CN108390819A - IM information protecting methods, device, equipment and computer storage media - Google Patents

IM information protecting methods, device, equipment and computer storage media Download PDF

Info

Publication number
CN108390819A
CN108390819A CN201810156888.6A CN201810156888A CN108390819A CN 108390819 A CN108390819 A CN 108390819A CN 201810156888 A CN201810156888 A CN 201810156888A CN 108390819 A CN108390819 A CN 108390819A
Authority
CN
China
Prior art keywords
information
chat window
chat
cloud
receiving terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810156888.6A
Other languages
Chinese (zh)
Inventor
伍旭鸿
金梅
周琳琳
刘腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810156888.6A priority Critical patent/CN108390819A/en
Priority to PCT/CN2018/082245 priority patent/WO2019161599A1/en
Publication of CN108390819A publication Critical patent/CN108390819A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Abstract

The invention discloses a kind of IM information protecting methods, include the following steps:The transmission request for receiving the first chat window triggering based on transmitting terminal, obtains the IM information sent in request, and establish the corresponding cloud chat window of IM information;According to the related information of the first chat window, judge whether cloud chat window starts Chat mode in limited time;If starting Chat mode of prescribing a time limit, the IM information in cloud chat window is pressed into predetermined encryption rule encryption;The IM information that encryption is completed is sent to the second chat window of receiving terminal, and monitors the reading state of IM information in the second chat window;When detecting that IM information reads completion, the IM information in the first chat window and/or the second chat window is deleted.The invention also discloses a kind of IM information protection devices, equipment and computer storage medias.The present invention improves the safety of IM information, avoids IM information in transmission process by malicious attack.

Description

IM information protecting methods, device, equipment and computer storage media
Technical field
The present invention relates to instant messaging fields more particularly to IM information protecting methods, device, equipment and computer storage to be situated between Matter.
Background technology
Mobile internet era now, because of the development of instant messaging technology and universal, this instant messaging applications of IM are Reach each instant messaging and has asked so-called " full-time online " using network operator's dream, and it is this " full-time online ".Band therewith The problem for be unable to fully protection privacy of user and safety.
When information is sent, there is no the safe handlings to information in itself in the instant message applications of part, only in user IM When arriving Financial Information involved in information, simply being prompted, such IM information securities are insufficient, are easy to be maliciously tampered, At the same time, IM information to user after usually automatically save record IM information, can automatically save in Message Record function and go through History message, user can check history message, and the Message Record function of instant message applications is brought while facilitate, It brings with a series of security risks, for example, when user leaves office seat, as long as instant message applications does not exit, other People will appear the risk of message leakage it is seen that history chat record on instant messaging interface in this way, how could be User is chatted using instant message applications, ensures the safety of information, becomes current urgent problem to be solved.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
Invention content
The main purpose of the present invention is to provide a kind of IM information protecting methods, device, equipment and computer storage media, The problems such as being intended to the safety by improving IM information, IM information prevented to be tampered, reveal.
To achieve the above object, the present invention provides a kind of IM information protecting methods, the IM information protecting methods include with Lower step:
The transmission request for receiving the first chat window triggering based on transmitting terminal obtains the IM letters sent in request Breath, and establish the corresponding cloud chat window of IM information;
According to the related information of the first chat window, judge whether cloud chat window starts Chat mode in limited time;
If cloud chat window starts Chat mode of prescribing a time limit, the IM information in cloud chat window is added by predetermined encryption rule Close processing;
The IM information that encryption is completed is sent to the second chat window of receiving terminal, and is monitored in the second chat window The reading state of IM information;
When detect IM information in the second chat window read complete when, delete the first chat window and/or second chat IM information in skylight opening.
Optionally, if the cloud chat window starts Chat mode of prescribing a time limit, by the IM information in cloud chat window by pre- If the step of encryption rule encryption, including:
If cloud chat window starts Chat mode of prescribing a time limit, the reception of the transmission identification information and receiving terminal of transmitting terminal is obtained Identification information, to carry out the two-way authentication of transmitting terminal and receiving terminal;
When detecting that the two-way authentication of transmitting terminal and receiving terminal is completed, the predetermined encryption rule that two-way authentication determines are obtained Then;
IM information is encrypted by predetermined encryption rule, to ensure IM information securities.
Optionally, the IM information that encryption is completed is sent to the second chat window of receiving terminal, and monitors the In two chat windows the step of the reading state of IM information, including:
The IM information that encryption is completed is sent to the second chat window of receiving terminal, judge receiving terminal whether at least two It is a;
If receiving terminal at least two, the reading state that each receiving terminal corresponds to IM information in the second chat window is monitored;
If whole read that each receiving terminal corresponds to IM information in the second chat window is completed, the first chat window is deleted And/or the second IM information in chat window;
If each receiving terminal corresponds to reading without whole for IM information in the second chat window and completes, judge whether arrived Preset time node;
If arrived preset time node, the IM information in the first chat window and/or the second chat window is deleted.
Optionally, described when detecting that the IM information in the second chat window reads completion, delete the first chat window And/or the step of the second IM information in chat window, includes:
When detecting that the IM information in the second chat window reads completion, label has been read into the addition of IM information;
The IM information added in the first chat window and/or the second chat window and read label is deleted, and addition has been read The IM information preservations of label are to cloud chat window.
Optionally, described when detecting that the IM information in the second chat window reads completion, delete the first chat window And/or after the step of the second IM information in chat window, including:
The IM Information recoverings instruction triggered based on the first chat window and/or the second chat window is received, IM information is obtained Restore the certificate message for including in instruction;
Identity-based verifies message and carries out subscriber authentication;
If subscriber authentication passes through, obtains IM Information recoverings and relevant IM is instructed to restore information, and IM is restored to believe Breath is shown in the first chat window and/or the second chat window.
Optionally, if the subscriber authentication passes through, IM Information recoverings are obtained, relevant IM is instructed to restore information, and After IM is restored presentation of information the first chat window and/or the second chat window the step of, including:
The IM information inquiring requests triggered based on the first chat window and/or the second chat window are received, IM information is obtained Keyword in inquiry request and/or query time;
The IM information comprising keyword and/or the IM information in query time is obtained as Query Information, and by inquiry to believe Breath is highlighted in the first chat window and/or the second chat window, so that user checks.
Optionally, the related information according to the first chat window judges whether cloud chat window starts and chats in limited time After the step of pattern, including:
If cloud chat window does not start Chat mode of prescribing a time limit, the IM information is sent to the second chat of receiving terminal Window;
The sending time for obtaining IM information, using the sending time of IM information as the time tag of IM information;
Sending time on time tag is compared with predetermined threshold value;
If sending time on time tag is more than predetermined threshold value, it is automatically deleted the first chat window and/or second chats IM information in skylight opening.
In addition, to achieve the above object, the present invention also provides a kind of IM information protection devices;
The IM information protection devices include:
Acquisition module is received, the transmission for receiving the first chat window triggering based on transmitting terminal is asked, described in acquisition The IM information in request is sent, and establishes the corresponding cloud chat window of IM information;
Mode deciding module judges whether cloud chat window starts limit for the related information according to the first chat window When Chat mode;
Encryption processing module believes the IM in cloud chat window if starting Chat mode of prescribing a time limit for cloud chat window Breath presses predetermined encryption rule encryption;
Monitoring modular is sent, the IM information for completing encryption is sent to the second chat window of receiving terminal, and Monitor the reading state of IM information in the second chat window;
Removing module is detected, is chatted for when detecting that the IM information in the second chat window reads completion, deleting first IM information in skylight opening and/or the second chat window.
In addition, to achieve the above object, the present invention also provides a kind of IM information protection devices;
The IM information protection devices include:It memory, processor and is stored on the memory and can be at the place The IM information protection programs run on reason device, wherein:
It is realized such as the step of above-mentioned IM information protecting methods when the IM information protection programs are executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
IM information protection programs are stored on the computer storage media, the IM information protection programs are held by processor It is realized such as the step of above-mentioned IM information protecting methods when row.
A kind of IM information protecting methods, device, equipment and the computer storage media that the embodiment of the present invention proposes, IM information Guard method includes the following steps:The transmission request for receiving the first chat window triggering based on transmitting terminal, obtains the transmission IM information in request, and establish the corresponding cloud chat window of IM information;According to the related information of the first chat window, cloud is judged Whether chat window starts Chat mode in limited time;If starting Chat mode of prescribing a time limit, by the IM information in cloud chat window by pre- If encryption rule encryption;The IM information that encryption is completed is sent to the second chat window of receiving terminal, and monitors the The reading state of IM information in two chat windows;When detect IM information read complete when, delete the first chat window and/or the IM information in two chat windows, by the way that the IM information of transmission to be encrypted to the safety that can ensure that information is sent, in IM Information can't be distorted during sending by the progress malice such as wooden horse, at the same time, it is corresponding reach receiving terminal in IM information When chat window, the reading state for monitoring IM information in real time is not necessarily to the case where being revealed to avoid the important IM information later stages User manually deletes chat record, improves user experience.
Description of the drawings
Fig. 1 is the apparatus structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of IM information protecting methods first embodiment of the present invention;
Fig. 3 is the concrete scene schematic diagram of IM information protecting methods first embodiment of the present invention;
Fig. 4 is the refinement flow diagram of the step S13 of IM information protecting methods in Fig. 2;
Fig. 5 is the refinement flow diagram of the step S14 of IM information protecting methods in Fig. 2;
Fig. 6 is a flow diagram of IM information protecting methods second embodiment of the present invention;
Fig. 7 is another flow diagram of IM information protecting methods second embodiment of the present invention;
Fig. 8 is the flow diagram of IM information protecting methods 3rd embodiment of the present invention;
Fig. 9 is the high-level schematic functional block diagram of one embodiment of IM information protection devices of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the server for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to (is called IM information Protect equipment) structural schematic diagram.
Server of the embodiment of the present invention can be such as " internet of things equipment ", the intelligent air condition with network savvy, intelligent electric lamp, intelligence Energy power supply etc.;Or the AR/VR equipment with network savvy, intelligent sound box, autonomous driving vehicle, PC, smart mobile phone, tablet electricity Brain, E-book reader, pocket computer etc. have the server of display function.
As shown in Figure 1, the server may include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that the wired of standard connects Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory, can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
Optionally, server can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, sound Frequency circuit, WiFi module;Input unit, than display screen, touch screen;Network interface can be blue in blanking wireless interface in addition to WiFi Tooth, probe, 3G/4G/5G internet base station equipment etc..It will be understood by those skilled in the art that server architecture shown in Fig. 1 The restriction to server is not constituted, may include either combining certain components or not than illustrating more or fewer components Same component arrangement.
As shown in Figure 1, the computer software product is stored in a storage medium (storage medium:It is called computer storage Medium, computer media, readable medium, readable storage medium storing program for executing, computer readable storage medium are directly medium etc., such as ROM/RAM, magnetic disc, CD) in, including some instructions are used so that a station terminal equipment (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) method described in each embodiment of the present invention is executed, it stores and is situated between as a kind of computer May include operating system, network communication module, Subscriber Interface Module SIM and IM information protection applications in the memory 1005 of matter Program.
In server shown in Fig. 1, network interface 1004 be mainly used for connect background server, with background server into Row data communication;User interface 1003 is mainly used for connecting client (user terminal, the receiving terminal in the embodiment of the present invention and transmission End is commonly referred to as client or terminal, wherein client can be connect with server communication, and client can also include sensing Device such as optical sensor, motion sensor and other sensors.Specifically, optical sensor may include ambient light sensor and connect Nearly sensor, wherein ambient light sensor can adjust the brightness of display screen according to the light and shade of ambient light, and proximity sensor can When Mobile Server is moved in one's ear, display screen and/or backlight are closed.As a kind of motion sensor, acceleration of gravity Sensor can detect in all directions the size of (generally three axis) acceleration, and size and the side of gravity are can detect that when static To can be used to identify the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of Mobile Server posture, shake Dynamic identification correlation function (such as pedometer, percussion) etc.;Certainly, Mobile Server can also configure gyroscope, barometer, humidity The other sensors such as meter, thermometer, infrared sensor, details are not described herein.) server and client be into row data communication; And processor 1001 can be used for calling the IM information protection application programs stored in memory 1005, and execute IM information protections The step of method.
Based on above-mentioned terminal hardware structure and communications network system, each reality of IM information protecting methods of the present invention is proposed Apply example.
The present invention provides a kind of IM information protecting methods.
This programme embodiment explanation before first to existing IM (IM instant messaging application software, for example, IM clouds, nail nail, Application software as Tencent QQ, wechat), all can this acknowledgement messaging mechanism, transmitting terminal Shen on instant communication applications software Please IM information when sending, generate request message (request, afterwards referred to as R);The corresponding server of instant messaging application software connects When receiving request message, generates response message (acknowledge, afterwards referred to as A) and feed back to transmitting terminal;Server generates notice Message (notify, afterwards referred to as N) by the outbox information of transmitting terminal to be sent to receiving terminal.Wherein, when IM information is sent according to Corresponding response benchmark is formed according to udp protocol or Transmission Control Protocol.Acknowledgement mechanism is typically to receive the same of message in message recipient When, response bag is sent at once, sender only need to determine whether other side really " receive " message according to this response bag, this The judgement of packet loss is just allowed to become simple;The terminal (terminal of IM includes transmitting terminal and receiving terminal) of IM is reported with server by sending Literary (namely request bag) completes the transmission of message.
With reference to Fig. 2, in a kind of first embodiment of IM information protecting methods of the present invention, the IM information protecting methods packet It includes:
Step S11 receives the transmission request of the first chat window triggering based on transmitting terminal, obtains in the transmission request IM information, and establish the corresponding cloud chat window of IM information.
User can be by instant message applications when the transmission for triggering IM information in terminal (transmitting terminal) is asked, and terminal obtains Take IM information (the IM information sent in asking:Refer to the chat message in instant message applications), IM information is sent to clothes IM information is transferred to by the server of instant messaging application and receives the corresponding receiving terminal of user, specifically, on server by business device The transmission request of the first chat window triggering of transmitting terminal is received, server obtains the IM information sent in request, and is servicing The corresponding cloud chat window of IM information is established in device navigation, as shown in figure 3, the corresponding server of instant message applications is according to transmitting terminal Transmission request, corresponding cloud chat window is established in server high in the clouds, to carry out the interaction of transmitting terminal and receiving terminal.
Step S12 judges whether cloud chat window starts mould of chatting in limited time according to the related information of the first chat window Formula.
Server judges whether the cloud chat window of instant message applications starts according to the related information of the first chat window (Chat mode is called IM information protection modes to Chat mode in limited time, and instant message applications can incite somebody to action under Chat mode in limited time in limited time The information that user sends is encrypted, while after receiving terminal and receiving IM information, the reading of monitoring IM information is gone in service State is taken, is automatically deleted IM information when detecting that IM information reads completion, to avoid information leakage), wherein first The related information of chat window includes the input information of the pattern information and user of the first chat window in the first chat window, For example, the first chat window opens Chat mode of prescribing a time limit, server judges that cloud chat window starts Chat mode of prescribing a time limit;First chats IM information in skylight opening is related to sensitive information, then server can in real time, and the automatic cloud chat window that starts starts in limited time merely Day mode.
It should be noted that:Chat mode can manually be set by user in the first chat window of transmitting terminal in limited time It sets, then the cloud chat window of server is also corresponding starts Chat mode of prescribing a time limit;Can also by server instant message applications according to The IM information that user sends starts automatically, for example, user clicks the chat case in limited time on the first chat window of terminal, opens manually Chat mode in limited time is opened, then the cloud chat window on server is also corresponding starts Chat mode of prescribing a time limit;Or server receives hair The IM information in request is sent, IM information analyses are carried out, if (sensitive information refers to related to money to sensitive information involved in IM information Information), then server start automatically cloud chat window in limited time Chat mode.
Step S13 is added the IM information in cloud chat window as default if cloud chat window starts Chat mode of prescribing a time limit Close rule encryption.
If cloud chat window starts Chat mode of prescribing a time limit, that is, instant message applications starts Chat mode of prescribing a time limit, then server By predetermined encryption rule (predetermined encryption rule:Refer to pre-set encryption rule in instant message applications, it is pre-set to add Close rule has following effect:Encrypt (Encryption), certification (Authentication) and identification (Identification); Encryption:Prevent bad person from obtaining user data;Certification:Prevent that bad person from having modified user data and user is not found;Authentication: Prevent the identity of bad person's fake user) it is encrypted.
IM information is encrypted server in the present embodiment, to prevent the existing following phenomenon of IM information outflow:First, in It is disconnected, refer to that attacker destroys and cut off other people communications on network purposely;Second, it intercepts and captures, is to belong to passive attack, attacker The Content of Communication that other people are eavesdropped from network destroys the confidentiality of information;Third is distorted, and refers to that attacker deliberately distorts network The message of upper transmission;4th, it forges, refers to information of attacker's spurious information in transmission of network, guarantee message transmitting procedure Safety, while encrypted information only has specified receiving terminal that can decrypt to check, ensure the safety in IM message transmitting procedures Property.
The IM information that encryption is completed is sent to the second chat window of receiving terminal by step S14, and is monitored second and chatted The reading state of IM information in skylight opening.
The IM information that encryption is completed is sent to the second chat window of receiving terminal by server, that is, server obtains The IM information that user inputs in the first chat window of transmitting terminal, and the second of receiving terminal is sent to after IM information is encrypted Chat window, and monitor the reading state of IM information in the second chat window.
Step S15, when detect IM information in the second chat window read complete when, delete the first chat window and/ Or the second IM information in chat window.
The server of instant message applications monitors the reading state of IM information in chat window in real time, is monitoring IM letters When breath reads completion, IM information is automatically deleted by server, that is, being automatically deleted for IM information refers to being read in user's IM information After the completion of taking, in prefixed time interval, (prefixed time interval can be arranged server according to specific circumstances, for example, when default Between interval with the working time match, be set as 8 hours) after, server is to the first chat window and/or receiving terminal in transmitting terminal IM information in upper second chat window is automatically deleted, to prevent other users from checking IM information.Server can basis The first chat window IM information is only deleted in user setting selection;Or only delete or the second chat window in IM information.
It should be added that:The IM information of cloud chat window in server is not deleted, and server chats cloud IM information in window is associated with subscriber identity information, and by after association IM information and incidence relation preserve, when necessary User when needed can restore the IM information of deletion.
Specifically, step S15 includes:
Step 151, when detecting that the IM information in the second chat window reads completion, the addition of IM information has been read to mark Label.
IM information reading states in the second chat window of monitoring server click the second chat window receiving end subscriber In information when, server detect user read the second chat window in IM information read, server IM information read Preset time period (preset time period is arranged according to concrete scene, such as could be provided as one minute) determines the second chat window afterwards In IM information read complete, server by IM information addition read label.
Step 152, it deletes and adds the IM information for having read label in the first chat window and/or the second chat window, and will Addition has read the IM information preservations of label to cloud chat window.
Server, which is deleted, adds the IM information for having read label in the first chat window and/or the second chat window, ensure letter Breath will not be revealed, and addition has been read the IM information preservations of label to cloud chat window by server so that server can according to Family demand carries out IM Information recoverings.
In the present embodiment by the way that the IM information of transmission to be encrypted to the safety that can ensure that information is sent, believe in IM Breath can't be distorted during sending by the progress malice such as wooden horse, at the same time, it is corresponding reach reception terminal in IM information When chat window, the reading state for monitoring IM information in real time is not necessarily to the case where being revealed to avoid the important IM information later stages User manually deletes chat record, improves user experience.
Further, with reference to Fig. 4, the present embodiment, this reality are further provided on the basis of first embodiment of the invention It is the refinement to step S13 in first embodiment to apply example, illustrates that IM information is added in instant message applications in the present embodiment The step of close processing.
The IM information protecting methods include:
Step S131 obtains the transmission identification information of transmitting terminal and connects if cloud chat window starts Chat mode of prescribing a time limit The reception identification information of receiving end, to carry out the two-way authentication of transmitting terminal and receiving terminal.
If cloud chat window starts Chat mode of prescribing a time limit, the server of instant message applications obtains to be sent out in instant message applications Sending end transmission identification information and receiving terminal reception identification information, for example, in IM information carry transmitting terminal facility information and The user account information of receiving terminal, server are believed the user account information of the facility information of transmitting terminal and receiving terminal as mark Breath, instant message applications server carry out the bi-directional verification between transmitting terminal and receiving terminal according to identification information.
For example, server obtains the message authentication code (MAC, Message authentication code) of transmitting terminal.Disappear It is the hash functions with key to cease authentication code, is based on key and hash functions.Key both sides arrange in advance, third cannot be allowed to know Road.Server calculates the MAC value of outbound message using MAC algorithms, is appended to behind verification message and sends jointly to receiving terminal.It receives After end receives verification message, message MAC value is received with the calculating of identical MAC algorithms, and with the MAC value comparison that receives whether Equally, to complete the two-way authentication of transmitting terminal and receiving terminal.
Step S132 obtains the pre- of two-way authentication determination when detecting that the two-way authentication of transmitting terminal and receiving terminal is completed If encryption rule.
Receiving terminal receives the verification information that server is sent, and receiving terminal is based on verification information and forms feedback message, server Feedback message is obtained, determines that the two-way authentication of transmitting terminal and receiving terminal is completed, transmitting terminal and receiving terminal are detected in server When two-way authentication is completed, the predetermined encryption rule that server two-way authentication determines, for example, server will determine encryption in verification Mode, and encryption and manner of decryption are subjected to unification in transmitting terminal and receiving terminal.
Step S133 IM information is encrypted by predetermined encryption rule, to ensure IM information securities.
IM information is encrypted server by predetermined encryption rule, is connect for example, transmitting terminal will be sent the data to Receiving end, transmitting terminal initiate session request to server, and server generates key.Key is sent to transmitting terminal by server, is sent Terminal is encrypted using data key, obtains ciphertext C, and C is issued server by transmission, and server obtains ciphertext C, goes forward side by side Row decryption obtains data, and obtained data are encrypted server by pre-set data key, and will be encrypted Ciphertext is sent to receiving terminal.
In the present embodiment by the way that IM information is encrypted, IM information is prevented to be trapped during transmission, Situations such as interrupting, distort or forging ensures that the safety of the transmission of IM information, IM information will not go out when information is transmitted Existing IM information distortions.
Further, with reference to Fig. 5, the present embodiment, this reality are further provided on the basis of first embodiment of the invention It is the refinement to step S14 in first embodiment to apply example, illustrates that IM information monitorings are read in instant message applications in the present embodiment The step of taking state.
The IM information protecting methods include:
The IM information that encryption is completed is sent to the second chat window of receiving terminal, judges receiving terminal by step S141 Whether at least two.
The IM information that encryption is completed is sent to the second chat window of receiving terminal by server, and monitoring server receives The reading state for holding IM information, to carry out the deletion of IM information according to the reading state of IM information, but it is soft for instant messaging When the group chatting of part, it is understood that there may be multiple receiving terminals, server need to monitor the IM information reading states of each receiving terminal, That is, server obtain receiving terminal information, judge receiving terminal whether at least two.
Step S142 monitors the reading that each receiving terminal corresponds to IM information in the second chat window if receiving terminal at least two Take state.
If receiving terminal at least two, each receiving terminal of monitoring server corresponds to the reading shape of IM information in the second chat window State, for example, server cloud chat window monitors the reading state of IM information in the second chat window of each receiving terminal respectively.
Step S143 deletes first if whole read that each receiving terminal corresponds to IM information in the second chat window is completed IM information in chat window and/or the second chat window.
If server detects that each receiving terminal corresponds to the whole of IM information in the second chat window and reads completion, server The IM information in the first chat window and/or the second chat window is deleted, for example, when number has the group chatting of 5 people, clothes Business device monitors that 5 receiving terminals correspond to the whole of IM information in the second chat window and read completion, then server is deleted first and chatted IM information in skylight opening and/or the second chat window.
Step S144 judges if each receiving terminal corresponds to being read without whole for IM information in the second chat window and completes Whether preset time node arrived.
If server detects that each receiving terminal corresponds to being read without whole for IM information in the second chat window and completes, take Business device judge whether to arrived preset time node, for example, when number has the group chatting of 200 people, monitoring server arrives The reading that 100 receiving terminals correspond to IM information in the second chat windows is completed, that is, IM information without complete in the second chat window Portion, which is read, to complete, then server obtains IM access times point and current point in time, and server is according to sending time point and works as Preceding time point determines IM access times section, and it is (default to judge whether IM access times section arrived preset time node Timing node is arranged as the case may be, could be provided as 10 minutes).
Step S145 is deleted if arrived preset time node in the first chat window and/or the second chat window IM information.
If arrived preset time node, server deletes the IM in the first chat window and/or the second chat window Information;If not reaching preset time node, server then monitors the reading that each receiving terminal corresponds to IM information in the second chat window State is taken, until each receiving terminal corresponds to being completed without all reading for IM information in the second chat window, or when reaching default Intermediate node, server delete the IM information in the first chat window and/or the second chat window.
Server is monitored the reading state of the IM information of group chatting in the present embodiment, in the present embodiment both In view of user is to the reading state of IM information, it is also contemplated that the problem of IM information securities so that chat in limited time more flexible.
Further, with reference to Fig. 6 IM information of the present invention is further provided on the basis of first embodiment of the invention The second embodiment of guard method, difference lies in the second of IM information protecting methods of the present invention with first embodiment of the invention User can restore the IM information of deletion in embodiment.
The IM information protecting methods include:
Step S21 is received the IM Information recoverings instruction triggered based on the first chat window and/or the second chat window, obtained The certificate message for including in taking IM Information recoverings to instruct.
Server carries out IM Message Records in Chat mode in limited time, according to IM information reading states and is deleted, user The IM Information recoverings instruction of the first chat window that can be based on instant message applications and/or the triggering of the second chat window, service Device obtains the certificate message for including in the instruction of IM Information recoverings.
Step S22, identity-based verify message and carry out subscriber authentication.
Server carries out subscriber authentication according to authentication information, for example, the instruction of IM Information recoverings includes user IM Information recoverings are instructed user identity by the identity informations such as the user account and subscriber phone number of instant message applications, server Information and logon account in the instant message applications identity information that prestores compare, and carry out subscriber authentication.
Step S23 obtains IM Information recoverings and relevant IM is instructed to restore information, and will if subscriber authentication passes through IM restores presentation of information in the first chat window and/or the second chat window.
Server prestores logon account in IM Information recoverings instruction subscriber identity information and instant message applications identity letter Breath compares, if IM Information recoverings instruct subscriber identity information and logon account in instant message applications, the identity information that prestores is identical, Then server detects that authentication passes through, and server then obtains IM Information recoverings and relevant IM is instructed to restore information, and by IM Restore presentation of information in the first chat window and/or the second chat window, is wrapped in the instruction of IM Information recoverings for example, server obtains The timing node information contained, server obtain the IM information that timing node information includes in cloud chat window and restore to believe as IM Breath, server restores IM recoveries information, so that user can carry out the inquiry of IM information again in chat window.
Further, with reference to Fig. 7, in step S23, if subscriber authentication passes through, IM Information recoverings instruction phase is obtained The IM of pass restores information, and IM is restored presentation of information after the first chat window and/or the second chat window, further includes:
Step S24 is received the IM information inquiring requests triggered based on the first chat window and/or the second chat window, obtained Take the keyword and/or query time in IM information inquiring requests;
The IM information inquiring requests that user triggers in the first chat window and/or the second chat window, server receive base In the IM information inquiring requests that the first chat window and/or the second chat window trigger, server obtains IM information inquiring requests In include key word of the inquiry and/or query time.
Step S25 obtains the IM information comprising keyword and/or the IM information in query time as Query Information, and Query Information is highlighted in the first chat window and/or the second chat window, so that user checks.
Server will obtain the IM information in the IM information comprising keyword and/or query time as Query Information, clothes Business device Query Information is highlighted in the first chat window and/or the second chat window, so that user checks.For example, with Family includes keyword input by user in inquiry request, then server is obtained using keyword input by user as inquiry dimension It takes the IM information of reading for including keyword, and has read that IM information is shown or user includes in inquiry request by described The sender information of determination input by user obtains the IM letters of sender transmission then using sender information as inquiry dimension Breath, and the IM information of having read is highlighted, it can highlight to can also be the modes such as overstriking to highlight.
It should be added that step S24 and step S25 in the present embodiment can be with other implementations of the present invention Example is combined, that is, any time user can be carried out the inquiry of IM information, make server according to the inquiry instruction of user into Row highlights.
The IM information that early period deletes in the present embodiment is restored, while preventing IM information leakages, if after user When phase checks demand, authentication can be carried out to user, after subscriber authentication passes through, by the IM of user's inquiry Information is shown, and the inquiry dimension based on user highlights, user-friendly.
Further, with reference to Fig. 8, in the 3rd embodiment of IM information protecting methods of the present invention, in the step of first embodiment After rapid S12, Chat mode in limited time is not started.
Include in the IM information protecting methods:
The IM information is sent to receiving terminal by step S31 if cloud chat window does not start Chat mode of prescribing a time limit Second chat window.
If cloud chat window does not start Chat mode of prescribing a time limit, that is, instant message applications transmitting terminal is actively without starting limit When Chat mode or server without automatically start prescribe a time limit Chat mode, then server will transmitting terminal send request in includes IM information be sent to the second chat window of corresponding receiving terminal so that receive terminal can receive IM information.
Step S32 obtains the sending time of IM information, using the sending time of IM information as the time tag of IM information.
Server obtains the sending time of IM information, and server is marked the sending time of IM information as the time of IM information Label, and by IM information preservations to cloud chat window, and server by the IM information of cloud chat window according to time tag when Between be sequentially ranked up.
Sending time on time tag is compared by step S33 with predetermined threshold value.
Server is by sending time and the predetermined threshold value (predetermined threshold value on time tag:It can be arranged according to actual conditions, Could be provided as 1 month or other) be compared.
Step S34, if sending time on time tag is more than predetermined threshold value, be automatically deleted the first chat window and/ Or the second IM information in chat window.
If the sending time on the time tag is more than predetermined threshold value, server is automatically deleted IM information, if described Sending time on time tag is not above predetermined threshold value, then does not handle IM information.
In the present embodiment when instant message applications is not Chat mode in limited time, can by IM information and sending time into Row association can be automatically deleted IM information in instant message applications, be not required to user when IM information is more than predetermined threshold value Carry out means deletion reduces terminal space occupancy, improves the experience of user.
In addition, in conjunction with Fig. 9, the embodiment of the present invention also proposes a kind of IM information protection devices, the IM information protection devices Including:
Acquisition module 10 is received, the transmission request for receiving the first chat window triggering based on transmitting terminal obtains institute The IM information sent in request is stated, and establishes the corresponding cloud chat window of IM information;
Mode deciding module 20 judges whether cloud chat window starts for the related information according to the first chat window Chat mode in limited time;
Encryption processing module 30, if starting Chat mode of prescribing a time limit for cloud chat window, by the IM in cloud chat window Information presses predetermined encryption rule encryption;
Monitoring modular 40 is sent, the IM information for completing encryption is sent to the second chat window of receiving terminal, And monitor the reading state of IM information in the second chat window;
Removing module 50 is detected, for when detecting that the IM information in the second chat window reads completion, deleting first IM information in chat window and/or the second chat window.
Wherein, the step of each Implement of Function Module of IM information protection devices can refer to IM information protecting methods of the present invention Each embodiment, details are not described herein again.It should be added that the IM information protection devices in this motion point can be IM The building block of information protection device can also independently constitute IM information protection devices.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
IM information protection programs are stored on the computer storage media, the IM information protection programs are held by processor Each embodiment of IM information approaches is realized when row, details are not described herein again.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/ There are any actual relationship or orders between object;The terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or system including a series of elements include not only that A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in process, method, article or the system including the element.
For device embodiments, since it is substantially similar to the method embodiment, related so describing fairly simple Place illustrates referring to the part of embodiment of the method.The apparatus embodiments described above are merely exemplary, wherein making The unit illustrated for separating component may or may not be physically separated.In can selecting according to the actual needs Some or all of module realize the purpose of the present invention program.Those of ordinary skill in the art are not making the creative labor In the case of, you can to understand and implement.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of IM information protecting methods, which is characterized in that the IM information protecting methods include the following steps:
The transmission request for receiving the first chat window triggering based on transmitting terminal obtains the IM information sent in request, and Establish the corresponding cloud chat window of IM information;
According to the related information of the first chat window, judge whether cloud chat window starts Chat mode in limited time;
If cloud chat window starts Chat mode of prescribing a time limit, by the IM information in cloud chat window by predetermined encryption rule encryption Reason;
The IM information that encryption is completed is sent to the second chat window of receiving terminal, and monitors IM in the second chat window and believes The reading state of breath;
When detecting that the IM information in the second chat window reads completion, the first chat window and/or the second chat window are deleted IM information in mouthful.
2. IM information protecting methods as described in claim 1, which is characterized in that chat in limited time if the cloud chat window starts Pattern, then by the IM information in cloud chat window press predetermined encryption rule encryption the step of, including:
If cloud chat window starts Chat mode of prescribing a time limit, the reception mark for sending identification information and receiving terminal of transmitting terminal is obtained Information, to carry out the two-way authentication of transmitting terminal and receiving terminal;
When detecting that the two-way authentication of transmitting terminal and receiving terminal is completed, the predetermined encryption rule that two-way authentication determines is obtained;
IM information is encrypted by predetermined encryption rule, to ensure IM information securities.
3. IM information protecting methods as described in claim 1, which is characterized in that the IM information for completing encryption is sent out It send to the second chat window of receiving terminal, and the step of monitoring the reading state of IM information in the second chat window, including:
The IM information that encryption is completed is sent to the second chat window of receiving terminal, judge receiving terminal whether at least two;
If receiving terminal at least two, the reading state that each receiving terminal corresponds to IM information in the second chat window is monitored;
If whole read that each receiving terminal corresponds to IM information in the second chat window is completed, delete the first chat window and/or IM information in second chat window;
If each receiving terminal corresponds to reading without whole for IM information in the second chat window and completes, judge whether arrived default Timing node;
If arrived preset time node, the IM information in the first chat window and/or the second chat window is deleted.
4. IM information protecting methods as described in claim 1, which is characterized in that described to detect in the second chat window IM information is read when completing, and the step of deleting the IM information in the first chat window and/or the second chat window includes:
When detecting that the IM information in the second chat window reads completion, label has been read into the addition of IM information;
The IM information added in the first chat window and/or the second chat window and read label is deleted, and label has been read into addition IM information preservations to cloud chat window.
5. the IM information protecting methods as described in Claims 1-4 any one, which is characterized in that described to detect second When IM information in chat window reads completion, the step of the first chat window and/or the IM information in the second chat window is deleted After rapid, including:
The IM Information recoverings instruction triggered based on the first chat window and/or the second chat window is received, IM Information recoverings are obtained The certificate message for including in instruction;
Identity-based verifies message and carries out subscriber authentication;
If subscriber authentication passes through, obtains IM Information recoverings and relevant IM is instructed to restore information, and IM recoveries information is shown Show in the first chat window and/or the second chat window.
6. IM information protecting methods as claimed in claim 5, which is characterized in that if the subscriber authentication passes through, obtain It takes IM Information recoverings that relevant IM is instructed to restore information, and IM recoveries presentation of information is chatted in the first chat window and/or second After the step of skylight opening, including:
The IM information inquiring requests triggered based on the first chat window and/or the second chat window are received, IM information inquiries are obtained Keyword in request and/or query time;
IM information and/or the IM information in query time comprising keyword is obtained as Query Information, and by Query Information to exist First chat window and/or the second chat window are highlighted, so that user checks.
7. IM information protecting methods as described in claim 1, which is characterized in that described to be believed according to the association of the first chat window Breath, after judging the step of whether cloud chat window starts Chat mode in limited time, including:
If cloud chat window does not start Chat mode of prescribing a time limit, the IM information is sent to the second chat window of receiving terminal Mouthful;
The sending time for obtaining IM information, using the sending time of IM information as the time tag of IM information;
Sending time on time tag is compared with predetermined threshold value;
If the sending time on time tag is more than predetermined threshold value, it is automatically deleted the first chat window and/or the second chat window IM information in mouthful.
8. a kind of IM information protection devices, which is characterized in that the IM information protection devices include:
Acquisition module is received, the transmission request for receiving the first chat window triggering based on transmitting terminal obtains the transmission IM information in request, and establish the corresponding cloud chat window of IM information;
Mode deciding module judges whether cloud chat window starts and chats in limited time for the related information according to the first chat window Day mode;
Encryption processing module presses the IM information in cloud chat window if starting Chat mode of prescribing a time limit for cloud chat window Predetermined encryption rule encryption;
Monitoring modular is sent, the IM information for completing encryption is sent to the second chat window of receiving terminal, and monitors The reading state of IM information in second chat window;
Removing module is detected, for when detecting that the IM information in the second chat window reads completion, deleting the first chat window IM information in mouth and/or the second chat window.
9. a kind of IM information protection devices, which is characterized in that the IM information protection devices include:It memory, processor and deposits The IM information protection programs that can be run on the memory and on the processor are stored up, wherein:
The IM letters as described in any one of claim 1 to 7 are realized when the IM information protection programs are executed by the processor The step of ceasing guard method.
10. a kind of computer storage media, which is characterized in that be stored with IM information protection journeys on the computer storage media Sequence realizes the IM information protections as described in any one of claim 1 to 7 when the IM information protection programs are executed by processor The step of method.
CN201810156888.6A 2018-02-23 2018-02-23 IM information protecting methods, device, equipment and computer storage media Pending CN108390819A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810156888.6A CN108390819A (en) 2018-02-23 2018-02-23 IM information protecting methods, device, equipment and computer storage media
PCT/CN2018/082245 WO2019161599A1 (en) 2018-02-23 2018-04-09 Im information protection method, apparatus and device, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810156888.6A CN108390819A (en) 2018-02-23 2018-02-23 IM information protecting methods, device, equipment and computer storage media

Publications (1)

Publication Number Publication Date
CN108390819A true CN108390819A (en) 2018-08-10

Family

ID=63069093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810156888.6A Pending CN108390819A (en) 2018-02-23 2018-02-23 IM information protecting methods, device, equipment and computer storage media

Country Status (2)

Country Link
CN (1) CN108390819A (en)
WO (1) WO2019161599A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181905A (en) * 2019-06-28 2020-05-19 腾讯科技(深圳)有限公司 File encryption method and device
CN111818466A (en) * 2020-05-29 2020-10-23 维沃移动通信有限公司 Information sending and receiving method and device, electronic equipment and readable storage medium
CN112217714A (en) * 2020-11-05 2021-01-12 上海云鱼智能科技有限公司 Method, device, server, client, terminal and storage medium for deleting information in two directions in instant communication session
CN114205319A (en) * 2020-09-18 2022-03-18 腾讯科技(深圳)有限公司 Instant messaging method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325096A (en) * 2011-08-29 2012-01-18 上海量明科技发展有限公司 Method for realizing communication content life management, terminal thereof and system thereof
CN102685018A (en) * 2011-03-07 2012-09-19 腾讯科技(深圳)有限公司 Method and system for processing network instant messaging message and instant massaging equipment
CN104158727A (en) * 2014-08-29 2014-11-19 蓝信工场(北京)科技有限公司 Method and device for deleting instant information at regular time
CN104954237A (en) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 Instant massaging method
CN105791105A (en) * 2016-05-20 2016-07-20 北京北信源软件股份有限公司 Method for burning after reading instant messaging information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685018A (en) * 2011-03-07 2012-09-19 腾讯科技(深圳)有限公司 Method and system for processing network instant messaging message and instant massaging equipment
CN102325096A (en) * 2011-08-29 2012-01-18 上海量明科技发展有限公司 Method for realizing communication content life management, terminal thereof and system thereof
CN104158727A (en) * 2014-08-29 2014-11-19 蓝信工场(北京)科技有限公司 Method and device for deleting instant information at regular time
CN104954237A (en) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 Instant massaging method
CN105791105A (en) * 2016-05-20 2016-07-20 北京北信源软件股份有限公司 Method for burning after reading instant messaging information

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181905A (en) * 2019-06-28 2020-05-19 腾讯科技(深圳)有限公司 File encryption method and device
CN111181905B (en) * 2019-06-28 2021-11-19 腾讯科技(深圳)有限公司 File encryption method and device
CN111818466A (en) * 2020-05-29 2020-10-23 维沃移动通信有限公司 Information sending and receiving method and device, electronic equipment and readable storage medium
CN114205319A (en) * 2020-09-18 2022-03-18 腾讯科技(深圳)有限公司 Instant messaging method and device
CN114205319B (en) * 2020-09-18 2023-12-01 腾讯科技(深圳)有限公司 Instant messaging method and device
CN112217714A (en) * 2020-11-05 2021-01-12 上海云鱼智能科技有限公司 Method, device, server, client, terminal and storage medium for deleting information in two directions in instant communication session

Also Published As

Publication number Publication date
WO2019161599A1 (en) 2019-08-29

Similar Documents

Publication Publication Date Title
US7891557B2 (en) System and method for managing multiple smart card sessions
CN108390819A (en) IM information protecting methods, device, equipment and computer storage media
CN104798355A (en) Mobile device management and security
CN104915601A (en) System and method of encrypting folder in device
CN109033801B (en) Method for verifying user identity by application program, mobile terminal and storage medium
CN103095457A (en) Login and verification method for application program
EP1850255A1 (en) System and method for managing multiple smart card sessions
CN104270517A (en) Information encryption method and mobile terminal
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
AU2020217317B2 (en) Tunneled monitoring service and methods
CN104270516B (en) Decryption method and mobile terminal
JP2018533864A (en) Remote control method, device and portable terminal
CN105743917B (en) Message transmission method and terminal
CN109618344A (en) A kind of secure connection method and device of wireless monitoring equipment
CN104253714A (en) Monitoring method, system, browser and server
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN106603815B (en) Message processing method and device
JP6321188B2 (en) Mobile terminal hacking prevention system and method
CN107070654A (en) information collecting method and device
CN109257416A (en) A kind of block chain cloud service network information management system
CN109729000A (en) A kind of instant communicating method and device
CN107154977A (en) Information-pushing method and device
WO2016146046A1 (en) Data access method and device
JP4109411B2 (en) E-mail authentication system and mail server
CN106254226A (en) A kind of information synchronization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180810