CN109274582B - Instant communication message display method, device, equipment and storage medium - Google Patents

Instant communication message display method, device, equipment and storage medium Download PDF

Info

Publication number
CN109274582B
CN109274582B CN201811102671.3A CN201811102671A CN109274582B CN 109274582 B CN109274582 B CN 109274582B CN 201811102671 A CN201811102671 A CN 201811102671A CN 109274582 B CN109274582 B CN 109274582B
Authority
CN
China
Prior art keywords
instant messaging
messaging message
target instant
target
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811102671.3A
Other languages
Chinese (zh)
Other versions
CN109274582A (en
Inventor
王辽松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Wuhan Co Ltd
Original Assignee
Tencent Technology Wuhan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Wuhan Co Ltd filed Critical Tencent Technology Wuhan Co Ltd
Priority to CN201811102671.3A priority Critical patent/CN109274582B/en
Publication of CN109274582A publication Critical patent/CN109274582A/en
Application granted granted Critical
Publication of CN109274582B publication Critical patent/CN109274582B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/043Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/234Monitoring or handling of messages for tracking messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The application discloses a method, a device, equipment and a storage medium for displaying instant messaging messages, and belongs to the technical field of the Internet. The method comprises the following steps: acquiring a target instant messaging message; detecting whether the target instant messaging message contains sensitive information; when the target instant messaging message contains sensitive information, adding a confidential reading identifier for the target instant messaging message, wherein the confidential reading identifier is used for indicating a receiving terminal of the target instant messaging message to display the target instant messaging message in a confidential mode; and sending the target instant messaging message added with the confidential reading identifier to a receiving terminal. The technical scheme provided by the embodiment of the application can avoid the leakage of sensitive information in the instant messaging message to a certain extent.

Description

Instant communication message display method, device, equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method, an apparatus, a device, and a storage medium for displaying an instant messaging message.
Background
Instant messaging is a communication service for instant messaging based on the internet, and can allow two or more people to use the internet to transmit characters, voice or images in real time.
In practical applications, the user may transmit various types of information by instant messaging, for example, the user may transmit sensitive information of the user by instant messaging. The sensitive information refers to information that a user does not want to know by outsiders, and in general, the sensitive information may include identity information, account information, address information, or contact information of the user, and leakage of the sensitive information may cause property loss to the user and even affect personal safety of the user.
Currently, after entering a chat interface of an instant messaging application of a certain user, any user can view an instant messaging message of the certain user, and the instant messaging message may contain sensitive information transmitted by the user, so that the security of the sensitive information is greatly threatened.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for displaying instant messaging messages, which can avoid the leakage of sensitive information in the instant messaging messages to a certain extent. The technical scheme is as follows:
in one aspect, a method for displaying an instant messaging message is provided, where the method includes:
acquiring a target instant messaging message;
detecting whether the target instant messaging message contains sensitive information or not;
when the target instant messaging message contains the sensitive information, adding a confidential reading identifier for the target instant messaging message, wherein the confidential reading identifier is used for indicating a receiving terminal of the target instant messaging message to display the target instant messaging message in a confidential mode;
and sending the target instant messaging message added with the confidential reading identifier to the receiving terminal.
In one aspect, a method for displaying an instant messaging message is provided, where the method includes:
receiving a target instant messaging message, wherein the target instant messaging message carries a confidential reading identifier, and the confidential reading identifier is added to the target instant messaging message when the target instant messaging message is determined to contain sensitive information;
and displaying the target instant messaging message in a confidential mode according to the indication of the confidential reading identifier.
In one aspect, an apparatus for displaying an instant messaging message is provided, the apparatus comprising:
the acquisition module is used for acquiring the target instant messaging message;
the detection module is used for detecting whether the target instant messaging message contains sensitive information;
the identification adding module is used for adding a confidential reading identification for the target instant messaging information when the target instant messaging information contains the sensitive information, wherein the confidential reading identification is used for indicating a receiving terminal of the target instant messaging information to display the target instant messaging information in a confidential mode;
and the sending module is used for sending the target instant messaging message added with the confidential reading identifier to the receiving terminal.
In one aspect, an apparatus for displaying an instant messaging message is provided, the apparatus comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a target instant messaging message, the target instant messaging message carries a confidential reading identifier, and the confidential reading identifier is added to the target instant messaging message when the target instant messaging message is determined to contain sensitive information;
and the display module is used for displaying the target instant messaging message in a confidential mode according to the indication of the confidential reading identifier.
In one aspect, a terminal is provided, where the terminal includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for displaying an instant messaging message provided in the embodiment of the present application.
In one aspect, a computer-readable storage medium is provided, where at least one instruction is stored in the computer-readable storage medium, and the instruction is loaded and executed by a processor to implement the method for displaying an instant messaging message provided in the embodiments of the present application.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
the method comprises the steps that when a target instant messaging message is detected to contain sensitive information, a confidential reading identifier is added to the target instant messaging message, so that a receiving terminal of the target instant messaging message can display the target instant messaging message in a confidential mode after receiving the target instant messaging message carrying the confidential reading identifier.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of a terminal desktop;
FIG. 2 is a schematic diagram of a main interface of an instant messaging application;
FIG. 3 is a schematic diagram of a chat interface for an instant messaging application;
FIG. 4 is a schematic illustration of an implementation environment provided by an embodiment of the present application;
FIG. 5 is a schematic illustration of an implementation environment provided by an embodiment of the present application;
fig. 6 is a timing diagram illustrating a method for displaying an instant messaging message according to an embodiment of the present disclosure;
fig. 7 is a timing diagram illustrating a method for displaying an instant messaging message according to an embodiment of the present disclosure;
fig. 8 is a timing diagram illustrating a method for displaying an instant messaging message according to an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of a prompt message provided by an embodiment of the present application;
FIG. 10 is a schematic diagram of a secure transmission option provided by an embodiment of the present application;
FIG. 11 is a schematic diagram of a prompt message provided by an embodiment of the present application;
fig. 12 is a timing diagram illustrating a method for displaying an instant messaging message according to an embodiment of the present application;
fig. 13 is a timing diagram illustrating a method for displaying an instant messaging message according to an embodiment of the present disclosure;
fig. 14 is a block diagram of an apparatus for displaying an instant messaging message according to an embodiment of the present application;
fig. 15 is a block diagram of an instant messaging message display apparatus according to an embodiment of the present application;
fig. 16 is a block diagram of a system for presenting an instant messaging message according to an embodiment of the present application;
fig. 17 is a block diagram of a system for presenting an instant messaging message according to an embodiment of the present application;
fig. 18 is a block diagram of a terminal provided in an embodiment of the present application;
fig. 19 is a block diagram of a server according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
With the increasing popularity of instant messaging applications, currently, many information interactions of users are performed through instant messaging applications. In practical application, sensitive information of a user is not lacked in information interacted by the instant messaging application, and if the sensitive information is not protected properly, the sensitive information is possibly stolen and utilized by an illegal user, so that property safety and personal safety of the user are threatened.
At present, after entering a chat interface of an instant messaging application, any user can view instant messaging messages displayed in the chat interface. Therefore, after an illegal user acquires a terminal device of a certain user by adopting an illegal means and enters a chat interface of an instant messaging application installed in the terminal device, the illegal user can check the instant messaging message of the certain user, and the sensitive information can be leaked under the condition that the instant messaging message contains sensitive information.
For example, as shown in fig. 1 to 3, an icon a of an instant messaging application may be set on a desktop of a terminal of a certain user, and if an illegal user acquires the terminal by an unauthorized means, the illegal user may open the instant messaging application by triggering the icon a. Then, the illegal user can enter the main interface of the instant messaging application as shown in fig. 2, and through the main interface, the illegal user can enter any chat interface of the instant messaging application. Fig. 3 is a schematic diagram of an exemplary chat interface, which, as shown in fig. 3, may include an instant messaging message of the certain user, and in the case that the instant messaging message includes sensitive information, the sensitive information may be leaked.
The embodiment of the application provides a method for displaying instant messaging messages, which can avoid the leakage of sensitive information in the instant messaging messages to a certain extent. In the instant messaging message display method, when a target instant messaging message is detected to contain sensitive information, a confidential reading identifier can be added to the target instant messaging message, a receiving terminal of the target instant messaging message can display the target instant messaging message in a confidential mode after receiving the target instant messaging message carrying the confidential reading identifier, and the target instant messaging message containing the sensitive information is displayed in the confidential mode by the receiving terminal, so that the target instant messaging message is difficult to be checked by an illegal user, and the leakage of the sensitive information in the target instant messaging message can be avoided to a certain extent.
Next, an implementation environment related to the method for displaying an instant messaging message provided by the embodiment of the present application will be described.
Fig. 4 is a schematic diagram of an implementation environment related to a method for displaying an instant messaging message according to an embodiment of the present application. As shown in fig. 4, the implementation environment may include a sending terminal 100 and a receiving terminal 200, where the sending terminal 100 refers to a terminal device held and used by a user who sends a target instant messaging message (hereinafter, referred to as a sending user) among at least two users who perform instant messaging, and the receiving terminal 200 refers to a terminal device held and used by a user who receives the target instant messaging message (hereinafter, referred to as a receiving user) among the at least two users who perform instant messaging.
The sending terminal 100 is configured to send a target instant messaging message to the receiving terminal 200, and the receiving terminal 200 is configured to receive the target instant messaging message sent by the sending terminal 100. In addition, the sending terminal 100 is further configured to add a confidential reading identifier to the target instant messaging message when detecting that the target instant messaging message contains sensitive information, and the receiving terminal 200 is further configured to display the target instant messaging message in a confidential manner under the condition that the target instant messaging message carries the confidential reading identifier.
Optionally, the sending terminal 100 and the receiving terminal 200 may be electronic devices such as a smart phone, a tablet computer, a desktop computer, a wearable device, an MP3 player (Moving Picture Experts Group Audio Layer III, mpeg Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, mpeg Audio Layer 4), or an e-book reader.
Fig. 5 is a schematic diagram of another implementation environment related to the method for displaying an instant messaging message according to the embodiment of the present application. As shown in fig. 5, the implementation environment may include a server 300 in addition to the transmitting terminal 100 and the receiving terminal 200 shown in fig. 4. The server 300 is configured to receive a target instant messaging message sent by the sending terminal 100, and forward the target instant messaging message to the receiving terminal 200. The server 300 is further configured to add a secure reading identifier to the target instant messaging message when it is detected that the target instant messaging message contains sensitive information.
It should be noted that the server 300 may be one server or a server cluster composed of a plurality of servers.
It should also be noted that although only one receiving terminal 200 is shown in each of fig. 4 and 5, the implementation environment related to the embodiments of the present application may include one or more receiving terminals 200. For example, when the sending terminal 100 sends the target instant messaging message in a group-sending manner, the implementation environment according to the embodiment of the present application may include a plurality of receiving terminals 200.
Referring to fig. 6, a timing diagram of a method for displaying an instant messenger message according to an embodiment of the present application is shown, where the method for displaying an instant messenger message may be applied to the sending terminal 100 of fig. 4, or the method for displaying an instant messenger message may be applied to the server 300 of fig. 5. As shown in fig. 6, the method for displaying an instant messaging message may include the following steps:
step 601, obtaining the target instant messaging message.
The target instant messaging message can be a text message, an audio message or an image message. Wherein, the text message refers to an instant messaging message containing text, the audio message refers to an instant messaging message containing audio, and the image message refers to an instant messaging message containing images, wherein the images comprise pictures and videos.
Step 602, detecting whether the target instant messaging message contains sensitive information.
Sensitive information refers to information that a user typically does not want to be known to outsiders, for example, the sensitive information may be identity information of the user, account information, physiological data, address information, contact information, an unsightly picture of the user, or information related to trade secrets, etc.
Step 603, when the target instant messaging message contains sensitive information, adding a confidential reading identifier for the target instant messaging message.
When the target instant messaging message contains sensitive information, a section of data can be written in a data packet carrying the target instant messaging message, wherein the section of data is the secret reading identifier, so that the technical process of adding the secret reading identifier to the target instant messaging message is realized.
The confidential reading mark is used for indicating the receiving terminal of the target instant messaging message to display the target instant messaging message in a confidential mode. By "presenting the target instant messaging message in a secure manner" is meant presenting the target instant messaging message in a manner that prevents viewing by users other than the legitimate recipient user of the target instant messaging message.
And step 604, sending the target instant messaging message added with the confidential reading identifier to a receiving terminal of the target instant messaging message.
To sum up, according to the method for displaying an instant messaging message provided in the embodiment of the present application, when it is detected that a target instant messaging message includes sensitive information, a confidential reading identifier is added to the target instant messaging message, so that a receiving terminal of the target instant messaging message displays the target instant messaging message in a confidential manner after receiving the target instant messaging message carrying the confidential reading identifier.
Referring to fig. 7, a timing diagram of a method for displaying an instant messenger message according to an embodiment of the present application is shown, where the method for displaying an instant messenger message can be applied to the receiving terminal 200 in fig. 4 or fig. 5. As shown in fig. 7, the method for displaying an instant messaging message may include the following steps:
step 701, the receiving terminal receives a target instant messaging message.
The target instant messaging message carries a confidential reading identifier, and the confidential reading identifier is added to the target instant messaging message when the target instant messaging message is determined to contain sensitive information.
And step 702, the receiving terminal displays the target instant messaging message in a confidential mode according to the instruction of the confidential reading identifier.
To sum up, the method for displaying an instant messaging message according to the embodiment of the present application displays a target instant messaging message in a confidential manner after receiving the target instant messaging message carrying a confidential reading identifier, where the confidential reading identifier is added to the target instant messaging message when determining that the target instant messaging message contains sensitive information, so that the target instant messaging message is difficult to be viewed by an illegal user, and thus leakage of the sensitive information in the target instant messaging message can be avoided to a certain extent.
Please refer to fig. 8, which illustrates a timing diagram of a method for displaying an instant messaging message according to an embodiment of the present application, where the method for displaying an instant messaging message can be applied to the implementation environments shown in fig. 4 or fig. 5. As shown in fig. 8, the method for displaying an instant messaging message may include the following steps:
step 801, the sending terminal obtains the target instant messaging message.
In the process of instant messaging, a sending user (i.e., a user who holds and uses a sending terminal) can open an instant messaging application installed in the sending terminal and enter a chat interface provided by the instant messaging application. In the message input box of the chat interface, the sending user can input the target instant messaging message. After the input is complete, the sending user can trigger a messaging option set in the chat interface. And after the triggering operation of the message sending option is detected, the sending terminal can obtain the target instant messaging message.
In the case that the technical solution provided in the embodiment of the present application is used in the implementation environment shown in fig. 4, after the sending terminal obtains the target instant messaging message, the following step 802 may be executed, that is, the sending terminal detects whether the target instant messaging message contains sensitive information.
In the case that the technical solution provided in the embodiment of the present application is used in the implementation environment shown in fig. 5, after the sending terminal obtains the target instant messaging message, the sending terminal may send the target instant messaging message to the server, so that the server detects whether the target instant messaging message contains sensitive information.
The technical process of the sending terminal detecting whether the target instant messaging message contains the sensitive information is the same as the technical process of the server detecting whether the target instant messaging message contains the sensitive information, and the embodiment of the application only takes the technical process of the sending terminal detecting whether the target instant messaging message contains the sensitive information as an example for explanation, that is, the embodiment of the application only takes the technical process of the step 802 as an example for explanation.
Step 802, the sending terminal detects whether the target instant messaging message contains sensitive information.
In the embodiment of the present application, the target instant messaging message may be a text message, an audio message, or an image message.
Next, the embodiment of the present application will briefly describe, for different types of target instant messaging messages, a technical process of a sending terminal for detecting whether a target instant messaging message includes sensitive information:
firstly, the target instant communication message is a character message.
In a possible implementation manner, the sending terminal may detect whether a target keyword exists in the text included in the target instant messaging message, and when the target keyword exists in the text included in the target instant messaging message, the sending terminal determines that the target instant messaging message includes sensitive information.
The target keyword may be a keyword preset by a technician or a keyword autonomously set by a sending user. The target keyword may be a keyword that may be included in the sensitive information or the target keyword may indicate that sensitive information is present in the context of the instant messaging message.
For example, the target keyword may be an "identification number", and when the target keyword "identification number" exists in text included in a certain instant messaging message, it usually indicates that sensitive information, i.e., identification number information of the user, is likely to exist in the context of the certain instant messaging message.
For another example, the target keyword may be "XX street," which may be a keyword that is set by the user autonomously, which may be part of the address of the user. When the target keyword 'XX street' exists in the text contained in an instant messaging message, the instant messaging message is indicated to contain sensitive information of the address of the user.
In another possible implementation manner, the sending terminal may detect whether a numeric string greater than a target length threshold exists in the text included in the target instant messaging message, and if the numeric string greater than the target length threshold exists in the text included in the target instant messaging message, the sending terminal may determine that the target instant messaging message includes sensitive information.
In general, if a number string greater than a target length threshold exists in a text included in a target instant messaging message, it is indicated that the target instant messaging message is likely to include sensitive information such as an identification number, a bank card number, or an account password.
The target length threshold may be set in advance by a technician, or may be set autonomously by a sending user, which is not specifically limited in the embodiment of the present application.
And secondly, the target instant messaging message is an audio message.
When the target instant messaging message is an audio message, the sending terminal can perform voice recognition on the audio contained in the target instant messaging message, so that the audio contained in the target instant messaging message is converted into characters. After the audio contained in the target instant messaging message is converted into the text, the sending terminal can detect whether the text contains the sensitive information or not by adopting the mode.
And thirdly, the target instant messaging message is an image message.
In a possible implementation manner, the sending terminal may detect whether a face exists in an image included in the target instant messaging message, and when the face exists in the image included in the target instant messaging message, the sending terminal may detect whether a ratio of human skin in the image included in the target instant messaging message is greater than a target ratio threshold.
When the proportion of the human skin in the image contained in the target instant messaging message is larger than the target proportion threshold value, the fact that the image contained in the target instant messaging message is possibly an unattractive picture of the user is shown, and under the condition, the sending terminal can determine that the target instant messaging message contains sensitive information.
The target ratio threshold may be set in advance by a technician, or may be set autonomously by a sending user, which is not specifically limited in the embodiment of the present application.
In another possible implementation manner, the sending terminal may detect whether an image included in the target instant messaging message is stored in a local privacy folder, where the privacy folder may be a folder set by a user and used for storing a sensitive image, and if the image included in the target instant messaging message is stored in the local privacy folder, the sending terminal may determine that the target instant messaging message includes sensitive information.
In yet another possible implementation manner, the sending terminal may input an image included in the target instant messaging message into a pre-trained neural network model, the neural network model outputs a probability that the image is a sensitive image, and when the probability that the image output by the neural network model is a sensitive image is greater than a target probability threshold, the sending terminal may determine that the target instant messaging message includes sensitive information.
The target probability threshold may be set in advance by a technician, or may be set autonomously by a sending user, which is not specifically limited in the embodiment of the present application.
It should be noted that the above-mentioned manner for the sending terminal to detect whether the target instant messaging message contains the sensitive information is merely exemplary, and in practical applications, there may be other manners for detecting whether the target instant messaging message contains the sensitive information.
Step 803, when the target instant messaging message contains sensitive information, the sending terminal displays the secret sending option in the chat interface of the instant messaging application.
Optionally, the sending terminal may display the prompt information sent in a confidential manner in a chat interface of the instant messaging application to prompt the user to send the target instant messaging message in a confidential manner. The term "confidential sending" refers to instructing the receiving terminal of the target instant messaging to display the target instant messaging message in a confidential mode.
Fig. 9 is a schematic diagram of an exemplary prompt message, which may be "prompt: based on data analysis, may the message contain sensitive information, is it sent using secondary encryption? Or send with one-time read logic? ". The term "sending by encryption" refers to indicating the receiving terminal of the target instant messaging to display the target instant messaging message after the authentication information of the user passes, and the term "sending by adopting one-time reading logic" refers to indicating the receiving terminal of the target instant messaging to destroy the target instant messaging message after the target instant messaging message is displayed once.
In an embodiment of the present application, the sending terminal may further display a secret sending option in a chat interface of the instant messaging application, and when the secret option is triggered, the target instant messaging message may be sent in a secret manner.
Fig. 10 is a diagram of exemplary secure transmission options, which may include a double encrypted transmission option and a one-time read transmission option, as shown in fig. 10. When the secondary encryption sending option is triggered, the target instant messaging message can be sent in a secondary encryption mode; when the one-time reading sending option is triggered, sending the target instant messaging message by adopting one-time reading logic.
Certainly, the secret sending option displayed in the chat interface of the instant messaging application by the sending terminal can also be a comprehensive secret sending option, and when the comprehensive secret sending option is triggered, the target instant messaging message can be sent in a secondary encryption and one-time reading logic mode.
It should be noted that, when the technical solution provided by the embodiment of the present application is used in the implementation environment shown in fig. 4, when the sending terminal detects that the target instant messaging message includes sensitive information, the sending terminal can display the secret sending option in the chat interface of the instant messaging application, and when the technical solution provided by the embodiment of the present application is used in the implementation environment shown in fig. 5, when the server detects that the target instant messaging message includes sensitive information, the server can send a target display command to the sending terminal, and after receiving the target display command, the sending terminal can display the secret sending option.
And step 804, after the triggering operation of the secret sending option is detected, adding a secret reading identifier for the target instant messaging message by the sending terminal.
As described above, the targeted instant messaging message may be sent securely upon detecting that the security option is triggered. The term "confidential sending" refers to instructing the receiving terminal of the target instant messaging to display the target instant messaging message in a confidential manner, that is, adding a confidential reading identifier to the target instant messaging message, wherein the confidential reading identifier is used for instructing the receiving terminal of the target instant messaging to display the target instant messaging message in a confidential manner.
In an embodiment of the present application, the confidential reading identifier may include at least one of a twice encrypted identifier and a destroyed identifier. The second encryption identifier is used for indicating the receiving terminal to display the target instant messaging message in the second encryption mode, namely, the second encryption identifier is used for indicating the receiving terminal to acquire the authentication information of the user before the target instant messaging message is displayed, and displaying the target instant messaging message after the authentication information passes; the destroy identifier is used to instruct the receiving terminal to display the target instant messaging message in the one-time reading logic manner, that is, the destroy identifier is used to instruct the receiving terminal to delete the target instant messaging message after displaying the target instant messaging message.
In the case that the technical solution provided by the embodiment of the present application is used in the implementation environment shown in fig. 4, after the sending terminal detects the trigger operation on the secret sending option, the sending terminal may add the secret reading identifier to the target instant messaging message, whereas in the case that the technical solution provided by the embodiment of the present application is used in the implementation environment shown in fig. 5, after the sending terminal detects the trigger operation on the secret sending option, the sending terminal may send a secret sending command to the server, and after the server receives the secret sending command, the secret reading identifier may be added to the target instant messaging message.
The technical process of adding the confidential reading identifier to the target instant messaging message by the sending terminal is the same as the technical process of adding the confidential reading identifier to the target instant messaging message by the server, and the embodiment of the application only takes the technical process of adding the confidential reading identifier to the target instant messaging message by the sending terminal as an example for description, that is, the embodiment of the application only takes the technical process of the step 804 as an example for description.
Step 805, the sending terminal sends the target instant messaging message added with the confidential reading identifier to the receiving terminal.
In the case that the technical solution provided by the embodiment of the present application is used in the implementation environment shown in fig. 4, the sending terminal may send the target instant messaging message to which the confidential reading identifier is added to the receiving terminal, and in the case that the technical solution provided by the embodiment of the present application is used in the implementation environment shown in fig. 5, the server may send the target instant messaging message to which the confidential reading identifier is added to the receiving terminal. In step 805, the embodiment of the present application is described only by taking the example that the sending terminal sends the target instant messaging message added with the confidential reading identifier to the receiving terminal.
In this embodiment of the present application, the code of the sending terminal or the server implementing the technical processes of steps 802 to 805 may be:
Figure BDA0001807071670000121
step 806, the receiving terminal receives the target instant messaging message.
After the receiving terminal receives the target instant messaging message, the target instant messaging message can be analyzed to determine whether the target instant messaging message carries the confidential reading identifier. When the target instant messaging message carries the confidential reading identification, the receiving terminal may perform the following technical process of step 806.
And step 807, the receiving terminal displays the target instant messaging message in a confidential mode according to the indication of the confidential reading identifier.
The way of displaying the target instant messaging message in a confidential way can be the following two ways:
in the first mode, the receiving terminal adopts a secondary encryption mode to display the target instant messaging message.
The receiving terminal can acquire the identity authentication information of the user before displaying the target instant messaging message, wherein the identity authentication information of the user can be physiological information such as fingerprint information, voiceprint information and face information, and the identity authentication information of the user can also be password information.
After acquiring the authentication information, the receiving terminal can authenticate the authentication information. For example, the receiving terminal may compare the acquired authentication information with reference authentication information stored in the receiving terminal, where the reference authentication information is authentication information of a legitimate user of the receiving terminal, and when the receiving terminal determines that the acquired authentication information is consistent with the reference authentication information in comparison, the authentication of the acquired authentication information may be passed.
After the authentication information of the user passes the authentication, the receiving terminal can display the target instant messaging message.
Optionally, the receiving terminal may display a prompt message for inputting the authentication information in the chat interface to prompt the user that the target instant messaging message can be checked only after the authentication information is input.
Fig. 11 is a diagram of an exemplary prompt message, which may be "the message requires secondary authentication, please fingerprint or enter a password to view the message" as shown in fig. 11.
In this way, after the authentication information of the user passes, the receiving terminal may display the target instant messaging message, and the authentication information of the illegal user cannot pass, so that the illegal user cannot check the target instant messaging message containing the sensitive information, thereby avoiding leakage of the sensitive information in the target instant messaging message to a certain extent.
In the second mode, the receiving terminal adopts a one-time reading logic mode to display the target instant messaging message.
The receiving terminal may display the target instant messaging message after receiving the target instant messaging message, and delete the target instant messaging message after displaying the target instant messaging message, for example, after displaying the target instant messaging message once.
In this way, the receiving terminal can delete the target instant messaging message after displaying the target instant messaging message, so that an illegal user cannot check the target instant messaging message containing sensitive information even if entering a chat interface of the user, and leakage of the sensitive information in the target instant messaging message can be avoided to a certain extent.
And in the third mode, the receiving terminal adopts secondary encryption and a one-time reading logic mode to display the target instant messaging message.
The receiving terminal can acquire the authentication information of the user before displaying the target instant messaging message, and can display the target instant messaging message after the authentication information of the user passes. The receiving terminal deletes the target instant messaging message after presenting the target instant messaging message, for example, after presenting the target instant messaging message once.
In this embodiment, the code for the receiving terminal to implement the technical processes of steps 806 to 807 may be:
Figure BDA0001807071670000141
in order to make the reader easily understand the technical solution provided by the embodiment of the present application, the embodiment of the present application will briefly describe the technical solution provided by the embodiment of the present application with reference to the timing diagrams of fig. 12 and fig. 13 as follows:
as shown in fig. 12, the sending user may edit the target instant messaging message on the chat interface, and after the editing is completed, the sending user may click on a message sending option. After detecting the click operation on the message sending option, the sending terminal may detect whether the target instant messaging message contains sensitive information. When the target instant messaging message does not contain sensitive information, the sending terminal can send the target instant messaging message in a normal mode. When the target instant messaging message contains sensitive information, the sending user can select a sending mode. When the sending user selects the sending mode of one-time reading, the sending terminal can add a destruction mark (namely, a confidential reading identifier) to the target instant messaging message and send the destruction mark. When the sending user selects the sending mode of the secondary encryption, the sending terminal can add a secondary encryption mark (namely a secret reading identifier) to the target instant messaging message and send the message. When the sending user selects the sending mode of normal sending, the sending terminal can send the target instant messaging message in a normal mode.
As shown in fig. 13, the receiving user may enter the chat interface to view the target instant messaging message, and the receiving terminal may parse the target instant messaging message to determine whether the target instant messaging message carries the confidential reading identifier. When the target instant communication message carries the confidential reading identification of the secondary encryption identification, the receiving terminal can verify the identity verification information of the user. When the target instant messaging message carries the confidential reading identifier of the destruction mark, the receiving terminal can delete the target instant messaging message after displaying the target instant messaging message.
To sum up, according to the method for displaying an instant messaging message provided in the embodiment of the present application, when it is detected that a target instant messaging message includes sensitive information, a confidential reading identifier is added to the target instant messaging message, so that a receiving terminal of the target instant messaging message can display the target instant messaging message in a confidential manner after receiving the target instant messaging message carrying the confidential reading identifier.
Referring to fig. 14, a block diagram of an instant messenger display apparatus 900 according to an embodiment of the present application is shown, where the instant messenger display apparatus 900 may be disposed in the sending terminal 100 shown in fig. 4 or the server 300 shown in fig. 5. As shown in fig. 14, the instant messenger message presentation apparatus 900 may include an obtaining module 901, a detecting module 902, an identifier adding module 903, and a sending module 904.
The obtaining module 901 is configured to obtain a target instant messaging message.
The detecting module 902 is configured to detect whether the target instant messaging message contains sensitive information.
The identifier adding module 903 is configured to add a confidential reading identifier to the target instant messaging message when the target instant messaging message contains the sensitive information, where the confidential reading identifier is used to instruct a receiving terminal of the target instant messaging message to display the target instant messaging message in a confidential manner.
The sending module 904 is configured to send the target instant messaging message with the confidential reading identifier added thereto to the receiving terminal.
In one embodiment of the application, the secure reading identifier comprises at least one of a twice encrypted identifier and a destroyed identifier; the secondary encryption mark is used for indicating the receiving terminal to acquire the authentication information of the user before the target instant messaging message is displayed, and displaying the target instant messaging message after the authentication information passes; the destruction identifier is used for indicating the receiving terminal to delete the target instant messaging message after the target instant messaging message is displayed.
In an embodiment of the present application, the identifier adding module 903 is configured to: displaying a secret sending option in a chat interface of the instant messaging application; and when the triggering operation of the secret sending option is detected, adding the secret reading identification to the target instant messaging message.
In an embodiment of the application, the target instant messaging message includes audio, and the detecting module 902 is specifically configured to: carrying out voice recognition on the audio frequency included in the target instant messaging message, and converting the audio frequency into character information; and detecting whether the text information contains the sensitive information.
In an embodiment of the application, the target instant messaging message includes an image, and the detecting module 902 is specifically configured to: detecting whether a face exists in an image included in the target instant messaging message; when a human face exists in the image, detecting whether the proportion of human skin in the image is larger than a target proportion threshold value; and when the proportion of the human skin in the image is larger than the target proportion threshold value, determining that the target instant messaging message contains the sensitive information.
In an embodiment of the application, the target instant messaging message includes an image, and the detecting module 902 is specifically configured to: detecting whether an image included in the target instant messaging message is stored in a privacy folder, wherein the privacy folder is used for storing a sensitive image; determining that the target instant messaging message contains the sensitive information when the image included in the target instant messaging message is stored in the privacy folder.
In an embodiment of the application, the target instant messaging message includes text information, and the detecting module 902 is specifically configured to: detecting whether a numeric string greater than a target length threshold exists in the text information included in the target instant messaging message; and when the character information included in the target instant messaging message contains the number string which is larger than the target length threshold, determining that the target instant messaging message contains the sensitive information.
In an embodiment of the application, the target instant messaging message includes text information, and the detecting module 902 is specifically configured to: detecting whether a target keyword exists in the text information included in the target instant messaging message; and when the target keyword exists in the text information included in the target instant messaging message, determining that the target instant messaging message contains the sensitive information.
To sum up, the device for displaying an instant messaging message according to the embodiment of the present application adds a confidential reading identifier to a target instant messaging message when detecting that the target instant messaging message contains sensitive information, so that a receiving terminal of the target instant messaging message can display the target instant messaging message in a confidential manner after receiving the target instant messaging message carrying the confidential reading identifier.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Referring to fig. 15, a block diagram of an instant messenger message display apparatus 1000 according to an embodiment of the present application is shown, where the instant messenger message display apparatus 1000 may be configured in the receiving terminal 200 shown in fig. 4 or fig. 5. As shown in fig. 15, the instant messenger message display apparatus 1000 may include a receiving module 1001 and a displaying module 1002.
The receiving module 1001 is configured to receive a target instant messaging message, where the target instant messaging message carries a confidential reading identifier, and the confidential reading identifier is added to the target instant messaging message when it is determined that the target instant messaging message contains sensitive information.
The display module 1002 is configured to display the target instant messaging message in a secure manner according to the indication of the secure reading identifier.
In an embodiment of the present application, the secret reading identifier includes a twice encrypted identifier, and the display module 1002 is specifically configured to: according to the indication of the secondary encryption identification, acquiring the identity authentication information of the user before the target instant messaging message is displayed; and displaying the target instant messaging message after the authentication information passes the authentication.
In an embodiment of the present application, the confidential reading identifier includes a destruction identifier, and the display module 1002 is specifically configured to: and displaying the target instant messaging message according to the indication of the destruction identifier, and deleting the target instant messaging message after displaying the target instant messaging message.
To sum up, the device for displaying an instant messaging message, provided by the embodiment of the present application, displays a target instant messaging message in a confidential manner after receiving the target instant messaging message carrying a confidential reading identifier, where the confidential reading identifier is added to the target instant messaging message when determining that the target instant messaging message contains sensitive information, so that the target instant messaging message is difficult to be viewed by an illegal user, and thus leakage of the sensitive information in the target instant messaging message can be avoided to a certain extent.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Referring to fig. 16, which shows a block diagram of an instant messenger presentation system 1100 according to an embodiment of the present application, as shown in fig. 16, the instant messenger presentation system 1100 may include a sending terminal 1101 and a receiving terminal 1102.
The sending terminal 1101 is configured to execute the steps executed by the sending terminal in the above method embodiments of the present application.
The receiving terminal 1102 is configured to execute the steps executed by the receiving terminal in the foregoing method embodiments of the present application.
Referring to fig. 17, a block diagram of an instant messenger presentation system 1200 according to an embodiment of the present application is shown, and as shown in fig. 17, the instant messenger presentation system 1200 may include a server 1201 and a receiving terminal 1202.
The server 1201 is configured to execute the steps executed by the server in the foregoing method embodiments of the present application.
The receiving terminal 1202 is configured to execute the steps executed by the receiving terminal in the foregoing method embodiments of the present application.
Fig. 18 shows a block diagram of a terminal 1800 according to an exemplary embodiment of the present application. The terminal 1800 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. The terminal 1800 may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, and the like.
Generally, the terminal 1800 includes: a processor 1801 and a memory 1802.
The processor 1801 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. The processor 1801 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1801 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1801 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing content required to be displayed on the display screen. In some embodiments, the processor 1801 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 1802 may include one or more computer-readable storage media, which may be non-transitory. Memory 1802 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1802 is used to store at least one instruction for execution by processor 1801 to implement a method for presenting an instant messaging message as provided by method embodiments herein.
Those skilled in the art will appreciate that the configuration shown in fig. 18 is not intended to be limiting of terminal 1800 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
Fig. 19 is a schematic diagram illustrating a configuration of a server according to an example embodiment. The server 1900 includes a Central Processing Unit (CPU)1901, a system memory 1904 including a Random Access Memory (RAM)1902 and a Read Only Memory (ROM)1903, and a system bus 1905 connecting the system memory 1904 and the central processing unit 1901. The server 1900 also includes a basic input/output system (I/O system) 1906 to facilitate transfer of information between devices within the computer, and a mass storage device 1907 to store an operating system 1913, application programs 1914, and other program modules 1915.
The basic input/output system 1906 includes a display 1908 for displaying information and an input device 1909, such as a mouse, keyboard, etc., for user input of information. Wherein the display 1908 and input device 1909 are coupled to the central processing unit 1901 through an input-output controller 1910 coupled to the system bus 1905. The basic input/output system 1906 may also include an input/output controller 1910 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 1910 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 1907 is connected to the central processing unit 1901 through a mass storage controller (not shown) connected to the system bus 1905. The mass storage device 1907 and its associated computer-readable media provide non-volatile storage for the server 1900. That is, the mass storage device 1907 may include a computer-readable medium (not shown), such as a hard disk or CD-ROM drive.
Without loss of generality, the computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that the computer storage media is not limited to the foregoing. The system memory 1904 and mass storage device 1907 described above may be collectively referred to as memory.
The server 1900 may also operate with remote computers connected to a network via a network, such as the internet, according to various embodiments of the present application. That is, the server 1900 may be connected to the network 1912 through the network interface unit 1911 connected to the system bus 1905, or the network interface unit 1911 may be used to connect to other types of networks or remote computer systems (not shown).
The memory further includes one or more programs, the one or more programs are stored in the memory, and the central processor 1901 implements the method for displaying the instant messaging message according to the embodiment of the present application by executing the one or more programs.
In an exemplary embodiment, a non-transitory computer-readable storage medium including instructions, such as a memory including instructions, executable by a processor of a server to perform a method of presenting an instant messaging message as shown in various embodiments of the present application is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The embodiment of the present application further provides a computer-readable storage medium, which is a non-volatile storage medium, and at least one instruction, at least one program, a code set, or a set of instructions is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the method for displaying an instant messaging message provided in the above embodiment of the present application.
The embodiment of the present application further provides a computer program product, where instructions are stored in the computer program product, and when the computer program product runs on a computer, the computer is enabled to execute the method for displaying an instant messaging message provided by the embodiment of the present application.
The embodiment of the present application further provides a chip, where the chip includes a programmable logic circuit and/or a program instruction, and when the chip runs, the method for displaying an instant messaging message provided in the embodiment of the present application can be executed.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (12)

1. A method for displaying instant communication messages is applied to a sending terminal or a server, and comprises the following steps:
acquiring a target instant messaging message, wherein the target instant messaging message comprises an image;
inputting the image contained in the target instant messaging message into a pre-trained neural network model, and outputting the probability that the image is a sensitive image by the neural network model; when the probability that the image output by the neural network model is the sensitive image is larger than a target probability threshold value, displaying a secret sending option in a chat interface of the instant messaging application; or when the image included in the target instant messaging message is stored in a privacy folder, displaying the secret sending option in a chat interface of the instant messaging application, wherein the privacy folder is used for storing a sensitive image;
displaying prompt information sent in a confidential mode on a chat interface of the instant messaging application, wherein the prompt information comprises secondary encryption prompt information sending and prompt information sent by adopting one-time reading logic, the secondary encryption prompt information sending is used for showing that a receiving terminal of the target instant messaging message displays the target instant messaging message after the authentication information of a user passes, and the prompt information sent by adopting the one-time reading logic is used for showing that the receiving terminal of the target instant messaging message destroys the target instant messaging message after the target instant messaging message is displayed once;
after the triggering operation of the confidential sending option is detected, adding a confidential reading identifier for the target instant messaging message, wherein the confidential reading identifier is used for indicating a receiving terminal of the target instant messaging message to display the target instant messaging message in a confidential mode, the confidential reading identifier comprises a secondary encryption identifier, the secondary encryption identifier is used for indicating the receiving terminal to acquire the identity verification information of a user before the target instant messaging message is displayed, and the identity verification information comprises at least one physiological information of fingerprint information, voiceprint information and facial information;
and under the condition that the secret sending option comprises a comprehensive secret sending option, after the comprehensive secret sending option is triggered, sending the target instant messaging message added with the secret reading identification to the receiving terminal in a secondary encryption and one-time reading logic mode.
2. The method of claim 1, wherein the secure reading identifier further comprises a destruction identifier;
the secondary encryption identifier is used for indicating the receiving terminal to acquire the authentication information of the user before the target instant messaging message is displayed, and displaying the target instant messaging message after the authentication information passes;
and the destruction identifier is used for indicating the receiving terminal to delete the target instant messaging message after the target instant messaging message is displayed.
3. The method of claim 1, wherein the targeted instant messaging message further comprises audio, and wherein detecting whether the targeted instant messaging message contains sensitive information comprises:
carrying out voice recognition on the audio frequency included by the target instant messaging message, and converting the audio frequency into character information;
and detecting whether the text information contains the sensitive information.
4. The method of claim 1, further comprising:
detecting whether a face exists in an image included in the target instant messaging message;
when a human face exists in the image, detecting whether the proportion of human skin in the image is larger than a target proportion threshold value;
and when the proportion of the human skin in the image is greater than the target proportion threshold value, determining that the target instant messaging message contains sensitive information.
5. The method of claim 1, wherein the target instant messaging message further comprises text information, and wherein detecting whether the target instant messaging message contains sensitive information comprises:
detecting whether a numeric string larger than a target length threshold exists in the text information included in the target instant messaging message;
and when the character information included in the target instant messaging message contains a numeric string which is larger than the target length threshold, determining that the target instant messaging message contains the sensitive information.
6. The method of claim 1, wherein the target instant messaging message further comprises text information, and wherein detecting whether the target instant messaging message contains sensitive information comprises:
detecting whether a target keyword exists in the text information included in the target instant messaging message;
and when the target keyword exists in the text information included in the target instant messaging message, determining that the target instant messaging message contains the sensitive information.
7. A method for displaying instant communication messages is applied to a receiving terminal, and the method comprises the following steps:
receiving a target instant messaging message, wherein the target instant messaging message comprises an image, the target instant messaging message carries a confidential reading identifier, the confidential reading identifier is the probability that a sending terminal or a server inputs the image contained in the target instant messaging message into a pre-trained neural network model, the neural network model outputs the image as a sensitive image, and when the probability that the image output by the neural network model is the sensitive image is greater than a target probability threshold value and a triggering operation of a confidential sending option displayed in a chat interface of an instant messaging application is detected, the confidential reading identifier is added to the target instant messaging message and comprises a secondary encryption identifier; or, the confidential reading identifier is added to the target instant messaging message when the image included in the target instant messaging message is stored in a privacy folder by the sending terminal or the server, and the privacy folder is used for storing a sensitive image;
according to the indication of the secondary encryption mark, acquiring identity authentication information of a user before the target instant messaging message is displayed, and displaying the target instant messaging message after the identity authentication information passes verification, wherein the identity authentication information comprises at least one physiological information of fingerprint information, voiceprint information and facial information; or displaying the target instant messaging message according to the indication of the destruction identifier, and deleting the target instant messaging message after displaying the target instant messaging message.
8. The method of claim 7, wherein the secure reading identifier comprises a destruction identifier, and wherein displaying the target instant messaging message in a secure manner according to the indication of the secure reading identifier comprises:
and displaying the target instant messaging message according to the indication of the destruction identifier, and deleting the target instant messaging message after displaying the target instant messaging message.
9. An instant messaging message display device, the device comprising:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a target instant messaging message, and the target instant messaging message comprises an image;
the detection module is used for inputting the images contained in the target instant messaging message into a pre-trained neural network model and outputting the probability that the images are sensitive images by the neural network model;
the identification adding module is used for displaying a secret sending option in a chat interface of the instant messaging application when the probability that the image output by the neural network model is the sensitive image is greater than a target probability threshold; or, the identifier adding module is further configured to display the confidential sending option in a chat interface of the instant messaging application when an image included in the target instant messaging message is stored in a privacy folder, where the privacy folder is used for storing a sensitive image;
the identification adding module is further used for displaying prompt information sent in a confidential mode on a chat interface of the instant messaging application, the prompt information comprises secondary encryption sending prompt information and prompt information sent by adopting one-time reading logic, the secondary encryption sending prompt information is used for showing that a receiving terminal of the target instant messaging message displays the target instant messaging message after the authentication information of a user passes, and the prompt information sent by adopting the one-time reading logic is used for showing that the receiving terminal of the target instant messaging message destroys the target instant messaging message after the target instant messaging message is displayed once;
the identification adding module is further configured to add a confidential reading identification to the target instant messaging message after detecting a triggering operation on the confidential sending option, where the confidential reading identification is used to indicate a receiving terminal of the target instant messaging message to display the target instant messaging message in a confidential manner, the confidential reading identification includes a secondary encryption identification, the secondary encryption identification is used to indicate the receiving terminal to obtain authentication information of a user before displaying the target instant messaging message, and the authentication information includes at least one of fingerprint information, voiceprint information, and face information;
and the sending module is used for sending the target instant messaging message added with the confidential reading identifier to the receiving terminal in a secondary encryption and one-time reading logic mode after the comprehensive confidential sending option is triggered under the condition that the confidential sending option comprises a comprehensive confidential sending option.
10. An instant messaging message display device, the device comprising:
a receiving module, configured to receive a target instant messaging message, where the target instant messaging message carries a confidential reading identifier, the target instant messaging message includes an image, the confidential reading identifier is a probability that a sending terminal or a server inputs an image included in the target instant messaging message into a pre-trained neural network model, the neural network model outputs the image as a sensitive image, and when the probability that the image output by the neural network model is the sensitive image is greater than a target probability threshold and a trigger operation on a confidential sending option displayed in a chat interface of an instant messaging application is detected, the image is added to the target instant messaging message, where the confidential reading identifier includes a secondary encryption identifier; or, the confidential reading identifier is added to the target instant messaging message when the image included in the target instant messaging message is stored in a privacy folder by the sending terminal or the server, and the privacy folder is used for storing a sensitive image;
the display module is used for acquiring the identity authentication information of the user before displaying the target instant messaging message according to the indication of the secondary encryption identifier, and displaying the target instant messaging message after the identity authentication information passes the authentication, wherein the identity authentication information comprises at least one of physiological information of fingerprint information, voiceprint information and facial information; or displaying the target instant messaging message according to the indication of the destruction identifier, and deleting the target instant messaging message after displaying the target instant messaging message.
11. A terminal, characterized in that the terminal comprises a processor and a memory, wherein the memory stores at least one instruction, and the instruction is loaded and executed by the processor to realize the instant messaging message display method according to any one of claims 1 to 6;
alternatively, the instructions are loaded and executed by the processor to implement the instant messaging message presentation method of claim 7 or 8.
12. A computer-readable storage medium, wherein at least one instruction is stored in the computer-readable storage medium, and the instruction is loaded and executed by a processor to implement the method for displaying an instant messenger message according to any one of claims 1 to 6;
alternatively, the instructions are loaded and executed by a processor to implement the method for presenting an instant messaging message according to claim 7 or 8.
CN201811102671.3A 2018-09-20 2018-09-20 Instant communication message display method, device, equipment and storage medium Active CN109274582B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811102671.3A CN109274582B (en) 2018-09-20 2018-09-20 Instant communication message display method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811102671.3A CN109274582B (en) 2018-09-20 2018-09-20 Instant communication message display method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109274582A CN109274582A (en) 2019-01-25
CN109274582B true CN109274582B (en) 2021-12-10

Family

ID=65197798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811102671.3A Active CN109274582B (en) 2018-09-20 2018-09-20 Instant communication message display method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109274582B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765502B (en) * 2019-10-30 2022-02-18 Oppo广东移动通信有限公司 Information processing method and related product
CN112367240A (en) * 2020-09-21 2021-02-12 上海伊邦医药信息科技股份有限公司 Method for ensuring uniqueness of instant messaging messages of multi-platform equipment
WO2022126476A1 (en) * 2020-12-17 2022-06-23 Citrix Systems, Inc. Secure collaboration messaging
CN114257562B (en) * 2021-12-16 2024-02-06 北京天融信网络安全技术有限公司 Instant messaging method, device, electronic equipment and computer readable storage medium
CN114598671B (en) * 2022-03-21 2023-01-31 北京明略昭辉科技有限公司 Session message processing method, device, storage medium and electronic equipment
CN115150172B (en) * 2022-07-01 2023-08-11 北京百度网讯科技有限公司 Data processing method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996314A (en) * 2009-08-26 2011-03-30 厦门市美亚柏科信息股份有限公司 Content-based human body upper part sensitive image identification method and device
CN103856919A (en) * 2014-03-27 2014-06-11 宇龙计算机通信科技(深圳)有限公司 Information sending method and device as well as information receiving method and device
CN104350505A (en) * 2012-06-28 2015-02-11 国际商业机器公司 Privacy control in social network
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal
CN106033518A (en) * 2015-03-12 2016-10-19 腾讯科技(深圳)有限公司 Information processing method and apparatus
CN107889102A (en) * 2016-09-30 2018-04-06 中兴通讯股份有限公司 The method and apparatus of information encryption and decryption in a kind of short message

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DK179471B1 (en) * 2016-09-23 2018-11-26 Apple Inc. Image data for enhanced user interactions

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996314A (en) * 2009-08-26 2011-03-30 厦门市美亚柏科信息股份有限公司 Content-based human body upper part sensitive image identification method and device
CN104350505A (en) * 2012-06-28 2015-02-11 国际商业机器公司 Privacy control in social network
CN103856919A (en) * 2014-03-27 2014-06-11 宇龙计算机通信科技(深圳)有限公司 Information sending method and device as well as information receiving method and device
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal
CN106033518A (en) * 2015-03-12 2016-10-19 腾讯科技(深圳)有限公司 Information processing method and apparatus
CN107889102A (en) * 2016-09-30 2018-04-06 中兴通讯股份有限公司 The method and apparatus of information encryption and decryption in a kind of short message

Also Published As

Publication number Publication date
CN109274582A (en) 2019-01-25

Similar Documents

Publication Publication Date Title
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
CN110515678B (en) Information processing method, equipment and computer storage medium
US9740920B1 (en) Systems and methods for securely authenticating users via facial recognition
CN105981398B (en) Content security method and electronic device for providing content security function
US20180359245A1 (en) Communication Method and Apparatus
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
CN103281375A (en) Contact management method, device and system for third-party application
CN110659452A (en) Artificial intelligence supported cyber data hiding and directed task execution
CN109858274A (en) The method and apparatus that message is shown
CN113422679B (en) Key generation method, device and system, encryption method, electronic device and computer readable storage medium
TW201504839A (en) Portable electronic apparatus and interactive human face login method
CN108073820A (en) Security processing, device and the mobile terminal of data
CN114157584A (en) Cloud mobile phone monitoring method and device, electronic equipment and storage medium
CN110545542A (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
WO2016188079A1 (en) Data storage method for terminal device and terminal device
CN114244518B (en) Digital signature confusion encryption method, device, computer equipment and storage medium
CN112910837B (en) Identity authentication method and system based on communication network and readable storage medium thereof
CN115277670A (en) Network connection control method and device of target application and electronic equipment
US20220053123A1 (en) Method and apparatus for independent authentication of video
CN113672954A (en) Feature extraction method and device and electronic equipment
CN107682161B (en) Offline authentication method and device for two-dimensional code
CN110740112B (en) Authentication method, apparatus and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant