CN107277028A - The method and device, equipment, storage medium of chatting facial expression are transmitted between application - Google Patents

The method and device, equipment, storage medium of chatting facial expression are transmitted between application Download PDF

Info

Publication number
CN107277028A
CN107277028A CN201710522568.3A CN201710522568A CN107277028A CN 107277028 A CN107277028 A CN 107277028A CN 201710522568 A CN201710522568 A CN 201710522568A CN 107277028 A CN107277028 A CN 107277028A
Authority
CN
China
Prior art keywords
application
expression
encrypted
facial expression
aes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710522568.3A
Other languages
Chinese (zh)
Other versions
CN107277028B (en
Inventor
任健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710522568.3A priority Critical patent/CN107277028B/en
Publication of CN107277028A publication Critical patent/CN107277028A/en
Application granted granted Critical
Publication of CN107277028B publication Critical patent/CN107277028B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of method and device, equipment, storage medium that chatting facial expression is transmitted between application, the chatting facial expression on the premise of the security of chatting facial expression data in ensuring each application, to realize between different application is shared.Wherein, method includes:The expression file of the target chatting facial expression is encrypted by the AES set for operation in response to replicating the target chatting facial expression in first application, first application, obtains encrypted file;In response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized, second application obtains decruption key corresponding with the AES;The encrypted file is decrypted using the decruption key for second application, is obtained the expression file of the target chatting facial expression and is deposited in the expression memory block of second application.

Description

The method and device, equipment, storage medium of chatting facial expression are transmitted between application
Technical field
The application is related to communication technique field, more particularly to a kind of method and device that chatting facial expression is transmitted between application, Equipment, storage medium.
Background technology
At present, there are various chatting facial expressions in major chat class applications (App) to use in chat process for user. Generally, the chatting facial expression of application is only limited to be used in this application, and can not be used by a user in other application.With skill The development of art, the increasing user applied using chat class wishes to share to chatting facial expression original in a certain application separately Used in one application.
The content of the invention
In view of this, the application provides a kind of method and device that chatting facial expression is transmitted between application, equipment, storage Jie Matter.
To achieve the above object, the technical scheme that the application is provided is as follows:
According to the first aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
In response to the operation of the target chatting facial expression in duplication first application, first application passes through adding for setting The expression file of the target chatting facial expression is encrypted close algorithm, obtains encrypted file;
It is described in response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized Second application obtains decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for second application, obtains the target chat The expression file of expression and the expression memory block for depositing in second application.
According to the second aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
Receive the second application transport that the target chatting facial expression during described first is applied is authorized to the described first application Instruction;
The expression file of the target chatting facial expression is encrypted by the AES set for first application, is obtained To encrypted file;
Second application obtains decruption key corresponding with the AES;
Second application is obtained the encrypted file and the encrypted file is carried out using the decruption key Decryption, obtains the expression file of the target chatting facial expression and deposits in the expression memory block of second application.
According to the third aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
Operation in response to replicating the target chatting facial expression in first application, first application passes through the first encryption The expression picture of the target chatting facial expression is encrypted algorithm, obtains encrypted picture file;
First application solves the metadata of the target chatting facial expression and first AES corresponding first Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
It is described in response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized Second application obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for second application, obtains the target chat table The metadata of feelings and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second application, obtains described The expression picture of target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by second application should Expression memory block.
According to the fourth aspect of the application, it is proposed that a kind of method that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and methods described includes:
Receive the second application transport that the target chatting facial expression during described first is applied is authorized to the described first application Instruction;
The expression picture of the target chatting facial expression is encrypted by the first AES for first application, is obtained Encrypted picture file;
First application solves the metadata of the target chatting facial expression and first AES corresponding first Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Second application obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for second application, obtains the target chat table The metadata of feelings and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second application, obtains described The expression picture of target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by second application should Expression memory block.
According to the 5th of the application the aspect, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and described device includes:Ciphering unit, key acquiring unit And decryption unit;
The ciphering unit is in response to the operation of the target chatting facial expression in the application of duplication first, and the encryption for passing through setting is calculated The expression file of the target chatting facial expression is encrypted method, obtains encrypted file;
The key acquiring unit by the target chatting facial expression in response to pasting first application is authorized second Operation in, obtains decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for the decryption unit, obtains the target chat The expression file of expression and the expression memory block for depositing in second application.
According to the 6th of the application the aspect, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and described device includes receiving unit, ciphering unit, key Acquiring unit and decryption unit;
The target chatting facial expression that the receiving unit is received during first is applied should to the second of the described first application mandate With the instruction of transmission;
The expression file of the target chatting facial expression is encrypted by the AES of setting for the ciphering unit, is obtained To encrypted file;
The key acquiring unit obtains decruption key corresponding with the AES;
The decryption unit is obtained the encrypted file and the encrypted file is carried out using the decruption key Decryption, obtains the expression file of the target chatting facial expression and deposits in the expression memory block of second application.
According to the 7th of the application the aspect, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and described device includes:First ciphering unit, the second encryption Unit, key acquiring unit, the first decryption unit, the second decryption unit and memory cell;
First ciphering unit passes through the first encryption in response to the operation of the target chatting facial expression in the application of duplication first The expression picture of the target chatting facial expression is encrypted algorithm, obtains encrypted picture file;
Second ciphering unit is by the metadata of the target chatting facial expression and first AES corresponding One decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
The key acquiring unit by the target chatting facial expression in response to pasting first application is authorized second Operation in, obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit, is obtained the target and is chatted The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit, is obtained The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by the memory cell should Expression memory block.
According to the eighth aspect of the application, it is proposed that a kind of device that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and described device includes:Receiving unit, the first ciphering unit, Second ciphering unit, key acquiring unit, the first decryption unit, the second decryption unit and memory cell;
The target chatting facial expression that the receiving unit is received during first is applied should to the second of the described first application mandate With the instruction of transmission;
The expression picture of the target chatting facial expression is encrypted by the first AES for first ciphering unit, Obtain encrypted picture file;
Second ciphering unit is by the metadata of the target chatting facial expression and first AES corresponding One decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
The key acquiring unit obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit, is obtained the target and is chatted The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit, is obtained The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in described second by the memory cell should Expression memory block.
The chatting facial expression in needing to apply first is can be seen that by above technical scheme to share in the second application Carry out in use, it is possible, firstly, to the expression file of required shared target chatting facial expression is encrypted by the first application, Then, if the second application is the mandate application of the first application, the second application can be got to the expression text after encryption The key that part is decrypted, and the expression file of above-mentioned target chatting facial expression is obtained using the secret key decryption, finally, the second application The expression file of acquisition can be deposited in the expression memory block of second application, with for users to use.It can be seen that, only second After being authorized to, it can just obtain the expression file in the first application and use, for the application being not authorized to, being can not Using the first chatting facial expression applied, so that the security of chatting facial expression data (is avoided extraneous in each application is ensured It is illegal to obtain) on the premise of, realize that the chatting facial expression between different application is shared.
Brief description of the drawings
Fig. 1 is a kind of flow of method that chatting facial expression is transmitted between application according to an exemplary embodiment;
Fig. 2 is the ciphertext structure of gained after a kind of encryption according to an exemplary embodiment;
Fig. 3 is the reading and writing data process in the user equipment according to an exemplary embodiment;
Fig. 4 is the flow of another method that chatting facial expression is transmitted between application according to an exemplary embodiment;
Fig. 5 is the flow for the method that another according to an exemplary embodiment transmits chatting facial expression between application;
Fig. 6 is the flow for the method that another according to an exemplary embodiment transmits chatting facial expression between application;
Fig. 7 is the hardware structure of a kind of electronic equipment according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of device that chatting facial expression is transmitted between application according to an exemplary embodiment;
Fig. 9 is the block diagram of another device that chatting facial expression is transmitted between application according to an exemplary embodiment;
Figure 10 is the block diagram for the device that another according to an exemplary embodiment transmits chatting facial expression between application;
Figure 11 is the block diagram for the device that another according to an exemplary embodiment transmits chatting facial expression between application.
Embodiment
At present, chatting facial expression is widely used in all kinds of chat class softwares, and the developers of all kinds of chat class softwares can be with Unique chatting facial expression bag is designed, to attract user.Chatting facial expression can be divided into symbol class expression or static images class expression or Dynamic picture class expression etc..Generally, chatting facial expression is created by major application software, it is contemplated that the guarantor of intellectual property Shield, is only limited to be used in this applies A using A chatting facial expression, can not typically be used by a user using in B.However, working as The modern increasing user applied using chat class wishes chatting facial expression original in a certain application A sharing to another application Used in B.In order to meet this demand of user, while ensure the original expression of major applications is not made illegally by the external world With, it is proposed that following solution.
A kind of flow of the methods of application between transmitting chatting facial expression of the Fig. 1 according to an exemplary embodiment.Such as Fig. 1 Shown, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with first should Applied with second.Wherein, first application and the second application can be the application for possessing chat feature.In one embodiment, This method comprises the steps 101~108, wherein:
In a step 101, in response to the operation of the target chatting facial expression in duplication first application, the first application passes through The expression picture of target chatting facial expression is encrypted first AES, obtains encrypted picture file.
, it is necessary to read the target chat table after target chatting facial expression during user applies to first carries out duplication operation The expression file of feelings.In one embodiment, the expression file of each chatting facial expression in mainly includes:Expression picture is (such as: Smiling face's picture that one form is GIF) and for the metadata for the attribute for describing the expression picture.Wherein, metadata is retouched The attribute stated can include but is not limited to:Expression name, source, author, copyright information, packet, unique identifier, size etc.. In one embodiment, first AES can be AES (Advanced Encryption Standard) AES, and Expression picture is encrypted using AES encryption algorithm.
In an alternative embodiment, by AES encryption algorithm by N number of byte in the expression picture of the target chatting facial expression Header data be encrypted, wherein, N≤256.Wherein, on the one hand, due to the header data of expression picture be usually picture compared with For important data, after the header data of N number of byte (byte) is encrypted, it is sufficient to ensure that other people can not restore expression Picture.On the other hand, only the partial data in expression picture is encrypted, it is possibility to have effect improves the time-consuming of ciphering process, Improve computer disposal efficiency.Further, since AES encryption algorithm is symmetric encipherment algorithm, so its ciphering process and decrypted The same keys of Cheng Caiyong, the key can be 128byte data.Certainly, above-mentioned first AES is not limited to AES encryption Algorithm.
In a step 102, encrypted picture file is deposited in public file storage area (such as by the first application:Android The file storage area of system share) under specified path.
In step 103, the specified circuit that the metadata of target chatting facial expression, encrypted picture file are deposited in the first application Footpath and corresponding first decruption key of the first AES are assemblied into text to be encrypted, and will be described by the second AES Text encryption to be encrypted is ciphertext.
Fig. 2 is the ciphertext structure of gained after a kind of encryption according to an exemplary embodiment, wherein, ciphertext may include The local path and the key of the first AES of expression picture after data head, the metadata of chatting facial expression, storage encryption (herein referred as the first decruption key).Wherein, the data head is for indicating that the second application need to decrypt the mark of the ciphertext, being somebody's turn to do It is masked as first application and the described second application is made an appointment, that is to say, that the second application can be to read this close After text, it can recognise that process is decrypted to the ciphertext in needs by the data head of the ciphertext.Certainly, above-mentioned mark The position aimed in the ciphertext is not restricted.In other possible embodiments, above-mentioned ciphertext can not include this mark yet.
In one embodiment, the second AES can be rivest, shamir, adelman, for example:RSA, Elgamal, knapsack are calculated Method, Rabin, D-H, ECC (elliptic curve encryption algorithm) etc..Rivest, shamir, adelman includes public key and the private previously generated for a pair Key, wherein, public key and private key are preassigned to the described first application and the described second application respectively.In a specific embodiment In, using the public key of RSA Algorithm to above-mentioned metadata, the specified path and the first decruption key of encrypted picture file storage It is encrypted.
After encryption obtains above-mentioned ciphertext, the ciphertext can temporarily be deposited in shear plate service by the first application In ClipboardManager (the one piece of storage region opened up in internal memory).
At step 104, in response to target chatting facial expression is pasted in the second application that first application is authorized Operation, the second application obtains the second decruption key corresponding with second AES.
In the present embodiment, the process of chatting facial expression is transmitted between different application needs user by way of duplication+stickup To trigger, wherein, user selectes certain in the interface of the first application and expresses one's feelings and click on after duplication button, and second can be switched to immediately The interface of application, and right click and click paste button in the interface.
The protection of intellectual property ought to be obtained in view of chatting facial expression, was not suitable for the use of the chatting facial expression of the first application Any one other application is given in power exploitation.Therefore, the application developer of the first application can be selected and one or more mutual conjunctions The application developer of work is cooperated, and carries out unidirectional or two-way chatting facial expression use mandate.That is, in the second application It is that the second application is just preassigned the second decruption key to the second AES on the premise of the mandate of the first application is applied (private key of such as RSA Algorithm);, whereas if the second application is uncommitted, second decruption key can not be obtained.
In one embodiment, when the mandate that the second application is the first application is applied, unique a pair of public affairs can be previously generated Key and private key are simultaneously respectively allocated to the first application and the second application, hereafter, and any one is provided with the user of first application Equipment can get the public key, and any one user equipment for being provided with second application can get described Private key.Wherein, public key and private key can be deposited under the local path of user equipment in advance, or be stored on application in advance On server, when needing to encrypt or decrypting, the public key or private key are obtained from the application server.In another embodiment, Can be that each be provided with the first application and the user equipment of the second application generates a pair of unique public affairs respectively to improve security Key and private key.
In step 105, the ciphertext is decrypted using second decruption key for the second application, obtains the mesh Mark the metadata and the first decruption key of chatting facial expression.
In step 106, the encrypted picture file is decrypted using first decruption key for the second application, Obtain the expression picture of the target chatting facial expression.
In the present embodiment, the path of the encrypted picture file of obtained storage is decrypted in the second application according to above-mentioned steps 105, The encrypted picture file is read, and the encrypted picture file is solved using the first decruption key (such as AES key) It is close, obtain the expression picture.
In step 107, the encrypted picture text that will be deposited in the specified path under public file storage area Part is deleted.
In step 108, the metadata of the expression picture and the target chatting facial expression is deposited in institute by the second application The expression memory block of the second application is stated, after this, user is carried out in just being applied second using above-mentioned target chatting facial expression Chat.
It is the reading and writing data process in the user equipment according to an exemplary embodiment shown in reference picture 3, wherein, Replicated in the first application that user installs on a user device after some target chatting facial expression, the first application can be using in advance If AES key the expression picture is encrypted, and by the public file storage area of the expression picture writing system after encryption; Then, the first application also needs to public key using default RSA Algorithm by depositing comprising the expression picture after AES key, encryption The text (such as Json forms) of storage path and metadata is encrypted, and obtains ciphertext (the corresponding data head of addition), and should In ciphertext write-in shear plate service ClipboardManager;Hereafter, when in the second application that user installs on a user device Paste after above-mentioned target chatting facial expression, the second application just reads ciphertext from shear plate service ClipboardManager, and It is decrypted using the private key of RSA Algorithm, the store path and first number of the expression picture after AES key, encryption is obtained According to;Therewith, the encrypted picture under store path is read in the second application, and it is decrypted using AES key, is expressed one's feelings Picture;Finally, metadata and expression picture are stored in the expression memory block of oneself by the second application, in case using.
In other possible embodiments, above-mentioned steps 102 and step 103 can be saved.It is used as replacement, encrypted figure Piece file can be together written into ciphertext in shear plate service ClipboardManager.Or, transmitted by alternative document Mode transmits the picture file and ciphertext after above-mentioned encryption, includes but is not limited to:File-sharing, using communication (such as TCP), shared drive, using pipeline etc. set up.
The technical scheme provided by Fig. 1, the chatting facial expression in needing to apply first shares to enter in the second application Row in use, it is possible, firstly, to the expression file of required shared target chatting facial expression is encrypted by the first application, with Afterwards, if the second application is the mandate application of the first application, the second application can be got to the expression file after encryption The key being decrypted, and the expression file of above-mentioned target chatting facial expression is obtained using the secret key decryption, finally, the second application can So that the expression file of acquisition to be deposited in the expression memory block of second application, with for users to use.It can be seen that, only second should After being authorized to, it can just obtain the expression file in the first application and use, be to make for the application being not authorized to With the first chatting facial expression applied, so that the security of chatting facial expression data (is avoided non-by the external world in each application is ensured Method is obtained) on the premise of, realize that the chatting facial expression between different application is shared.
Fig. 4 is the flow of another method that chatting facial expression is transmitted between application according to an exemplary embodiment, As shown in figure 4, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with One application and the second application.Wherein, first application and the second application can be the application for possessing chat feature.In an embodiment In, this method comprises the steps 201~109, wherein:
In step 201, the target chatting facial expression during described first is applied is authorized to the described first application the is received The instruction of two application transports.
In the present embodiment, the instruction can be triggered by the specific operation of user.Wherein, the specific operation can be use The single operation of family on a user device, or the constituted operative combination of multiple continuous operations.For example, in a kind of scene In, the chatting facial expression in user needs to apply first, which is transferred in the second application, to be carried out in use, user needs to make as follows Operation:Paste operation in operating+being applied second to replicating for target chatting facial expression in being applied first;In another scene In, user needs to make following operation:Mouse right click is carried out to target chatting facial expression in the first application, selected in the dialog box jumped out " share other and authorize application " is selected, one conduct of selection " the second application " from multiple alternative mandate applications afterwards;Etc.. In another scene, it is assumed that the mandate application of the first application be it is unique, then can directly by double mouse click chatting facial expression or The mode of " share other and authorize application " is selected to trigger above-mentioned instruction in the dialog box jumped out after right click.Herein to instruction Triggering mode be not restricted.
In step 202., the first application is carried out the expression picture of the target chatting facial expression by the first AES Encryption, obtains encrypted picture file.
In step 203, the finger that the first application deposits in the encrypted picture file under public file storage area Determine path.
In step 204, the first application by the path of the metadata of target chatting facial expression, the storage of encrypted picture file with And first corresponding first decruption key of AES be assemblied into text to be encrypted, and will be described to be added by the second AES Ciphertext is originally encrypted as ciphertext.
In step 205, the second application obtains the second decruption key corresponding with second AES.
In step 206, the ciphertext is decrypted using second decruption key for the second application, obtains the mesh Mark the metadata and the first decruption key of chatting facial expression.
In step 207, the encrypted picture file is decrypted using first decruption key for the second application, Obtain the expression picture of the target chatting facial expression.
In a step 208, the encrypted picture text that will be deposited in the specified path under public file storage area Part is deleted.
In step 209, the metadata of the expression picture and the target chatting facial expression is deposited in institute by the second application State the expression memory block of the second application.
202~step 209 of above-mentioned steps can refer to the particular content of 101~step 108 of above-mentioned steps, no longer give herein Repeat.
Fig. 5 is the flow for the method that another according to an exemplary embodiment transmits chatting facial expression between application, As shown in figure 5, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with One application and the second application.Wherein, first application and the second application can be the application for possessing chat feature.In an embodiment In, this method comprises the steps 301~303, wherein:
In step 301, in response to the operation of the target chatting facial expression in duplication first application, the first application passes through The expression file of the target chatting facial expression is encrypted the AES of setting, obtains encrypted file.
In one embodiment, the expression file can be expression picture.In another embodiment, the expression file can be with Including expression picture and for the metadata for the attribute for describing the expression picture.
In step 302, in response to the target chatting facial expression is pasted into the second application that first application is authorized In operation, the second application obtains corresponding with AES decruption key.
In an alternative embodiment, the AES is rivest, shamir, adelman (such as RSA), and the asymmetric encryption is calculated The corresponding public key of method and private key are respectively allocated to first application and the described second application.
In step 303, the encrypted file is decrypted using the decruption key for the second application, obtains described The expression file of target chatting facial expression and the expression memory block for depositing in second application, subsequently to be used.
The technical scheme provided by Fig. 5, after the only second application is authorized to, can just obtain the table in the first application Feelings file is simultaneously used, for the application being not authorized to, and is that can not use the chatting facial expression of the first application, so as to ensure respectively should On the premise of with the security (avoiding by extraneous illegal acquisition) of middle chatting facial expression data, the chat between different application is realized Expression is shared.
Fig. 6 is the flow for the method that another according to an exemplary embodiment transmits chatting facial expression between application, As shown in fig. 6, this method can be applied to all types of user equipment (such as:Mobile phone, computer, PDA etc.), the user equipment is provided with One application and the second application.Wherein, first application and the second application can be the application for possessing chat feature.In an embodiment In, this method comprises the steps 401~404, wherein:
In step 401, the target chatting facial expression during described first is applied is authorized to the described first application the is received The instruction of two application transports.
In the present embodiment, the instruction can be triggered by the specific operation of user.Wherein, the specific operation can be use The single operation of family on a user device, or the constituted operative combination of multiple continuous operations.
In step 402, the first application is entered the expression file of the target chatting facial expression by the AES set Row encryption, obtains encrypted file.
In one embodiment, the expression file can be expression picture.In another embodiment, the expression file can be with Including expression picture and for the metadata for the attribute for describing the expression picture.
In step 403, the second application obtains decruption key corresponding with the AES.
In an alternative embodiment, the AES is rivest, shamir, adelman (such as RSA), and the asymmetric encryption is calculated The corresponding public key of method and private key are respectively allocated to first application and the described second application.
In step 404, the second application obtains the encrypted file and using the decruption key to described encrypted File is decrypted, and obtains the expression file of the target chatting facial expression and deposits in the expression memory block of second application.
The technical scheme provided by Fig. 6, after the only second application is authorized to, can just obtain the table in the first application Feelings file is simultaneously used, for the application being not authorized to, and is that can not use the chatting facial expression of the first application, so as to ensure respectively should On the premise of with the security (avoiding by extraneous illegal acquisition) of middle chatting facial expression data, the chat between different application is realized Expression is shared.
Fig. 7 is the hardware configuration of a kind of electronic equipment according to an exemplary embodiment.Fig. 7 is refer to, in hardware Aspect, the electronic equipment includes processor, internal bus, network interface, memory (including internal memory and non-volatile memories Device), the hardware required for other business is also possible that certainly.Wherein, it can be stored with to realize in memory and answer With an interrelated logic (i.e. computer program) for transmission chatting facial expression, processor can read corresponding from nonvolatile memory Computer program is into internal memory and then runs.Certainly, in addition to software realization mode, the application is not precluded from other realization sides Mode of formula, such as logical device or software and hardware combining etc., that is to say, that the executive agent of following handling process is not limited Due to each logic unit or hardware or logical device.
As shown in figure 8, in one embodiment, a kind of device 300 that chatting facial expression is transmitted between application is set applied to user Standby, the user equipment is provided with the first application and the second application, and described device 300 includes:Ciphering unit 501, key are obtained Unit 502 and decryption unit 503;Wherein, ciphering unit 501 may be present in the first application, key acquiring unit 502 and decryption Unit 503 may be present in the second application.Specifically:
Ciphering unit 501 is in response to the operation of the target chatting facial expression in the application of duplication first, and the encryption for passing through setting is calculated The expression file of the target chatting facial expression is encrypted method, obtains encrypted file;
Key acquiring unit 502 should in response to the target chatting facial expression is pasted into the second of the first application mandate Operation in, obtains decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for decryption unit 503, obtains the target chat The expression file of expression and the expression memory block for depositing in second application.
As shown in figure 9, in one embodiment, a kind of device 600 that chatting facial expression is transmitted between application is set applied to user Standby, the user equipment is provided with the first application and the second application, and described device 600 includes receiving unit 601, ciphering unit 602nd, key acquiring unit 603 and decryption unit 604;Wherein, ciphering unit 602 be may be present in the first application, and key is obtained Unit 603 and decryption unit 604 may be present in the second application.Specifically:
Receiving unit 601 receives the second application that the target chatting facial expression during first is applied is authorized to the described first application The instruction of transmission;
The expression file of the target chatting facial expression is encrypted by the AES of setting for ciphering unit 602, is obtained To encrypted file;
Key acquiring unit 603 obtains decruption key corresponding with the AES;
Decryption unit 604 is obtained the encrypted file and the encrypted file is solved using the decruption key It is close, obtain the expression file of the target chatting facial expression and deposit in the expression memory block of second application.
As shown in Figure 10, in one embodiment, a kind of device 700 that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and described device 700 includes:First ciphering unit 701, Two ciphering units 702, key acquiring unit 703, the first decryption unit 704, the second decryption unit 705 and memory cell 706;Its In, the first ciphering unit 701, the second ciphering unit 702 be may be present in the first application, and key acquiring unit 703, first is decrypted Unit 704, the second decryption unit 705 and memory cell 706 may be present in the second application.Specifically:
First ciphering unit 701 passes through the first encryption in response to the operation of the target chatting facial expression in the application of duplication first The expression picture of the target chatting facial expression is encrypted algorithm, obtains encrypted picture file;
Second ciphering unit 702 is by the metadata of the target chatting facial expression and first AES corresponding first Decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Key acquiring unit 703 should in response to the target chatting facial expression is pasted into the second of the first application mandate Operation in, obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit 704, is obtained the target and is chatted The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit 705, is obtained The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by memory cell 706 Expression memory block.
As shown in figure 11, in one embodiment, a kind of device 800 that chatting facial expression is transmitted between application, applied to user Equipment, the user equipment is provided with the first application and the second application, and described device 800 includes:Receiving unit 801, first adds Close unit 802, the second ciphering unit 803, key acquiring unit 804, the first decryption unit 805, the second decryption unit 806 and deposit Storage unit 807;Wherein, the first ciphering unit 802, the second ciphering unit 803 may be present in the first application, key acquiring unit 804th, the first decryption unit 805, the second decryption unit 806 and memory cell 807 may be present in the second application.Specifically:
Receiving unit 801 receives the second application that the target chatting facial expression during first is applied is authorized to the described first application The instruction of transmission;
The expression picture of the target chatting facial expression is encrypted by the first AES for first ciphering unit 802, Obtain encrypted picture file;
Second ciphering unit 803 is by the metadata of the target chatting facial expression and first AES corresponding first Decruption key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Key acquiring unit 804 obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit 805, is obtained the target and is chatted The metadata and the first decruption key of its expression;
The encrypted picture file is decrypted using first decruption key for second decryption unit 806, is obtained The expression picture of the target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by memory cell 807 Expression memory block.
The step of above computer program is realized when being executed by processor is referred to description above to embodiment of the method, Also, on the premise of not colliding, the content of said apparatus embodiment and the content of above method embodiment can be mended each other Fill, this is no longer repeated.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity, Or realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet PC, wearable device or these equipment The combination of any several equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flashRAM).Internal memory is showing for computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitorymedia), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (32)

1. a kind of method that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, methods described includes:
Operation in response to replicating the target chatting facial expression in first application, first application is calculated by the encryption set The expression file of the target chatting facial expression is encrypted method, obtains encrypted file;
In response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized, described second Using acquisition decruption key corresponding with the AES;
The encrypted file is decrypted using the decruption key for second application, obtains the target chatting facial expression Expression file and deposit in it is described second application expression memory block.
2. according to the method described in claim 1, the expression file includes expression picture and for describing the expression picture Attribute metadata.
3. according to the method described in claim 1, the AES is rivest, shamir, adelman, the rivest, shamir, adelman Corresponding public key and private key are respectively allocated to first application and the described second application.
4. according to the method described in claim 1, it is described first application by set AES by the target chat table The expression file of feelings is encrypted, including:
First application passes through AES encryption algorithm by the head number of N number of byte in the expression picture of the target chatting facial expression According to being encrypted, wherein, N≤256.
5. a kind of method that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, methods described includes:
Receive the instruction for the second application transport that the target chatting facial expression during described first is applied is authorized to the described first application;
It is described first application by setting AES the expression file of the target chatting facial expression is encrypted, obtain by Encrypt file;
Second application obtains decruption key corresponding with the AES;
Second application is obtained the encrypted file and the encrypted file is decrypted using the decruption key, Obtain the expression file of the target chatting facial expression and deposit in the expression memory block of second application.
6. method according to claim 5, the expression file includes expression picture and for describing the expression picture Attribute metadata.
7. method according to claim 5, the AES is rivest, shamir, adelman, the rivest, shamir, adelman Corresponding public key and private key are respectively allocated to first application and the described second application.
8. method according to claim 5, first application is chatted the target table by the AES that sets The expression file of feelings is encrypted, including:
First application passes through AES encryption algorithm by the head number of N number of byte in the expression picture of the target chatting facial expression According to being encrypted, wherein, N≤256.
9. a kind of method that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, methods described includes:
Operation in response to replicating the target chatting facial expression in first application, first application passes through the first AES The expression picture of the target chatting facial expression is encrypted, encrypted picture file is obtained;
First application is close by corresponding first decryption of the metadata of the target chatting facial expression and first AES Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
In response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized, described second Using acquisition the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for second application, obtains the target chatting facial expression Metadata and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second application, obtains the target The expression picture of chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by second application Expression memory block.
10. method according to claim 9, after encryption obtains encrypted picture file, by the ciphertext to be added Originally it is encrypted as before ciphertext, methods described also includes:
The specified path that first application deposits in the encrypted picture file under public file storage area;
It is described to be assemblied into the metadata of the target chatting facial expression and corresponding first decruption key of first AES Text to be encrypted, including:
Described first applies the metadata of the target chatting facial expression, corresponding first decruption key of first AES And the specified path of the encrypted picture file storage is assemblied into text to be encrypted.
11. method according to claim 10, is entered using first decruption key to the encrypted picture file After row decryption, the expression picture for obtaining the target chatting facial expression, methods described also includes:
The encrypted picture file deposited in the specified path under public file storage area is deleted.
12. method according to claim 9, first AES is aes algorithm, second AES is non- Symmetric encipherment algorithm.
13. by the text encryption to be encrypted it is being ciphertext by the second AES method according to claim 9 Afterwards, methods described also includes:
Increase in the specified location of the ciphertext for indicating that the second application need to decrypt the mark of the ciphertext, it is described to be masked as institute State what the first application was made an appointment with the described second application.
14. a kind of method that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, methods described includes:
Receive the instruction for the second application transport that the target chatting facial expression during described first is applied is authorized to the described first application;
The expression picture of the target chatting facial expression is encrypted by the first AES for first application, obtains being added Close picture file;
First application is close by corresponding first decryption of the metadata of the target chatting facial expression and first AES Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
Second application obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for second application, obtains the target chatting facial expression Metadata and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second application, obtains the target The expression picture of chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by second application Expression memory block.
15. method according to claim 14, after encryption obtains encrypted picture file, by the ciphertext to be added Originally it is encrypted as before ciphertext, methods described also includes:
The specified path that first application deposits in the encrypted picture file under public file storage area;
First application is close by corresponding first decryption of the metadata of the target chatting facial expression and first AES Key is assemblied into text to be encrypted, including:
Described first applies the metadata of the target chatting facial expression, corresponding first decruption key of first AES And the specified path of the encrypted picture file storage is assemblied into text to be encrypted.
16. method according to claim 15, is added in the described first application using first decruption key to described Close picture file is decrypted, and after the expression picture for obtaining the target chatting facial expression, methods described also includes:
The encrypted picture file deposited in the specified path under public file storage area is deleted.
17. method according to claim 14, first AES is aes algorithm, second AES is Rivest, shamir, adelman.
18. method according to claim 14, the second AES is passed through by the ciphertext to be added in the described first application Originally it is encrypted as after ciphertext, methods described also includes:
Described first applies the specified location in the ciphertext to increase for indicating that the second application need to decrypt the mark of the ciphertext, It is described to be masked as what first application was made an appointment with the described second application.
19. a kind of device that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, described device includes:Ciphering unit, key acquiring unit and decryption unit;
The ciphering unit, will by the AES of setting in response to the operation of the target chatting facial expression in the application of duplication first The expression file of the target chatting facial expression is encrypted, and obtains encrypted file;
The key acquiring unit by the target chatting facial expression in response to pasting the second application that first application is authorized In operation, obtain corresponding with AES decruption key;
The encrypted file is decrypted using the decruption key for the decryption unit, obtains the target chatting facial expression Expression file and deposit in it is described second application expression memory block.
20. device according to claim 19, the expression file includes expression picture and for describing the expression figure The metadata of the attribute of piece.
21. device according to claim 19, the AES is rivest, shamir, adelman, the asymmetric encryption is calculated The corresponding public key of method and private key are respectively allocated to first application and the described second application.
22. device according to claim 19, the ciphering unit is by AES encryption algorithm by the target chatting facial expression Expression picture in the header data of N number of byte be encrypted, wherein, N≤256.
23. a kind of device that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, described device includes receiving unit, ciphering unit, key acquiring unit and decryption unit;
The target chatting facial expression that the receiving unit is received during first is applied is passed to the second application of the described first application mandate Defeated instruction;
The expression file of the target chatting facial expression is encrypted by the AES of setting for the ciphering unit, obtain by Encrypt file;
The key acquiring unit obtains decruption key corresponding with the AES;
The decryption unit is obtained the encrypted file and the encrypted file is decrypted using the decruption key, Obtain the expression file of the target chatting facial expression and deposit in the expression memory block of second application.
24. device according to claim 23, the expression file includes expression picture and for describing the expression figure The metadata of the attribute of piece.
25. device according to claim 23, the AES is rivest, shamir, adelman, the asymmetric encryption is calculated The corresponding public key of method and private key are respectively allocated to first application and the described second application.
26. device according to claim 23, the ciphering unit is by AES encryption algorithm by the target chatting facial expression Expression picture in the header data of N number of byte be encrypted, wherein, N≤256.
27. a kind of device that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, described device includes:First ciphering unit, the second ciphering unit, key acquiring unit, the first decryption are single Member, the second decryption unit and memory cell;
First ciphering unit passes through the first AES in response to the operation of the target chatting facial expression in the application of duplication first The expression picture of the target chatting facial expression is encrypted, encrypted picture file is obtained;
Second ciphering unit solves the metadata of the target chatting facial expression and first AES corresponding first Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
The key acquiring unit by the target chatting facial expression in response to pasting the second application that first application is authorized In operation, obtain corresponding with second AES the second decruption key;
The ciphertext is decrypted using second decruption key for first decryption unit, obtains the target chat table The metadata of feelings and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second decryption unit, obtains described The expression picture of target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by the memory cell Expression memory block.
28. a kind of device that chatting facial expression is transmitted between application, applied to user equipment, the user equipment is provided with first should Applied with second, described device includes:Receiving unit, the first ciphering unit, the second ciphering unit, key acquiring unit, One decryption unit, the second decryption unit and memory cell;
The target chatting facial expression that the receiving unit is received during first is applied is passed to the second application of the described first application mandate Defeated instruction;
The expression picture of the target chatting facial expression is encrypted by the first AES for first ciphering unit, is obtained Encrypted picture file;
Second ciphering unit solves the metadata of the target chatting facial expression and first AES corresponding first Key is assemblied into text to be encrypted, and is ciphertext by the text encryption to be encrypted by the second AES;
The key acquiring unit obtains the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key for first decryption unit, obtains the target chat table The metadata of feelings and the first decruption key;
The encrypted picture file is decrypted using first decruption key for second decryption unit, obtains described The expression picture of target chatting facial expression;
The metadata of the expression picture and the target chatting facial expression is deposited in second application by the memory cell Expression memory block.
29. a kind of computer-readable storage medium, is stored thereon with computer program, the computer program is realized when being executed by processor Following steps:
Operation in response to replicating the target chatting facial expression in the first application, is chatted the target by the AES of setting The expression file of expression is encrypted, and obtains encrypted file;
In response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized, obtain and institute State the corresponding decruption key of AES;
The encrypted file is decrypted using the decruption key, the expression file of the target chatting facial expression is obtained simultaneously Deposit in the expression memory block of second application.
30. a kind of computer-readable storage medium, is stored thereon with computer program, the computer program is realized when being executed by processor Following steps:
Receive the instruction for the second application transport that the target chatting facial expression during first is applied is authorized to the first application;
The expression file of the target chatting facial expression is encrypted by the AES of setting, encrypted file is obtained;
Obtain decruption key corresponding with the AES;
Obtain the encrypted file and the encrypted file is decrypted using the decruption key, obtain the target The expression file of chatting facial expression and the expression memory block for depositing in second application.
31. a kind of computer-readable storage medium, is stored thereon with computer program, the computer program is realized when being executed by processor Following steps:
In response to replicate first application in target chatting facial expression operation, by the first AES by the target chat table The expression picture of feelings is encrypted, and obtains encrypted picture file;
The metadata of the target chatting facial expression and corresponding first decruption key of first AES are assemblied into be added Ciphertext sheet, and be ciphertext by the text encryption to be encrypted by the second AES;
In response to the target chatting facial expression to be pasted to the operation in the second application that first application is authorized, obtain and institute State corresponding second decruption key of the second AES;
The ciphertext is decrypted using second decruption key, the metadata and first of the target chatting facial expression is obtained Decruption key;
The encrypted picture file is decrypted using first decruption key, the table of the target chatting facial expression is obtained Feelings picture;
The metadata of the expression picture and the target chatting facial expression is deposited in the expression memory block of second application.
32. a kind of computer-readable storage medium, is stored thereon with computer program, the computer program is realized when being executed by processor Following steps:
Receive the instruction for the second application transport that the target chatting facial expression during first is applied is authorized to the first application;
The expression picture of the target chatting facial expression is encrypted by the first AES, encrypted picture file is obtained;
The metadata of the target chatting facial expression and corresponding first decruption key of first AES are assemblied into be added Ciphertext sheet, and be ciphertext by the text encryption to be encrypted by the second AES;
Obtain the second decruption key corresponding with second AES;
The ciphertext is decrypted using second decruption key, the metadata and first of the target chatting facial expression is obtained Decruption key;
The encrypted picture file is decrypted using first decruption key, the table of the target chatting facial expression is obtained Feelings picture;
The metadata of the expression picture and the target chatting facial expression is deposited in the expression memory block of second application.
CN201710522568.3A 2017-06-30 2017-06-30 Method, device, equipment and storage medium for transmitting chat emoticons among applications Active CN107277028B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710522568.3A CN107277028B (en) 2017-06-30 2017-06-30 Method, device, equipment and storage medium for transmitting chat emoticons among applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710522568.3A CN107277028B (en) 2017-06-30 2017-06-30 Method, device, equipment and storage medium for transmitting chat emoticons among applications

Publications (2)

Publication Number Publication Date
CN107277028A true CN107277028A (en) 2017-10-20
CN107277028B CN107277028B (en) 2020-05-19

Family

ID=60070292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710522568.3A Active CN107277028B (en) 2017-06-30 2017-06-30 Method, device, equipment and storage medium for transmitting chat emoticons among applications

Country Status (1)

Country Link
CN (1) CN107277028B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108363536A (en) * 2018-02-27 2018-08-03 维沃移动通信有限公司 A kind of expression packet application method and terminal device
CN109522135A (en) * 2018-10-12 2019-03-26 北京奇虎科技有限公司 A kind of task processing method across program, device, equipment and storage medium
CN111045571A (en) * 2019-12-27 2020-04-21 珠海市魅族科技有限公司 Method, device, equipment and storage medium for adding expression files in application program
CN111371773A (en) * 2020-02-28 2020-07-03 北京百度网讯科技有限公司 Information sending and displaying method, device, equipment and storage medium
CN111625508A (en) * 2020-06-01 2020-09-04 联想(北京)有限公司 Information processing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252550A (en) * 2008-03-31 2008-08-27 腾讯科技(深圳)有限公司 User-defined information management apparatus, method and system
US20090094247A1 (en) * 2007-10-03 2009-04-09 Fredlund John R Image storage system, device and method
US20100240416A1 (en) * 2009-03-20 2010-09-23 Nokia Corporation Method and apparatus for providing an emotion-based user interface
CN102819716A (en) * 2012-07-20 2012-12-12 腾讯科技(深圳)有限公司 Method, device and system for encrypting and decrypting picture
CN103312801A (en) * 2013-06-05 2013-09-18 上海西本网络科技有限公司 Application devices, interaction method and system for data between application devices and server
CN103905293A (en) * 2012-12-28 2014-07-02 北京新媒传信科技有限公司 Method and device for obtaining expression information
CN105739715A (en) * 2016-01-22 2016-07-06 百度在线网络技术(北京)有限公司 Information sharing method and device in input application
CN106020622A (en) * 2016-07-12 2016-10-12 百度在线网络技术(北京)有限公司 Method and device for collecting emoticons
US20170132290A1 (en) * 2015-11-11 2017-05-11 Adobe Systems Incorporated Image Search using Emotions
CN106817358A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The encryption and decryption method and equipment of a kind of user resources

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090094247A1 (en) * 2007-10-03 2009-04-09 Fredlund John R Image storage system, device and method
CN101252550A (en) * 2008-03-31 2008-08-27 腾讯科技(深圳)有限公司 User-defined information management apparatus, method and system
US20100240416A1 (en) * 2009-03-20 2010-09-23 Nokia Corporation Method and apparatus for providing an emotion-based user interface
CN102819716A (en) * 2012-07-20 2012-12-12 腾讯科技(深圳)有限公司 Method, device and system for encrypting and decrypting picture
CN103905293A (en) * 2012-12-28 2014-07-02 北京新媒传信科技有限公司 Method and device for obtaining expression information
CN103312801A (en) * 2013-06-05 2013-09-18 上海西本网络科技有限公司 Application devices, interaction method and system for data between application devices and server
US20170132290A1 (en) * 2015-11-11 2017-05-11 Adobe Systems Incorporated Image Search using Emotions
CN106817358A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The encryption and decryption method and equipment of a kind of user resources
CN105739715A (en) * 2016-01-22 2016-07-06 百度在线网络技术(北京)有限公司 Information sharing method and device in input application
CN106020622A (en) * 2016-07-12 2016-10-12 百度在线网络技术(北京)有限公司 Method and device for collecting emoticons

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108363536A (en) * 2018-02-27 2018-08-03 维沃移动通信有限公司 A kind of expression packet application method and terminal device
CN109522135A (en) * 2018-10-12 2019-03-26 北京奇虎科技有限公司 A kind of task processing method across program, device, equipment and storage medium
CN111045571A (en) * 2019-12-27 2020-04-21 珠海市魅族科技有限公司 Method, device, equipment and storage medium for adding expression files in application program
CN111371773A (en) * 2020-02-28 2020-07-03 北京百度网讯科技有限公司 Information sending and displaying method, device, equipment and storage medium
CN111625508A (en) * 2020-06-01 2020-09-04 联想(北京)有限公司 Information processing method and device

Also Published As

Publication number Publication date
CN107277028B (en) 2020-05-19

Similar Documents

Publication Publication Date Title
US11038679B2 (en) Secure multi-party computation method and apparatus, and electronic device
JP6892513B2 (en) Off-chain smart contract service based on a reliable execution environment
CN110915164B (en) Processing blockchain data based on smart contract operations performed in trusted execution environments
US11223477B2 (en) Data sharing method, client, server, computing device, and storage medium
CN113032840B (en) Data processing method, device, equipment and computer readable storage medium
TW202013928A (en) Multi-party security computing method and apparatus, and electronic device
CN107277028A (en) The method and device, equipment, storage medium of chatting facial expression are transmitted between application
Hardin et al. Amanuensis: Information provenance for health-data systems
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
JP2020518880A (en) Parallel execution of transactions in blockchain network based on smart contract whitelist
US11308234B1 (en) Methods for protecting data
CN106685905A (en) Systems and methods of encrypted transmission of web pages
US20200351074A1 (en) System for synchronizing a cryptographic key state through a blockchain
CN111538479B (en) Random parameter generation method and device in bidding process
CN113076527A (en) Block chain-based digital asset processing method and device
CN117043772A (en) Block chain data separation
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
EP3618346A1 (en) A method and apparatus for policy hiding on ciphertext-policy attribute-based encryption
CN111061720B (en) Data screening method and device and electronic equipment
JP6755539B2 (en) Methods and equipment for publishing copyrighted works on networks
CN115544572A (en) Multi-party privacy data and financial privacy data processing method based on privacy protection
Gao et al. New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
WO2022089518A1 (en) Address generation method, blockchain information processing method, and related device
US11924320B2 (en) Devices and methods for protecting cryptographic programs
CN111130788B (en) Data processing method and system, data reading method and iSCSI server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1245538

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right