CN106656756B - The operation method and device of instant message applications - Google Patents

The operation method and device of instant message applications Download PDF

Info

Publication number
CN106656756B
CN106656756B CN201611162707.8A CN201611162707A CN106656756B CN 106656756 B CN106656756 B CN 106656756B CN 201611162707 A CN201611162707 A CN 201611162707A CN 106656756 B CN106656756 B CN 106656756B
Authority
CN
China
Prior art keywords
instant message
security
message applications
level
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611162707.8A
Other languages
Chinese (zh)
Other versions
CN106656756A (en
Inventor
朱英柏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING RONGLIAN YITONG INFORMATION TECHNOLOGY CO.,LTD.
Original Assignee
Beijing Link Glory Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Link Glory Technology Co Ltd filed Critical Beijing Link Glory Technology Co Ltd
Priority to CN201611162707.8A priority Critical patent/CN106656756B/en
Publication of CN106656756A publication Critical patent/CN106656756A/en
Application granted granted Critical
Publication of CN106656756B publication Critical patent/CN106656756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/23Reliability checks, e.g. acknowledgments or fault reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of operation method of instant message applications and devices, are related to field of communication technology, can be avoided the case where divulging a secret by instant message applications.The method comprise the steps that determining the security level of current network when detecting instant message applications operation;Obtain the corresponding operating mode of the security level;The instant message applications is run according to the operating mode.The present invention is suitable for maintaining secrecy to the chat content instant message applications.

Description

The operation method and device of instant message applications
Technical field
The present invention relates to field of communication technology more particularly to the operation methods and device of a kind of instant message applications.
Background technique
With the sharp increase of Internet user, the use of chat tool tends to universalness, and easy communication while also occurs The event that company's important core data are leaked by instant messenger, network security become the head that puzzlement internet develops in a healthy way One of problem is wanted, the safety that enterprise's confidential information has been increasingly becoming the problem of actively divulging a secret using chat tool being on the rise is hidden Suffer from.
Summary of the invention
The embodiment of the present invention provides the operation method and device of a kind of instant message applications, is able to solve and passes through Instant Messenger The problem of news software is divulged a secret.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the present invention provides a kind of operation method of instant message applications, comprising:
When detecting instant message applications operation, the security level of current network is determined;
Obtain the corresponding operating mode of the security level;
The instant message applications is run according to the operating mode.
With reference to first aspect, in the first possible implementation of the first aspect, the security level includes advanced Safety and low-level security;
It is described to run the instant message applications according to the operating mode, comprising:
When the security level is advanced security, the repertoire of the instant message applications is run;Or,
When the security level is low-level security, the partial function of the instant message applications is run.
The possible implementation of with reference to first aspect the first, it is in the second possible implementation, described to work as institute State security level be low-level security when, run the partial function of the instant message applications, comprising:
When the security level is low-level security, the information input function of the instant message applications is run, forbids transporting The chat record of the row instant message applications obtains function.
The possible implementation of with reference to first aspect the first, it is in the third possible implementation, described to work as institute State security level be low-level security when, run the partial function of the instant message applications, comprising:
When the security level is low-level security, the sensitive note in the chat record of the instant message applications is obtained It records, includes sensitive keys word in the sensitive record;
The information input function of running the instant message applications forbids the acquisition function of running the sensitive record.
Second of possible implementation of the possible implementation of with reference to first aspect the first or first aspect, Or the third possible implementation of first aspect, it is in the fourth possible implementation, described to work as the security level When for low-level security, after the partial function for running the instant message applications, further includes:
Show Password Input prompting frame;
Obtain the encrypted message inputted based on the Password Input prompting frame;
The encrypted message is verified;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TC2 characters are inputted most when indicating continuous input for the man-machine crash time Short time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is It is correct for password;
When the verification result of the encrypted message is that password is correct, the repertoire of the instant message applications is run.
With reference to first aspect or second of the first possible implementation of first aspect or first aspect possible The possible implementation of the third of implementation or first aspect, in a fifth possible implementation, the determination is worked as The security level of preceding network, comprising:
According to any one in the network type, network identity and Internet protocol address of the current network or arbitrarily Combination, determines the security level of the current network.
Second aspect, the embodiment of the present invention provide a kind of running gear of instant message applications, comprising:
Determining module, for determining the security level of current network when detecting instant message applications operation;
Module is obtained, the corresponding operating mode of the security level determined for obtaining the determining module;
Module is run, the operating mode for obtaining according to the acquisition module runs the instant message applications.
In conjunction with second aspect, in the first possible implementation of the second aspect, the institute that the determining module determines Stating security level includes advanced security and low-level security;
The operation module includes: the first operation submodule or the second operation submodule;
The first operation submodule, for it is soft to run the instant messaging when the security level is advanced security The repertoire of part;
The second operation submodule, for it is soft to run the instant messaging when the security level is low-level security The partial function of part.
In conjunction with the first possible implementation of second aspect, in the second possible implementation, described second Running submodule includes: the first running unit;
First running unit, for running the instant message applications when the security level is low-level security Information input function, the chat record for forbidding running the instant message applications obtains function.
In conjunction with the first possible implementation of second aspect, in the third possible implementation, described second Running submodule includes: acquiring unit, the second running unit;
The acquiring unit, for obtaining chatting for the instant message applications when the security level is low-level security Sensitivity in its record records, and includes sensitive keys word in the sensitive record;
Second running unit is forbidden described in operation for running the information input function of the instant message applications The acquisition function of sensitivity record.
In conjunction with the first possible implementation of second aspect or second of possible implementation of second aspect, Or the third possible implementation of second aspect, in the fourth possible implementation, described device further include: display Module obtains module, authentication module;
The display module, for showing Password Input prompting frame;
The acquisition module, for obtaining the encrypted message based on Password Input prompting frame input;
The authentication module, for being verified to the encrypted message;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TC2 characters are inputted most when indicating continuous input for the man-machine crash time Short time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is It is correct for password;
The first operation submodule is also used to run institute when the verification result of the encrypted message is that password is correct State the repertoire of instant message applications.
Second in conjunction with the possible implementation of the first of second aspect or second aspect or second aspect is possible The possible implementation of the third of implementation or second aspect, in a fifth possible implementation, the determining mould Block comprises determining that submodule;
The determining submodule, for the network type, network identity and Internet protocol according to the current network Any one or any combination in location, determine the security level of the current network.
The operation method and device of instant message applications provided in an embodiment of the present invention detect that instant messaging is soft by working as When part is run, it is first determined then the security level of current network obtains the corresponding operating mode of the security level, finally presses The instant message applications is run according to the operating mode.It can be according to current network security situation, according to corresponding work Mode operation instant message applications runs instant messaging still according to normal mode to avoid under network unsafe condition Software, and lead to the case where secret is revealed in instant communication software.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of the operation method of the instant message applications of the embodiment of the present invention;
Fig. 2 is another flow diagram of the operation method of the instant message applications of the embodiment of the present invention;
Fig. 3 is the running gear structural schematic diagram of the instant message applications of the embodiment of the present invention;
Fig. 4 is the structural schematic diagram of the operation module of the embodiment of the present invention;
Fig. 5 is the structural schematic diagram of the second operation submodule of the embodiment of the present invention;
Fig. 6 is another structural schematic diagram of the second operation submodule of the embodiment of the present invention;
Fig. 7 is another structural schematic diagram of the running gear of the instant message applications of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
One embodiment of the invention provides a kind of operation method of instant message applications, is applied to the terminals such as mobile phone, computer, As shown in Figure 1, which comprises
101, when detecting instant message applications operation, the security level of current network is determined.
Wherein, instant message applications can be the chat softwares such as wechat, QQ, Michat, or the social activities such as microblogging, forum Software, the embodiment of the present invention is with no restriction.
102, the corresponding operating mode of the security level is obtained.
For the embodiment of the present invention, under different working modes, the function that instant message applications can be run is different.Its In, the function that can be run respectively under each operating mode, can by enterprise backstage be configured, can also by instant message applications into The setting of row system.
103, the instant message applications is run according to the operating mode.
Compared with prior art, the embodiment of the present invention can be according to current network security situation, according to corresponding work Mode operation instant message applications runs instant messaging still according to normal mode to avoid under network unsafe condition Software, and lead to the case where secret is revealed in instant communication software.
Further embodiment of this invention provides a kind of operation method of instant message applications, as shown in Fig. 2, the method packet It includes:
201, when detect instant message applications operation when, according to the network type of the current network, network identity and Any one or any combination in Internet protocol address, determine the security level of the current network.
Wherein, network type may include cable network and wireless network, wireless network can specifically include Wifi, 4G, 3G and 2G etc.;Network identity may include: corporate networks, home network, coffee shop's network etc.;Security level includes advanced security And low-level security.
For example, corresponding security level is advanced security when current network is corporate networks;Current network is coffee shop's net When network, corresponding security level is low-level security.
It should be noted that in embodiments of the present invention, the quantity of security level and each security level title can be to appoint What form.For example, security level may include advanced security and low-level security, it also may include a level security, secondary safety, three Level security, four level securities, the embodiment of the present invention is with no restriction.
202, the corresponding operating mode of the security level is obtained.
The step 203a that executes after step 202, when the security level is advanced security, run the instant messaging The repertoire of software.
Wherein, the repertoire of instant message applications may include chat message input function, chat record acquisition function Deng.In embodiments of the present invention, the repertoire for running instant message applications refers to soft according to normal mode operation instant messaging Part does not make any restrictions to its function that can be run.
With step 203a step 203b arranged side by side, when the security level be low-level security when, run the instant messaging The partial function of software.
Wherein, the partial function that instant message applications can be run may include chat message input function, without including chatting Its record obtains function.In embodiments of the present invention, when security level is low-level security, function that instant message applications can be run It can be the function of not will cause the information leakages such as chat content.
Optionally, step 203b can be with are as follows: when the security level is low-level security, runs the instant message applications Information input function, the chat record for forbidding running the instant message applications obtains function.
In embodiments of the present invention, by the security level in network be low-level security when, only run instant message applications Information input function, and forbid run chat record obtain function, can be improved the safety of information in instant message applications Property.
Optionally, step 203b can be with are as follows: when the security level is low-level security, it is soft to obtain the instant messaging Sensitivity in the chat record of part records, and includes sensitive keys word in the sensitive record;Run the instant message applications Information input function forbids the acquisition function of running the sensitive record.
Wherein, sensitive keys word can be configured by enterprise backstage, can also carry out self study according to chat content.Example Such as, sensitive keys word may include: product issue date, product function, product parameters, the issue of theses, employee's wages treatment etc..
The step 204 of execution, display Password Input prompting frame after step 203b.
205, the encrypted message inputted based on the Password Input prompting frame is obtained.
Wherein, the password that password can make an appointment for enterprise backstage, or the login password of employee's account may be used also Think the problem of making an appointment answer etc..
206, the encrypted message is verified.
The step of verifying to encrypted message include:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TCThe most short of 2 characters is inputted when indicating continuous input for the man-machine crash time Time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is Password is correct;
Wherein, previous discriminate indicates that the time of input password is less than the mankind's conventionally used time, to prevent with calculating Machine decryption;Latter discriminate indicate this input password when rhythm and in the past input password when rhythm similarity compared with It is low, it is illegally logged in prevent other people from obtaining password;P is adjustable similarity parameter, which is used by being manually set To indicate the similarity degree of the rhythm when rhythm and past input password when this input password.
207, when the verification result of the encrypted message is that password is correct, whole function of the instant message applications are run Energy.
In embodiments of the present invention, by subscriber authentication it is correct after, run the repertoire of instant message applications, It can guarantee that chat content safety is higher simultaneously, improve the convenience that user uses instant message applications.
Further embodiment of this invention provides a kind of running gear of instant message applications, as shown in figure 3, described device packet It includes:
Determining module 31, for determining the security level of current network when detecting instant message applications operation.
Wherein it is determined that the security level that module 31 determines may include advanced security and low-level security.
Module 32 is obtained, the corresponding operating mode of the security level determined for obtaining determining module 31.
Module 33 is run, the operating mode operation instant message applications for obtaining according to module 32 is obtained.
Compared with prior art, the embodiment of the present invention can be according to current network security situation, according to corresponding work Mode operation instant message applications runs instant messaging still according to normal mode to avoid under network unsafe condition Software, and lead to the case where secret is revealed in instant communication software.
Further, as shown in figure 4, the operation module 33 includes: the first operation submodule 331 or the second operation Module 332.
First operation submodule 331, for running the instant message applications when the security level is advanced security Repertoire.
Second operation submodule 332, for running the instant message applications when the security level is low-level security Partial function.
Further, as shown in figure 5, the second operation submodule 332 includes: the first running unit 3321.
First running unit 3321, for running the instant message applications when the security level is low-level security Information input function, the chat record for forbidding running the instant message applications obtains function.
Further, as shown in fig. 6, the second operation submodule 332 includes: acquiring unit 3322, the second running unit 3323。
Acquiring unit 3322, for obtaining chatting for the instant message applications when the security level is low-level security Sensitivity in its record records, and includes sensitive keys word in the sensitive record.
Second running unit 3323 is forbidden described in operation for running the information input function of the instant message applications The acquisition function of sensitivity record.
Further, as shown in fig. 7, described device further include: display module 34 obtains module 35, authentication module 36.
Display module 34, for showing Password Input prompting frame.
Module 35 is obtained, for obtaining the encrypted message based on Password Input prompting frame input.
Authentication module 36, for being verified to the encrypted message.The step of verifying to encrypted message include:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TCThe most short of 2 characters is inputted when indicating continuous input for the man-machine crash time Time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is Password is correct.
Wherein, previous discriminate indicates that the time of input password is less than the mankind's conventionally used time, to prevent with calculating Machine decryption;Latter discriminate indicate this input password when rhythm and in the past input password when rhythm similarity compared with It is low, it is illegally logged in prevent other people from obtaining password;P is adjustable similarity parameter, which is used by being manually set To indicate the similarity degree of the rhythm when rhythm and past input password when this input password.
First operation submodule 331 is also used to run described instant when the verification result of encrypted message is that password is correct The repertoire of communication software.
Further, determining module 31 comprises determining that submodule.
Submodule 311 is determined, for the network type, network identity and Internet protocol address according to the current network In any one or any combination, determine the security level of the current network.
In embodiments of the present invention, by the security level in network be low-level security when, only run instant message applications Information input function, and forbid run chat record obtain function, can be improved the safety of information in instant message applications Property;By to subscriber authentication it is correct after, run the repertoire of instant message applications, can guarantee chat content safety Property it is higher simultaneously, improve user use instant message applications convenience.
The embodiment of the method for above-mentioned offer may be implemented in the running gear of instant message applications provided in an embodiment of the present invention, Concrete function realizes the explanation referred in embodiment of the method, and details are not described herein.Instant messaging provided in an embodiment of the present invention The operation method and device of software can be adapted for maintaining secrecy to the chat content in instant message applications, but be not limited only to This.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (6)

1. a kind of operation method of instant message applications characterized by comprising
When detecting instant message applications operation, the security level of current network is determined;
Obtain the corresponding operating mode of the security level;
The instant message applications is run according to the operating mode;
The security level includes advanced security and low-level security;
It is described to run the instant message applications according to the operating mode, comprising:
When the security level is advanced security, the repertoire of the instant message applications is run;Or,
When the security level is low-level security, the partial function of the instant message applications is run;
It is described when the security level is low-level security, after the partial function for running the instant message applications, further includes:
Show Password Input prompting frame;
Obtain the encrypted message inputted based on the Password Input prompting frame;
The encrypted message is verified;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical, then The time that each character is inputted when according to input password is analyzed and determined, judges to be judged with failure discriminate, the failure Discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;To go through T in history input behavioriAverage value;TCThe shortest time of 2 characters is inputted when indicating continuous input for the man-machine crash time;P For adjustable similarity parameter, value is between 0 to 1;When all discriminates are not satisfied, verification result be password just Really;
When the verification result of the encrypted message is that password is correct, the repertoire of the instant message applications is run.
2. the operation method of instant message applications according to claim 1, which is characterized in that described to work as the security level When for low-level security, the partial function of the instant message applications is run, comprising:
When the security level is low-level security, the information input function of the instant message applications is run, forbids running institute The chat record for stating instant message applications obtains function.
3. the operation method of instant message applications according to claim 1, which is characterized in that described to work as the security level When for low-level security, the partial function of the instant message applications is run, comprising:
When the security level is low-level security, the sensitive record in the chat record of the instant message applications, institute are obtained It states in sensitive record comprising sensitive keys word;
The information input function of running the instant message applications forbids the acquisition function of running the sensitive record.
4. the operation method of instant message applications according to claim 1-3, which is characterized in that the determination is worked as The security level of preceding network, comprising:
According in the network type, network identity and Internet protocol address of the current network any one or any group It closes, determines the security level of the current network.
5. a kind of running gear of instant message applications characterized by comprising
Determining module, for determining the security level of current network when detecting instant message applications operation;
Module is obtained, the corresponding operating mode of the security level determined for obtaining the determining module;
Module is run, the operating mode for obtaining according to the acquisition module runs the instant message applications;
The security level that the determining module determines includes advanced security and low-level security;
The operation module includes: the first operation submodule or the second operation submodule;
The first operation submodule, for running the instant message applications when the security level is advanced security Repertoire;
The second operation submodule, for running the instant message applications when the security level is low-level security Partial function;
Described device further include: display module obtains module, authentication module;
The display module, for showing Password Input prompting frame;
The acquisition module, for obtaining the encrypted message based on Password Input prompting frame input;
The authentication module, for being verified to the encrypted message;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical, then The time that each character is inputted when according to input password is analyzed and determined, judges to be judged with failure discriminate, the failure Discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;To go through T in history input behavioriAverage value;TCThe shortest time of 2 characters is inputted when indicating continuous input for the man-machine crash time;P For adjustable similarity parameter, value is between 0 to 1;When all discriminates are not satisfied, verification result be password just Really;
The first operation submodule is also used to when the verification result of the encrypted message is that password is correct, and operation is described i.e. When communication software repertoire.
6. the running gear of instant message applications according to claim 5, which is characterized in that the second operation submodule It include: the first running unit;
First running unit, for running the letter of the instant message applications when the security level is low-level security Input function is ceased, the chat record for running the instant message applications is forbidden to obtain function.
CN201611162707.8A 2016-12-15 2016-12-15 The operation method and device of instant message applications Active CN106656756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611162707.8A CN106656756B (en) 2016-12-15 2016-12-15 The operation method and device of instant message applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611162707.8A CN106656756B (en) 2016-12-15 2016-12-15 The operation method and device of instant message applications

Publications (2)

Publication Number Publication Date
CN106656756A CN106656756A (en) 2017-05-10
CN106656756B true CN106656756B (en) 2019-09-13

Family

ID=58822796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611162707.8A Active CN106656756B (en) 2016-12-15 2016-12-15 The operation method and device of instant message applications

Country Status (1)

Country Link
CN (1) CN106656756B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2608602A1 (en) * 2011-12-21 2013-06-26 Nuance Communications, Inc. Situation-aware message presentation for automotive messaging
CN104267994A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running device and terminal device
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN105205388A (en) * 2014-06-05 2015-12-30 腾讯科技(深圳)有限公司 Authority management method and system for application
CN105550591A (en) * 2015-12-10 2016-05-04 厦门美图移动科技有限公司 Security protection device and method for user data in mobile terminal
CN105847216A (en) * 2015-01-12 2016-08-10 阿里巴巴集团控股有限公司 Identity authentication method and device
CN105873062A (en) * 2016-06-27 2016-08-17 联想(北京)有限公司 Method and device to be networked with wireless communication network, and terminal equipment
CN105991626A (en) * 2015-03-06 2016-10-05 小米科技有限责任公司 Network access method and network access device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2608602A1 (en) * 2011-12-21 2013-06-26 Nuance Communications, Inc. Situation-aware message presentation for automotive messaging
CN105205388A (en) * 2014-06-05 2015-12-30 腾讯科技(深圳)有限公司 Authority management method and system for application
CN104267994A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running device and terminal device
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN105847216A (en) * 2015-01-12 2016-08-10 阿里巴巴集团控股有限公司 Identity authentication method and device
CN105991626A (en) * 2015-03-06 2016-10-05 小米科技有限责任公司 Network access method and network access device
CN105550591A (en) * 2015-12-10 2016-05-04 厦门美图移动科技有限公司 Security protection device and method for user data in mobile terminal
CN105873062A (en) * 2016-06-27 2016-08-17 联想(北京)有限公司 Method and device to be networked with wireless communication network, and terminal equipment

Also Published As

Publication number Publication date
CN106656756A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
US9794228B2 (en) Security challenge assisted password proxy
CN106797371B (en) Method and system for user authentication
CN105681328B (en) The method, apparatus and electronic equipment of controlling electronic devices
CN104065621B (en) A kind of auth method of third party's service, client and system
Abbott et al. How mandatory second factor affects the authentication user experience
US20220207164A1 (en) Method for accessing application and apparatus, electronic device, and storage medium
US20150058972A1 (en) Method And Apparatus For Accessing An Application Program
US20130139238A1 (en) Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network
Li et al. Behaviour profiling on mobile devices
CA3066837A1 (en) Auto-user registration and unlocking of a computing device
CN104468611A (en) Data security processing method and device based on dual-system switching
CN103813334A (en) Right control method and right control device
WO2013043534A1 (en) Mobile computing device authentication using scannable images
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN104967597A (en) Third-party application message authentication method and system based on secure channel
CN107733838A (en) A kind of mobile terminal client terminal identity identifying method, device and system
CN105429943B (en) Information processing method and terminal thereof
CN109698809A (en) A kind of recognition methods of account abnormal login and device
CN107846406A (en) A kind of account logon method and device
Jubur et al. Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications
Consolvo et al. " Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns
CN106559386A (en) A kind of authentication method and device
CN104883341A (en) Application management device, terminal and application management method
Gerlitz et al. Adventures in recovery land: Testing the account recovery of popular websites when the second factor is lost

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220128

Address after: Room 1601, unit 1, 13th floor, building 1, No.33, Guangshun North Street, Chaoyang District, Beijing

Patentee after: BEIJING RONGLIAN YITONG INFORMATION TECHNOLOGY CO.,LTD.

Address before: 100000 room b253, floor 2, building 3, yard 29, Dongbeiwang South Road, Haidian District, Beijing

Patentee before: BEIJING RONGLIAN GUANGHUI TECHNOLOGY CO.,LTD.