CN106453069B - A kind of instant communication message sends, checks, checking control method and its equipment - Google Patents
A kind of instant communication message sends, checks, checking control method and its equipment Download PDFInfo
- Publication number
- CN106453069B CN106453069B CN201611190691.1A CN201611190691A CN106453069B CN 106453069 B CN106453069 B CN 106453069B CN 201611190691 A CN201611190691 A CN 201611190691A CN 106453069 B CN106453069 B CN 106453069B
- Authority
- CN
- China
- Prior art keywords
- time
- message
- key
- encryption
- instant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of instant communication messages to send, check, checks control method and its equipment.This method comprises: obtaining the time key of instant message to be sent, the time key is for limiting the time limit that the instant message to be sent can be checked;According to the time key, encryption is carried out to the instant message to be sent and generates encryption message;The encryption message is sent to recipient, whether send the time key to server and by server recipient according to the time cipher controlled can check the encryption message.The present invention provides the guarantee of expired failure for instant message, keeps the safety of instant messaging, timeliness higher, and encryption range is wider.
Description
Technical field
The present invention relates to fields of communication technology more particularly to a kind of instant communication message to send, check, checks control method
And its equipment.
Background technique
With the development of communication technology, the function of instant communication software is constantly reinforced, since it can be realized online chatting
With exchange, it is convenient and efficient, therefore be widely used.By instant communication software, can not only realize text, picture,
The transmission of the instant messages such as expression, but also can immediately transmit audio and video.Thus, instant communication software is as friendship
Levelling platform has the characteristics that information storage is big, privacy is high.
In use, due to the instantaneity of instant messaging, sending message is usually to be directly displayed at the communication of other side
On platform, privacy cannot be protected preferably, and safety is very low, and the history message stored on instant message and platform will be very
It is easy to be stolen, but there is the message usually on platform privacy to be not intended to be seen by the third party, or is stolen and gets, however
Current use situation is: as long as being logged on on personal instant communication software by login password, the history on communication software
Chat record will cannot just be ensured by easily browsing, duplication, forwarding etc., the privacy of information therefore how to mention
It rises the security performance of instant messaging, guarantee the problem of privacy of instant messages is current instant messaging field urgent need to resolve.
Summary of the invention
In view of the above problems, overcome the above problem the invention proposes a kind of or at least be partially solved the above problem
Instant communication message sends, checks, checking that control method and its equipment, specific technical solution are:
The embodiment of the present application provides a kind of instant communication message sending method, which comprises
The time key of instant message to be sent is obtained, the time key can for limiting the instant message to be sent
The time limit checked;
According to the time key, encryption is carried out to the instant message to be sent and generates encryption message;
The encryption message is sent to recipient, send the time key to server and by the server according to
Whether recipient described in the time cipher controlled can check the encryption message.
Optionally, the time key for obtaining instant message to be sent, comprising:
The out-of-service time of instant message to be sent is obtained, the out-of-service time is expired failure after the instant message is sent
Time;
Time key is obtained according to the out-of-service time.
It is optionally, described that encryption is carried out to the instant message to be sent and generates encryption message according to the time key,
Specific method includes:
The instant message to be sent described in the time key pair carries out encryption and generates the encryption message;Or
Generate session key, with the combination of the time key and the session key to the instant message to be sent into
Row encryption generates the encryption message.
Optionally, described that the instant message to be sent is carried out with the combination of the time key and the session key
Encryption, comprising:
Instant message to be sent is encrypted with the session key, the message data generated in the encryption message is close
Text;
The session key described in the time key pair is encrypted, and the session key generated in the encryption message is close
Text.
Optionally, the encryption message is specifically: before sending will be by the message data ciphertext and session key ciphertext
The encapsulation package generated after being packaged.
Optionally, the time key is the time public key being calculated using id password algorithm.
Optionally, the out-of-service time for obtaining instant message to be sent, comprising:
The sending time of the instant message to be sent is generated into the out-of-service time plus fixed term.
The present invention also provides a kind of instant communication message inspection methods, are applied to instant messaging receiving end, the method packet
It includes:
The encryption message encrypted according to time key is received, the time key can for limiting the encryption message
The time limit checked;
Response checks that the encryption message checks operation, generates and sends key request to server, the key is asked
Seek the time key for obtaining the encryption message;
Receive the feedback information that the server responds the key request, the feedback information by the server according to
The time key that the request time and instant messaging transmitting terminal of the key request are sent generates, when the request time is super
Out when the time key corresponding time range the feedback information be the characterization encryption message invalid information, when described
The feedback information is the time key when request time is in the corresponding time range of the time key;
Parse the feedback information, according to parsing result respond described in check operation.
Optionally, the encryption message are as follows:
The message generated with time key encryption;Or
The message of encryption generation is carried out with the combination of the time key and the session key.
Optionally, it is described according to parsing result respond described in check operation, comprising:
When parsing result is the encryption message invalid, operation is checked described in response, prompts to encrypt message described in user
It is out of date to be checked;
When parsing result is the time key, operation is checked described in response, according to time key decryption
Message is encrypted, message data is obtained and is shown.
It is optionally, described that the encryption message is decrypted according to the time key, comprising:
The encryption message is decrypted with the time key, obtains message data;Or
The encapsulation package for parsing the encryption message obtains the session key ciphertext in the encryption message;It is close with the time
Key decrypts the session key ciphertext, obtains session key;The message count in the encryption message is decrypted with the session key
According to ciphertext, message data is obtained.
The present invention also provides a kind of instant communication messages to check control method, is applied to server, which comprises
Receive the key request for the acquisition encryption message time key that instant messaging receiving end is sent;
When requesting the request time of the time key corresponding with the time key instant messaging receiving end
Between range be compared;
If the request time exceeds the time range, refuse close to the instant messaging receiving end granting time
Key, so that instant messaging receiving end can not be decrypted and check to encryption message;
If the request time provides the time key without departing from the time range, to instant messaging receiving end,
So that instant messaging receiving end is decrypted and checks according to the time key pair encryption message.
The present invention also provides a kind of instant messaging transmitting terminals, comprising:
Acquiring unit: for obtaining the time key of instant message to be sent, the time key is to be sent for limiting
The time limit that instant message can be checked;
Encryption unit: for carrying out encryption generation encryption to the instant message to be sent and disappearing according to the time key
Breath;
First transmission unit: for sending the encryption message to recipient, the time key is sent to server simultaneously
By the server, whether the recipient according to the time cipher controlled can check the encryption message.
Optionally, the acquiring unit, comprising:
Time obtains subelement, and for obtaining the out-of-service time of message to be sent, the out-of-service time is message hair
Send the time of rear expired failure;
Key obtaining sub-unit, for obtaining time key according to the out-of-service time.
Optionally, the encryption unit, comprising:
First encryption sub-unit operable carries out encryption for the message to be sent described in the time key pair and generates the encryption
Message;Or
Second encryption sub-unit operable, for generating session key, with the combination pair of the time key and the session key
The message to be sent carries out encryption and generates the encryption message.
Optionally, second encryption sub-unit operable, is used for:
Message to be sent is encrypted with the session key, generates the message data ciphertext in the encryption message;
The session key described in the time key pair is encrypted, and the session key generated in the encryption message is close
Text.Optionally, the encryption message is specifically: will be sealed before sending by the message data ciphertext and session key ciphertext
The encapsulation package generated after dress.
Optionally, the time key is the time public key being calculated using id password algorithm.
Optionally, the time obtains subelement, is used for:
The sending time of the message to be sent is generated into the out-of-service time plus fixed term.
The present invention also provides a kind of instant messaging receiving ends characterized by comprising
First receiving unit: for receiving the encryption message encrypted according to time key, the time key is used for
Limit the time limit that the encryption message can be checked;
Respond request unit: it checks that the encryption message checks operation for responding, generates and sends key request extremely
Server, the key request are used to obtain the time key of the encryption message;
Second receiving unit: the feedback information of the key request, the feedback letter are responded for receiving the server
Breath is generated by the server according to the time key that the request time and transmitting terminal of the key request are sent, when described
The feedback information be to characterize the encryption message invalid when request time is beyond the time key corresponding time range
Information, when the request time is in the corresponding time range of the time key, the feedback information is that the time is close
Key;
Resolution response unit: for parsing the feedback information, according to parsing result respond described in check operation.
Optionally, the encryption message are as follows:
The message generated with time key encryption;Or
The message of encryption generation is carried out with the combination of the time key and the session key.
Optionally, resolution response unit is used for:
When parsing result is the encryption message invalid, operation is checked described in response, prompts to encrypt message described in user
It is out of date to be checked;
When parsing result is the time key, operation is checked described in response, according to time key decryption
Message is encrypted, message data is obtained and is shown.
Optionally, the resolution response unit, comprising:
First resolution response subelement obtains message data for decrypting the encryption message with the time key;Or
Person
Second resolution response subelement, the encapsulation package for parsing the encryption message obtain the meeting in the encryption message
Talk about key ciphertext;The session key ciphertext is decrypted with the time key, obtains session key;It is decrypted with the session key
Message data ciphertext in the encryption message, obtains message data.
The present invention also provides a kind of servers characterized by comprising
Third receiving unit: the key for receiving the acquisition encryption message time key of instant messaging receiving end transmission is asked
It asks;
Authentication unit: for the instant messaging receiving end to be requested to the request time of the time key and the time
The corresponding time range of key is compared;
Second transmission unit: for refusing to receive to instant messaging when the request time exceeds the time range
The time key is provided at end, so that instant messaging receiving end can not be decrypted and check to encryption message;
When the request time is without departing from the time range, the time key is provided to instant messaging receiving end,
So that instant messaging receiving end is decrypted and checks according to the time key pair encryption message.
The technical solution provided in the embodiment of the present application, has at least the following technical effects or advantages:
Encryption method of the invention is to be encrypted using time key pair instant message to be sent, which uses
In the time limit that limitation instant message to be sent can be checked, that is, the time limit is crossed, instant message cannot be looked into again
It sees, ensure that the timeliness of instant message;Meanwhile the time key for encrypting message is to be sent to server, by server
The granting of key is managed, can be checked with this to control encryption message, it is ensured that the height of information during instant messaging
The timeliness of safety and message, the security performance for solving instant messaging in the prior art is not high, the privacy of instant messages
Difference, easy the technical issues of being leaked.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows a kind of instant communication message sending method flow chart according to an embodiment of the invention;
Fig. 2 shows a kind of instant communication message inspection method flow charts according to an embodiment of the invention;
Fig. 3 shows a kind of instant communication message according to an embodiment of the invention and checks control method flow chart;
Fig. 4 shows a kind of schematic diagram of instant messaging transmitting terminal according to an embodiment of the invention;
Fig. 5 shows a kind of schematic diagram of instant messaging receiving end according to an embodiment of the invention;
Fig. 6 shows a kind of schematic diagram of server according to an embodiment of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
The embodiment of the present invention provides a kind of instant messaging and sends, checks, checking control method and its equipment, existing to solve
There is the security performance of instant messaging in technology not high, private poor, easy the technical issues of being leaked of instant messages.
Referring to FIG. 1, the method that a kind of instant messaging provided by the embodiments of the present application is sent, this method includes following step
It is rapid:
S11: obtaining the time key of instant message to be sent, and the time key is for limiting described to be sent disappear immediately
Cease the time limit that can be checked;
S12: according to the time key, encryption is carried out to the instant message to be sent and generates encryption message;
S13: the encryption message is sent to recipient, sends the time key to server and by the server
The encryption message whether can be checked according to recipient described in the time cipher controlled.
It should be noted that in the specific implementation process, above-mentioned instant communication message sending method provided by the present application can
It is widely used using various instant communication clients, such as common QQ, wechat or microblogging, this method, it is easy to operate.
In the following, the specific implementation step of this instant communication message sending method is discussed in detail in conjunction with Fig. 1:
Step S11, obtains the time key of instant message to be sent, the time key for limit it is described it is to be sent i.e.
When the time limit that can be checked of message.
It specifically includes:
S111: obtaining the out-of-service time of instant message to be sent, and the out-of-service time is mistake after the instant message is sent
The time of phase failure;
S112: time key is obtained according to the out-of-service time;
Wherein step S111, obtains the out-of-service time of instant message to be sent, and the generation of the out-of-service time can use
Following manner:
First way: the out-of-service time is set by sender.
Method particularly includes: instant messaging transmitting terminal is addresser before editor's new information is sent, when being set with input failure
Between the entrance that instructs, for example, sender can be manually entered or be manually selected the out-of-service time by this entrance, such as manually
Typing or the time selected are " 2016-8-1 11:30 ", then the out-of-service time of instant message is " 2016-8-1 11:30 ".
The second way: the out-of-service time is automatically generated by instant messaging transmitting terminal system.
Specific method is that the out-of-service time is the time by the transmission message of instant messaging transmitting terminal plus a fixation
Time limit automatically generate, such as, send message time be " 2016-8-1 11:30 ", the fixed time limit be 30 days, then
The out-of-service time is " 2016-8-31 11:30 ".The function of the fixed term being set as when instantaneous communication system is developed
It is integrated.About the generating mode of out-of-service time, the present invention is with no restrictions.
Step S112: time key is obtained according to the out-of-service time.
Specific time key can be the time public key ID being calculated using id password algorithm, at least following two
Kind method:
First method: the method that symmetric cryptography can be used encrypts raw message data, the original of symmetric encipherment algorithm
Reason is: data transmission side (initial data) and encryption key will make it become complexity together after Encryption Algorithm is handled in plain text
Encrypted cipher text send.After recipient receives ciphertext, if wanting to solve read raw data, need using the used key of encryption
And ciphertext is decrypted in the algorithm for inversion of identical Encryption Algorithm, just it can be made to revert to readable plaintext.In a symmetric encryption algorithm,
The key used only one, hair receive both sides be all encrypted and decrypted using this data key, symmetric encipherment algorithm
Difficult cracking when advantage is the high speed of encryption and decryption and uses long key.
Second method: time key can also be obtained with rivest, shamir, adelman, and rivest, shamir, adelman needs two
Key: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair of, if
Data are encrypted with public-key cryptography, could only be decrypted with corresponding private cipher key;If with private cipher key pair data into
Row encryption, then could only be decrypted with corresponding public-key cryptography.The characteristics of asymmetric cryptosystem, is: encrypting and decrypting speed
It is slow compared with symmetric cryptography, but Encryption Algorithm intensity is complicated, highly-safe.
Step S12 carries out encryption to the instant message to be sent and generates encryption message according to the time key;
Step S12 can specifically be realized using method one: the instant message to be sent described in the time key pair into
Row encryption generates the encryption message;
Specifically in the present embodiment, raw message data can be encrypted using the method for symmetric cryptography herein, it is specific to add
Close content is as follows:
EncrpytBySym (instant message data ciphertext)=fx_encryptBySym (ori (instant message content), ID
(time key)), ori is all the elements of instant message, and using binary data format, EncrpytBySym is to add
The message data ciphertext of close acquisition, encrypting the encryption intensity used is AES256.
Step S12 can also be realized using method two: session key be generated, with the time key and the session key
Combination encryption carried out to the instant message to be sent generate the encryption message;
Specifically in the present embodiment, for example, the algorithm for generating session key is according to one section of session of generating random number
Key, such as SessionPassword=fx_randomSession (" 1234567890 "), SessionPassword=session
Key, 1234567890 be a random number, and the algorithm by generating session key generates one section of session key.Then,
Instant message to be sent is encrypted with the session key, generates the message data ciphertext in the encryption message, specifically
Method is:
EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message content),
SessionPassword, ID), EncrpytBySym is with the combination of the time key and the session key to described
Instant message to be sent carries out the message data ciphertext of encryption generation.
Next, the session key described in the time key pair is encrypted, the session in the encryption message is generated
Key ciphertext;Specific method may is that
((session is close by SessionPassword by session key ciphertext id1_encryptdata=fx_encryptByIBC
Key), ID (time key)), this Encryption Algorithm uses sm9 Encryption Algorithm, and encryption intensity is RSA3072.
Further, specifically can be before sending will be close by the message data ciphertext and session for encryption message therein
The encapsulation package that key ciphertext generates after being packaged;The encapsulation of P7 format is carried out to message data ciphertext and session key ciphertext, in conjunction with
It is as follows to be specifically encapsulated as XXX immediate news systems format for the present embodiment:
P7Data=SEQUENCE
Encryption type=XXXIm
Encryption Algorithm=id-ibc-enc-kem-sok-esbdh
Writing abstract=aes256
Type of coding=dem-dem3, hmacSHA
Can decryption time information=
It can decryption time mark=yyyymmddhhnnsszzz
Domain=360jiamiyou_olym
Version=1
Session key ciphertext (id1_encryptdata)
}
Data ciphertext (EncryptBySym)
}
After the completion of above-mentioned work, so that it may carry out step S13: the transmission encryption message to recipient, when sending described
Between key to server and by server recipient according to the time cipher controlled whether can check described in plus
Close message.About server, how whether the recipient according to the time cipher controlled can check the side for encrypting message
Method content will be described in detail below.
Please refer to Fig. 2: a kind of instant communication message inspection method provided by the embodiments of the present application is applied to message sink
End, which comprises
S21: receiving the encryption message encrypted according to time key, and the time key disappears for limiting the encryption
Cease the time limit that can be checked;
S22: response checks that the encryption message checks operation, generates and sends key request to server, described close
Key request is for obtaining the time key of the encryption message;
S23: the feedback information that the server responds the key request is received, the feedback information is by the server
It is generated according to the time key that the request time of the key request and transmitting terminal are sent, when the request time exceeds institute
The feedback information is the information of the characterization encryption message invalid when stating time key corresponding time range, when the request
The feedback information is the time key when time is in the corresponding time range of the time key;
S24: parsing the feedback information, according to parsing result respond described in check operation;
It is described according to parsing result respond described in check operation, comprising:
When parsing result is the encryption message invalid, step S241 is executed: checking operation described in response, prompt user
The encryption message is out of date to be checked;
When parsing result is the time key, executes step S242: operation is checked described in response, according to the time
Key decrypts the encryption message, obtains message data and shows;
It is described that the encryption message is decrypted according to the time key in executing step S242, it can be done using two kinds
Method:
Method one: the encryption message is decrypted with the time key, obtains message data;
Or method two: the encapsulation package of the parsing encryption message obtains the session key ciphertext in the encryption message;
The session key ciphertext is decrypted with the time key, obtains session key;Disappeared with the session key decryption encryption
Message data ciphertext in breath, obtains message data.
In the following, the specific implementation step of instant communication message inspection method in the embodiment of the present application is discussed in detail in conjunction with Fig. 2:
S21: receiving the encryption message encrypted according to time key, and the time key disappears for limiting the encryption
Cease the time limit that can be checked;
Time key can be the time public key ID being calculated using id password algorithm, at least following two side
Method:
First method: the method that symmetric cryptography can be used encrypts raw message data, the original of symmetric encipherment algorithm
Reason is: data transmission side (initial data) and encryption key will make it become complexity together after Encryption Algorithm is handled in plain text
Encrypted cipher text send.After recipient receives ciphertext, if wanting to solve read raw data, need using the used key of encryption
And ciphertext is decrypted in the algorithm for inversion of identical Encryption Algorithm, just it can be made to revert to readable plaintext.In a symmetric encryption algorithm,
The key used only one, hair receive message both sides be all encrypted and decrypted using this data key, symmetric cryptography calculate
Difficult cracking when the advantages of method is the high speed of encryption and decryption and uses long key.
Second method: time key can also be obtained with rivest, shamir, adelman, and rivest, shamir, adelman needs two
Key: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair of, if
Data are encrypted with public-key cryptography, could only be decrypted with corresponding private cipher key;If with private cipher key pair data into
Row encryption, then could only be decrypted with corresponding public-key cryptography.The characteristics of asymmetric cryptosystem, is: encrypting and decrypting speed
It is slow compared with symmetric cryptography, but Encryption Algorithm intensity is complicated, highly-safe.
S22: response checks that the encryption message checks operation, generates and sends key request to server, described close
Key request is for obtaining the time key of the encryption message;
The instant message receiving end sends key request to server and obtains time key, and the time key is service
Device is by verifying the time of the instant message receiving end application time key whether in the corresponding time range of time key
Come what is provided, server is generally CA server herein;So-called CA, as digital certificate authentication center
(CertficateAuthority, CA) is the key link of entire online electronic transaction safety.It is mainly responsible for generation, distribution
And authentication digital certificate needed for managing all entities for participating in online transaction.
S23: the feedback information that the server responds the key request is received, the feedback information is by the server
It is generated according to the time key that the request time of the key request and transmitting terminal are sent, when the request time exceeds institute
The feedback information is the information of the characterization encryption message invalid when stating time key corresponding time range, when the request
The feedback information is the time key when time is in the corresponding time range of the time key.
Specifically in the present embodiment, for example:
The request time of instant messaging receiving end to server transmission key request is 2016-8-20 10:10:10, and is
The time key corresponding time that Shi Tongxin transmitting terminal is sent is 2016-8-10 10:10:10, then when request time exceeds described
Between the corresponding time range of key, server to instant messaging receiving end feedback information be encrypt message invalid, Instant Messenger
The time key corresponding time for believing that transmitting terminal is sent is 2016-8-30 10:10:10, then request time is in the time key
In corresponding time range, server is time key to the feedback information of instant messaging receiving end at this time.
S24: parsing the feedback information, according to parsing result respond described in check operation;
It is described according to parsing result respond described in check operation, comprising:
When parsing result is the encryption message invalid, executes step S241: being looked into described in the response of instant messaging receiving end
It sees operation, prompts encryption described in user message is out of date not checked;
When parsing result is the time key, executes step S242: checking behaviour described in the response of instant messaging receiving end
Make, the encryption message is decrypted according to the time key, obtains message data and show;
It is described that the encryption message is decrypted according to the time key in executing step S242, it can be done using two kinds
Method:
Method one: the encryption message is decrypted with the time key, obtains message data;
Or method two: the encapsulation package of the parsing encryption message obtains the session key ciphertext in the encryption message;
The session key ciphertext is decrypted with the time key, obtains session key;Disappeared with the session key decryption encryption
Message data ciphertext in breath, obtains message data;
Specifically, instant messaging receiving end is after obtaining time key, can the session described in the time key-parsing it is close
Key ciphertext obtains the session key.In the present embodiment, it by parsing session key ciphertext (id1_encryptdata), obtains
It is " 1234567890 " to session key SessionPassword, is then parsed by session key SessionPassword
Message data ciphertext, such as in encryption, EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message
Content), SessionPassword (session key)), after decryption, finally obtain message data ORI.
The P7 format encapsulation of data of the generation as described in aforementioned instant communication message sending method of encapsulation package herein, tool
Body encapsulation of data is as follows:
P7Data=SEQUENCE
Encryption type=XXXsIm
Encryption Algorithm=id-ibc-enc-kem-sok-esbdh
Writing abstract=aes256
Type of coding=dem-dem3, hmacSHA
Can decryption time information=
It can decryption time mark=yyyymmddhhnnsszzz
Domain=XXXjiamiyou_olym
Version=1
Session key ciphertext (id1_encryptdata)
}
Data ciphertext (EncryptBySym)
}。
By encapsulating Packet analyzing to P7 format, when can therefrom obtain session key ciphertext id1_encryptdata and failure
Between yyyymmddhhnnsszzz.
Please refer to Fig. 3: a kind of instant communication message checks control method, is applied to server, and method includes:
S31: the key request for the acquisition encryption message time key that instant messaging receiving end is sent is received;
S32: the request time of the time key is requested to be answered with the time key pair instant messaging receiving end
Time range be compared;
If the request time exceeds the time range, S321 is executed: refusing to provide institute to instant messages receiving end
Time key is stated, so that instant messages receiving end can not be decrypted and check to encryption message;
If the request time executes S322 without departing from the time range: described in being provided to instant messages receiving end
Time key, so that instant messages receiving end is decrypted and checks according to the time key pair encryption message.
The concrete principle and operating method of step S32 is corresponding with step S23.
The concrete principle and operating method of step S321 and step S322 are corresponding with S241 and S242 respectively.
As the instantaneous communication system for corresponding to above-mentioned encryption method, the encryption of instant message is carried out using method above-mentioned
Send, decryption receives and checks control, which includes instant messaging transmitting terminal above-mentioned, instant messaging receiving end
And server.
A kind of instant communication message sending method provided based on the above embodiment, the embodiment of the present application is also corresponding to provide one
Kind instant messaging transmitting terminal, as shown in Figure 4, comprising:
Acquiring unit 21: for obtaining the time key of instant messages to be sent, the time key is pending for limiting
The time limit for sending instant messages that can be checked;
Encryption unit 22: for carrying out encryption to the instant messages to be sent and generating encryption according to the time key
Information;
First transmission unit 23: for sending the encryption information to recipient, the time key is sent to server
And whether the encryption message can be checked by server recipient according to the time cipher controlled.
Acquiring unit 21, comprising:
Time obtains subelement, a kind of alternative embodiment, and the time obtains subelement for obtaining instant messages to be sent
Out-of-service time, the out-of-service time are the time of expired failure after the message is sent;
Another alternative embodiment, the time obtains subelement, for obtaining the hair of the instant messages to be sent
The time is sent to generate the out-of-service time plus fixed term.
Key obtaining sub-unit, for obtaining time key according to the out-of-service time.
Encryption unit 22, comprising:
First encryption sub-unit operable carries out described in encryption generation for the instant messages to be sent described in the time key pair
Encryption information;Or
Second encryption sub-unit operable;
A kind of alternative embodiment, the second encryption sub-unit operable is for generating session key, with the time key and the meeting
The combination for talking about key carries out encryption to the instant message to be sent and generates the encryption instant messages.
Another alternative embodiment, the second encryption sub-unit operable, is used for:
Instant messages to be sent are encrypted with the session key, the information data generated in the encryption message is close
Text;
The session key described in the time key pair is encrypted, and the session key generated in the encryption message is close
Text.
A kind of timely communication information inspection method provided based on the above embodiment, the embodiment of the present application is also corresponding to provide one
Kind instant communication message receiving end, as shown in Figure 5, comprising:
First receiving unit 31: for receiving the encryption message encrypted according to time key, the time key is used
In the time limit that the limitation encryption message can be checked;
Respond request unit 32: it checks that the encryption message checks operation for responding, generates and sends key request
To server, the key request is used to obtain the time key of the encryption message;
Second receiving unit 33: the feedback information of the key request, the feedback are responded for receiving the server
Information is generated by the server according to the time key that the request time and transmitting terminal of the key request are sent, and works as institute
The feedback information is characterizes the encryption message invalid when stating request time beyond the time key corresponding time range
Information, when the request time is in the corresponding time range of the time key feedback information be the time it is close
Key;
Resolution response unit 34: for parsing the feedback information, according to parsing result respond described in check operation.
Specifically, resolution response unit 34, is used for:
When parsing result is the encryption message invalid, operation is checked described in response, prompts to encrypt message described in user
It is out of date to be checked;
When parsing result is the time key, operation is checked described in response, according to time key decryption
Message is encrypted, message data is obtained and is shown;
The resolution response unit 34, comprising:
First resolution response subelement obtains message data for decrypting the encryption message with the time key;Or
Person
Second resolution response subelement, the encapsulation package for parsing the encryption message obtain the meeting in the encryption message
Talk about key ciphertext;The session key ciphertext is decrypted with the time key, obtains session key;It is decrypted with the session key
Message data ciphertext in the encryption message, obtains message data.
A kind of instant communication message provided based on the above embodiment checks that control method, the embodiment of the present application also correspondence mention
For a kind of server, as shown in Figure 6, comprising:
Third receiving unit 41: for receiving the key of the acquisition encryption message time key of instant messages receiving end transmission
Request;
Authentication unit 42: for the instant messages receiving end is requested the time key request time and it is described when
Between the corresponding time range of key be compared;
Second transmission unit 43: for refusing to connect to instant messages when the request time exceeds the time range
Receiving end provides the time key, so that instant messages receiving end can not be decrypted and check to encryption message;
When the request time is without departing from the time range, the time key is provided to instant messages receiving end,
So that instant messages receiving end is decrypted and checks according to the time key pair encryption message.
Encryption method of the invention is to be encrypted using time key pair instant message to be sent, which uses
In the time limit that limitation instant message to be sent can be checked, that is, the time limit is crossed, instant message cannot be looked into again
It sees, ensure that the timeliness of instant message;Meanwhile the time key for encrypting message is to be sent to server, by server
The granting of key is managed, can be checked with this to control encryption message, it is ensured that the height of information during instant messaging
The timeliness of safety and message, the security performance for solving instant messaging in the prior art is not high, the privacy of instant messages
Difference, easy the technical issues of being leaked.
Provided herein algorithm and display not with any certain computer, mobile digital device, virtual system or other
Equipment is inherently related.Various general-purpose systems can also be used together with teachings based herein.As described above, this is constructed
Structure required by class system is obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that
It can use various programming languages and realize summary of the invention described herein, and the description done above to language-specific is
In order to disclose the best mode of carrying out the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) are some or all in browser according to an embodiment of the present invention to realize
The some or all functions of component.The present invention be also implemented as a part for executing method as described herein or
Whole device or device programs (for example, computer program and computer program product).It is such to realize journey of the invention
Sequence can store on a computer-readable medium, or may be in the form of one or more signals.Such signal can
It is obtained with being downloaded from Internet site server, is perhaps provided on the carrier signal or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The invention discloses A1, a kind of instant communication message sending method, which is characterized in that the described method includes:
The time key of instant message to be sent is obtained, the time key can for limiting the instant message to be sent
The time limit checked;
According to the time key, encryption is carried out to the instant message to be sent and generates encryption message;
The encryption message is sent to recipient, send the time key to server and by the server according to
Whether recipient described in the time cipher controlled can check the encryption message.
A2, method as described in a1, which is characterized in that the time key for obtaining instant message to be sent, comprising:
The out-of-service time of instant message to be sent is obtained, the out-of-service time is expired failure after the instant message is sent
Time;
Time key is obtained according to the out-of-service time.
A3, method as described in a1, which is characterized in that it is described according to the time key, to be sent disappear immediately to described
Breath carries out encryption and generates encryption message, and specific method includes:
The instant message to be sent described in the time key pair carries out encryption and generates the encryption message;Or
Generate session key, with the combination of the time key and the session key to the instant message to be sent into
Row encryption generates the encryption message.
A4, the method as described in A3, which is characterized in that the combination pair with the time key and the session key
The instant message to be sent is encrypted, comprising:
Instant message to be sent is encrypted with the session key, the message data generated in the encryption message is close
Text;
The session key described in the time key pair is encrypted, and the session key generated in the encryption message is close
Text.
A5, the method as described in A4, which is characterized in that the encryption message is specifically: before sending will be by the message
The encapsulation package that data ciphertext and session key ciphertext generate after being packaged.
A6, the method as described in A1~A5 is any, which is characterized in that the time key is to utilize id password algorithm meter
Obtained time public key.
A7, the method as described in seeking A2, which is characterized in that the out-of-service time for obtaining instant message to be sent, comprising:
The sending time of the instant message to be sent is generated into the out-of-service time plus fixed term.
B8, a kind of instant communication message inspection method are applied to instant messaging receiving end, which is characterized in that the method
Include:
The encryption message encrypted according to time key is received, the time key can for limiting the encryption message
The time limit checked;
Response checks that the encryption message checks operation, generates and sends key request to server, the key is asked
Seek the time key for obtaining the encryption message;
Receive the feedback information that the server responds the key request, the feedback information by the server according to
The time key that the request time and instant messaging transmitting terminal of the key request are sent generates, when the request time is super
Out when the time key corresponding time range the feedback information be the characterization encryption message invalid information, when described
The feedback information is the time key when request time is in the corresponding time range of the time key;
Parse the feedback information, according to parsing result respond described in check operation.
B9, the method as described in B8, which is characterized in that the encryption message are as follows:
The message generated with time key encryption;Or
The message of encryption generation is carried out with the combination of the time key and the session key.
B10, the method as described in B8 or B9, which is characterized in that it is described according to parsing result respond described in check operation, wrap
It includes:
When parsing result is the encryption message invalid, operation is checked described in response, prompts to encrypt message described in user
It is out of date to be checked;
When parsing result is the time key, operation is checked described in response, according to time key decryption
Message is encrypted, message data is obtained and is shown.
B11, the method as described in B10, which is characterized in that it is described that the encryption message is decrypted according to the time key,
Include:
The encryption message is decrypted with the time key, obtains message data;Or
The encapsulation package for parsing the encryption message obtains the session key ciphertext in the encryption message;It is close with the time
Key decrypts the session key ciphertext, obtains session key;The message count in the encryption message is decrypted with the session key
According to ciphertext, message data is obtained.
C12, a kind of instant communication message check control method, are applied to server, which is characterized in that the method packet
It includes:
Receive the key request for the acquisition encryption message time key that instant messaging receiving end is sent;
When requesting the request time of the time key corresponding with the time key instant messaging receiving end
Between range be compared;
If the request time exceeds the time range, refuse close to the instant messaging receiving end granting time
Key, so that instant messaging receiving end can not be decrypted and check to encryption message;
If the request time provides the time key without departing from the time range, to instant messaging receiving end,
So that instant messaging receiving end is decrypted and checks according to the time key pair encryption message.
D13, a kind of instant messaging transmitting terminal characterized by comprising
Acquiring unit: for obtaining the time key of instant message to be sent, the time key is to be sent for limiting
The time limit that instant message can be checked;
Encryption unit: for carrying out encryption generation encryption to the instant message to be sent and disappearing according to the time key
Breath;
First transmission unit: for sending the encryption message to recipient, the time key is sent to server simultaneously
By the server, whether the recipient according to the time cipher controlled can check the encryption message.
D14, the instant messaging transmitting terminal as described in D13, it is characterised in that: the acquiring unit, comprising:
Time obtains subelement, and for obtaining the out-of-service time of instant message to be sent, the out-of-service time, which is described, is
When message send after expired failure time;
Key obtaining sub-unit, for obtaining time key according to the out-of-service time.
D15, the instant messaging transmitting terminal as described in D12, which is characterized in that the encryption unit, comprising:
First encryption sub-unit operable carries out described in encryption generation for the instant message to be sent described in the time key pair
Encrypt message;Or
Second encryption sub-unit operable, for generating session key, with the combination pair of the time key and the session key
The instant message to be sent carries out encryption and generates the encryption message.
D16, the instant messaging transmitting terminal as described in seeking D14, which is characterized in that
Second encryption sub-unit operable, is used for:
Instant messages to be sent are encrypted with the session key, the message data generated in the encryption information is close
Text;
The session key described in the time key pair is encrypted, and the session key generated in the encryption information is close
Text.
D17, the instant messaging transmitting terminal as described in D16, which is characterized in that the encryption message includes: before sending will
The encapsulation package generated after being packaged by the message data ciphertext and session key ciphertext.
D18, the instant messaging transmitting terminal as described in D13~D17 is any, which is characterized in that the time key is to utilize
The time public key that id password algorithm is calculated.
D19, the instant messaging transmitting terminal as described in D14, which is characterized in that the time obtains subelement, is used for:
The sending time of the instant message to be sent is generated into the out-of-service time plus fixed term.
The out-of-service time for obtaining instant message to be sent, comprising:
The sending time of the instant message to be sent is generated into the out-of-service time plus fixed term.
E20, a kind of instant messaging receiving end characterized by comprising
First receiving unit: for receiving the encryption message encrypted according to time key, the time key is used for
Limit the time limit that the encryption message can be checked;
Respond request unit: it checks that the encryption message checks operation for responding, generates and sends key request extremely
Server, the key request are used to obtain the time key of the encryption message;
Second receiving unit: the feedback information of the key request, the feedback letter are responded for receiving the server
Breath is generated by the server according to the time key that the request time and transmitting terminal of the key request are sent, when described
The feedback information be to characterize the encryption message invalid when request time is beyond the time key corresponding time range
Information, when the request time is in the corresponding time range of the time key, the feedback information is that the time is close
Key;
Resolution response unit: for parsing the feedback information, according to parsing result respond described in check operation.
E21, the instant messaging receiving end as described in E20, which is characterized in that the encryption message are as follows:
The message generated with time key encryption;Or
The message of encryption generation is carried out with the combination of the time key and the session key.
E22, the instant messaging receiving end as described in E20 or E21, which is characterized in that the resolution response unit is used for:
When parsing result is the encryption message invalid, operation is checked described in response, prompts to encrypt message described in user
It is out of date to be checked;
When parsing result is the time key, operation is checked described in response, according to time key decryption
Message is encrypted, message data is obtained and is shown.
E23, the instant messaging receiving end as described in E21, which is characterized in that the resolution response unit, comprising:
First resolution response subelement obtains message data for decrypting the encryption message with the time key;Or
Person
Second resolution response subelement, the encapsulation package for parsing the encryption message obtain the meeting in the encryption message
Talk about key ciphertext;The session key ciphertext is decrypted with the time key, obtains session key;It is decrypted with the session key
Message data ciphertext in the encryption message, obtains message data.
E24, a kind of server characterized by comprising
Third receiving unit: the key for receiving the acquisition encryption message time key of instant messaging receiving end transmission is asked
It asks;
Authentication unit: for the instant messaging receiving end to be requested to the request time of the time key and the time
The corresponding time range of key is compared;
Second transmission unit: for refusing to receive to instant messaging when the request time exceeds the time range
The time key is provided at end, so that instant messaging receiving end can not be decrypted and check to encryption message;
When the request time is without departing from the time range, the time key is provided to instant messaging receiving end,
So that instant messaging receiving end is decrypted and checks according to the time key pair encryption message.
Claims (21)
1. a kind of instant communication message sending method, which is characterized in that the described method includes:
The time key of instant message to be sent is obtained, the time key can be looked into for limiting the instant message to be sent
The time limit seen;
According to the time key, encryption is carried out to the instant message to be sent and generates encryption message, the encryption message are as follows:
The message generated with time key encryption;Or encryption generation is carried out with the combination of the time key and session key
Message;
The encryption message is sent to recipient, the time key is sent to server and passes through the server according to
Whether recipient described in time cipher controlled can check the encryption message.
2. the method as described in claim 1, which is characterized in that the time key for obtaining instant message to be sent, comprising:
Obtain the out-of-service time of instant message to be sent, the out-of-service time be after the instant message is sent expired failure when
Between;
Time key is obtained according to the out-of-service time.
3. the method as described in claim 1, which is characterized in that the combination with the time key and the session key
The instant message to be sent is encrypted, comprising:
Instant message to be sent is encrypted with the session key, generates the message data ciphertext in the encryption message;
The session key described in the time key pair is encrypted, and the session key ciphertext in the encryption message is generated.
4. method as claimed in claim 3, which is characterized in that the encryption message is specifically: will be disappeared before sending by described
The encapsulation package that breath data ciphertext and session key ciphertext generate after being packaged.
5. the method as described in Claims 1 to 4 is any, which is characterized in that the time key is to utilize id password algorithm
The time public key being calculated.
6. method according to claim 2, which is characterized in that the out-of-service time for obtaining instant message to be sent, comprising:
The sending time of the instant message to be sent is generated into the out-of-service time plus fixed term.
7. a kind of instant communication message inspection method is applied to instant messaging receiving end, which is characterized in that the described method includes:
The encryption message encrypted according to time key is received, the time key can be looked into for limiting the encryption message
The time limit seen, the encryption message are as follows: the message generated with time key encryption;Or with the time key and
The combination of session key carries out the message of encryption generation;
Response checks that the encryption message checks operation, generates and sends key request to server, the key request use
In the time key for obtaining the encryption message;
The feedback information that the server responds the key request is received, the feedback information is as the server according to
The time key that the request time and instant messaging transmitting terminal of key request are sent generates, when the request time exceeds institute
The feedback information is the information of the characterization encryption message invalid when stating time key corresponding time range, when the request
The feedback information is the time key when time is in the corresponding time range of the time key;
Parse the feedback information, according to parsing result respond described in check operation.
8. the method for claim 7, which is characterized in that it is described according to parsing result respond described in check operation, comprising:
When parsing result is the encryption message invalid, operation is checked described in response, and encryption message described in user is prompted to be already expired
Phase can not be checked;
When parsing result is the time key, operation is checked described in response, and the encryption is decrypted according to the time key
Message obtains message data and shows.
9. method according to claim 8, which is characterized in that it is described that the encryption message is decrypted according to the time key,
Include:
The encryption message is decrypted with the time key, obtains message data;Or
The encapsulation package for parsing the encryption message obtains the session key ciphertext in the encryption message;With the time key solution
The close session key ciphertext, obtains session key;It is close that the message data in the encryption message is decrypted with the session key
Text obtains message data.
10. a kind of instant communication message checks control method, it is applied to server, which is characterized in that the described method includes:
Receive the key request for the acquisition encryption message time key that instant messaging receiving end is sent, the encryption message are as follows: use
The message that the time key encryption generates;Or disappearing for encryption generation is carried out with the combination of the time key and session key
Breath;
The request time of time key time model corresponding with the time key is requested into the instant messaging receiving end
It encloses and is compared;
If the request time exceeds the time range, refuses to provide the time key to instant messaging receiving end, make
Obtaining instant messaging receiving end can not be decrypted and check to encryption message;
If the request time provides the time key without departing from the time range, to instant messaging receiving end, so that
Instant messaging receiving end is decrypted and checks according to the time key pair encryption message.
11. a kind of instant messaging transmitting terminal characterized by comprising
Acquiring unit: for obtaining the time key of instant message to be sent, the time key is to be sent instant for limiting
The time limit that message can be checked;
Encryption unit: for carrying out encryption to the instant message to be sent and generating encryption message, institute according to the time key
State encryption message are as follows: the message generated with time key encryption;Or the combination with the time key and session key
Carry out the message of encryption generation;
First transmission unit: for sending the encryption message to recipient, the time key is sent to server and is passed through
Whether server recipient according to the time cipher controlled can check the encryption message.
12. instant messaging transmitting terminal as claimed in claim 11, it is characterised in that: the acquiring unit, comprising:
Time obtains subelement, and for obtaining the out-of-service time of instant message to be sent, the out-of-service time disappears immediately to be described
The time of expired failure after breath is sent;
Key obtaining sub-unit, for obtaining time key according to the out-of-service time.
13. instant messaging transmitting terminal as claimed in claim 11, which is characterized in that the encryption unit, comprising:
First encryption sub-unit operable carries out encryption for the instant message to be sent described in the time key pair and generates the encryption
Message;Or
Second encryption sub-unit operable, for generating session key, with the combination of the time key and the session key to described
Instant message to be sent carries out encryption and generates the encryption message.
14. instant messaging transmitting terminal as claimed in claim 13, which is characterized in that second encryption sub-unit operable is used for:
Instant messages to be sent are encrypted with the session key, generate the message data ciphertext in the encryption information;
The session key described in the time key pair is encrypted, and the session key ciphertext in the encryption information is generated.
15. instant messaging transmitting terminal as claimed in claim 14, which is characterized in that the encryption message includes: before sending
The encapsulation package generated after being packaged by the message data ciphertext and session key ciphertext.
16. the instant messaging transmitting terminal as described in claim 11~15 is any, which is characterized in that the time key is to utilize
The time public key that id password algorithm is calculated.
17. instant messaging transmitting terminal as claimed in claim 12, which is characterized in that the time obtains subelement, is used for:
The sending time of the instant message to be sent is generated into the out-of-service time plus fixed term.
18. a kind of instant messaging receiving end characterized by comprising
First receiving unit: for receiving the encryption message encrypted according to time key, the time key is for limiting
The time limit that the encryption message can be checked, the encryption message are as follows: the message generated with time key encryption;Or
The combination of person's time key and session key carries out the message of encryption generation;
Respond request unit: it checks that the encryption message checks operation for responding, generates and sends key request to service
Device, the key request are used to obtain the time key of the encryption message;
Second receiving unit: responding the feedback information of the key request for receiving the server, the feedback information by
The server is generated according to the time key that the request time and transmitting terminal of the key request are sent, when the request
The feedback information be the characterization information for encrypting message invalid when time is beyond the time key corresponding time range,
When the request time is in the corresponding time range of the time key, the feedback information is the time key;
Resolution response unit: for parsing the feedback information, according to parsing result respond described in check operation.
19. instant messaging receiving end as claimed in claim 18, which is characterized in that the resolution response unit is used for:
When parsing result is the encryption message invalid, operation is checked described in response, and encryption message described in user is prompted to be already expired
Phase can not be checked;
When parsing result is the time key, operation is checked described in response, and the encryption is decrypted according to the time key
Message obtains message data and shows.
20. instant messaging receiving end as claimed in claim 18, which is characterized in that the resolution response unit, comprising:
First resolution response subelement obtains message data for decrypting the encryption message with the time key;Or
Second resolution response subelement, the session that the encapsulation package for parsing the encryption message obtains in the encryption message are close
Key ciphertext;The session key ciphertext is decrypted with the time key, obtains session key;Described in session key decryption
The message data ciphertext in message is encrypted, message data is obtained.
21. a kind of server characterized by comprising
Third receiving unit: for receiving the key request of the acquisition encryption message time key of instant messaging receiving end transmission,
The encryption message are as follows: the message generated with time key encryption;Or the group with the time key and session key
Close the message for carrying out encryption generation;
Authentication unit: for the instant messaging receiving end to be requested to the request time and the time key of the time key
Corresponding time range is compared;
Second transmission unit: for refusing to send out to instant messaging receiving end when the request time exceeds the time range
The time key is put, so that instant messaging receiving end can not be decrypted and check to encryption message;
When the request time is without departing from the time range, the time key is provided to instant messaging receiving end, so that
Instant messaging receiving end is decrypted and checks according to the time key pair encryption message.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190691.1A CN106453069B (en) | 2016-12-21 | 2016-12-21 | A kind of instant communication message sends, checks, checking control method and its equipment |
PCT/CN2017/117842 WO2018113756A1 (en) | 2016-12-21 | 2017-12-21 | Sending method, control method, sending end and receiving end in instant messaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611190691.1A CN106453069B (en) | 2016-12-21 | 2016-12-21 | A kind of instant communication message sends, checks, checking control method and its equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106453069A CN106453069A (en) | 2017-02-22 |
CN106453069B true CN106453069B (en) | 2019-08-30 |
Family
ID=58215234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611190691.1A Active CN106453069B (en) | 2016-12-21 | 2016-12-21 | A kind of instant communication message sends, checks, checking control method and its equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453069B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113756A1 (en) * | 2016-12-21 | 2018-06-28 | 北京奇虎科技有限公司 | Sending method, control method, sending end and receiving end in instant messaging |
CN106603388B (en) * | 2016-12-21 | 2020-04-21 | 北京奇虎科技有限公司 | Mail sending, viewing and viewing control method and equipment thereof |
CN111831186B (en) * | 2020-06-28 | 2022-01-04 | 维沃移动通信有限公司 | Information processing method and device and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677300A (en) * | 2008-09-18 | 2010-03-24 | 国际商业机器公司 | Method for delivering E-mail messages and E-mail system |
CN102195989B (en) * | 2011-06-15 | 2014-03-26 | 中国电信股份有限公司 | Email processing method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7640307B2 (en) * | 2004-04-19 | 2009-12-29 | Bigstring Corporation | Universal recallable, erasable, secure and timed delivery email |
CN102118710A (en) * | 2011-03-08 | 2011-07-06 | 上海红松信息技术有限公司 | System and method for transmitting data between mobile terminals |
CN103577405A (en) * | 2012-07-19 | 2014-02-12 | 中国人民大学 | Interest analysis based micro-blogger community classification method |
CN104158727A (en) * | 2014-08-29 | 2014-11-19 | 蓝信工场(北京)科技有限公司 | Method and device for deleting instant information at regular time |
CN104954237A (en) * | 2015-07-15 | 2015-09-30 | 山西佰纳得科技有限公司 | Instant massaging method |
-
2016
- 2016-12-21 CN CN201611190691.1A patent/CN106453069B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677300A (en) * | 2008-09-18 | 2010-03-24 | 国际商业机器公司 | Method for delivering E-mail messages and E-mail system |
CN102195989B (en) * | 2011-06-15 | 2014-03-26 | 中国电信股份有限公司 | Email processing method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106453069A (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109831374B (en) | Mail receiving and sending system based on block chain | |
CN105207774B (en) | The cryptographic key negotiation method and device of verification information | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
KR20210137073A (en) | Blockchain-based secure email system | |
KR20140045629A (en) | Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer | |
CN109639697A (en) | Cloud mobile phone safe throws method, mobile terminal and the server of screen | |
CN112400299B (en) | Data interaction method and related equipment | |
CN109891423A (en) | It is controlled using the data encryption of multiple control mechanisms | |
CN107026824A (en) | A kind of message encryption, decryption method and device | |
CN108111497A (en) | Video camera and server inter-authentication method and device | |
CN110213321A (en) | The method, apparatus and electronic equipment of third party's service are provided in Internet application | |
CN106453069B (en) | A kind of instant communication message sends, checks, checking control method and its equipment | |
CN113949566B (en) | Resource access method, device, electronic equipment and medium | |
CN104243452B (en) | A kind of cloud computing access control method and system | |
CN107094156A (en) | A kind of safety communicating method and system based on P2P patterns | |
CN113141365A (en) | Distributed micro-service data transmission method, device, system and electronic equipment | |
CN113518078A (en) | Cross-network data sharing method, information demander, information provider and system | |
CN111246407B (en) | Data encryption and decryption method and device for short message transmission | |
CN116601914A (en) | Hybrid key derivation to protect data | |
CN112637230A (en) | Instant messaging method and system | |
CN106603388A (en) | Email sending method, email check method, email view control method and devices | |
CN109711178A (en) | A kind of storage method of key-value pair, device, equipment and storage medium | |
Fahl et al. | Trustsplit: usable confidentiality for social network messaging | |
CN109120576A (en) | Data sharing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |