CN106453069A - Instant communication message sending, viewing and viewing control method and device thereof - Google Patents

Instant communication message sending, viewing and viewing control method and device thereof Download PDF

Info

Publication number
CN106453069A
CN106453069A CN201611190691.1A CN201611190691A CN106453069A CN 106453069 A CN106453069 A CN 106453069A CN 201611190691 A CN201611190691 A CN 201611190691A CN 106453069 A CN106453069 A CN 106453069A
Authority
CN
China
Prior art keywords
key
time
message
instant
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611190691.1A
Other languages
Chinese (zh)
Other versions
CN106453069B (en
Inventor
陈耀攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201611190691.1A priority Critical patent/CN106453069B/en
Publication of CN106453069A publication Critical patent/CN106453069A/en
Priority to PCT/CN2017/117842 priority patent/WO2018113756A1/en
Application granted granted Critical
Publication of CN106453069B publication Critical patent/CN106453069B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses an instant communication message sending, viewing and viewing control method and a device thereof. The method comprises the steps of obtaining a time key of a to-be-sent instant message, wherein the time key is used for limiting a viewable time limit of the to-be-sent instant message; according to the time key, carrying out encryption on the to-be-sent instant message to generate an encrypted message; and sending the encrypted message to a receiver, sending the time key to a server and controlling whether the receiver can view the encrypted message via the server according to the time key. According to the instant communication message sending, viewing and viewing control method and the device thereof disclosed by the invention, the overdue failure guarantee is provided for the instant message, so that the security and the timeliness of instant communication are higher and the encryption range is wider.

Description

A kind of instant communication message sends, checks, checking control method and its equipment
Technical field
The present invention relates to communication technical field, more particularly, to a kind of instant communication message sends, checks, checks control method And its equipment.
Background technology
With the development of communication technology, the function of instant communication software is constantly strengthened, because it is capable of online chatting With exchange, convenient and swift, be therefore widely used.By instant communication software, can not only realize word, picture, The transmission of the instant messages such as expression, but also can immediately transmit Voice & Video.Thus, instant communication software is as friendship Levelling platform, has the characteristics that information storage is big, private high.
In use, due to the instantaneity of instant messaging, send the communication that message is typically directly displayed at other side On platform, privacy cannot preferably be protected, and safety is very low, and on instant message and platform, the history message of storage will be very Easily be stolen, but the message on usual platform have privacy and is not intended to be seen by the 3rd people, or stolen get, but Current use situation is:As long as the history on the instant communication software of individual, on communication software is signed in by login password Chat record will easily be browsed, replicates, forwards, and the privacy of information just cannot ensure, therefore says, how to carry The security performance rising instant messaging, the privacy ensureing instant messages are the problems of current instant messaging field urgent need to resolve.
Content of the invention
In view of the above problems, the present invention proposes and a kind of overcome the problems referred to above or solve the above problems at least in part Instant communication message sends, checks, checking control method and its equipment, concrete technical scheme is:
The embodiment of the present application provides a kind of instant communication message sending method, and methods described includes:
Obtain the time key of instant message to be sent, described time key is used for limiting described instant message to be sent can The time limit checked;
According to described time key, described instant message to be sent is encrypted with generation encryption message;
Send described encryption message to recipient, send described time key to server and by described server according to Described in described time cipher controlled, whether recipient can check described encryption message.
Optionally, the described time key obtaining instant message to be sent, including:
Obtain the out-of-service time of instant message to be sent, the described out-of-service time is expired inefficacy after described instant message sends Time;
Time key is obtained according to the described out-of-service time.
Optionally, described according to described time key, described instant message to be sent is encrypted generation encryption message, Concrete grammar includes:
With described time key, described instant message to be sent is encrypted with the described encryption message of generation;Or
Generate session key, with the combination of described time key and described session key, described instant message to be sent is entered Row encryption generates described encryption message.
Optionally, the described combination with described time key and described session key is carried out to described instant message to be sent Encryption, including:
With described session key, instant message to be sent is encrypted, the message data generating in described encryption message is close Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption message is close Literary composition.
Optionally, described encryption message specifically:Before sending will be by described message data ciphertext and session key ciphertext The wrapper generating after being packaged.
Optionally, described time key is using id password algorithm calculated time public key.
Optionally, the described out-of-service time obtaining instant message to be sent, including:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
The present invention also provides a kind of instant communication message inspection method, is applied to instant messaging receiving terminal, methods described bag Include:
Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption message can The time limit checked;
Response check described encryption message check operation, generate and send key request to server, described key please Seek the described time key for obtaining described encryption message;
Receive the feedback information that described server responds described key request, described feedback information by described server according to The described time key of the request time of described key request and the transmission of instant messaging transmitting terminal generates, when described request time surpasses When going out the corresponding time range of described time key, described feedback information is the information characterizing described encryption message invalid, when described When request time is in the corresponding time range of described time key, described feedback information is described time key;
Parse described feedback information, according to analysis result response, check operation.
Optionally, described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
Optionally, check operation described in the described response according to analysis result, including:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption Encryption message, obtains message data and shows.
Optionally, described encryption message according to described time secret key decryption, including:
With encrypting message described in described time secret key decryption, obtain message data;Or
The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message;Close with the described time Described session key ciphertext deciphered by key, obtains session key;With the message count in described session key deciphering described encryption message According to ciphertext, obtain message data.
The present invention also provides a kind of instant communication message to check control method, is applied to server, and methods described includes:
Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
When described instant messaging receiving terminal is asked the request time of described time key corresponding with described time key Between scope be compared;
If described request time exceeds described time range, refuse close to the instant messaging receiving terminal granting described time Key is so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
If described request time, without departing from described time range, provides described time key to instant messaging receiving terminal, Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
The present invention also provides a kind of instant messaging transmitting terminal, including:
Acquiring unit:For obtaining the time key of instant message to be sent, described time key is used for limiting to be sent The time limit that instant message can be checked;
Ciphering unit:Disappear for according to described time key, described instant message to be sent is encrypted with generation encryption Breath;
First transmitting element:For sending described encryption message to recipient, send described time key to server simultaneously By described server, whether recipient according to described time cipher controlled can check described encryption message.
Optionally, described acquiring unit, including:
Time obtains subelement, and for obtaining the out-of-service time of message to be sent, the described out-of-service time is sent out for described message The time of expired inefficacy after sending;
Key obtaining sub-unit, for obtaining time key according to the described out-of-service time.
Optionally, described ciphering unit, including:
First encryption sub-unit operable, for being encrypted the described encryption of generation with described time key to described message to be sent Message;Or
Second encryption sub-unit operable, for generating session key, the combination with described time key and described session key is right Described message to be sent is encrypted the described encryption message of generation.
Optionally, described second encryption sub-unit operable, is used for:
With described session key, message to be sent is encrypted, generates the message data ciphertext in described encryption message;
With described time key, described session key is encrypted, the session key generating in described encryption message is close Literary composition.Optionally, described encryption message specifically:To be sealed by described message data ciphertext and session key ciphertext before sending The wrapper generating after dress.
Optionally, described time key is using id password algorithm calculated time public key.
Optionally, the described time obtains subelement, is used for:
The transmission time of described message to be sent is added that fixed term generates the described out-of-service time.
The present invention also provides a kind of instant messaging receiving terminal it is characterised in that including:
First receiving unit:For receiving the encryption message being encrypted according to time key, described time key is used for Limit the time limit that described encryption message can be checked;
Respond request unit:For response check described encryption message check operation, generate and send key request extremely Server, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit:Respond the feedback information of described key request, described feedback letter for receiving described server Breath is generated according to the described time key that request time and the transmitting terminal of described key request send by described server, when described When request time exceeds described time key corresponding time range, described feedback information is to characterize described encryption message invalid Information, when described request time is in the corresponding time range of described time key, described feedback information is that the described time is close Key;
Resolution response unit:For parsing described feedback information, according to analysis result response, check operation.
Optionally, described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
Optionally, resolution response unit, is used for:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption Encryption message, obtains message data and shows.
Optionally, described resolution response unit, including:
First resolution response subelement, for encrypting message described in described time secret key decryption, obtaining message data;Or Person
Second resolution response subelement, the wrapper for parsing described encryption message obtains the meeting in described encryption message Words key ciphertext;With session key ciphertext described in described time secret key decryption, obtain session key;With the deciphering of described session key Message data ciphertext in described encryption message, obtains message data.
The present invention also provides a kind of server it is characterised in that including:
3rd receiving unit:The key that message time key is encrypted in acquisition for receiving the transmission of instant messaging receiving terminal please Ask;
Authentication unit:For described instant messaging receiving terminal being asked the request time of described time key and described time The corresponding time range of key is compared;
Second transmitting element:For when described request time exceeds described time range, refusing to receive to instant messaging Described time key is provided at end so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, provide described time key to instant messaging receiving terminal, Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
The technical scheme providing in the embodiment of the present application, at least has the following technical effect that or advantage:
The encryption method of the present invention is using time key, instant message to be sent to be encrypted, and this time key is used In limiting the time limit that instant message to be sent can be checked, that is, cross this time limit, instant message can not be looked into again See it is ensured that instant message ageing;Meanwhile, the time key for encrypting message is to send to server, by server To manage the granting of key, to be controlled with this encryption message can be checked it is ensured that during instant messaging information height Safety and message ageing, the security performance solving instant messaging in prior art is not high, the privacy of instant messages Difference, easily compromised technical problem.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows a kind of instant communication message sending method flow chart according to an embodiment of the invention;
Fig. 2 shows a kind of instant communication message inspection method flow chart according to an embodiment of the invention;
Fig. 3 shows that a kind of instant communication message according to an embodiment of the invention checks control method flow chart;
Fig. 4 shows a kind of schematic diagram of instant messaging transmitting terminal according to an embodiment of the invention;
Fig. 5 shows a kind of schematic diagram of instant messaging receiving terminal according to an embodiment of the invention;
Fig. 6 shows a kind of schematic diagram of server according to an embodiment of the invention.
Specific embodiment
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, these embodiments are provided to be able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
The embodiment of the present invention provides a kind of instant messaging send, check, checking control method and its equipment, existing in order to solve There is the security performance of instant messaging in technology not high, private poor, the easily compromised technical problem of instant messages.
Refer to Fig. 1, the method that a kind of instant messaging that the embodiment of the present application provides sends, the method includes following step Suddenly:
S11:Obtain the time key of instant message to be sent, described time key is used for limiting described to be sent immediately disappear The time limit that breath can be checked;
S12:According to described time key, described instant message to be sent is encrypted with generation encryption message;
S13:Send described encryption message to recipient, send described time key and to server and pass through described server According to described time cipher controlled, whether recipient can check described encryption message.
It should be noted that in specific implementation process, the above-mentioned instant communication message sending method that the application provides can Apply various instant communication clients, QQ, wechat or microblogging of such as commonly using etc., the method is widely used, easy to operate.
Below, implement step in conjunction with what Fig. 1 was discussed in detail this instant communication message sending method:
Step S11, obtains the time key of instant message to be sent, described time key be used for limiting described to be sent i.e. When the time limit that can be checked of message.
Specifically include:
S111:Obtain the out-of-service time of instant message to be sent, the described out-of-service time is mistake after described instant message sends The time that phase lost efficacy;
S112:Time key is obtained according to the described out-of-service time;
Wherein step S111, obtains the out-of-service time of instant message to be sent, and the generation of described out-of-service time can adopt In the following manner:
First kind of way:Out-of-service time is set by sender.
Concrete grammar is:Instant messaging transmitting terminal be addresser editor new information send before, be set with input lost efficacy when Between instruction entrance, such as, sender can be manually entered or be manually selected by this entrance the out-of-service time, such as manually The time of typing or selection is " 2016-8-1 11:30 ", then the out-of-service time of instant message is " 2016-8-1 11:30”.
The second way:Out-of-service time is automatically generated by instant messaging transmitting terminal system.
Concrete grammar is that the described out-of-service time is to add a fixation by the time of the transmission message of instant messaging transmitting terminal Time limit automatically generate, such as, send message time be " 2016-8-1 11:30 ", the fixing time limit is 30 days, then The described out-of-service time is " 2016-8-31 11:30”.The function being set as during instantaneous communication system exploitation of described fixed term Integrated.With regard to the generating mode of out-of-service time, the present invention is not limited.
Step S112:Time key is obtained according to the described out-of-service time.
Specific time key can be using id password algorithm calculated time public key ID at least following two The method of kind:
First method:Can use symmetric cryptography method to raw message data encrypt, symmetric encipherment algorithm former Reason is:Data transmission side will in plain text (initial data) with encryption key together with after AES process so as to become complexity Encrypted cipher text send.After recipient receives ciphertext, if wanting to solve read raw data, need using the used key of encryption And the algorithm for inversion of identical AES is decrypted to ciphertext, it just can be made to revert to readable plaintext.In a symmetric encryption algorithm, The key only one of which using, is sent out receipts both sides and is all encrypted and decrypted using this data key, symmetric encipherment algorithm Advantage is the high speed of encryption and decryption and using difficult cracking during long key.
Second method:Time key can also be obtained with rivest, shamir, adelman, and rivest, shamir, adelman needs two Key:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair, if With public-key cryptography, data is encrypted, only could be deciphered with corresponding private cipher key;If entered with private cipher key pair data Row encryption, then only could be deciphered with corresponding public-key cryptography.The feature of asymmetric cryptosystem is:Encrypting and decrypting speed Slow compared with symmetric cryptography, but AES intensity is complicated, safe.
Step S12, according to described time key, is encrypted generation encryption message to described instant message to be sent;
Step S12 specifically can be realized using method one:With described time key, described instant message to be sent is entered Row encryption generates described encryption message;
Specifically in the present embodiment, can adopt the method for symmetric cryptography that raw message data is encrypted herein, specifically add Close content is as follows:
EncrpytBySym (instant message data ciphertext)=fx_encryptBySym (ori (instant message content), ID (time key)), ori is all the elements of instant message, uses binary data format, and EncrpytBySym is and adds The message data ciphertext of close acquisition, the Cipher Strength that encryption uses is AES256.
Step S12 can also be realized using method two:Generate session key, with described time key and described session key Combination described instant message to be sent is encrypted generation described encryption message;
Specifically in the present embodiment, illustrate, the algorithm generating session key is according to one section of session of generating random number Key, such as SessionPassword=fx_randomSession (" 1234567890 "), SessionPassword=session Key, 1234567890 are a random number, generate one section of session key by generating the algorithm of session key.Then, With described session key, instant message to be sent is encrypted, generates the message data ciphertext in described encryption message, specifically Method is:
EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message content), SessionPassword, ID), EncrpytBySym is with the combination of described time key and described session key to described Instant message to be sent is encrypted the message data ciphertext of generation.
Next, being encrypted to described session key with described time key, generate the session in described encryption message Key ciphertext;Concrete grammar can be:
((session is close for SessionPassword for session key ciphertext id1_encryptdata=fx_encryptByIBC Key), ID (time key)), this AES adopts sm9 AES, and Cipher Strength is RSA3072.
Further, encryption message therein can be specifically before sending will be close by described message data ciphertext and session The wrapper that key ciphertext generates after being packaged;P7 form encapsulation is carried out to message data ciphertext and session key ciphertext, in conjunction with The present embodiment, is specifically encapsulated as XXX immediate news systems form as follows:
P7Data=SEQUENCE
Encryption type=XXXIm
AES=id-ibc-enc-kem-sok-esbdh
Writing abstract=aes256
Type of coding=dem-dem3, hmacSHA
Can decryption time information=
Can decryption time mark=yyyymmddhhnnsszzz
Domain=360jiamiyou_olym
Version=1
Session key ciphertext (id1_encryptdata)
}
Data ciphertext (EncryptBySym)
}
It is possible to carry out step S13 after the completion of above-mentioned work:Send described encryption message to recipient, when sending described Between key described in whether recipient according to described time cipher controlled can check to server and by described server plus Close message.With regard to server, how whether recipient according to described time cipher controlled can check the described side encrypting message Method content will be described in detail below.
Refer to Fig. 2:A kind of instant communication message inspection method that the embodiment of the present application provides, is applied to message sink End, methods described includes:
S21:Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption and disappears The time limit that breath can be checked;
S22:Response check described encryption message check operation, generate and send key request to server, described close The described time key for obtaining described encryption message asked by key;
S23:Receive the feedback information that described server responds described key request, described feedback information is by described server The described time key of the request time according to described key request and transmitting terminal transmission generates, when described request time exceeds institute When stating the corresponding time range of time key, described feedback information is the information characterizing described encryption message invalid, when described request When time is in the corresponding time range of described time key, described feedback information is described time key;
S24:Parse described feedback information, according to analysis result response, check operation;
Operation is checked described in the described response according to analysis result, including:
When analysis result is described encryption message invalid, execution step S241:Check operation described in response, point out user Message is out of date cannot be checked for described encryption;
When analysis result is for described time key, execution step S242:Operation is checked, according to the described time described in response Encrypt message described in secret key decryption, obtain message data and show;
In execution step S242, described encryption message according to described time secret key decryption, can be done using two kinds Method:
Method one:With encrypting message described in described time secret key decryption, obtain message data;
Or method two:The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message; With session key ciphertext described in described time secret key decryption, obtain session key;Decipher described encryption with described session key to disappear Message data ciphertext in breath, obtains message data.
Below, implement step in conjunction with what Fig. 2 was discussed in detail instant communication message inspection method in the embodiment of the present application:
S21:Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption and disappears The time limit that breath can be checked;
Time key can be using id password algorithm calculated time public key ID, at least following two sides Method:
First method:Can use symmetric cryptography method to raw message data encrypt, symmetric encipherment algorithm former Reason is:Data transmission side will in plain text (initial data) with encryption key together with after AES process so as to become complexity Encrypted cipher text send.After recipient receives ciphertext, if wanting to solve read raw data, need using the used key of encryption And the algorithm for inversion of identical AES is decrypted to ciphertext, it just can be made to revert to readable plaintext.In a symmetric encryption algorithm, The key only one of which using, is sent out receipts message both sides and is all encrypted and decrypted using this data key, symmetric cryptography is calculated The advantage of method is the high speed of encryption and decryption and using difficult cracking during long key.
Second method:Time key can also be obtained with rivest, shamir, adelman, and rivest, shamir, adelman needs two Key:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair, if With public-key cryptography, data is encrypted, only could be deciphered with corresponding private cipher key;If entered with private cipher key pair data Row encryption, then only could be deciphered with corresponding public-key cryptography.The feature of asymmetric cryptosystem is:Encrypting and decrypting speed Slow compared with symmetric cryptography, but AES intensity is complicated, safe.
S22:Response check described encryption message check operation, generate and send key request to server, described close The described time key for obtaining described encryption message asked by key;
Described instant message receiving terminal sends key request to server and obtains time key, and described time key is service Whether device passes through to verify the time of described instant message receiving terminal application time key in the corresponding time range of time key Come to provide, server is generally CA server herein;So-called CA, as digital certificate authentication center (CertficateAuthority, CA), is the key link of entirely online electronic transaction safety.It is mainly responsible for producing, distributes And manage all authentication digital certificates needed for entity participating in online transaction.
S23:Receive the feedback information that described server responds described key request, described feedback information is by described server The described time key of the request time according to described key request and transmitting terminal transmission generates, when described request time exceeds institute When stating the corresponding time range of time key, described feedback information is the information characterizing described encryption message invalid, when described request When time is in the corresponding time range of described time key, described feedback information is described time key.
Specifically in the present embodiment, illustrate:
The request time that instant messaging receiving terminal sends key request to server is 2016-8-20 10:10:10, and be The time key corresponding time that Shi Tongxin transmitting terminal sends is 2016-8-10 10:10:10, then when request time exceeds described Between the corresponding time range of key, server as encrypts message invalid, IMU to the feedback information of instant messaging receiving terminal The time key corresponding time that letter transmitting terminal sends is 2016-8-30 10:10:10, then request time is in described time key In corresponding time range, now server is time key to the feedback information of instant messaging receiving terminal.
S24:Parse described feedback information, according to analysis result response, check operation;
Operation is checked described in the described response according to analysis result, including:
When analysis result is described encryption message invalid, execution step S241:Look into described in the response of instant messaging receiving terminal See operation, point out encryption described in user message is out of date to be checked;
When analysis result is for described time key, execution step S242:Behaviour is checked described in the response of instant messaging receiving terminal Make, according to described time secret key decryption, encrypt message, obtain message data and show;
In execution step S242, described encryption message according to described time secret key decryption, can be done using two kinds Method:
Method one:With encrypting message described in described time secret key decryption, obtain message data;
Or method two:The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message; With session key ciphertext described in described time secret key decryption, obtain session key;Decipher described encryption with described session key to disappear Message data ciphertext in breath, obtains message data;
Specifically, instant messaging receiving terminal, can be close with session described in described time key-parsing after obtaining time key Key ciphertext, obtains described session key.In the present embodiment, by parsing session key ciphertext (id1_encryptdata), obtain It is " 1234567890 " to session key SessionPassword, then parsed by session key SessionPassword Message data ciphertext, such as in encryption, EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message Content), SessionPassword (session key)), after deciphering, finally obtain message data ORI.
The P7 form encapsulation of data of generation as described in aforementioned instant communication message sending method for the wrapper herein, tool Body encapsulation of data is as follows:
P7Data=SEQUENCE
Encryption type=XXXsIm
AES=id-ibc-enc-kem-sok-esbdh
Writing abstract=aes256
Type of coding=dem-dem3, hmacSHA
Can decryption time information=
Can decryption time mark=yyyymmddhhnnsszzz
Domain=XXXjiamiyou_olym
Version=1
Session key ciphertext (id1_encryptdata)
}
Data ciphertext (EncryptBySym)
}.
By Packet analyzing is encapsulated to P7 form, when can therefrom obtain session key ciphertext id1_encryptdata and lose efficacy Between yyyymmddhhnnsszzz.
Refer to Fig. 3:A kind of instant communication message checks control method, is applied to server, and method includes:
S31:Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
S32:Will be corresponding with described time key for the request time of the described instant messaging receiving terminal described time key of request Time range be compared;
If described request time exceeds described time range, execute S321:Refuse to provide institute to instant messages receiving terminal State time key so that instant messages receiving terminal cannot be decrypted to encryption message and check;
If described request time is without departing from described time range, execute S322:Provide described to instant messages receiving terminal Time key is so that instant messages receiving terminal is decrypted and checks according to described time key pair encryption message.
The concrete principle of step S32 and operational approach are corresponding with step S23.
The concrete principle of step S321 and step S322 and operational approach are corresponding with S241 and S242 respectively.
As the instantaneous communication system corresponding to above-mentioned encryption method, carry out the encryption of instant message using aforesaid method Send, deciphering receives and checks control, this instantaneous communication system includes aforesaid instant messaging transmitting terminal, instant messaging receiving terminal Server.
A kind of instant communication message sending method being provided based on above-described embodiment, the embodiment of the present application also corresponds to offer one Plant instant messaging transmitting terminal, as shown in figure 4, including:
Acquiring unit 21:For obtaining the time key of instant messages to be sent, described time key is used for limiting pending Send the time limit that instant messages can be checked;
Ciphering unit 22:Generate encryption for according to described time key, being encrypted to described instant messages to be sent Information;
First transmitting element 23:For sending described encryption information to recipient, send described time key to server And whether recipient according to described time cipher controlled can check described encryption message by described server.
Acquiring unit 21, including:
Time obtains subelement, a kind of alternative embodiment, and the time obtains subelement and is used for obtaining instant messages to be sent Out-of-service time, the described out-of-service time is the time of expired inefficacy after described message sends;
Another kind of alternative embodiment, the described time obtains subelement, for obtaining sending out described instant messages to be sent The time is sent to add that fixed term generates the described out-of-service time.
Key obtaining sub-unit, for obtaining time key according to the described out-of-service time.
Ciphering unit 22, including:
First encryption sub-unit operable, described for described instant messages to be sent being encrypted with generation with described time key Encryption information;Or
Second encryption sub-unit operable;
A kind of alternative embodiment, the second encryption sub-unit operable is used for generating session key, with described time key and described meeting The combination of words key is encrypted the described encryption instant messages of generation to described instant message to be sent.
Another kind of alternative embodiment, the second encryption sub-unit operable, it is used for:
With described session key, instant messages to be sent are encrypted, the information data generating in described encryption message is close Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption message is close Literary composition.
A kind of timely communication information inspection method being provided based on above-described embodiment, the embodiment of the present application also corresponds to offer one Plant instant communication message receiving terminal, as shown in figure 5, including:
First receiving unit 31:For receiving the encryption message being encrypted according to time key, described time key is used The time limit that can be checked in restriction described encryption message;
Respond request unit 32:For response check described encryption message check operation, generate and send key request To server, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit 33:Respond the feedback information of described key request, described feedback for receiving described server Information is generated according to the described time key that request time and the transmitting terminal of described key request send by described server, works as institute Stating described feedback information when request time exceeds described time key corresponding time range is to characterize described encryption message invalid Information, when described request time is in the corresponding time range of described time key described feedback information be the described time close Key;
Resolution response unit 34:For parsing described feedback information, according to analysis result response, check operation.
Specifically, resolution response unit 34, is used for:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption Encryption message, obtains message data and shows;
Described resolution response unit 34, including:
First resolution response subelement, for encrypting message described in described time secret key decryption, obtaining message data;Or Person
Second resolution response subelement, the wrapper for parsing described encryption message obtains the meeting in described encryption message Words key ciphertext;With session key ciphertext described in described time secret key decryption, obtain session key;With the deciphering of described session key Message data ciphertext in described encryption message, obtains message data.
Control method is checked based on a kind of instant communication message that above-described embodiment provides, the embodiment of the present application also correspondence carries For a kind of server, as shown in fig. 6, including:
3rd receiving unit 41:The key of message time key is encrypted in acquisition for receiving the transmission of instant messages receiving terminal Request;
Authentication unit 42:For by described instant messages receiving terminal ask described time key request time with described when Between the corresponding time range of key be compared;
Second transmitting element 43:For when described request time exceeds described time range, refusing to connect to instant messages Receiving end provides described time key so that instant messages receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, provide described time key to instant messages receiving terminal, Instant messages receiving terminal is made to be decrypted and check according to described time key pair encryption message.
The encryption method of the present invention is using time key, instant message to be sent to be encrypted, and this time key is used In limiting the time limit that instant message to be sent can be checked, that is, cross this time limit, instant message can not be looked into again See it is ensured that instant message ageing;Meanwhile, the time key for encrypting message is to send to server, by server To manage the granting of key, to be controlled with this encryption message can be checked it is ensured that during instant messaging information height Safety and message ageing, the security performance solving instant messaging in prior art is not high, the privacy of instant messages Difference, easily compromised technical problem.
Provided herein algorithm and display not with any certain computer, mobile digital device, virtual system or other Equipment is inherently related.Various general-purpose systems can also be used together with based on teaching in this.As described above, construct this Structure required by class system is obvious.Additionally, the present invention is also not for any certain programmed language.It should be understood that The content of invention described herein can be realized using various programming languages, and the description above language-specific done is In order to disclose the preferred forms of the present invention.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the disclosure and help understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield more features than the feature being expressly recited in each claim.More precisely, it is such as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, The claims following specific embodiment are thus expressly incorporated in this specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint One of meaning can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) are some or all in browser according to embodiments of the present invention to realize The some or all functions of part.The present invention be also implemented as a part for executing method as described herein or Whole equipment or program of device (for example, computer program and computer program).Such journey realizing the present invention Sequence can store on a computer-readable medium, or can have the form of one or more signal.Such signal can Obtained with downloading on Internet site server, or provide on carrier signal, or provided with any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention discloses, A1, a kind of instant communication message sending method are it is characterised in that methods described includes:
Obtain the time key of instant message to be sent, described time key is used for limiting described instant message to be sent can The time limit checked;
According to described time key, described instant message to be sent is encrypted with generation encryption message;
Send described encryption message to recipient, send described time key to server and by described server according to Described in described time cipher controlled, whether recipient can check described encryption message.
A2, the method as described in A1 it is characterised in that the time key of described acquisition instant message to be sent, including:
Obtain the out-of-service time of instant message to be sent, the described out-of-service time is expired inefficacy after described instant message sends Time;
Time key is obtained according to the described out-of-service time.
A3, the method as described in A1 it is characterised in that time key as described in described basis, to be sent disappear immediately to described Breath is encrypted generation encryption message, and concrete grammar includes:
With described time key, described instant message to be sent is encrypted with the described encryption message of generation;Or
Generate session key, with the combination of described time key and described session key, described instant message to be sent is entered Row encryption generates described encryption message.
A4, the method as described in A3 are it is characterised in that the described combination with described time key and described session key is right Described instant message to be sent is encrypted, including:
With described session key, instant message to be sent is encrypted, the message data generating in described encryption message is close Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption message is close Literary composition.
A5, the method as described in A4 it is characterised in that described encryption message specifically:Before sending will be by described message The wrapper that data ciphertext and session key ciphertext generate after being packaged.
A6, described method as arbitrary in A1~A5 are it is characterised in that described time key is using id password algorithm meter The time public key obtaining.
A7, sought method as described in A2 it is characterised in that the out-of-service time of described acquisition instant message to be sent, including:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
B8, a kind of instant communication message inspection method, are applied to instant messaging receiving terminal it is characterised in that methods described Including:
Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption message can The time limit checked;
Response check described encryption message check operation, generate and send key request to server, described key please Seek the described time key for obtaining described encryption message;
Receive the feedback information that described server responds described key request, described feedback information by described server according to The described time key of the request time of described key request and the transmission of instant messaging transmitting terminal generates, when described request time surpasses When going out the corresponding time range of described time key, described feedback information is the information characterizing described encryption message invalid, when described When request time is in the corresponding time range of described time key, described feedback information is described time key;
Parse described feedback information, according to analysis result response, check operation.
B9, the method as described in B8 are it is characterised in that described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
B10, the method as described in B8 or B9, it is characterised in that checking operation as described in the described response according to analysis result, are wrapped Include:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption Encryption message, obtains message data and shows.
B11, the method as described in B10 it is characterised in that as described in time secret key decryption as described in described basis encrypt message, Including:
With encrypting message described in described time secret key decryption, obtain message data;Or
The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message;Close with the described time Described session key ciphertext deciphered by key, obtains session key;With the message count in described session key deciphering described encryption message According to ciphertext, obtain message data.
C12, a kind of instant communication message check control method, are applied to server it is characterised in that methods described bag Include:
Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
When described instant messaging receiving terminal is asked the request time of described time key corresponding with described time key Between scope be compared;
If described request time exceeds described time range, refuse close to the instant messaging receiving terminal granting described time Key is so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
If described request time, without departing from described time range, provides described time key to instant messaging receiving terminal, Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
D13, a kind of instant messaging transmitting terminal are it is characterised in that include:
Acquiring unit:For obtaining the time key of instant message to be sent, described time key is used for limiting to be sent The time limit that instant message can be checked;
Ciphering unit:Disappear for according to described time key, described instant message to be sent is encrypted with generation encryption Breath;
First transmitting element:For sending described encryption message to recipient, send described time key to server simultaneously By described server, whether recipient according to described time cipher controlled can check described encryption message.
D14, as described in D13 instant messaging transmitting terminal it is characterised in that:Described acquiring unit, including:
Time obtains subelement, and for obtaining the out-of-service time of instant message to be sent, the described out-of-service time for described is When message send after expired inefficacy time;
Key obtaining sub-unit, for obtaining time key according to the described out-of-service time.
D15, the instant messaging transmitting terminal as described in D12 it is characterised in that described ciphering unit, including:
First encryption sub-unit operable, described for described instant message to be sent being encrypted with generation with described time key Encryption message;Or
Second encryption sub-unit operable, for generating session key, the combination with described time key and described session key is right Described instant message to be sent is encrypted the described encryption message of generation.
D16, sought instant messaging transmitting terminal as described in D14 it is characterised in that
Described second encryption sub-unit operable, is used for:
With described session key, instant messages to be sent are encrypted, the message data generating in described encryption information is close Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption information is close Literary composition.
D17, the instant messaging transmitting terminal as described in D16 are it is characterised in that described encryption message includes:Before sending will The wrapper generating after being packaged by described message data ciphertext and session key ciphertext.
D18, described instant messaging transmitting terminal as arbitrary in D13~D17 are it is characterised in that described time key is utilization Id password algorithm calculated time public key.
D19, the instant messaging transmitting terminal as described in D14, it is characterised in that the described time obtains subelement, are used for:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
The described out-of-service time obtaining instant message to be sent, including:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
E20, a kind of instant messaging receiving terminal are it is characterised in that include:
First receiving unit:For receiving the encryption message being encrypted according to time key, described time key is used for Limit the time limit that described encryption message can be checked;
Respond request unit:For response check described encryption message check operation, generate and send key request extremely Server, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit:Respond the feedback information of described key request, described feedback letter for receiving described server Breath is generated according to the described time key that request time and the transmitting terminal of described key request send by described server, when described When request time exceeds described time key corresponding time range, described feedback information is to characterize described encryption message invalid Information, when described request time is in the corresponding time range of described time key, described feedback information is that the described time is close Key;
Resolution response unit:For parsing described feedback information, according to analysis result response, check operation.
E21, the instant messaging receiving terminal as described in E20 are it is characterised in that described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
E22, the instant messaging receiving terminal as described in E20 or E21, it is characterised in that described resolution response unit, are used for:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption Encryption message, obtains message data and shows.
E23, the instant messaging receiving terminal as described in E21 it is characterised in that described resolution response unit, including:
First resolution response subelement, for encrypting message described in described time secret key decryption, obtaining message data;Or Person
Second resolution response subelement, the wrapper for parsing described encryption message obtains the meeting in described encryption message Words key ciphertext;With session key ciphertext described in described time secret key decryption, obtain session key;With the deciphering of described session key Message data ciphertext in described encryption message, obtains message data.
E24, a kind of server are it is characterised in that include:
3rd receiving unit:The key that message time key is encrypted in acquisition for receiving the transmission of instant messaging receiving terminal please Ask;
Authentication unit:For described instant messaging receiving terminal being asked the request time of described time key and described time The corresponding time range of key is compared;
Second transmitting element:For when described request time exceeds described time range, refusing to receive to instant messaging Described time key is provided at end so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, provide described time key to instant messaging receiving terminal, Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.

Claims (10)

1. a kind of instant communication message sending method is it is characterised in that methods described includes:
Obtain the time key of instant message to be sent, described time key is used for limiting described instant message to be sent can be looked into The time limit seen;
According to described time key, described instant message to be sent is encrypted with generation encryption message;
Send described encryption message to recipient, send described time key to server and by described server according to described Whether recipient described in time cipher controlled can check described encryption message.
2. the method for claim 1 is it is characterised in that the time key of described acquisition instant message to be sent, including:
Obtain the out-of-service time of instant message to be sent, the described out-of-service time be after described instant message sends expired inefficacy when Between;
Time key is obtained according to the described out-of-service time.
3. the method for claim 1 it is characterised in that described according to described time key, to described to be sent immediately Message is encrypted generation encryption message, and concrete grammar includes:
With described time key, described instant message to be sent is encrypted with the described encryption message of generation;Or
Generate session key, with the combination of described time key and described session key, described instant message to be sent is carried out adding The described encryption message of close generation.
4. method as claimed in claim 3 is it is characterised in that the described combination with described time key and described session key Described instant message to be sent is encrypted, including:
With described session key, instant message to be sent is encrypted, generates the message data ciphertext in described encryption message;
With described time key, described session key is encrypted, generates the session key ciphertext in described encryption message.
5. a kind of instant communication message inspection method, is applied to instant messaging receiving terminal it is characterised in that methods described includes:
Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption message can be looked into The time limit seen;
What described encryption message was checked in response checks operation, generates and sends key request to server, described key request is used In the described time key obtaining described encryption message;
Receive the feedback information that described server responds described key request, described feedback information is by described server according to described The described time key of the request time of key request and the transmission of instant messaging transmitting terminal generates, when described request time exceeds institute When stating the corresponding time range of time key, described feedback information is the information characterizing described encryption message invalid, when described request When time is in the corresponding time range of described time key, described feedback information is described time key;
Parse described feedback information, according to analysis result response, check operation.
6. method as claimed in claim 5 is it is characterised in that described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
7. a kind of instant communication message checks control method, is applied to server it is characterised in that methods described includes:
Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
Described instant messaging receiving terminal is asked the request time time model corresponding with described time key of described time key Enclose and be compared;
If described request time exceeds described time range, refuse to provide described time key to instant messaging receiving terminal, make Obtain instant messaging receiving terminal encryption message cannot be decrypted and check;
If described request time is without departing from described time range, provide described time key to instant messaging receiving terminal so that Instant messaging receiving terminal is decrypted and checks according to described time key pair encryption message.
8. a kind of instant messaging transmitting terminal is it is characterised in that include:
Acquiring unit:For obtaining the time key of instant message to be sent, described time key be used for limiting to be sent immediately The time limit that message can be checked;
Ciphering unit:Generate encryption message for according to described time key, being encrypted to described instant message to be sent;
First transmitting element:For sending described encryption message to recipient, send described time key and to server and pass through Whether described server recipient according to described time cipher controlled can check described encryption message.
9. a kind of instant messaging receiving terminal is it is characterised in that include:
First receiving unit:For receiving the encryption message being encrypted according to time key, described time key is used for limiting The time limit that described encryption message can be checked;
Respond request unit:For response check described encryption message check operation, generate and send key request to service Device, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit:Respond the feedback information of described key request for receiving described server, described feedback information by Described server generates according to the described time key that request time and the transmitting terminal of described key request send, when described request When time exceeds described time key corresponding time range, described feedback information is the information characterizing described encryption message invalid, When described request time is in the corresponding time range of described time key, described feedback information is described time key;
Resolution response unit:For parsing described feedback information, according to analysis result response, check operation.
10. a kind of server is it is characterised in that include:
3rd receiving unit:The key request of message time key is encrypted in acquisition for receiving the transmission of instant messaging receiving terminal;
Authentication unit:For described instant messaging receiving terminal being asked the request time of described time key and described time key Corresponding time range is compared;
Second transmitting element:For when described request time exceeds described time range, refusing to send out to instant messaging receiving terminal Put described time key so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, to instant messaging receiving terminal provide described time key so that Instant messaging receiving terminal is decrypted and checks according to described time key pair encryption message.
CN201611190691.1A 2016-12-21 2016-12-21 A kind of instant communication message sends, checks, checking control method and its equipment Active CN106453069B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611190691.1A CN106453069B (en) 2016-12-21 2016-12-21 A kind of instant communication message sends, checks, checking control method and its equipment
PCT/CN2017/117842 WO2018113756A1 (en) 2016-12-21 2017-12-21 Sending method, control method, sending end and receiving end in instant messaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611190691.1A CN106453069B (en) 2016-12-21 2016-12-21 A kind of instant communication message sends, checks, checking control method and its equipment

Publications (2)

Publication Number Publication Date
CN106453069A true CN106453069A (en) 2017-02-22
CN106453069B CN106453069B (en) 2019-08-30

Family

ID=58215234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611190691.1A Active CN106453069B (en) 2016-12-21 2016-12-21 A kind of instant communication message sends, checks, checking control method and its equipment

Country Status (1)

Country Link
CN (1) CN106453069B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113708A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Mail sending, reading, and read control method, and apparatus for same
WO2018113756A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Sending method, control method, sending end and receiving end in instant messaging
CN111831186A (en) * 2020-06-28 2020-10-27 维沃移动通信有限公司 Information processing method and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005103930A2 (en) * 2004-04-19 2005-11-03 Emailemissary, Inc. Universal recallable, erasable, secure and timed delivery email
CN101677300A (en) * 2008-09-18 2010-03-24 国际商业机器公司 Method for delivering E-mail messages and E-mail system
CN102118710A (en) * 2011-03-08 2011-07-06 上海红松信息技术有限公司 System and method for transmitting data between mobile terminals
CN103577405A (en) * 2012-07-19 2014-02-12 中国人民大学 Interest analysis based micro-blogger community classification method
CN102195989B (en) * 2011-06-15 2014-03-26 中国电信股份有限公司 Email processing method and system
CN104158727A (en) * 2014-08-29 2014-11-19 蓝信工场(北京)科技有限公司 Method and device for deleting instant information at regular time
CN104954237A (en) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 Instant massaging method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005103930A2 (en) * 2004-04-19 2005-11-03 Emailemissary, Inc. Universal recallable, erasable, secure and timed delivery email
CN101677300A (en) * 2008-09-18 2010-03-24 国际商业机器公司 Method for delivering E-mail messages and E-mail system
CN102118710A (en) * 2011-03-08 2011-07-06 上海红松信息技术有限公司 System and method for transmitting data between mobile terminals
CN102195989B (en) * 2011-06-15 2014-03-26 中国电信股份有限公司 Email processing method and system
CN103577405A (en) * 2012-07-19 2014-02-12 中国人民大学 Interest analysis based micro-blogger community classification method
CN104158727A (en) * 2014-08-29 2014-11-19 蓝信工场(北京)科技有限公司 Method and device for deleting instant information at regular time
CN104954237A (en) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 Instant massaging method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113708A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Mail sending, reading, and read control method, and apparatus for same
WO2018113756A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Sending method, control method, sending end and receiving end in instant messaging
CN111831186A (en) * 2020-06-28 2020-10-27 维沃移动通信有限公司 Information processing method and device and electronic equipment

Also Published As

Publication number Publication date
CN106453069B (en) 2019-08-30

Similar Documents

Publication Publication Date Title
CN109831374B (en) Mail receiving and sending system based on block chain
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
US9473308B2 (en) Method and system for implementing digital signature in mobile operating system
CN106101150B (en) The method and system of Encryption Algorithm
CN104113528A (en) Pre-posed gateway-based method and system for preventing sensitive information leakage
CN109891423A (en) It is controlled using the data encryption of multiple control mechanisms
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN105407467B (en) Method for encrypting short message, device and system
CN103327034A (en) Safe login method, system and device
CN109800588A (en) Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN112564887A (en) Key protection processing method, device, equipment and storage medium
CN108900301A (en) The certification of restful interface security and message mixed encryption method based on .NET MVC
CN106603388A (en) Email sending method, email check method, email view control method and devices
CN106453069A (en) Instant communication message sending, viewing and viewing control method and device thereof
CN116601914A (en) Hybrid key derivation to protect data
CN110048994A (en) A kind of communication means and device
CN113949566A (en) Resource access method, device, electronic equipment and medium
CN111181944B (en) Communication system, information distribution method, device, medium, and apparatus
CN107920060A (en) Data access method and device based on account
CN104811451A (en) Link login method and system
CN102624892B (en) A kind of method preventing plug-in client simulation HTTP request
CN108965278A (en) Transaction request processing method and processing device
CN109120576A (en) Data sharing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant