CN106453069A - Instant communication message sending, viewing and viewing control method and device thereof - Google Patents
Instant communication message sending, viewing and viewing control method and device thereof Download PDFInfo
- Publication number
- CN106453069A CN106453069A CN201611190691.1A CN201611190691A CN106453069A CN 106453069 A CN106453069 A CN 106453069A CN 201611190691 A CN201611190691 A CN 201611190691A CN 106453069 A CN106453069 A CN 106453069A
- Authority
- CN
- China
- Prior art keywords
- key
- time
- message
- instant
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an instant communication message sending, viewing and viewing control method and a device thereof. The method comprises the steps of obtaining a time key of a to-be-sent instant message, wherein the time key is used for limiting a viewable time limit of the to-be-sent instant message; according to the time key, carrying out encryption on the to-be-sent instant message to generate an encrypted message; and sending the encrypted message to a receiver, sending the time key to a server and controlling whether the receiver can view the encrypted message via the server according to the time key. According to the instant communication message sending, viewing and viewing control method and the device thereof disclosed by the invention, the overdue failure guarantee is provided for the instant message, so that the security and the timeliness of instant communication are higher and the encryption range is wider.
Description
Technical field
The present invention relates to communication technical field, more particularly, to a kind of instant communication message sends, checks, checks control method
And its equipment.
Background technology
With the development of communication technology, the function of instant communication software is constantly strengthened, because it is capable of online chatting
With exchange, convenient and swift, be therefore widely used.By instant communication software, can not only realize word, picture,
The transmission of the instant messages such as expression, but also can immediately transmit Voice & Video.Thus, instant communication software is as friendship
Levelling platform, has the characteristics that information storage is big, private high.
In use, due to the instantaneity of instant messaging, send the communication that message is typically directly displayed at other side
On platform, privacy cannot preferably be protected, and safety is very low, and on instant message and platform, the history message of storage will be very
Easily be stolen, but the message on usual platform have privacy and is not intended to be seen by the 3rd people, or stolen get, but
Current use situation is:As long as the history on the instant communication software of individual, on communication software is signed in by login password
Chat record will easily be browsed, replicates, forwards, and the privacy of information just cannot ensure, therefore says, how to carry
The security performance rising instant messaging, the privacy ensureing instant messages are the problems of current instant messaging field urgent need to resolve.
Content of the invention
In view of the above problems, the present invention proposes and a kind of overcome the problems referred to above or solve the above problems at least in part
Instant communication message sends, checks, checking control method and its equipment, concrete technical scheme is:
The embodiment of the present application provides a kind of instant communication message sending method, and methods described includes:
Obtain the time key of instant message to be sent, described time key is used for limiting described instant message to be sent can
The time limit checked;
According to described time key, described instant message to be sent is encrypted with generation encryption message;
Send described encryption message to recipient, send described time key to server and by described server according to
Described in described time cipher controlled, whether recipient can check described encryption message.
Optionally, the described time key obtaining instant message to be sent, including:
Obtain the out-of-service time of instant message to be sent, the described out-of-service time is expired inefficacy after described instant message sends
Time;
Time key is obtained according to the described out-of-service time.
Optionally, described according to described time key, described instant message to be sent is encrypted generation encryption message,
Concrete grammar includes:
With described time key, described instant message to be sent is encrypted with the described encryption message of generation;Or
Generate session key, with the combination of described time key and described session key, described instant message to be sent is entered
Row encryption generates described encryption message.
Optionally, the described combination with described time key and described session key is carried out to described instant message to be sent
Encryption, including:
With described session key, instant message to be sent is encrypted, the message data generating in described encryption message is close
Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption message is close
Literary composition.
Optionally, described encryption message specifically:Before sending will be by described message data ciphertext and session key ciphertext
The wrapper generating after being packaged.
Optionally, described time key is using id password algorithm calculated time public key.
Optionally, the described out-of-service time obtaining instant message to be sent, including:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
The present invention also provides a kind of instant communication message inspection method, is applied to instant messaging receiving terminal, methods described bag
Include:
Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption message can
The time limit checked;
Response check described encryption message check operation, generate and send key request to server, described key please
Seek the described time key for obtaining described encryption message;
Receive the feedback information that described server responds described key request, described feedback information by described server according to
The described time key of the request time of described key request and the transmission of instant messaging transmitting terminal generates, when described request time surpasses
When going out the corresponding time range of described time key, described feedback information is the information characterizing described encryption message invalid, when described
When request time is in the corresponding time range of described time key, described feedback information is described time key;
Parse described feedback information, according to analysis result response, check operation.
Optionally, described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
Optionally, check operation described in the described response according to analysis result, including:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user
Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption
Encryption message, obtains message data and shows.
Optionally, described encryption message according to described time secret key decryption, including:
With encrypting message described in described time secret key decryption, obtain message data;Or
The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message;Close with the described time
Described session key ciphertext deciphered by key, obtains session key;With the message count in described session key deciphering described encryption message
According to ciphertext, obtain message data.
The present invention also provides a kind of instant communication message to check control method, is applied to server, and methods described includes:
Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
When described instant messaging receiving terminal is asked the request time of described time key corresponding with described time key
Between scope be compared;
If described request time exceeds described time range, refuse close to the instant messaging receiving terminal granting described time
Key is so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
If described request time, without departing from described time range, provides described time key to instant messaging receiving terminal,
Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
The present invention also provides a kind of instant messaging transmitting terminal, including:
Acquiring unit:For obtaining the time key of instant message to be sent, described time key is used for limiting to be sent
The time limit that instant message can be checked;
Ciphering unit:Disappear for according to described time key, described instant message to be sent is encrypted with generation encryption
Breath;
First transmitting element:For sending described encryption message to recipient, send described time key to server simultaneously
By described server, whether recipient according to described time cipher controlled can check described encryption message.
Optionally, described acquiring unit, including:
Time obtains subelement, and for obtaining the out-of-service time of message to be sent, the described out-of-service time is sent out for described message
The time of expired inefficacy after sending;
Key obtaining sub-unit, for obtaining time key according to the described out-of-service time.
Optionally, described ciphering unit, including:
First encryption sub-unit operable, for being encrypted the described encryption of generation with described time key to described message to be sent
Message;Or
Second encryption sub-unit operable, for generating session key, the combination with described time key and described session key is right
Described message to be sent is encrypted the described encryption message of generation.
Optionally, described second encryption sub-unit operable, is used for:
With described session key, message to be sent is encrypted, generates the message data ciphertext in described encryption message;
With described time key, described session key is encrypted, the session key generating in described encryption message is close
Literary composition.Optionally, described encryption message specifically:To be sealed by described message data ciphertext and session key ciphertext before sending
The wrapper generating after dress.
Optionally, described time key is using id password algorithm calculated time public key.
Optionally, the described time obtains subelement, is used for:
The transmission time of described message to be sent is added that fixed term generates the described out-of-service time.
The present invention also provides a kind of instant messaging receiving terminal it is characterised in that including:
First receiving unit:For receiving the encryption message being encrypted according to time key, described time key is used for
Limit the time limit that described encryption message can be checked;
Respond request unit:For response check described encryption message check operation, generate and send key request extremely
Server, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit:Respond the feedback information of described key request, described feedback letter for receiving described server
Breath is generated according to the described time key that request time and the transmitting terminal of described key request send by described server, when described
When request time exceeds described time key corresponding time range, described feedback information is to characterize described encryption message invalid
Information, when described request time is in the corresponding time range of described time key, described feedback information is that the described time is close
Key;
Resolution response unit:For parsing described feedback information, according to analysis result response, check operation.
Optionally, described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
Optionally, resolution response unit, is used for:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user
Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption
Encryption message, obtains message data and shows.
Optionally, described resolution response unit, including:
First resolution response subelement, for encrypting message described in described time secret key decryption, obtaining message data;Or
Person
Second resolution response subelement, the wrapper for parsing described encryption message obtains the meeting in described encryption message
Words key ciphertext;With session key ciphertext described in described time secret key decryption, obtain session key;With the deciphering of described session key
Message data ciphertext in described encryption message, obtains message data.
The present invention also provides a kind of server it is characterised in that including:
3rd receiving unit:The key that message time key is encrypted in acquisition for receiving the transmission of instant messaging receiving terminal please
Ask;
Authentication unit:For described instant messaging receiving terminal being asked the request time of described time key and described time
The corresponding time range of key is compared;
Second transmitting element:For when described request time exceeds described time range, refusing to receive to instant messaging
Described time key is provided at end so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, provide described time key to instant messaging receiving terminal,
Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
The technical scheme providing in the embodiment of the present application, at least has the following technical effect that or advantage:
The encryption method of the present invention is using time key, instant message to be sent to be encrypted, and this time key is used
In limiting the time limit that instant message to be sent can be checked, that is, cross this time limit, instant message can not be looked into again
See it is ensured that instant message ageing;Meanwhile, the time key for encrypting message is to send to server, by server
To manage the granting of key, to be controlled with this encryption message can be checked it is ensured that during instant messaging information height
Safety and message ageing, the security performance solving instant messaging in prior art is not high, the privacy of instant messages
Difference, easily compromised technical problem.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows a kind of instant communication message sending method flow chart according to an embodiment of the invention;
Fig. 2 shows a kind of instant communication message inspection method flow chart according to an embodiment of the invention;
Fig. 3 shows that a kind of instant communication message according to an embodiment of the invention checks control method flow chart;
Fig. 4 shows a kind of schematic diagram of instant messaging transmitting terminal according to an embodiment of the invention;
Fig. 5 shows a kind of schematic diagram of instant messaging receiving terminal according to an embodiment of the invention;
Fig. 6 shows a kind of schematic diagram of server according to an embodiment of the invention.
Specific embodiment
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to be able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
The embodiment of the present invention provides a kind of instant messaging send, check, checking control method and its equipment, existing in order to solve
There is the security performance of instant messaging in technology not high, private poor, the easily compromised technical problem of instant messages.
Refer to Fig. 1, the method that a kind of instant messaging that the embodiment of the present application provides sends, the method includes following step
Suddenly:
S11:Obtain the time key of instant message to be sent, described time key is used for limiting described to be sent immediately disappear
The time limit that breath can be checked;
S12:According to described time key, described instant message to be sent is encrypted with generation encryption message;
S13:Send described encryption message to recipient, send described time key and to server and pass through described server
According to described time cipher controlled, whether recipient can check described encryption message.
It should be noted that in specific implementation process, the above-mentioned instant communication message sending method that the application provides can
Apply various instant communication clients, QQ, wechat or microblogging of such as commonly using etc., the method is widely used, easy to operate.
Below, implement step in conjunction with what Fig. 1 was discussed in detail this instant communication message sending method:
Step S11, obtains the time key of instant message to be sent, described time key be used for limiting described to be sent i.e.
When the time limit that can be checked of message.
Specifically include:
S111:Obtain the out-of-service time of instant message to be sent, the described out-of-service time is mistake after described instant message sends
The time that phase lost efficacy;
S112:Time key is obtained according to the described out-of-service time;
Wherein step S111, obtains the out-of-service time of instant message to be sent, and the generation of described out-of-service time can adopt
In the following manner:
First kind of way:Out-of-service time is set by sender.
Concrete grammar is:Instant messaging transmitting terminal be addresser editor new information send before, be set with input lost efficacy when
Between instruction entrance, such as, sender can be manually entered or be manually selected by this entrance the out-of-service time, such as manually
The time of typing or selection is " 2016-8-1 11:30 ", then the out-of-service time of instant message is " 2016-8-1 11:30”.
The second way:Out-of-service time is automatically generated by instant messaging transmitting terminal system.
Concrete grammar is that the described out-of-service time is to add a fixation by the time of the transmission message of instant messaging transmitting terminal
Time limit automatically generate, such as, send message time be " 2016-8-1 11:30 ", the fixing time limit is 30 days, then
The described out-of-service time is " 2016-8-31 11:30”.The function being set as during instantaneous communication system exploitation of described fixed term
Integrated.With regard to the generating mode of out-of-service time, the present invention is not limited.
Step S112:Time key is obtained according to the described out-of-service time.
Specific time key can be using id password algorithm calculated time public key ID at least following two
The method of kind:
First method:Can use symmetric cryptography method to raw message data encrypt, symmetric encipherment algorithm former
Reason is:Data transmission side will in plain text (initial data) with encryption key together with after AES process so as to become complexity
Encrypted cipher text send.After recipient receives ciphertext, if wanting to solve read raw data, need using the used key of encryption
And the algorithm for inversion of identical AES is decrypted to ciphertext, it just can be made to revert to readable plaintext.In a symmetric encryption algorithm,
The key only one of which using, is sent out receipts both sides and is all encrypted and decrypted using this data key, symmetric encipherment algorithm
Advantage is the high speed of encryption and decryption and using difficult cracking during long key.
Second method:Time key can also be obtained with rivest, shamir, adelman, and rivest, shamir, adelman needs two
Key:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair, if
With public-key cryptography, data is encrypted, only could be deciphered with corresponding private cipher key;If entered with private cipher key pair data
Row encryption, then only could be deciphered with corresponding public-key cryptography.The feature of asymmetric cryptosystem is:Encrypting and decrypting speed
Slow compared with symmetric cryptography, but AES intensity is complicated, safe.
Step S12, according to described time key, is encrypted generation encryption message to described instant message to be sent;
Step S12 specifically can be realized using method one:With described time key, described instant message to be sent is entered
Row encryption generates described encryption message;
Specifically in the present embodiment, can adopt the method for symmetric cryptography that raw message data is encrypted herein, specifically add
Close content is as follows:
EncrpytBySym (instant message data ciphertext)=fx_encryptBySym (ori (instant message content), ID
(time key)), ori is all the elements of instant message, uses binary data format, and EncrpytBySym is and adds
The message data ciphertext of close acquisition, the Cipher Strength that encryption uses is AES256.
Step S12 can also be realized using method two:Generate session key, with described time key and described session key
Combination described instant message to be sent is encrypted generation described encryption message;
Specifically in the present embodiment, illustrate, the algorithm generating session key is according to one section of session of generating random number
Key, such as SessionPassword=fx_randomSession (" 1234567890 "), SessionPassword=session
Key, 1234567890 are a random number, generate one section of session key by generating the algorithm of session key.Then,
With described session key, instant message to be sent is encrypted, generates the message data ciphertext in described encryption message, specifically
Method is:
EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message content),
SessionPassword, ID), EncrpytBySym is with the combination of described time key and described session key to described
Instant message to be sent is encrypted the message data ciphertext of generation.
Next, being encrypted to described session key with described time key, generate the session in described encryption message
Key ciphertext;Concrete grammar can be:
((session is close for SessionPassword for session key ciphertext id1_encryptdata=fx_encryptByIBC
Key), ID (time key)), this AES adopts sm9 AES, and Cipher Strength is RSA3072.
Further, encryption message therein can be specifically before sending will be close by described message data ciphertext and session
The wrapper that key ciphertext generates after being packaged;P7 form encapsulation is carried out to message data ciphertext and session key ciphertext, in conjunction with
The present embodiment, is specifically encapsulated as XXX immediate news systems form as follows:
P7Data=SEQUENCE
Encryption type=XXXIm
AES=id-ibc-enc-kem-sok-esbdh
Writing abstract=aes256
Type of coding=dem-dem3, hmacSHA
Can decryption time information=
Can decryption time mark=yyyymmddhhnnsszzz
Domain=360jiamiyou_olym
Version=1
Session key ciphertext (id1_encryptdata)
}
Data ciphertext (EncryptBySym)
}
It is possible to carry out step S13 after the completion of above-mentioned work:Send described encryption message to recipient, when sending described
Between key described in whether recipient according to described time cipher controlled can check to server and by described server plus
Close message.With regard to server, how whether recipient according to described time cipher controlled can check the described side encrypting message
Method content will be described in detail below.
Refer to Fig. 2:A kind of instant communication message inspection method that the embodiment of the present application provides, is applied to message sink
End, methods described includes:
S21:Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption and disappears
The time limit that breath can be checked;
S22:Response check described encryption message check operation, generate and send key request to server, described close
The described time key for obtaining described encryption message asked by key;
S23:Receive the feedback information that described server responds described key request, described feedback information is by described server
The described time key of the request time according to described key request and transmitting terminal transmission generates, when described request time exceeds institute
When stating the corresponding time range of time key, described feedback information is the information characterizing described encryption message invalid, when described request
When time is in the corresponding time range of described time key, described feedback information is described time key;
S24:Parse described feedback information, according to analysis result response, check operation;
Operation is checked described in the described response according to analysis result, including:
When analysis result is described encryption message invalid, execution step S241:Check operation described in response, point out user
Message is out of date cannot be checked for described encryption;
When analysis result is for described time key, execution step S242:Operation is checked, according to the described time described in response
Encrypt message described in secret key decryption, obtain message data and show;
In execution step S242, described encryption message according to described time secret key decryption, can be done using two kinds
Method:
Method one:With encrypting message described in described time secret key decryption, obtain message data;
Or method two:The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message;
With session key ciphertext described in described time secret key decryption, obtain session key;Decipher described encryption with described session key to disappear
Message data ciphertext in breath, obtains message data.
Below, implement step in conjunction with what Fig. 2 was discussed in detail instant communication message inspection method in the embodiment of the present application:
S21:Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption and disappears
The time limit that breath can be checked;
Time key can be using id password algorithm calculated time public key ID, at least following two sides
Method:
First method:Can use symmetric cryptography method to raw message data encrypt, symmetric encipherment algorithm former
Reason is:Data transmission side will in plain text (initial data) with encryption key together with after AES process so as to become complexity
Encrypted cipher text send.After recipient receives ciphertext, if wanting to solve read raw data, need using the used key of encryption
And the algorithm for inversion of identical AES is decrypted to ciphertext, it just can be made to revert to readable plaintext.In a symmetric encryption algorithm,
The key only one of which using, is sent out receipts message both sides and is all encrypted and decrypted using this data key, symmetric cryptography is calculated
The advantage of method is the high speed of encryption and decryption and using difficult cracking during long key.
Second method:Time key can also be obtained with rivest, shamir, adelman, and rivest, shamir, adelman needs two
Key:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair, if
With public-key cryptography, data is encrypted, only could be deciphered with corresponding private cipher key;If entered with private cipher key pair data
Row encryption, then only could be deciphered with corresponding public-key cryptography.The feature of asymmetric cryptosystem is:Encrypting and decrypting speed
Slow compared with symmetric cryptography, but AES intensity is complicated, safe.
S22:Response check described encryption message check operation, generate and send key request to server, described close
The described time key for obtaining described encryption message asked by key;
Described instant message receiving terminal sends key request to server and obtains time key, and described time key is service
Whether device passes through to verify the time of described instant message receiving terminal application time key in the corresponding time range of time key
Come to provide, server is generally CA server herein;So-called CA, as digital certificate authentication center
(CertficateAuthority, CA), is the key link of entirely online electronic transaction safety.It is mainly responsible for producing, distributes
And manage all authentication digital certificates needed for entity participating in online transaction.
S23:Receive the feedback information that described server responds described key request, described feedback information is by described server
The described time key of the request time according to described key request and transmitting terminal transmission generates, when described request time exceeds institute
When stating the corresponding time range of time key, described feedback information is the information characterizing described encryption message invalid, when described request
When time is in the corresponding time range of described time key, described feedback information is described time key.
Specifically in the present embodiment, illustrate:
The request time that instant messaging receiving terminal sends key request to server is 2016-8-20 10:10:10, and be
The time key corresponding time that Shi Tongxin transmitting terminal sends is 2016-8-10 10:10:10, then when request time exceeds described
Between the corresponding time range of key, server as encrypts message invalid, IMU to the feedback information of instant messaging receiving terminal
The time key corresponding time that letter transmitting terminal sends is 2016-8-30 10:10:10, then request time is in described time key
In corresponding time range, now server is time key to the feedback information of instant messaging receiving terminal.
S24:Parse described feedback information, according to analysis result response, check operation;
Operation is checked described in the described response according to analysis result, including:
When analysis result is described encryption message invalid, execution step S241:Look into described in the response of instant messaging receiving terminal
See operation, point out encryption described in user message is out of date to be checked;
When analysis result is for described time key, execution step S242:Behaviour is checked described in the response of instant messaging receiving terminal
Make, according to described time secret key decryption, encrypt message, obtain message data and show;
In execution step S242, described encryption message according to described time secret key decryption, can be done using two kinds
Method:
Method one:With encrypting message described in described time secret key decryption, obtain message data;
Or method two:The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message;
With session key ciphertext described in described time secret key decryption, obtain session key;Decipher described encryption with described session key to disappear
Message data ciphertext in breath, obtains message data;
Specifically, instant messaging receiving terminal, can be close with session described in described time key-parsing after obtaining time key
Key ciphertext, obtains described session key.In the present embodiment, by parsing session key ciphertext (id1_encryptdata), obtain
It is " 1234567890 " to session key SessionPassword, then parsed by session key SessionPassword
Message data ciphertext, such as in encryption, EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message
Content), SessionPassword (session key)), after deciphering, finally obtain message data ORI.
The P7 form encapsulation of data of generation as described in aforementioned instant communication message sending method for the wrapper herein, tool
Body encapsulation of data is as follows:
P7Data=SEQUENCE
Encryption type=XXXsIm
AES=id-ibc-enc-kem-sok-esbdh
Writing abstract=aes256
Type of coding=dem-dem3, hmacSHA
Can decryption time information=
Can decryption time mark=yyyymmddhhnnsszzz
Domain=XXXjiamiyou_olym
Version=1
Session key ciphertext (id1_encryptdata)
}
Data ciphertext (EncryptBySym)
}.
By Packet analyzing is encapsulated to P7 form, when can therefrom obtain session key ciphertext id1_encryptdata and lose efficacy
Between yyyymmddhhnnsszzz.
Refer to Fig. 3:A kind of instant communication message checks control method, is applied to server, and method includes:
S31:Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
S32:Will be corresponding with described time key for the request time of the described instant messaging receiving terminal described time key of request
Time range be compared;
If described request time exceeds described time range, execute S321:Refuse to provide institute to instant messages receiving terminal
State time key so that instant messages receiving terminal cannot be decrypted to encryption message and check;
If described request time is without departing from described time range, execute S322:Provide described to instant messages receiving terminal
Time key is so that instant messages receiving terminal is decrypted and checks according to described time key pair encryption message.
The concrete principle of step S32 and operational approach are corresponding with step S23.
The concrete principle of step S321 and step S322 and operational approach are corresponding with S241 and S242 respectively.
As the instantaneous communication system corresponding to above-mentioned encryption method, carry out the encryption of instant message using aforesaid method
Send, deciphering receives and checks control, this instantaneous communication system includes aforesaid instant messaging transmitting terminal, instant messaging receiving terminal
Server.
A kind of instant communication message sending method being provided based on above-described embodiment, the embodiment of the present application also corresponds to offer one
Plant instant messaging transmitting terminal, as shown in figure 4, including:
Acquiring unit 21:For obtaining the time key of instant messages to be sent, described time key is used for limiting pending
Send the time limit that instant messages can be checked;
Ciphering unit 22:Generate encryption for according to described time key, being encrypted to described instant messages to be sent
Information;
First transmitting element 23:For sending described encryption information to recipient, send described time key to server
And whether recipient according to described time cipher controlled can check described encryption message by described server.
Acquiring unit 21, including:
Time obtains subelement, a kind of alternative embodiment, and the time obtains subelement and is used for obtaining instant messages to be sent
Out-of-service time, the described out-of-service time is the time of expired inefficacy after described message sends;
Another kind of alternative embodiment, the described time obtains subelement, for obtaining sending out described instant messages to be sent
The time is sent to add that fixed term generates the described out-of-service time.
Key obtaining sub-unit, for obtaining time key according to the described out-of-service time.
Ciphering unit 22, including:
First encryption sub-unit operable, described for described instant messages to be sent being encrypted with generation with described time key
Encryption information;Or
Second encryption sub-unit operable;
A kind of alternative embodiment, the second encryption sub-unit operable is used for generating session key, with described time key and described meeting
The combination of words key is encrypted the described encryption instant messages of generation to described instant message to be sent.
Another kind of alternative embodiment, the second encryption sub-unit operable, it is used for:
With described session key, instant messages to be sent are encrypted, the information data generating in described encryption message is close
Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption message is close
Literary composition.
A kind of timely communication information inspection method being provided based on above-described embodiment, the embodiment of the present application also corresponds to offer one
Plant instant communication message receiving terminal, as shown in figure 5, including:
First receiving unit 31:For receiving the encryption message being encrypted according to time key, described time key is used
The time limit that can be checked in restriction described encryption message;
Respond request unit 32:For response check described encryption message check operation, generate and send key request
To server, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit 33:Respond the feedback information of described key request, described feedback for receiving described server
Information is generated according to the described time key that request time and the transmitting terminal of described key request send by described server, works as institute
Stating described feedback information when request time exceeds described time key corresponding time range is to characterize described encryption message invalid
Information, when described request time is in the corresponding time range of described time key described feedback information be the described time close
Key;
Resolution response unit 34:For parsing described feedback information, according to analysis result response, check operation.
Specifically, resolution response unit 34, is used for:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user
Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption
Encryption message, obtains message data and shows;
Described resolution response unit 34, including:
First resolution response subelement, for encrypting message described in described time secret key decryption, obtaining message data;Or
Person
Second resolution response subelement, the wrapper for parsing described encryption message obtains the meeting in described encryption message
Words key ciphertext;With session key ciphertext described in described time secret key decryption, obtain session key;With the deciphering of described session key
Message data ciphertext in described encryption message, obtains message data.
Control method is checked based on a kind of instant communication message that above-described embodiment provides, the embodiment of the present application also correspondence carries
For a kind of server, as shown in fig. 6, including:
3rd receiving unit 41:The key of message time key is encrypted in acquisition for receiving the transmission of instant messages receiving terminal
Request;
Authentication unit 42:For by described instant messages receiving terminal ask described time key request time with described when
Between the corresponding time range of key be compared;
Second transmitting element 43:For when described request time exceeds described time range, refusing to connect to instant messages
Receiving end provides described time key so that instant messages receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, provide described time key to instant messages receiving terminal,
Instant messages receiving terminal is made to be decrypted and check according to described time key pair encryption message.
The encryption method of the present invention is using time key, instant message to be sent to be encrypted, and this time key is used
In limiting the time limit that instant message to be sent can be checked, that is, cross this time limit, instant message can not be looked into again
See it is ensured that instant message ageing;Meanwhile, the time key for encrypting message is to send to server, by server
To manage the granting of key, to be controlled with this encryption message can be checked it is ensured that during instant messaging information height
Safety and message ageing, the security performance solving instant messaging in prior art is not high, the privacy of instant messages
Difference, easily compromised technical problem.
Provided herein algorithm and display not with any certain computer, mobile digital device, virtual system or other
Equipment is inherently related.Various general-purpose systems can also be used together with based on teaching in this.As described above, construct this
Structure required by class system is obvious.Additionally, the present invention is also not for any certain programmed language.It should be understood that
The content of invention described herein can be realized using various programming languages, and the description above language-specific done is
In order to disclose the preferred forms of the present invention.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the disclosure and help understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield more features than the feature being expressly recited in each claim.More precisely, it is such as following
Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
The claims following specific embodiment are thus expressly incorporated in this specific embodiment, wherein each claim itself
All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively
Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list
Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or
Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any
Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed
Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's
Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint
One of meaning can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) are some or all in browser according to embodiments of the present invention to realize
The some or all functions of part.The present invention be also implemented as a part for executing method as described herein or
Whole equipment or program of device (for example, computer program and computer program).Such journey realizing the present invention
Sequence can store on a computer-readable medium, or can have the form of one or more signal.Such signal can
Obtained with downloading on Internet site server, or provide on carrier signal, or provided with any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer
Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
The invention discloses, A1, a kind of instant communication message sending method are it is characterised in that methods described includes:
Obtain the time key of instant message to be sent, described time key is used for limiting described instant message to be sent can
The time limit checked;
According to described time key, described instant message to be sent is encrypted with generation encryption message;
Send described encryption message to recipient, send described time key to server and by described server according to
Described in described time cipher controlled, whether recipient can check described encryption message.
A2, the method as described in A1 it is characterised in that the time key of described acquisition instant message to be sent, including:
Obtain the out-of-service time of instant message to be sent, the described out-of-service time is expired inefficacy after described instant message sends
Time;
Time key is obtained according to the described out-of-service time.
A3, the method as described in A1 it is characterised in that time key as described in described basis, to be sent disappear immediately to described
Breath is encrypted generation encryption message, and concrete grammar includes:
With described time key, described instant message to be sent is encrypted with the described encryption message of generation;Or
Generate session key, with the combination of described time key and described session key, described instant message to be sent is entered
Row encryption generates described encryption message.
A4, the method as described in A3 are it is characterised in that the described combination with described time key and described session key is right
Described instant message to be sent is encrypted, including:
With described session key, instant message to be sent is encrypted, the message data generating in described encryption message is close
Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption message is close
Literary composition.
A5, the method as described in A4 it is characterised in that described encryption message specifically:Before sending will be by described message
The wrapper that data ciphertext and session key ciphertext generate after being packaged.
A6, described method as arbitrary in A1~A5 are it is characterised in that described time key is using id password algorithm meter
The time public key obtaining.
A7, sought method as described in A2 it is characterised in that the out-of-service time of described acquisition instant message to be sent, including:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
B8, a kind of instant communication message inspection method, are applied to instant messaging receiving terminal it is characterised in that methods described
Including:
Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption message can
The time limit checked;
Response check described encryption message check operation, generate and send key request to server, described key please
Seek the described time key for obtaining described encryption message;
Receive the feedback information that described server responds described key request, described feedback information by described server according to
The described time key of the request time of described key request and the transmission of instant messaging transmitting terminal generates, when described request time surpasses
When going out the corresponding time range of described time key, described feedback information is the information characterizing described encryption message invalid, when described
When request time is in the corresponding time range of described time key, described feedback information is described time key;
Parse described feedback information, according to analysis result response, check operation.
B9, the method as described in B8 are it is characterised in that described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
B10, the method as described in B8 or B9, it is characterised in that checking operation as described in the described response according to analysis result, are wrapped
Include:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user
Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption
Encryption message, obtains message data and shows.
B11, the method as described in B10 it is characterised in that as described in time secret key decryption as described in described basis encrypt message,
Including:
With encrypting message described in described time secret key decryption, obtain message data;Or
The wrapper of parsing described encryption message obtains the session key ciphertext in described encryption message;Close with the described time
Described session key ciphertext deciphered by key, obtains session key;With the message count in described session key deciphering described encryption message
According to ciphertext, obtain message data.
C12, a kind of instant communication message check control method, are applied to server it is characterised in that methods described bag
Include:
Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
When described instant messaging receiving terminal is asked the request time of described time key corresponding with described time key
Between scope be compared;
If described request time exceeds described time range, refuse close to the instant messaging receiving terminal granting described time
Key is so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
If described request time, without departing from described time range, provides described time key to instant messaging receiving terminal,
Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
D13, a kind of instant messaging transmitting terminal are it is characterised in that include:
Acquiring unit:For obtaining the time key of instant message to be sent, described time key is used for limiting to be sent
The time limit that instant message can be checked;
Ciphering unit:Disappear for according to described time key, described instant message to be sent is encrypted with generation encryption
Breath;
First transmitting element:For sending described encryption message to recipient, send described time key to server simultaneously
By described server, whether recipient according to described time cipher controlled can check described encryption message.
D14, as described in D13 instant messaging transmitting terminal it is characterised in that:Described acquiring unit, including:
Time obtains subelement, and for obtaining the out-of-service time of instant message to be sent, the described out-of-service time for described is
When message send after expired inefficacy time;
Key obtaining sub-unit, for obtaining time key according to the described out-of-service time.
D15, the instant messaging transmitting terminal as described in D12 it is characterised in that described ciphering unit, including:
First encryption sub-unit operable, described for described instant message to be sent being encrypted with generation with described time key
Encryption message;Or
Second encryption sub-unit operable, for generating session key, the combination with described time key and described session key is right
Described instant message to be sent is encrypted the described encryption message of generation.
D16, sought instant messaging transmitting terminal as described in D14 it is characterised in that
Described second encryption sub-unit operable, is used for:
With described session key, instant messages to be sent are encrypted, the message data generating in described encryption information is close
Literary composition;
With described time key, described session key is encrypted, the session key generating in described encryption information is close
Literary composition.
D17, the instant messaging transmitting terminal as described in D16 are it is characterised in that described encryption message includes:Before sending will
The wrapper generating after being packaged by described message data ciphertext and session key ciphertext.
D18, described instant messaging transmitting terminal as arbitrary in D13~D17 are it is characterised in that described time key is utilization
Id password algorithm calculated time public key.
D19, the instant messaging transmitting terminal as described in D14, it is characterised in that the described time obtains subelement, are used for:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
The described out-of-service time obtaining instant message to be sent, including:
The transmission time of described instant message to be sent is added that fixed term generates the described out-of-service time.
E20, a kind of instant messaging receiving terminal are it is characterised in that include:
First receiving unit:For receiving the encryption message being encrypted according to time key, described time key is used for
Limit the time limit that described encryption message can be checked;
Respond request unit:For response check described encryption message check operation, generate and send key request extremely
Server, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit:Respond the feedback information of described key request, described feedback letter for receiving described server
Breath is generated according to the described time key that request time and the transmitting terminal of described key request send by described server, when described
When request time exceeds described time key corresponding time range, described feedback information is to characterize described encryption message invalid
Information, when described request time is in the corresponding time range of described time key, described feedback information is that the described time is close
Key;
Resolution response unit:For parsing described feedback information, according to analysis result response, check operation.
E21, the instant messaging receiving terminal as described in E20 are it is characterised in that described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
E22, the instant messaging receiving terminal as described in E20 or E21, it is characterised in that described resolution response unit, are used for:
When analysis result is described encryption message invalid, checks operation described in response, point out to encrypt message described in user
Out of date cannot be checked;
When analysis result is for described time key, check operation described in response, according to described time secret key decryption
Encryption message, obtains message data and shows.
E23, the instant messaging receiving terminal as described in E21 it is characterised in that described resolution response unit, including:
First resolution response subelement, for encrypting message described in described time secret key decryption, obtaining message data;Or
Person
Second resolution response subelement, the wrapper for parsing described encryption message obtains the meeting in described encryption message
Words key ciphertext;With session key ciphertext described in described time secret key decryption, obtain session key;With the deciphering of described session key
Message data ciphertext in described encryption message, obtains message data.
E24, a kind of server are it is characterised in that include:
3rd receiving unit:The key that message time key is encrypted in acquisition for receiving the transmission of instant messaging receiving terminal please
Ask;
Authentication unit:For described instant messaging receiving terminal being asked the request time of described time key and described time
The corresponding time range of key is compared;
Second transmitting element:For when described request time exceeds described time range, refusing to receive to instant messaging
Described time key is provided at end so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, provide described time key to instant messaging receiving terminal,
Instant messaging receiving terminal is made to be decrypted and check according to described time key pair encryption message.
Claims (10)
1. a kind of instant communication message sending method is it is characterised in that methods described includes:
Obtain the time key of instant message to be sent, described time key is used for limiting described instant message to be sent can be looked into
The time limit seen;
According to described time key, described instant message to be sent is encrypted with generation encryption message;
Send described encryption message to recipient, send described time key to server and by described server according to described
Whether recipient described in time cipher controlled can check described encryption message.
2. the method for claim 1 is it is characterised in that the time key of described acquisition instant message to be sent, including:
Obtain the out-of-service time of instant message to be sent, the described out-of-service time be after described instant message sends expired inefficacy when
Between;
Time key is obtained according to the described out-of-service time.
3. the method for claim 1 it is characterised in that described according to described time key, to described to be sent immediately
Message is encrypted generation encryption message, and concrete grammar includes:
With described time key, described instant message to be sent is encrypted with the described encryption message of generation;Or
Generate session key, with the combination of described time key and described session key, described instant message to be sent is carried out adding
The described encryption message of close generation.
4. method as claimed in claim 3 is it is characterised in that the described combination with described time key and described session key
Described instant message to be sent is encrypted, including:
With described session key, instant message to be sent is encrypted, generates the message data ciphertext in described encryption message;
With described time key, described session key is encrypted, generates the session key ciphertext in described encryption message.
5. a kind of instant communication message inspection method, is applied to instant messaging receiving terminal it is characterised in that methods described includes:
Receive the encryption message that is encrypted according to time key, described time key is used for limiting described encryption message can be looked into
The time limit seen;
What described encryption message was checked in response checks operation, generates and sends key request to server, described key request is used
In the described time key obtaining described encryption message;
Receive the feedback information that described server responds described key request, described feedback information is by described server according to described
The described time key of the request time of key request and the transmission of instant messaging transmitting terminal generates, when described request time exceeds institute
When stating the corresponding time range of time key, described feedback information is the information characterizing described encryption message invalid, when described request
When time is in the corresponding time range of described time key, described feedback information is described time key;
Parse described feedback information, according to analysis result response, check operation.
6. method as claimed in claim 5 is it is characterised in that described encryption message is:
The message being generated with the encryption of described time key;Or
It is encrypted the message of generation with the combination of described time key and described session key.
7. a kind of instant communication message checks control method, is applied to server it is characterised in that methods described includes:
Receive the key request of the acquisition encryption message time key that instant messaging receiving terminal sends;
Described instant messaging receiving terminal is asked the request time time model corresponding with described time key of described time key
Enclose and be compared;
If described request time exceeds described time range, refuse to provide described time key to instant messaging receiving terminal, make
Obtain instant messaging receiving terminal encryption message cannot be decrypted and check;
If described request time is without departing from described time range, provide described time key to instant messaging receiving terminal so that
Instant messaging receiving terminal is decrypted and checks according to described time key pair encryption message.
8. a kind of instant messaging transmitting terminal is it is characterised in that include:
Acquiring unit:For obtaining the time key of instant message to be sent, described time key be used for limiting to be sent immediately
The time limit that message can be checked;
Ciphering unit:Generate encryption message for according to described time key, being encrypted to described instant message to be sent;
First transmitting element:For sending described encryption message to recipient, send described time key and to server and pass through
Whether described server recipient according to described time cipher controlled can check described encryption message.
9. a kind of instant messaging receiving terminal is it is characterised in that include:
First receiving unit:For receiving the encryption message being encrypted according to time key, described time key is used for limiting
The time limit that described encryption message can be checked;
Respond request unit:For response check described encryption message check operation, generate and send key request to service
Device, described key request is used for obtaining the described time key of described encryption message;
Second receiving unit:Respond the feedback information of described key request for receiving described server, described feedback information by
Described server generates according to the described time key that request time and the transmitting terminal of described key request send, when described request
When time exceeds described time key corresponding time range, described feedback information is the information characterizing described encryption message invalid,
When described request time is in the corresponding time range of described time key, described feedback information is described time key;
Resolution response unit:For parsing described feedback information, according to analysis result response, check operation.
10. a kind of server is it is characterised in that include:
3rd receiving unit:The key request of message time key is encrypted in acquisition for receiving the transmission of instant messaging receiving terminal;
Authentication unit:For described instant messaging receiving terminal being asked the request time of described time key and described time key
Corresponding time range is compared;
Second transmitting element:For when described request time exceeds described time range, refusing to send out to instant messaging receiving terminal
Put described time key so that instant messaging receiving terminal cannot be decrypted to encryption message and check;
When described request time is without departing from described time range, to instant messaging receiving terminal provide described time key so that
Instant messaging receiving terminal is decrypted and checks according to described time key pair encryption message.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190691.1A CN106453069B (en) | 2016-12-21 | 2016-12-21 | A kind of instant communication message sends, checks, checking control method and its equipment |
PCT/CN2017/117842 WO2018113756A1 (en) | 2016-12-21 | 2017-12-21 | Sending method, control method, sending end and receiving end in instant messaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190691.1A CN106453069B (en) | 2016-12-21 | 2016-12-21 | A kind of instant communication message sends, checks, checking control method and its equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106453069A true CN106453069A (en) | 2017-02-22 |
CN106453069B CN106453069B (en) | 2019-08-30 |
Family
ID=58215234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611190691.1A Active CN106453069B (en) | 2016-12-21 | 2016-12-21 | A kind of instant communication message sends, checks, checking control method and its equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453069B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113708A1 (en) * | 2016-12-21 | 2018-06-28 | 北京奇虎科技有限公司 | Mail sending, reading, and read control method, and apparatus for same |
WO2018113756A1 (en) * | 2016-12-21 | 2018-06-28 | 北京奇虎科技有限公司 | Sending method, control method, sending end and receiving end in instant messaging |
CN111831186A (en) * | 2020-06-28 | 2020-10-27 | 维沃移动通信有限公司 | Information processing method and device and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005103930A2 (en) * | 2004-04-19 | 2005-11-03 | Emailemissary, Inc. | Universal recallable, erasable, secure and timed delivery email |
CN101677300A (en) * | 2008-09-18 | 2010-03-24 | 国际商业机器公司 | Method for delivering E-mail messages and E-mail system |
CN102118710A (en) * | 2011-03-08 | 2011-07-06 | 上海红松信息技术有限公司 | System and method for transmitting data between mobile terminals |
CN103577405A (en) * | 2012-07-19 | 2014-02-12 | 中国人民大学 | Interest analysis based micro-blogger community classification method |
CN102195989B (en) * | 2011-06-15 | 2014-03-26 | 中国电信股份有限公司 | Email processing method and system |
CN104158727A (en) * | 2014-08-29 | 2014-11-19 | 蓝信工场(北京)科技有限公司 | Method and device for deleting instant information at regular time |
CN104954237A (en) * | 2015-07-15 | 2015-09-30 | 山西佰纳得科技有限公司 | Instant massaging method |
-
2016
- 2016-12-21 CN CN201611190691.1A patent/CN106453069B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005103930A2 (en) * | 2004-04-19 | 2005-11-03 | Emailemissary, Inc. | Universal recallable, erasable, secure and timed delivery email |
CN101677300A (en) * | 2008-09-18 | 2010-03-24 | 国际商业机器公司 | Method for delivering E-mail messages and E-mail system |
CN102118710A (en) * | 2011-03-08 | 2011-07-06 | 上海红松信息技术有限公司 | System and method for transmitting data between mobile terminals |
CN102195989B (en) * | 2011-06-15 | 2014-03-26 | 中国电信股份有限公司 | Email processing method and system |
CN103577405A (en) * | 2012-07-19 | 2014-02-12 | 中国人民大学 | Interest analysis based micro-blogger community classification method |
CN104158727A (en) * | 2014-08-29 | 2014-11-19 | 蓝信工场(北京)科技有限公司 | Method and device for deleting instant information at regular time |
CN104954237A (en) * | 2015-07-15 | 2015-09-30 | 山西佰纳得科技有限公司 | Instant massaging method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113708A1 (en) * | 2016-12-21 | 2018-06-28 | 北京奇虎科技有限公司 | Mail sending, reading, and read control method, and apparatus for same |
WO2018113756A1 (en) * | 2016-12-21 | 2018-06-28 | 北京奇虎科技有限公司 | Sending method, control method, sending end and receiving end in instant messaging |
CN111831186A (en) * | 2020-06-28 | 2020-10-27 | 维沃移动通信有限公司 | Information processing method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106453069B (en) | 2019-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105207774B (en) | The cryptographic key negotiation method and device of verification information | |
JP6573600B2 (en) | A method performed by at least one server for processing data packets from a first computing device to a second computing device to allow end-to-end encrypted communication | |
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
US9473308B2 (en) | Method and system for implementing digital signature in mobile operating system | |
CN106101150B (en) | The method and system of Encryption Algorithm | |
CN109891423A (en) | It is controlled using the data encryption of multiple control mechanisms | |
CN104113528A (en) | Pre-posed gateway-based method and system for preventing sensitive information leakage | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN105407467B (en) | Method for encrypting short message, device and system | |
CN103327034A (en) | Safe login method, system and device | |
CN112564887A (en) | Key protection processing method, device, equipment and storage medium | |
CN109800588A (en) | Bar code dynamic encrypting method and device, bar code dynamic decryption method and device | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
CN108900301A (en) | The certification of restful interface security and message mixed encryption method based on .NET MVC | |
CN103108245B (en) | A kind of intelligent television pays cipher key system and method for payment based on intelligent television | |
CN106603388A (en) | Email sending method, email check method, email view control method and devices | |
CN106453069A (en) | Instant communication message sending, viewing and viewing control method and device thereof | |
CN116601914A (en) | Hybrid key derivation to protect data | |
CN110048994A (en) | A kind of communication means and device | |
CN113949566A (en) | Resource access method, device, electronic equipment and medium | |
CN107920060A (en) | Data access method and device based on account | |
CN114785524A (en) | Electronic seal generation method, device, equipment and medium | |
CN111181944A (en) | Communication system, information distribution method, device, medium, and apparatus | |
CN102624892B (en) | A kind of method preventing plug-in client simulation HTTP request |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |