensure that the fail safe of communication technically.
In one embodiment, encryption Executive Module 604 is also for obtaining the encrypting module 605 that first party provides, and the encipher interface that the encrypting module 605 provided by first party is provided is encrypted message content, obtains the message content of encryption.And first party encrypted indicia is also for making another or multiple terminal 610 according to first party encrypted indicia, obtain the deciphering module 607 that first party provides, the decryption interface that the deciphering module 607 provided by this first party is provided is decrypted message content, obtains message content.
Particularly, in the present embodiment, terminal 600 can be used for obtaining from other node the local area network (LAN) of local or first party the encrypting module 605 that first party provides, thus is encrypted message content by the encipher interface that the encrypting module 605 that first party provides provides; If there is not the encrypting module 605 that first party provides in other node in the local area network (LAN) of local or first party, then not encrypting messages content.After first party encrypted indicia is used for making another or multiple terminal 610 receive message data, obtain from other node the local area network (LAN) of local or first party the deciphering module 607 that first party provides according to this first party encrypted indicia, the decryption interface that the deciphering module 607 provided by first party is provided is decrypted message content.The encrypting module 605 that first party provides and the deciphering module 607 that first party provides can be DLL form or COM form, or can also be can carry out mutual mode with the instant communication client operated in terminal arbitrarily.The encrypting module 605 that first party provides and the deciphering module 607 that first party provides can be same module, call to facilitate.
In the present embodiment, the encrypting module 605 provided by first party realizes the cipher mode that first party provides, the deciphering module 607 provided by first party accordingly realizes the manner of decryption that first party provides, module is easily installed and is unloaded, and the deciphering module 607 that the encrypting module 605 that can be provided by adjustment first party and first party are provided adjusts enciphering and deciphering algorithm, facilitates follow-up maintenance, amendment.
In one embodiment, message data also comprises message display parameter, and message display parameter is used for making another or multiple terminal 610 according to message display parameter display message content.Particularly, message display parameter can be used for making another or multiple terminal 610 in the message display area that corresponding originating user identifies, show message content according to this message display parameter.Message display parameter comprises at least one in character script, font color, font size size, background color etc.In addition, another or multiple terminal 610 also for showing animation and/or play sound while displaying message content, the animation preferably shown and/or the sound of broadcasting relevant to message content.In the present embodiment, terminal 600, by arranging message display parameter to control another or how multiple terminal 610 shows message content, can pass on abundanter information.
In one embodiment, message data also comprises the network address of originating user mark and/or terminal 600, message data sending module 608 is also for sending to the server of second party by message data, the server of second party is made to carry out authentication according to the network address of the originating user mark in message data and/or terminal 600, and when after authentication success, make the server of second party send message data according to the targeted customer's mark in message data to another or multiple terminal 610.
In the present embodiment, after the server of second party is used for receiving message data, the server triggering second party carries out authentication, the server of second party can be used for by judging whether originating user mark is legal first party user ID particularly, and/or by judging whether the network address of terminal 600 carries out authentication in the network address range of the local area network (LAN) of first party, the fail safe communicated can be ensured further.
In one embodiment, message data sending module 608 also for adopt second party to provide cipher mode encrypted message data after, the message data of encryption is sent to the server of second party, after the manner of decryption making the server of second party adopt second party to provide deciphering from the message data of encryption obtains targeted customer's mark, send the message data of encryption according to targeted customer's mark to another or multiple terminal 610.Another or multiple terminal 610, for the message data of the manner of decryption enabling decryption of encrypted that adopts second party to provide, obtain message data.
In the present embodiment, terminal 600 is for encrypting this message data sending the cipher mode adopting second party to provide before message data, and the cipher mode that second party provides is to provide, and the second party of SAAS service provides.The manner of decryption adopting the second party corresponding with the cipher mode that second party provides to provide after making the server of second party receive the message data of encryption deciphers the message data of this encryption, thus can obtain targeted customer's mark from message data, but the server of second party cannot the message content of encryption in decrypt data.The server of second party is used for the message data sending above-mentioned encryption again according to this targeted customer mark to another or multiple terminal 610.After another or multiple terminal 610 obtain message data for the manner of decryption deciphering adopting second party to provide after receiving the message data of encryption, then the manner of decryption deciphering adopting first party to provide obtains message content.
In the present embodiment, the cipher mode adopting second party to provide is encrypted message data, the cipher mode that the cipher mode simultaneously using first party to provide and second party provide, can ensure that third party cannot know the content of the message data of transmission, second party cannot know the message content of the encryption in message data, has ensured the fail safe of communication further.
In one embodiment, message data sending module 608 is also for sending to the server of second party by message data, the server of second party being identified according to the targeted customer in message data and judges targeted customer's mark whether corresponding presence, making when being judged as YES the server of second party send message data according to the targeted customer's mark in message data to another or multiple terminal 610.
The server of second party is used for presence corresponding to record user identifications, and each terminal can send online signal every prefixed time interval to the server of second party, thus remains on line states.Nullify or the server of second party exceed the default time limit when not receiving online signal then the server of second party for changing presence corresponding to user ID for not presence.
In the present embodiment, after the server of second party receives message data, the server of second party is used for the whether corresponding presence of first query aim user ID, if then identify corresponding another to targeted customer or multiple terminal 610 sends message data; If not corresponding presence, this message data of buffer memory, until identify to targeted customer the message data that corresponding another or multiple terminal 610 send buffer memory when targeted customer identifies corresponding presence.The scheme of the present embodiment can ensure another or multiple terminal 610 is online time receive message data, avoid because of another or multiple terminal 610 online time send the loss that message data causes message data.
Fig. 7 is the module map of a computer system 1000 that can realize the embodiment of the present invention.This computer system 1000 can be used as the first terminal in above-described embodiment, also can as the second terminal in above-described embodiment, can also as the server of the second party in above-described embodiment.This computer system 1000 is an example being applicable to computer environment of the present invention, can not think to propose any restriction to the scope of application of the present invention.Computer system 1000 can not be interpreted as the combination needing the one or more parts depending on or have in illustrated exemplary computer system 1000.
Computer system 1000 shown in Fig. 7 is the examples being suitable for computer system of the present invention.Other framework with different sub-systems configuration also can use.Such as have the desktop computer known by masses, notebook, smart phone, panel computer, etc. similar devices go for some embodiments of the present invention.But be not limited to above cited equipment.
As shown in Figure 7, computer system 1000 comprises processor 1010, memory 1020 and system bus 1022.The various system components comprising memory 1020 and processor 1010 are connected on system bus 1022.Processor 1010 is the hardware being used for being performed by arithmetic sum logical operation basic in computer system computer program instructions.Memory 1020 be one for storing the physical equipment of calculation procedure or data (such as, program state information) temporarily or permanently.System bus 1020 can be any one in the bus structures of following several types, comprises memory bus or storage control, peripheral bus and local bus.Processor 1010 and memory 1020 can carry out data communication by system bus 1022.Wherein memory 1020 comprises read-only memory (ROM) or flash memory (all not shown in figure), and random-access memory (ram), and RAM typically refers to the main storage being loaded with operating system and application program.
Computer system 1000 also comprises display interface 1030(such as, Graphics Processing Unit), display unit 1040(such as, liquid crystal display), audio interface 1050(such as, sound card) and audio frequency apparatus 1060(such as, loud speaker).Display unit 1040 and audio frequency apparatus 1060 are the media devices for experiencing content of multimedia.
Computer system 1000 generally comprises a memory device 1070.Memory device 1070 can be selected from multiple computer-readable medium, and computer-readable medium refers to any available medium can accessed by computer system 1000, that comprise movement and fixing two media.Such as, computer-readable medium includes but not limited to, flash memory (miniature SD card), CD-ROM, digital versatile disc (DVD) or other optical disc storage, cassette, tape, disk storage or other magnetic storage apparatus, or can be used for storing information needed and other medium any can accessed by computer system 1000.
Computer system 1000 also comprises input unit 1080 and input interface 1090(such as, I/O controller).User can pass through input unit 1080, and as the touch panel equipment in keyboard, mouse, display unit 1040, input instruction and information are in computer system 1000.Input unit 1080 is normally connected on system bus 1022 by input interface 1090, but also can be connected by other interface or bus structures, as USB (USB).
Computer system 1000 can be carried out logic with one or more network equipment in a network environment and is connected.The network equipment can be PC, server, router, smart phone, panel computer or other common network node.Computer system 1000 is connected with the network equipment by Local Area Network interface 1100 or mobile comm unit 1110.Local Area Network refers in finite region, such as family, school, computer laboratory or use the office building of the network media, the computer network of interconnected composition.WiFi and twisted-pair feeder wiring Ethernet are two kinds of technology of the most frequently used structure local area network (LAN).WiFi is a kind of technology that can make computer system 1000 swapping data or be connected to wireless network by radio wave.Mobile comm unit 1110 can be answered by radio communication diagram while movement and call in a wide geographic area.Except call, mobile comm unit 1110 is also supported in the 2G providing mobile data service, carries out internet access in 3G or 4G cellular communication system.
It should be pointed out that other computer system comprising the subsystem more more or less than computer system 1000 also can be applicable to invention.
As described in detail, be applicable to the assigned operation that computer system 1000 of the present invention can perform instant communicating method above.The form of the software instruction that computer system 1000 is operated in computer-readable medium by processor 1010 performs these operations.These software instructions can be read into memory 1020 from memory device 1070 or by lan interfaces 1100 from another equipment.The software instruction be stored in memory 1020 makes processor 1010 perform above-mentioned instant communicating method.In addition, also the present invention can be realized equally by hardware circuit or hardware circuit in conjunction with software instruction.Therefore, the combination that the present invention is not limited to any specific hardware circuit and software is realized.
The above embodiment only have expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (24)

1. an instant communicating method, described method comprises:
First terminal obtains the message content of targeted customer's mark and input;
The cipher mode that described first terminal adopts first party to provide is encrypted described message content, obtains the message content of encryption;
Described first terminal generating messages data, described message data comprises message content and the described targeted customer mark of encryption;
Described message data is sent to the server of second party by described first terminal;
The message data that the server that described second terminal receives described second party sends to described second terminal according to the described targeted customer's mark in described message data;
The message content of manner of decryption to the described encryption in described message data that described second terminal adopts first party to provide is decrypted, and obtains described message content.
2. method according to claim 1, is characterized in that, described message content comprises at least one in character, picture, file, expression information, voice messaging.
3. method according to claim 1, is characterized in that, the cipher mode that described first terminal adopts first party to provide is encrypted described message content, obtains the message content of encryption, comprising:
Described first terminal obtains the encrypting module that first party provides, and the encipher interface that the encrypting module provided by described first party is provided is encrypted described message content, obtains the message content of encryption;
The message content of manner of decryption to the described encryption in described message data that described second terminal adopts first party to provide is decrypted, and obtains described message content, comprising:
Described second terminal obtains the deciphering module that first party provides, and the decryption interface that the deciphering module provided by described first party is provided is decrypted described message content, obtains described message content.
4. method according to claim 1, is characterized in that, described message data is sent to the server of second party by described first terminal, comprising:
After the cipher mode that described first terminal adopts second party to provide encrypts described message data, the message data of encryption is sent to the server of second party;
The message data that the server that described second terminal receives described second party sends to described second terminal according to the described targeted customer's mark in described message data, comprising:
After the manner of decryption that the server that described second terminal receives described second party adopts second party to provide is deciphered and obtained described targeted customer mark from the message data of described encryption, the server of described second party is according to the message data of described targeted customer's mark to the encryption of described second terminal transmission;
The message content of manner of decryption to the described encryption in described message data that described second terminal adopts first party to provide is decrypted, and before obtaining described message content, also comprises:
The manner of decryption that described second terminal adopts second party to provide deciphers the message data of described encryption, obtains described message data.
5. method according to claim 1, is characterized in that, the message data that the server that described second terminal receives described second party sends to described second terminal according to the described targeted customer's mark in described message data, comprising:
The server that described second terminal receives described second party according to the described targeted customer in described message data identify judge that described targeted customer identifies corresponding presence time, the described message data that the server of described second party sends to described second terminal according to the described targeted customer's mark in described message data.
6. method according to claim 1, is characterized in that, described message data also comprises message display parameter; Described method also comprises:
Described second terminal is message content according to the described message display parameter display in described message data.
7. an instant communicating method, described method comprises:
First terminal obtains the message content of targeted customer's mark and input; Described targeted customer identifies corresponding second terminal;
The cipher mode that described first terminal adopts first party to provide is encrypted described message content, obtains the message content of encryption;
Described first terminal generating messages data, described message data comprises the message content of encryption, first party encrypted indicia and described targeted customer mark;
Described message data is sent to the server of second party by described first terminal, makes the server of described second party send described message data according to the described targeted customer's mark in described message data to described second terminal;
Wherein, described first party encrypted indicia is decrypted for the message content of manner of decryption to the described encryption in described message data making described second terminal and adopt first party to provide according to described first party encrypted indicia, obtains described message content.
8. method according to claim 7, is characterized in that, described message content comprises at least one in character, picture, file, expression information, voice messaging.
9. method according to claim 7, is characterized in that, the cipher mode that described first terminal adopts first party to provide is encrypted described message content, obtains the message content of encryption, comprising:
Described first terminal obtains the encrypting module that first party provides, and the encipher interface that the encrypting module provided by described first party is provided is encrypted described message content, obtains the message content of encryption;
And described first party encrypted indicia is also for making described second terminal according to described first party encrypted indicia, obtain the deciphering module that first party provides, the decryption interface that the deciphering module provided by described first party is provided is decrypted described message content, obtains described message content.
10. method according to claim 7, it is characterized in that, described message data is sent to the server of second party by described first terminal, makes the server of described second party send described message data according to the described targeted customer's mark in described message data to described second terminal, comprising:
After the cipher mode that described first terminal adopts second party to provide encrypts described message data, the message data of encryption is sent to the server of second party, the manner of decryption making the server of described second party adopt second party to provide sends the message data of encrypting according to described targeted customer's mark to described second terminal after deciphering from the message data of described encryption and obtaining described targeted customer mark;
Described second terminal deciphers the message data of described encryption for the manner of decryption adopting second party to provide, obtain described message data.
11. methods according to claim 7, it is characterized in that, described message data is sent to the server of second party by described first terminal, makes the server of described second party send described message data according to the described targeted customer's mark in described message data to described second terminal, comprising:
Described message data is sent to the server of second party by described first terminal, the server of described second party being identified according to the targeted customer in described message data and judges described targeted customer mark whether corresponding presence, making when being judged as YES the server of described second party send described message data according to the described targeted customer's mark in described message data to described second terminal.
12. methods according to claim 7, is characterized in that, described message data also comprises message display parameter, and described message display parameter is used for making described second terminal message content according to described message display parameter display.
13. 1 kinds of instantaneous communication systems, is characterized in that, described system comprises first terminal and the second terminal;
Described first terminal is for obtaining the message content of targeted customer's mark and input;
The cipher mode of described first terminal also for adopting first party to provide is encrypted described message content, obtains the message content of encryption;
Described first terminal is also for generating messages data, and described message data comprises message content and the described targeted customer mark of encryption;
Described first terminal is also for sending to the server of second party by described message data;
The message data that described second terminal sends to described second terminal according to the described targeted customer's mark in described message data for the server receiving described second party;
The manner of decryption message content to described encryption in described message data of described second terminal also for adopting first party to provide is decrypted, and obtains described message content.
14. systems according to claim 13, is characterized in that, described message content comprises at least one in character, picture, file, expression information, voice messaging.
15. systems according to claim 13, it is characterized in that, described first terminal is also for obtaining the encrypting module that first party provides, and the encipher interface that the encrypting module provided by described first party is provided is encrypted described message content, obtains the message content of encryption;
Described second terminal is also for obtaining the deciphering module that first party provides, and the decryption interface that the deciphering module provided by described first party is provided is decrypted described message content, obtains described message content.
16. systems according to claim 13, is characterized in that, after the cipher mode of described first terminal also for adopting second party to provide encrypts described message data, the message data of encryption are sent to the server of second party;
After the manner of decryption that described second terminal also adopts second party to provide for the server receiving described second party is deciphered and obtained described targeted customer mark from the message data of described encryption, the server of described second party is according to the message data of described targeted customer's mark to the encryption of described second terminal transmission;
The manner of decryption of described second terminal also for adopting second party to provide deciphers the message data of described encryption, obtains described message data.
17. systems according to claim 13, it is characterized in that, described second terminal also for the server that receives described second party according to the described targeted customer in described message data identify judge that targeted customer identifies corresponding presence time, the described message data that the server of described second party sends to described second terminal according to the described targeted customer's mark in described message data.
18. systems according to claim 13, is characterized in that, described message data also comprises message display parameter; Described second terminal is also for message content according to the message display parameter display in described message data.
19. 1 kinds of terminals, is characterized in that, described terminal comprises:
Acquisition module, for obtaining the message content of targeted customer's mark and input; Described targeted customer identifies corresponding another or multiple terminal;
Encryption Executive Module, the cipher mode provided for adopting first party is encrypted described message content, obtains the message content of encryption;
Message data generation module, for generating messages data, described message data comprises the message content of encryption, first party encrypted indicia and described targeted customer mark;
Message data sending module, for described message data being sent to the server of second party, makes the server of described second party send described message data according to the described targeted customer mark in described message data to described another or multiple terminal;
Wherein, described first party encrypted indicia is decrypted for the message content of manner of decryption to the described encryption in described message data making described another or multiple terminal and adopt first party to provide according to described first party encrypted indicia, obtains described message content.
20. methods according to claim 19, is characterized in that, described message content comprises at least one in character, picture, file, expression information, voice messaging.
21. methods according to claim 19, it is characterized in that, described encryption Executive Module is also for obtaining the encrypting module that first party provides, and the encipher interface that the encrypting module provided by described first party is provided is encrypted described message content, obtains the message content of encryption;
And described first party encrypted indicia is also for making described another or multiple terminal according to described first party encrypted indicia, obtain the deciphering module that first party provides, the decryption interface that the deciphering module provided by described first party is provided is decrypted described message content, obtains described message content.
22. methods according to claim 19, it is characterized in that, after the cipher mode of described message data sending module also for adopting second party to provide encrypts described message data, the message data of encryption is sent to the server of second party, after making the server of described second party adopt the manner of decryption that provides of second party decipher from the message data of described encryption to obtain described targeted customer mark, send the message data of encrypting according to described targeted customer's mark to described another or multiple terminal;
Described another or multiple terminal decipher the message data of described encryption for the manner of decryption adopting second party to provide, and obtain described message data.
23. methods according to claim 19, it is characterized in that, described message data sending module is also for sending to the server of second party by described message data, the server of described second party being identified according to the targeted customer in described message data and judges described targeted customer mark whether corresponding presence, making when being judged as YES the server of described second party send described message data according to the described targeted customer's mark in described message data to described another or multiple terminal.
24. methods according to claim 19, is characterized in that, described message data also comprises message display parameter, and described message display parameter is used for making described another or multiple terminal message content according to described message display parameter display.
CN201410134175.1A 2014-04-03 2014-04-03 Instant communicating method, system and terminal Active CN104980397B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410134175.1A CN104980397B (en) 2014-04-03 2014-04-03 Instant communicating method, system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410134175.1A CN104980397B (en) 2014-04-03 2014-04-03 Instant communicating method, system and terminal

Publications (2)

Publication Number Publication Date
CN104980397A true CN104980397A (en) 2015-10-14
CN104980397B CN104980397B (en) 2019-04-26

Family

ID=54276507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410134175.1A Active CN104980397B (en) 2014-04-03 2014-04-03 Instant communicating method, system and terminal

Country Status (1)

Country Link
CN (1) CN104980397B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933202A (en) * 2016-04-13 2016-09-07 郑州悉知信息科技股份有限公司 Message processing method and device
CN106100980A (en) * 2016-07-29 2016-11-09 黄亮 Instant messaging communication means end to end and device
CN106230712A (en) * 2016-09-27 2016-12-14 山东浪潮商用系统有限公司 A kind of communication system and method
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN106570405A (en) * 2016-11-04 2017-04-19 北京百度网讯科技有限公司 Method and apparatus for performing encryption/decryption on text in input method
CN106685792A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information sending method and device
CN106685634A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information transmitting method and device for public platform client
CN106685892A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information transmitting method used for common platform client side and confidential information transmitting device thereof
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential Information transmitting method and confidential information transmitting device
CN107483314A (en) * 2016-06-07 2017-12-15 腾讯科技(深圳)有限公司 A kind of information processing method and system, terminal device
CN107749846A (en) * 2017-10-23 2018-03-02 深圳市比量科技传媒有限公司 The processing method and system that partial information is encrypted in a kind of common channel
CN108243161A (en) * 2016-12-26 2018-07-03 北京润信恒达科技有限公司 A kind of terminal speech encryption method and voice encryption system
CN110581847A (en) * 2019-08-26 2019-12-17 杭州城市大数据运营有限公司 Input foreknowledge system
WO2020048289A1 (en) * 2018-09-05 2020-03-12 深圳市红砖坊技术有限公司 System and method for processing user information
CN112202768A (en) * 2020-09-29 2021-01-08 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN114124880A (en) * 2021-11-29 2022-03-01 北京天融信网络安全技术有限公司 Secret communication method and device based on public cloud, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN102098307A (en) * 2011-02-11 2011-06-15 重庆梦彩科技发展有限公司 Password type instant message (IM) encryption method and system in self-service bank
CN102782692A (en) * 2009-12-31 2012-11-14 沃蒂夫有限公司 System, apparatus and method for encryption and decryption of data transmitted over a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102782692A (en) * 2009-12-31 2012-11-14 沃蒂夫有限公司 System, apparatus and method for encryption and decryption of data transmitted over a network
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN102098307A (en) * 2011-02-11 2011-06-15 重庆梦彩科技发展有限公司 Password type instant message (IM) encryption method and system in self-service bank

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106685634A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information transmitting method and device for public platform client
CN106685892B (en) * 2015-11-06 2021-07-23 北京奇虎科技有限公司 Secret information sending method and device for public platform client
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential Information transmitting method and confidential information transmitting device
CN106685892A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information transmitting method used for common platform client side and confidential information transmitting device thereof
CN106685792A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential information sending method and device
CN105933202A (en) * 2016-04-13 2016-09-07 郑州悉知信息科技股份有限公司 Message processing method and device
CN107483314A (en) * 2016-06-07 2017-12-15 腾讯科技(深圳)有限公司 A kind of information processing method and system, terminal device
CN107483314B (en) * 2016-06-07 2018-11-23 腾讯科技(深圳)有限公司 A kind of information processing method and system, terminal device
CN106100980A (en) * 2016-07-29 2016-11-09 黄亮 Instant messaging communication means end to end and device
CN106230712A (en) * 2016-09-27 2016-12-14 山东浪潮商用系统有限公司 A kind of communication system and method
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN106487659B (en) * 2016-10-20 2022-12-20 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information encryption device and terminal
CN106570405A (en) * 2016-11-04 2017-04-19 北京百度网讯科技有限公司 Method and apparatus for performing encryption/decryption on text in input method
CN108243161A (en) * 2016-12-26 2018-07-03 北京润信恒达科技有限公司 A kind of terminal speech encryption method and voice encryption system
CN107749846A (en) * 2017-10-23 2018-03-02 深圳市比量科技传媒有限公司 The processing method and system that partial information is encrypted in a kind of common channel
WO2020048289A1 (en) * 2018-09-05 2020-03-12 深圳市红砖坊技术有限公司 System and method for processing user information
CN110581847A (en) * 2019-08-26 2019-12-17 杭州城市大数据运营有限公司 Input foreknowledge system
CN112202768A (en) * 2020-09-29 2021-01-08 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN112202768B (en) * 2020-09-29 2023-05-12 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN114124880A (en) * 2021-11-29 2022-03-01 北京天融信网络安全技术有限公司 Secret communication method and device based on public cloud, computer equipment and storage medium
CN114124880B (en) * 2021-11-29 2023-07-18 北京天融信网络安全技术有限公司 Secret communication method and device based on public cloud, computer equipment and storage medium

Also Published As

Publication number Publication date
CN104980397B (en) 2019-04-26

Similar Documents

Publication Publication Date Title
CN104980397A (en) Instant messaging method, system and terminal
CN111193695B (en) Encryption method and device for third party account login and storage medium
US9374222B2 (en) Secure communication of data between devices
CN110417543B (en) Data encryption method, device and storage medium
CN112287372B (en) Method and apparatus for protecting clipboard privacy
WO2019134303A1 (en) Live stream room popularity processing method and apparatus, server and storage medium
CN108111497A (en) Video camera and server inter-authentication method and device
KR102433939B1 (en) Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
US20170279854A1 (en) Identifying data usage via active data
CN112311769B (en) Method, system, electronic device and medium for security authentication
CN105100268A (en) Security control method and system of Internet-of-things device as well as application server
KR101540672B1 (en) A system and method for protecting from hacking of mobile terminal
US11870760B2 (en) Secure virtual personalized network
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN114553590A (en) Data transmission method and related equipment
CN103036852A (en) Method and device for achieving network login
CN111431922A (en) Internet of things data encryption transmission method and system
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
KR20160111244A (en) Electronic apparatus and communication method thereof
CN109120576B (en) Data sharing method and device, computer equipment and storage medium
Barbera et al. Cdroid: Towards a cloud-integrated mobile operating system
WO2023226778A1 (en) Identity authentication method and apparatus, and electronic device and computer-readable storage medium
KR100931986B1 (en) Terminal and method for transmitting message and receiving message
CN108270917B (en) Encrypted smart phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240108

Address after: 518057 Tencent Building, No. 1 High-tech Zone, Nanshan District, Shenzhen City, Guangdong Province, 35 floors

Patentee after: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd.

Patentee after: TENCENT CLOUD COMPUTING (BEIJING) Co.,Ltd.

Address before: 2, 518000, East 403 room, SEG science and Technology Park, Zhenxing Road, Shenzhen, Guangdong, Futian District

Patentee before: TENCENT TECHNOLOGY (SHENZHEN) Co.,Ltd.

TR01 Transfer of patent right