The content of the invention
In view of this, the application provides a kind of method and device that chatting facial expression is transmitted between application, equipment, storage Jie
Matter.
To achieve the above object, the technical scheme that the application is provided is as follows:
According to the first aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
In response to the operation of the target chatting facial expression in duplication first application, first application passes through adding for setting
The expression file of the target chatting facial expression is encrypted close algorithm, obtains encrypted file;
It is described in response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized
Second application obtains decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for second application, obtains the target chat
The expression file of expression and the expression memory block for depositing in second application.
According to the second aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
Receive the second application transport that the target chatting facial expression during described first is applied is authorized to the described first application
Instruction;
The expression file of the target chatting facial expression is encrypted by the AES set for first application, is obtained
To encrypted file;
Second application obtains decruption key corresponding with the AES;
Second application is obtained the encrypted file and the encrypted file is carried out using the decruption key
Decryption, obtains the expression file of the target chatting facial expression and deposits in the expression memory block of second application.
According to the third aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
Operation in response to replicating the target chatting facial expression in first application, first application passes through the first encryption
The expression picture of the target chatting facial expression is encrypted algorithm, obtains encrypted picture file;
First application solves the metadata of the target chatting facial expression and first AES corresponding first
Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
It is described in response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized
Second application obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for second application, obtains the target chat table
The metadata of feelings and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second application, obtains described
The expression picture of target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by second application should
Expression memory block.
According to the fourth aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
Receive the second application transport that the target chatting facial expression during described first is applied is authorized to the described first application
Instruction;
The expression picture of the target chatting facial expression is encrypted by the first AES for first application, is obtained
Encrypted picture file;
First application solves the metadata of the target chatting facial expression and first AES corresponding first
Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Second application obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for second application, obtains the target chat table
The metadata of feelings and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second application, obtains described
The expression picture of target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by second application should
Expression memory block.
According to the 5th of the application the aspect, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and described device includes:Ciphering unit, key acquiring unit
And decryption unit;
The ciphering unit is in response to the operation of the target chatting facial expression in the application of duplication first, and the encryption for passing through setting is calculated
The expression file of the target chatting facial expression is encrypted method, obtains encrypted file;
The key acquiring unit by the target chatting facial expression in response to pasting first application is authorized second
Operation in, obtains decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for the decryption unit, obtains the target chat
The expression file of expression and the expression memory block for depositing in second application.
According to the 6th of the application the aspect, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and described device includes receiving unit, ciphering unit, key
Acquiring unit and decryption unit;
The target chatting facial expression that the receiving unit is received during first is applied should to the second of the described first application mandate
With the instruction of transmission;
The expression file of the target chatting facial expression is encrypted by the AES of setting for the ciphering unit, is obtained
To encrypted file;
The key acquiring unit obtains decruption key corresponding with the AES;
The decryption unit is obtained the encrypted file and the encrypted file is carried out using the decruption key
Decryption, obtains the expression file of the target chatting facial expression and deposits in the expression memory block of second application.
According to the 7th of the application the aspect, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and described device includes:First ciphering unit, the second encryption
Unit, key acquiring unit, the first decryption unit, the second decryption unit and memory cell;
First ciphering unit passes through the first encryption in response to the operation of the target chatting facial expression in the application of duplication first
The expression picture of the target chatting facial expression is encrypted algorithm, obtains encrypted picture file;
Second ciphering unit is by the metadata of the target chatting facial expression and first AES corresponding
One decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
The key acquiring unit by the target chatting facial expression in response to pasting first application is authorized second
Operation in, obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit, is obtained the target and is chatted
The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit, is obtained
The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by the memory cell should
Expression memory block.
According to the eighth aspect of the application, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and described device includes:Receiving unit, the first ciphering unit,
Second ciphering unit, key acquiring unit, the first decryption unit, the second decryption unit and memory cell;
The target chatting facial expression that the receiving unit is received during first is applied should to the second of the described first application mandate
With the instruction of transmission;
The expression picture of the target chatting facial expression is encrypted by the first AES for first ciphering unit,
Obtain encrypted picture file;
Second ciphering unit is by the metadata of the target chatting facial expression and first AES corresponding
One decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
The key acquiring unit obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit, is obtained the target and is chatted
The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit, is obtained
The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by the memory cell should
Expression memory block.
The chatting facial expression in needing to apply first is can be seen that by above technical scheme to share in the second application
Carry out in use, it is possible, firstly, to the expression file of required shared target chatting facial expression is encrypted by the first application,
Then, if the second application is the mandate application of the first application, the second application can be got to the expression text after encryption
The key that part is decrypted, and the expression file of above-mentioned target chatting facial expression is obtained using the secret key decryption, finally, the second application
The expression file of acquisition can be deposited in the expression memory block of second application, with for users to use.It can be seen that, only second
After being authorized to, it can just obtain the expression file in the first application and use, for the application being not authorized to, being can not
Using the first chatting facial expression applied, so that the security of chatting facial expression data (is avoided extraneous in each application is ensured
It is illegal to obtain) on the premise of, realize that the chatting facial expression between different application is shared.
Embodiment
At present, chatting facial expression is widely used in all kinds of chat class softwares, and the developers of all kinds of chat class softwares can be with
Unique chatting facial expression bag is designed, to attract user.Chatting facial expression can be divided into symbol class expression or static images class expression or
Dynamic picture class expression etc..Generally, chatting facial expression is created by major application software, it is contemplated that the guarantor of intellectual property
Shield, is only limited to be used in this applies A using A chatting facial expression, can not typically be used by a user using in B.However, working as
The modern increasing user applied using chat class wishes chatting facial expression original in a certain application A sharing to another application
Used in B.In order to meet this demand of user, while ensure the original expression of major applications is not made illegally by the external world
With, it is proposed that following solution.
A kind of flow of the methods of application between transmitting chatting facial expression of the Fig. 1 according to an exemplary embodiment.Such as Fig. 1
Shown, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with first should
Applied with second.Wherein, first application and the second application can be the application for possessing chat feature.In one embodiment,
This method comprises the steps 101~108, wherein:
In a step 101, in response to the operation of the target chatting facial expression in duplication first application, the first application passes through
The expression picture of target chatting facial expression is encrypted first AES, obtains encrypted picture file.
, it is necessary to read the target chat table after target chatting facial expression during user applies to first carries out duplication operation
The expression file of feelings.In one embodiment, the expression file of each chatting facial expression in mainly includes:Expression picture is (such as:
Smiling face's picture that one form is GIF) and for the metadata for the attribute for describing the expression picture.Wherein, metadata is retouched
The attribute stated can include but is not limited to:Expression name, source, author, copyright information, packet, unique identifier, size etc..
In one embodiment, first AES can be AES (Advanced Encryption Standard) AES, and
Expression picture is encrypted using AES encryption algorithm.
In an alternative embodiment, by AES encryption algorithm by N number of byte in the expression picture of the target chatting facial expression
Header data be encrypted, wherein, N≤256.Wherein, on the one hand, due to the header data of expression picture be usually picture compared with
For important data, after the header data of N number of byte (byte) is encrypted, it is sufficient to ensure that other people can not restore expression
Picture.On the other hand, only the partial data in expression picture is encrypted, it is possibility to have effect improves the time-consuming of ciphering process,
Improve computer disposal efficiency.Further, since AES encryption algorithm is symmetric encipherment algorithm, so its ciphering process and decrypted
The same keys of Cheng Caiyong, the key can be 128byte data.Certainly, above-mentioned first AES is not limited to AES encryption
Algorithm.
In a step 102, encrypted picture file is deposited in public file storage area (such as by the first application:Android
The file storage area of system share) under specified path.
In step 103, the specified circuit that the metadata of target chatting facial expression, encrypted picture file are deposited in the first application
Footpath and corresponding first decruption key of the first AES are assemblied into text to be encrypted, and will be described by the second AES
Text encryption to be encrypted is ciphertext.
Fig. 2 is the ciphertext structure of gained after a kind of encryption according to an exemplary embodiment, wherein, ciphertext may include
The local path and the key of the first AES of expression picture after data head, the metadata of chatting facial expression, storage encryption
(herein referred as the first decruption key).Wherein, the data head is for indicating that the second application need to decrypt the mark of the ciphertext, being somebody's turn to do
It is masked as first application and the described second application is made an appointment, that is to say, that the second application can be to read this close
After text, it can recognise that process is decrypted to the ciphertext in needs by the data head of the ciphertext.Certainly, above-mentioned mark
The position aimed in the ciphertext is not restricted.In other possible embodiments, above-mentioned ciphertext can not include this mark yet.
In one embodiment, the second AES can be rivest, shamir, adelman, for example:RSA, Elgamal, knapsack are calculated
Method, Rabin, D-H, ECC (elliptic curve encryption algorithm) etc..Rivest, shamir, adelman includes public key and the private previously generated for a pair
Key, wherein, public key and private key are preassigned to the described first application and the described second application respectively.In a specific embodiment
In, using the public key of RSA Algorithm to above-mentioned metadata, the specified path and the first decruption key of encrypted picture file storage
It is encrypted.
After encryption obtains above-mentioned ciphertext, the ciphertext can temporarily be deposited in shear plate service by the first application
In ClipboardManager (the one piece of storage region opened up in internal memory).
At step 104, in response to target chatting facial expression is pasted in the second application that first application is authorized
Operation, the second application obtains the second decruption key corresponding with second AES.
In the present embodiment, the process of chatting facial expression is transmitted between different application needs user by way of duplication+stickup
To trigger, wherein, user selectes certain in the interface of the first application and expresses one's feelings and click on after duplication button, and second can be switched to immediately
The interface of application, and right click and click paste button in the interface.
The protection of intellectual property ought to be obtained in view of chatting facial expression, was not suitable for the use of the chatting facial expression of the first application
Any one other application is given in power exploitation.Therefore, the application developer of the first application can be selected and one or more mutual conjunctions
The application developer of work is cooperated, and carries out unidirectional or two-way chatting facial expression use mandate.That is, in the second application
It is that the second application is just preassigned the second decruption key to the second AES on the premise of the mandate of the first application is applied
(private key of such as RSA Algorithm);, whereas if the second application is uncommitted, second decruption key can not be obtained.
In one embodiment, when the mandate that the second application is the first application is applied, unique a pair of public affairs can be previously generated
Key and private key are simultaneously respectively allocated to the first application and the second application, hereafter, and any one is provided with the user of first application
Equipment can get the public key, and any one user equipment for being provided with second application can get described
Private key.Wherein, public key and private key can be deposited under the local path of user equipment in advance, or be stored on application in advance
On server, when needing to encrypt or decrypting, the public key or private key are obtained from the application server.In another embodiment,
Can be that each be provided with the first application and the user equipment of the second application generates a pair of unique public affairs respectively to improve security
Key and private key.
In step 105, the ciphertext is decrypted using second decruption key for the second application, obtains the mesh
Mark the metadata and the first decruption key of chatting facial expression.
In step 106, the encrypted picture file is decrypted using first decruption key for the second application,
Obtain the expression picture of the target chatting facial expression.
In the present embodiment, the path of the encrypted picture file of obtained storage is decrypted in the second application according to above-mentioned steps 105,
The encrypted picture file is read, and the encrypted picture file is solved using the first decruption key (such as AES key)
It is close, obtain the expression picture.
In step 107, the encrypted picture text that will be deposited in the specified path under public file storage area
Part is deleted.
In step 108, the metadata of the expression picture and the target chatting facial expression is deposited in institute by the second application
The expression memory block of the second application is stated, after this, user is carried out in just being applied second using above-mentioned target chatting facial expression
Chat.
It is the reading and writing data process in the user equipment according to an exemplary embodiment shown in reference picture 3, wherein,
Replicated in the first application that user installs on a user device after some target chatting facial expression, the first application can be using in advance
If AES key the expression picture is encrypted, and by the public file storage area of the expression picture writing system after encryption;
Then, the first application also needs to public key using default RSA Algorithm by depositing comprising the expression picture after AES key, encryption
The text (such as Json forms) of storage path and metadata is encrypted, and obtains ciphertext (the corresponding data head of addition), and should
In ciphertext write-in shear plate service ClipboardManager;Hereafter, when in the second application that user installs on a user device
Paste after above-mentioned target chatting facial expression, the second application just reads ciphertext from shear plate service ClipboardManager, and
It is decrypted using the private key of RSA Algorithm, the store path and first number of the expression picture after AES key, encryption is obtained
According to;Therewith, the encrypted picture under store path is read in the second application, and it is decrypted using AES key, is expressed one's feelings
Picture;Finally, metadata and expression picture are stored in the expression memory block of oneself by the second application, in case using.
In other possible embodiments, above-mentioned steps 102 and step 103 can be saved.It is used as replacement, encrypted figure
Piece file can be together written into ciphertext in shear plate service ClipboardManager.Or, transmitted by alternative document
Mode transmits the picture file and ciphertext after above-mentioned encryption, includes but is not limited to:File-sharing, using communication (such as
TCP), shared drive, using pipeline etc. set up.
The technical scheme provided by Fig. 1, the chatting facial expression in needing to apply first shares to enter in the second application
Row in use, it is possible, firstly, to the expression file of required shared target chatting facial expression is encrypted by the first application, with
Afterwards, if the second application is the mandate application of the first application, the second application can be got to the expression file after encryption
The key being decrypted, and the expression file of above-mentioned target chatting facial expression is obtained using the secret key decryption, finally, the second application can
So that the expression file of acquisition to be deposited in the expression memory block of second application, with for users to use.It can be seen that, only second should
After being authorized to, it can just obtain the expression file in the first application and use, be to make for the application being not authorized to
With the first chatting facial expression applied, so that the security of chatting facial expression data (is avoided non-by the external world in each application is ensured
Method is obtained) on the premise of, realize that the chatting facial expression between different application is shared.
Fig. 4 is the flow of another method that chatting facial expression is transmitted between application according to an exemplary embodiment,
As shown in figure 4, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with
One application and the second application.Wherein, first application and the second application can be the application for possessing chat feature.In an embodiment
In, this method comprises the steps 201~109, wherein:
In step 201, the target chatting facial expression during described first is applied is authorized to the described first application the is received
The instruction of two application transports.
In the present embodiment, the instruction can be triggered by the specific operation of user.Wherein, the specific operation can be use
The single operation of family on a user device, or the constituted operative combination of multiple continuous operations.For example, in a kind of scene
In, the chatting facial expression in user needs to apply first, which is transferred in the second application, to be carried out in use, user needs to make as follows
Operation:Paste operation in operating+being applied second to replicating for target chatting facial expression in being applied first;In another scene
In, user needs to make following operation:Mouse right click is carried out to target chatting facial expression in the first application, selected in the dialog box jumped out
" share other and authorize application " is selected, one conduct of selection " the second application " from multiple alternative mandate applications afterwards;Etc..
In another scene, it is assumed that the mandate application of the first application be it is unique, then can directly by double mouse click chatting facial expression or
The mode of " share other and authorize application " is selected to trigger above-mentioned instruction in the dialog box jumped out after right click.Herein to instruction
Triggering mode be not restricted.
In step 202., the first application is carried out the expression picture of the target chatting facial expression by the first AES
Encryption, obtains encrypted picture file.
In step 203, the finger that the first application deposits in the encrypted picture file under public file storage area
Determine path.
In step 204, the first application by the path of the metadata of target chatting facial expression, the storage of encrypted picture file with
And first corresponding first decruption key of AES be assemblied into text to be encrypted, and will be described to be added by the second AES
Ciphertext is originally encrypted as ciphertext.
In step 205, the second application obtains the second decruption key corresponding with second AES.
In step 206, the ciphertext is decrypted using second decruption key for the second application, obtains the mesh
Mark the metadata and the first decruption key of chatting facial expression.
In step 207, the encrypted picture file is decrypted using first decruption key for the second application,
Obtain the expression picture of the target chatting facial expression.
In a step 208, the encrypted picture text that will be deposited in the specified path under public file storage area
Part is deleted.
In step 209, the metadata of the expression picture and the target chatting facial expression is deposited in institute by the second application
State the expression memory block of the second application.
202~step 209 of above-mentioned steps can refer to the particular content of 101~step 108 of above-mentioned steps, no longer give herein
Repeat.
Fig. 5 is the flow for the method that another according to an exemplary embodiment transmits chatting facial expression between application,
As shown in figure 5, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with
One application and the second application.Wherein, first application and the second application can be the application for possessing chat feature.In an embodiment
In, this method comprises the steps 301~303, wherein:
In step 301, in response to the operation of the target chatting facial expression in duplication first application, the first application passes through
The expression file of the target chatting facial expression is encrypted the AES of setting, obtains encrypted file.
In one embodiment, the expression file can be expression picture.In another embodiment, the expression file can be with
Including expression picture and for the metadata for the attribute for describing the expression picture.
In step 302, in response to the target chatting facial expression is pasted into the second application that first application is authorized
In operation, the second application obtains corresponding with AES decruption key.
In an alternative embodiment, the AES is rivest, shamir, adelman (such as RSA), and the asymmetric encryption is calculated
The corresponding public key of method and private key are respectively allocated to first application and the described second application.
In step 303, the encrypted file is decrypted using the decruption key for the second application, obtains described
The expression file of target chatting facial expression and the expression memory block for depositing in second application, subsequently to be used.
The technical scheme provided by Fig. 5, after the only second application is authorized to, can just obtain the table in the first application
Feelings file is simultaneously used, for the application being not authorized to, and is that can not use the chatting facial expression of the first application, so as to ensure respectively should
On the premise of with the security (avoiding by extraneous illegal acquisition) of middle chatting facial expression data, the chat between different application is realized
Expression is shared.
Fig. 6 is the flow for the method that another according to an exemplary embodiment transmits chatting facial expression between application,
As shown in fig. 6, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with
One application and the second application.Wherein, first application and the second application can be the application for possessing chat feature.In an embodiment
In, this method comprises the steps 401~404, wherein:
In step 401, the target chatting facial expression during described first is applied is authorized to the described first application the is received
The instruction of two application transports.
In the present embodiment, the instruction can be triggered by the specific operation of user.Wherein, the specific operation can be use
The single operation of family on a user device, or the constituted operative combination of multiple continuous operations.
In step 402, the first application is entered the expression file of the target chatting facial expression by the AES set
Row encryption, obtains encrypted file.
In one embodiment, the expression file can be expression picture.In another embodiment, the expression file can be with
Including expression picture and for the metadata for the attribute for describing the expression picture.
In step 403, the second application obtains decruption key corresponding with the AES.
In an alternative embodiment, the AES is rivest, shamir, adelman (such as RSA), and the asymmetric encryption is calculated
The corresponding public key of method and private key are respectively allocated to first application and the described second application.
In step 404, the second application obtains the encrypted file and using the decruption key to described encrypted
File is decrypted, and obtains the expression file of the target chatting facial expression and deposits in the expression memory block of second application.
The technical scheme provided by Fig. 6, after the only second application is authorized to, can just obtain the table in the first application
Feelings file is simultaneously used, for the application being not authorized to, and is that can not use the chatting facial expression of the first application, so as to ensure respectively should
On the premise of with the security (avoiding by extraneous illegal acquisition) of middle chatting facial expression data, the chat between different application is realized
Expression is shared.
Fig. 7 is the hardware configuration of a kind of electronic equipment according to an exemplary embodiment.Fig. 7 is refer to, in hardware
Aspect, the electronic equipment includes processor, internal bus, network interface, memory (including internal memory and non-volatile memories
Device), the hardware required for other business is also possible that certainly.Wherein, it can be stored with to realize in memory and answer
With an interrelated logic (i.e. computer program) for transmission chatting facial expression, processor can read corresponding from nonvolatile memory
Computer program is into internal memory and then runs.Certainly, in addition to software realization mode, the application is not precluded from other realization sides
Mode of formula, such as logical device or software and hardware combining etc., that is to say, that the executive agent of following handling process is not limited
Due to each logic unit or hardware or logical device.
As shown in figure 8, in one embodiment, a kind of device 300 that chatting facial expression is transmitted between application is set applied to user
Standby, the user equipment is provided with the first application and the second application, and described device 300 includes:Ciphering unit 501, key are obtained
Unit 502 and decryption unit 503;Wherein, ciphering unit 501 may be present in the first application, key acquiring unit 502 and decryption
Unit 503 may be present in the second application.Specifically:
Ciphering unit 501 is in response to the operation of the target chatting facial expression in the application of duplication first, and the encryption for passing through setting is calculated
The expression file of the target chatting facial expression is encrypted method, obtains encrypted file;
Key acquiring unit 502 should in response to the target chatting facial expression is pasted into the second of the first application mandate
Operation in, obtains decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for decryption unit 503, obtains the target chat
The expression file of expression and the expression memory block for depositing in second application.
As shown in figure 9, in one embodiment, a kind of device 600 that chatting facial expression is transmitted between application is set applied to user
Standby, the user equipment is provided with the first application and the second application, and described device 600 includes receiving unit 601, ciphering unit
602nd, key acquiring unit 603 and decryption unit 604;Wherein, ciphering unit 602 be may be present in the first application, and key is obtained
Unit 603 and decryption unit 604 may be present in the second application.Specifically:
Receiving unit 601 receives the second application that the target chatting facial expression during first is applied is authorized to the described first application
The instruction of transmission;
The expression file of the target chatting facial expression is encrypted by the AES of setting for ciphering unit 602, is obtained
To encrypted file;
Key acquiring unit 603 obtains decruption key corresponding with the AES;
Decryption unit 604 is obtained the encrypted file and the encrypted file is solved using the decruption key
It is close, obtain the expression file of the target chatting facial expression and deposit in the expression memory block of second application.
As shown in Figure 10, in one embodiment, a kind of device 700 that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and described device 700 includes:First ciphering unit 701,
Two ciphering units 702, key acquiring unit 703, the first decryption unit 704, the second decryption unit 705 and memory cell 706;Its
In, the first ciphering unit 701, the second ciphering unit 702 be may be present in the first application, and key acquiring unit 703, first is decrypted
Unit 704, the second decryption unit 705 and memory cell 706 may be present in the second application.Specifically:
First ciphering unit 701 passes through the first encryption in response to the operation of the target chatting facial expression in the application of duplication first
The expression picture of the target chatting facial expression is encrypted algorithm, obtains encrypted picture file;
Second ciphering unit 702 is by the metadata of the target chatting facial expression and first AES corresponding first
Decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Key acquiring unit 703 should in response to the target chatting facial expression is pasted into the second of the first application mandate
Operation in, obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit 704, is obtained the target and is chatted
The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit 705, is obtained
The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by memory cell 706
Expression memory block.
As shown in figure 11, in one embodiment, a kind of device 800 that chatting facial expression is transmitted between application, applied to user
Equipment, the user equipment is provided with the first application and the second application, and described device 800 includes:Receiving unit 801, first adds
Close unit 802, the second ciphering unit 803, key acquiring unit 804, the first decryption unit 805, the second decryption unit 806 and deposit
Storage unit 807;Wherein, the first ciphering unit 802, the second ciphering unit 803 may be present in the first application, key acquiring unit
804th, the first decryption unit 805, the second decryption unit 806 and memory cell 807 may be present in the second application.Specifically:
Receiving unit 801 receives the second application that the target chatting facial expression during first is applied is authorized to the described first application
The instruction of transmission;
The expression picture of the target chatting facial expression is encrypted by the first AES for first ciphering unit 802,
Obtain encrypted picture file;
Second ciphering unit 803 is by the metadata of the target chatting facial expression and first AES corresponding first
Decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Key acquiring unit 804 obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit 805, is obtained the target and is chatted
The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit 806, is obtained
The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by memory cell 807
Expression memory block.
The step of above computer program is realized when being executed by processor is referred to description above to embodiment of the method,
Also, on the premise of not colliding, the content of said apparatus embodiment and the content of above method embodiment can be mended each other
Fill, this is no longer repeated.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity,
Or realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can
To be personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play
In device, navigation equipment, E-mail receiver/send equipment, game console, tablet PC, wearable device or these equipment
The combination of any several equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flashRAM).Internal memory is showing for computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitorymedia), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by
Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with
Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system
Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.