CN113452530B - Information transmission method and device - Google Patents

Information transmission method and device Download PDF

Info

Publication number
CN113452530B
CN113452530B CN202110727231.2A CN202110727231A CN113452530B CN 113452530 B CN113452530 B CN 113452530B CN 202110727231 A CN202110727231 A CN 202110727231A CN 113452530 B CN113452530 B CN 113452530B
Authority
CN
China
Prior art keywords
information
time point
electronic device
timestamp
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110727231.2A
Other languages
Chinese (zh)
Other versions
CN113452530A (en
Inventor
唐杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110727231.2A priority Critical patent/CN113452530B/en
Publication of CN113452530A publication Critical patent/CN113452530A/en
Application granted granted Critical
Publication of CN113452530B publication Critical patent/CN113452530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/216Handling conversation history, e.g. grouping of messages in sessions or threads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application relates to an information transmission method and device, and belongs to the technical field of communication. The information transmission method comprises the following steps: the method comprises the steps that first electronic equipment obtains first information to be sent; generating second information associated with the first information under the condition that the first information comprises private content, wherein the second information is information obtained by encrypting the first information and comprises: key information, the key information including first timestamp information of the first electronic device; and sending the second information to second electronic equipment so as to enable the second electronic equipment to display the second information in a target mode. And after the second electronic equipment receives the second information, the second electronic equipment displays the second information in a target mode, so that the privacy and the safety of the first information are effectively guaranteed.

Description

Information transmission method and device
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to an information transmission method, an information transmission method and an information transmission device.
Background
When a user uses the social application program to chat with another user, the user is substantially end-to-end data transmission, that is, one electronic device end sends a message, the other electronic device end receives the message, and in the whole process, a chat record is generated, and the chat record is usually stored locally in the electronic device, the electronic device can also send the chat record to a server, and the server stores the chat record, so that when the user logs in the social application program in another electronic device, the chat record can be synchronized.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art: when the chat information of the user has the privacy information (such as the ID card number, the bank card number, the home address and the like), the electronic equipment at the sending end directly sends the privacy information to the electronic equipment at the receiving end, and the electronic equipment at the receiving end can review the privacy information at any time, so that the privacy is easily revealed.
Disclosure of Invention
The embodiment of the application provides an information transmission method and device, which can solve the problem of privacy information safety during information transmission and after information transmission between electronic equipment.
In a first aspect, an embodiment of the present application provides an information transmission method, which is applied to a first electronic device, and the method includes:
acquiring first information to be sent;
generating second information associated with the first information under the condition that the first information comprises private content, wherein the second information is information obtained by encrypting the first information and comprises: key information including first timestamp information of the first electronic device;
and sending the second information to second electronic equipment so as to enable the second electronic equipment to display the second information in a target mode.
In a second aspect, an embodiment of the present application further provides an information transmission method, which is applied to a second electronic device, and the method includes:
receiving second information sent by first electronic equipment, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic equipment;
displaying the second information in a first display manner under the condition that a second time point is matched with the first timestamp information;
or, when the second time point does not match the first timestamp information, displaying the second information in a second display manner.
In a third aspect, an embodiment of the present application further provides an information transmission apparatus, which is applied to a first electronic device, and the apparatus includes:
the acquisition module is used for acquiring first information to be sent;
a generating module, configured to generate second information associated with the first information when the first information includes private content, where the second information is information obtained by encrypting the first information, and the second information includes: key information, the key information including first timestamp information of the first electronic device;
and the sending module is used for sending the second information to second electronic equipment so as to enable the second electronic equipment to display the second information in a target mode.
In a fourth aspect, an embodiment of the present application provides an information transmission apparatus, which is applied to a second electronic device, and includes:
the receiving module is used for receiving second information sent by first electronic equipment, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic equipment;
the second display module is used for displaying the second information in a first display mode under the condition that a second time point is matched with the first timestamp information; or, when the second time point does not match the first timestamp information, displaying the second information in a second display manner.
In a fifth aspect, an embodiment of the present application further provides a first electronic device, where the first electronic device includes:
a first processor, a first memory and a program or instructions stored on the first memory and executable on the first processor, which program or instructions, when executed by the first processor, implement the steps of the information transmission method according to the first aspect.
In a sixth aspect, an embodiment of the present application further provides a second electronic device, where the second electronic device includes: a second processor, a second memory and a program or instructions stored on the second memory and executable on the second processor, which program or instructions, when executed by the second processor, implement the steps of the information transmission method according to the second aspect.
In a seventh aspect, this application further provides a readable storage medium, where the computer readable storage medium stores a program or instructions, and the program or instructions, when executed by a processor, implement the steps of the method according to the first or second aspect.
In the embodiment of the application, when first information acquired by first electronic equipment comprises private content, second information associated with the first information is generated, and the second information is information obtained by encrypting the first information. And then, the second information is sent to the second electronic equipment, so that privacy safety protection of the first electronic equipment is realized when the information carrying privacy content is transmitted. After the second electronic device receives the second information transmitted by the first electronic device, the second information includes key information including first timestamp information of the first electronic device, so that the second information is displayed in the first display mode when the second time point matches the first timestamp information, and the second information is displayed in the second display mode when the second time point does not match the first timestamp information. That is, if the second time point of the second electronic device does not meet the condition, the second information is displayed in a second display mode, for example, the ciphertext is displayed, so that the user cannot directly view the first information displayed in the plaintext, and the second electronic device cannot directly display the specific content of the first information under the condition that the subsequent time points are not matched, thereby effectively ensuring the privacy security of the first information.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
FIG. 1 is a schematic view of a first electronic device interacting with a second electronic device according to the present application;
FIG. 2 is a schematic flow chart illustrating interaction between a first electronic device and a second electronic device according to the present application;
FIG. 3 is a schematic flow chart diagram illustrating one embodiment of an information transfer method of the present application;
FIG. 4 is an interface diagram of a dialog box of an embodiment of the information transfer method of the present application;
FIG. 5 is an interface diagram of scenario 1 of an embodiment of the information transfer method of the present application;
FIG. 6 is an interface diagram of scenario 2 of an embodiment of the information transfer method of the present application;
FIG. 7 is an interface diagram of scenario 3 of an embodiment of the information transfer method of the present application;
FIG. 8 is a schematic flow chart diagram illustrating another embodiment of an information transfer method of the present application;
FIG. 9 is a schematic diagram of an embodiment of an information transfer device according to the present application;
fig. 10 is a schematic configuration diagram of another embodiment of the information transmission device of the present application;
fig. 11 is a schematic structural diagram of a first electronic device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a second electronic device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The information transmission method provided in the embodiments of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
As shown in fig. 1, fig. 1 is a schematic view of a scene in which a first electronic device and a second electronic device interact with each other, where the first electronic device and the second electronic device both have a social application program, and interact with each other through the social application program, and when the first electronic device sends a message to the second electronic device, the second electronic device can receive the message. It will be appreciated that the first electronic device and the second electronic device may be interchangeable, i.e. the first electronic device is able to receive a message when the second electronic device sends the message to the first electronic device. The first electronic device and the second electronic device may be intelligent terminals, such as a mobile phone, a tablet computer, a notebook computer, and the like.
As shown in fig. 2, which is an exemplary interaction flowchart between a first electronic device and a second electronic device, the first electronic device obtains first information to be sent, and generates second information associated with the first information when the first information includes private content, where the second information is information obtained by encrypting the first information. Wherein the second information comprises key information, the key information comprising first timestamp information of the first electronic device. Then, the first electronic device sends the second information to a second electronic device so that the second electronic device displays the second information in a target mode.
The first electronic equipment stores second information after sending the second information to the second electronic equipment, and displays the second information in a first display mode under the condition that the first time point is matched with the first timestamp information; or, when the first time point does not match the first timestamp information, displaying the second information in a second display manner.
When first electronic equipment sends the first information that carries the privacy content, through the mode of converting first information into second information earlier and then sending, guaranteed the privacy security of information transmission process to after sending, when local point in time and first time stamp information did not match, then show the second information with second display mode (for example ciphertext display mode), make the follow-up unable direct view first information of user (privacy content), guarantee the privacy security of first information.
The second electronic equipment receives second information sent by the first electronic equipment, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic equipment. Displaying the second information in a first display mode under the condition that the second time point is matched with the first time stamp information; or, when the second time point does not match the first timestamp information, displaying the second information in a second display manner.
When the second electronic device receives the second information sent by the first electronic device in the privacy protection manner, the second information can be displayed in the first display manner, such as a plaintext display, only when the second time point matches the first time stamp information, so that the user can view the original first information (privacy content). However, if the second time point does not match the first timestamp information, the second electronic device displays the second information in a second display mode, such as ciphertext display, that is, the user cannot directly view the first information carrying the private content through the second electronic device, so that the privacy security of the first information is ensured.
As shown in fig. 3, a schematic flow chart of an information transmission method provided in the embodiment of the present application is shown, where the information transmission method is applied to a first electronic device, and the method includes:
s301: and acquiring first information to be sent.
In the first electronic device and the second electronic device, many types of social application programs are generally installed, and a user can send or receive information by using the social application programs.
Specifically, as shown in fig. 4, after the user logs in the social application on the first electronic device by using the account, when the user performs a chat session with the friend through the social application, the user may input chat content that the user wants to send in the dialog box, so that the first electronic device may obtain the chat content in the dialog box to obtain the first information to be sent. After the user clicks to send, the first message to be sent is converted into a sent message, and the sent message is displayed in a dialog box, for example, the chat message b and the chat message d in fig. 4 are messages that the user of the first electronic device has sent to the user of the second electronic device, and the chat message a and the chat message c are messages that the user of the second electronic device has sent to the user of the first electronic device.
As shown in fig. 5, "chat message e" in the input box of the first electronic device is the first information to be sent, which is acquired by the first electronic device.
S302: and generating second information associated with the first information under the condition that the first information comprises private content, wherein the second information is information obtained by encrypting the first information, and the second information comprises key information which comprises first timestamp information of the first electronic equipment.
It can be understood that the first information to be sent generally relates to some private information, such as an identity card number, a picture corresponding to the identity card, a bank card number, a picture corresponding to the bank card, a home address, a mobile phone number, and other information.
Specifically, the first electronic device may perform level division on the first information to be sent when the first information to be sent is obtained, for example, the first information to be sent is divided into a-G levels, where the a level is smaller than the B level, the B level is smaller than the C level, and so on. And, the first information to be transmitted with a level higher than the D level (E, F, G level) is set as private information, whereas the first information to be transmitted with a level lower than the D level (including the D level) is ordinary information. The common information can be directly sent and directly stored locally in the first electronic device, or the first electronic device sends the common information to the cloud server for storage after the common information is sent successfully. For example, when the first information to be sent is "do you know my identity card number", although several sensitive words such as the identity card number are involved, but the identity card number is not involved, the level of the first information to be sent can be determined as D, and when the first information to be sent is "do me identity card number", it is obvious that the level of the first information to be sent is E, that is, greater than D, and privacy content (specific identity card number) is included.
When the first electronic device identifies that the first information to be sent contains the private information, it indicates that the first information to be sent relates to the private information, and at this time, the private content needs to be sent in a protective manner.
In some optional embodiments, when there is private information in the first information to be sent, if the user wants to send the private information, the first electronic device may display a prompt box to prompt the user that the information includes the private information, and ask the user whether the user needs to select a protective sending method to send the first information.
Accordingly, after the first electronic device determines that the first information includes private content, the method may further include:
if receiving a sending operation aiming at the first information, displaying a prompt box;
generating second information associated with the first information in response to the determination operation for the prompt box.
Illustratively, as shown in fig. 5, a user inputs first information carrying privacy content in an input box, if the user clicks a send button of a social application on the first electronic device, the first electronic device displays a prompt box, as shown in fig. 6, prompts that the information relates to privacy, inquires whether to send the information in a protected sending manner, and displays a cancel and confirm button for the user to select, when the user selects and confirms, the first electronic device generates second information associated with the first information, and sends the first information in a protected sending manner (converted into the second information), and if the user selects the cancel button, the first electronic device directly sends the first information in a normal manner.
In the case where the first information is transmitted in the protected transmission method, it is necessary to generate a key, encrypt the first information with the key, and transmit the information as a privacy ciphertext.
In other embodiments, the first electronic device may also not display the prompt box, and when the first electronic device detects that the first information to be sent includes the private information, the first electronic device directly sends the private information in a protective manner.
When the user selects the protective mode for transmission, the first electronic equipment generates second information associated with the first information. In some embodiments, the key information includes first timestamp information of the first electronic device, and the first electronic device determines a specific target display mode according to a matching condition of the first timestamp information and a first time point at which the first electronic device displays the second information.
In some embodiments, the key information further includes device information of the first electronic device, and when the first electronic device successfully sends the second information, the first electronic device stores the second information locally in the first electronic device, or the first electronic device forwards the second information to the cloud server, so that the cloud server stores the second information. When a user logs in the social contact application at other electronic equipment by using the same account, the social contact application synchronizes second information through the cloud server, and the second information is directly displayed in a second display mode on the other electronic equipment due to the fact that the equipment information of the other electronic equipment is not matched with the equipment information of the first electronic equipment, for example, the first information is displayed in a ciphertext mode, so that the user is prevented from being capable of viewing the specific content of the first information at the other electronic equipment.
When generating the key information, the key information may be generated from the information (the first timestamp information, the device information of the first device, and the like) according to a random hash rule. The random hash rule is, for example, MD5 (Message-Digest Algorithm), belongs to a hash Algorithm, and can hash any section of plaintext data to obtain key information.
S303: and sending the second information to second electronic equipment so as to enable the second electronic equipment to display the second information in a target mode.
After obtaining the second information, the first electronic device may directly send the second information to the second electronic device.
The second information is sent after the first information is encrypted by the key, so that the safety of the first information carrying the private content in the transmission process can be effectively ensured.
In some optional embodiments, after the first electronic device sends the second information to the second electronic device, the local of the first electronic device will usually generate a chat record related to the second information, the user will view the chat record because of his own needs, and in order to ensure the privacy and safety of the chat record, after the first electronic device sends the second information to the second electronic device, the method may further include:
storing the second information;
displaying the second information in a first display mode under the condition that a first time point is matched with the first timestamp information;
or, when the first time point does not match the first timestamp information, displaying the second information in a second display manner.
It can be understood that, since the key information includes the first timestamp information of the first electronic device, when the user subsequently views the transmitted first information locally on the first electronic device, if the viewed first time point does not match the first timestamp information, only the second information displayed in the second display manner can be viewed, and if the viewed first time point matches the first timestamp information, the first information displayed in the first display manner can be viewed.
In some specific embodiments, after the first electronic device sends the second information, the first electronic device stores the sent information locally, that is, stores the sent second information, or the first electronic device uploads the sent second information to the cloud server, and the cloud server stores the second information.
In order to ensure the privacy and safety of the first information, the second information is displayed in a first display mode under the condition that the first time point is matched with the first timestamp information. Wherein, the first time point may be a current time when the user views the transmitted second information using the first electronic device. As can be appreciated, displaying the second information in the first display manner may be: the second information is decrypted to display the second information in plain text (i.e., to display the first information). That is, when the current time when the subsequent user views the sent second information at the first electronic device side matches the first timestamp information, the first electronic device decrypts the second information and displays the second information in a plaintext (i.e., displays the first information), and at this time, the user can directly view the content of the first information.
In addition, the second information is displayed in a second display manner when the first time point does not match the first timestamp information. As can be appreciated, displaying the second information in the second display manner may be: the information is still displayed in the form of ciphertext (i.e., display of the second information). That is, when the current time of the transmitted second information viewed by the subsequent user at the first electronic device side does not match the first timestamp information, the first electronic device directly displays the second information in a ciphertext manner, and at this time, the user cannot directly view the specific content of the first information.
Optionally, the first timestamp information includes sending time point information and preset duration information.
And matching the first time point with the first timestamp information under the condition that the first time point is within a preset time interval.
Or, in a case that the first time point is not within the preset time interval, the first time point is not matched with the first timestamp information.
The first time point is the current time point of the first electronic device when the second information is displayed, and the preset interval is determined by the sending time point information and the preset duration information.
For example, when the transmission time point information is 8 00, the preset duration information is 3 minutes, and when the transmission time point information is the start time of the preset time interval, and the preset duration information is 3 minutes, the preset time interval is 8 00-01-03, when the first time point (8. For example, the first information is "my identity card number is 123456", the encrypted second information is "my identity card number is", and the second information is displayed in a first display mode as follows: "my identification number is 123456" is displayed. When the first time point (8: "my identification number is shown.
It should be noted that the situation that the first electronic device displays the second information again after sending the second information may be that the user triggers the first electronic device to display when clicking to view the sent message, or that the user re-clicks to enter the dialog box after exiting from the current dialog box, and the second information is exactly in the interface displayed by the dialog box. Since there are various ways to trigger the first electronic device to display the second information, they are not listed here.
In addition, the preset duration information can be set according to the requirements of the user. Alternatively, the preset time period may be calculated only after detecting that the user exits from the dialog interface, for example, after the user sends the second information, the user exits from the dialog interface after displaying half an hour, and the end time of the preset time interval is half an hour plus the preset time period information, that is, the user may see the second information displayed in the first display mode (i.e., directly display the first information) without exiting from the dialog interface.
In some optional embodiments, as shown in fig. 7, in order to facilitate the user to know that the first information is sent by a protected sending method, after the first electronic device sends the second information to the second electronic device, a prompt "description" may be displayed on the dialog box: through the protective sending mode, plaintext display at any end cannot be performed subsequently, so that a user is prompted that the second information displayed in the plaintext cannot be checked (namely, the first information is displayed) when the second information is outside a preset time interval.
The first electronic equipment sends the second information to the second electronic equipment in a protective mode, so that the safety of the first information in the transmission process is guaranteed, the first information can be further protected in privacy through the matching degree of the first timestamp information of the first electronic equipment in the key information and the first time point of the first electronic equipment, the fact that the first electronic equipment cannot display the second information in the clear text in the follow-up process is achieved, and therefore the safety of the local information of the first electronic equipment is guaranteed.
In the embodiment of the application, when first information to be sent acquired by first electronic equipment includes private content, second information associated with the first information is generated, wherein the second information is information obtained by encrypting the first information. And then, the first electronic equipment sends the second information to the second electronic equipment so as to protect the privacy content when the information carrying the privacy content is transmitted.
Fig. 8 is a schematic flowchart of an information transmission method provided in an embodiment of the present application, where the information transmission method is applied to a second electronic device, and the method includes:
s801: second information sent by a first electronic device is received, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic device.
S802: displaying the second information in a first display mode under the condition that a second time point is matched with the first timestamp information;
s803: or, when the second time point does not match the first timestamp information, displaying the second information in a second display manner.
After first electronic equipment sends second information to second electronic equipment, the second electronic equipment receives the second information sent by the first electronic equipment, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic equipment. And then, the second electronic equipment determines a specific target mode according to the matching condition of the second time point and the first time stamp information.
It is understood that the second time point is a current time point when the second electronic device displays the second information. And the second electronic equipment displays the second information in different target modes according to the matching condition of the second time point and the first time stamp information. That is, the second electronic device displays the second information in a different manner in the case where the second time point does not match the first time stamp information and in the case where the second time point matches the first time stamp information.
Specifically, the target mode includes a first display mode and a second display mode, and for example, the first display mode may be a plaintext display mode, that is, the second electronic device converts the second information into the first information to be directly displayed, so that the user can view the content of the first information conveniently; the second display mode can be a cipher text display mode, so that a user cannot directly view the specific content of the first information.
And the first information is the information obtained after the second information is decrypted.
Optionally, the first timestamp information includes sending time point information and preset duration information.
And under the condition that the second time point is within a preset time interval, matching the second time point with the first timestamp information.
And under the condition that the second time point is not in the preset time interval, the second time point is not matched with the first timestamp information.
The second time point is the current time point of the second electronic device when the second information is displayed, and the preset time interval is determined by the sending time point information and the preset duration information.
For example, after the second electronic device receives the second information, a time point triggered to display the second information is a second time point, the first timestamp information of the first electronic device is 8 00. At this time, if a second time point (8: "my identification number is 123456" is displayed.
When a second time point (8: "my identification number is shown.
There are various ways in which the second electronic device is triggered to display the second information, for example, the second electronic device keeps displaying a dialog box with the first electronic device on the current interface, so that when the first electronic device sends the second information to the second electronic device, the second electronic device immediately displays the second information; for another example, the user of the second electronic device has exited the dialog box, but after the first electronic device sends the second information to the second electronic device, the second electronic device re-enters the dialog box to display the second information.
In this embodiment, the user's viewing of the second information on the second electronic device is restricted by determining a relationship between the second point in time of the second electronic device and the first timestamp information. Specifically, when the second time point of the second electronic device is outside the preset time interval, the second electronic device displays the second information in the second display mode, and at this time, the user cannot view the second information (i.e., the first information) displayed in the clear text, thereby ensuring the privacy and security of the first information.
Optionally, step S802 may include:
under the condition that the second time point is matched with the first timestamp information, the second information is decrypted by using the key information to obtain first information;
and displaying the first information.
The second electronic device may decrypt the second information using the key information to obtain the first information when the second time point matches the first timestamp information, and display the first information, that is, the second electronic device may directly display the first information when the time point at which the second electronic device displays the second information is within the preset time interval, so that the user may directly view the specific content of the first information.
In some optional embodiments, the key information further includes preset device information, and after the second electronic device receives the second information sent by the first electronic device, the method further includes:
and under the condition that the equipment information of the second electronic equipment is not matched with the preset equipment information, displaying the second information in the second display mode.
Further, since the second information includes key information including first time stamp information of the first electronic device, the second information is displayed in the first display manner when the second time point matches the first time stamp information.
It can be understood that, after the second electronic device decrypts the second information by using the key information, preset device information is also obtained, where the preset information may be a device list preset by the user, or may be that a device that receives the second information for the first time is determined as a preset device. And displaying the second information in the second display mode under the condition that the device information of the second electronic device is not matched with the preset device information, wherein at the moment, the second information displayed in the second display mode can only be viewed at a second time point of viewing the information on the second electronic device even within a preset time interval, and the second information (namely the first information) displayed in a plaintext cannot be viewed, so that the electronic devices which are not matched with the preset device information cannot view the specific content of the information, and the information leakage caused by the fact that a user using the second electronic device forwards the private content is prevented.
Accordingly, as shown in fig. 9, an embodiment of the present application further provides an information transmission apparatus, which may be applied to an electronic device, for example, the first electronic device shown in fig. 1, where the information transmission apparatus 900 includes:
an obtaining module 901, configured to obtain first information to be sent;
a generating module 902, configured to generate second information associated with the first information when the first information includes private content, where the second information is information obtained by encrypting the first information, and the second information includes: key information including first timestamp information of the first electronic device;
a sending module 903, configured to send the second information to a second electronic device, so that the second electronic device displays the second information in a target manner.
In the embodiment of the application, when first information acquired by first electronic equipment includes private content, second information associated with the first information is generated, and the second information is information obtained by encrypting the first information. And then, the second information is sent to the second electronic equipment, so that privacy safety protection of the first electronic equipment is realized when the information carrying the privacy content is transmitted.
In some embodiments, the apparatus 900 further comprises:
a storage module 904, configured to store the second information;
a first display module 905, configured to display the second information in a first display manner when the first time point matches the first timestamp information; or, when the first time point does not match the first timestamp information, displaying the second information in a second display mode.
In some embodiments, the first timestamp information includes transmission time point information and preset duration information; the first display module 905 is further configured to:
under the condition that the first time point is within a preset time interval, matching the first time point with the first timestamp information;
or, in the case that the first time point is not within the preset time interval, the first time point is not matched with the first timestamp information;
the first time point is the current time point of the first electronic device when the second information is displayed, and the preset interval is determined by the sending time point information and the preset duration information.
Accordingly, as shown in fig. 10, an embodiment of the present application further provides an information transmission apparatus, which may be applied to an electronic device, for example, the second electronic device shown in fig. 1, where the information transmission apparatus 1000 includes:
a receiving module 1001, configured to receive second information sent by a first electronic device, where the second information includes key information, and the key information includes first timestamp information of the first electronic device;
a second displaying module 1002, configured to display the second information in a first displaying manner when a second time point matches the first timestamp information;
or, when the second time point does not match the first timestamp information, displaying the second information in a second display manner.
According to the information transmission device in the embodiment of the application, after the second electronic device receives the second information sent by the first electronic device, the second information comprises the key information, and the key information comprises the first timestamp information of the first electronic device, so that the second information is displayed in the first display mode under the condition that the second time point is matched with the first timestamp information, and the second information is displayed in the second display mode under the condition that the second time point is not matched with the first timestamp information. That is, if the second time point of the second electronic device does not meet the condition, the second information is displayed in a second display mode, for example, the ciphertext is displayed, so that the user cannot directly view the first information displayed in the plaintext, and the second electronic device cannot directly display the specific content of the first information under the condition that the subsequent time points are not matched, thereby effectively ensuring the privacy security of the first information.
In some embodiments, the first timestamp information includes transmission time point information and preset duration information; under the condition that the second time point is within a preset time interval, the second time point is matched with the first timestamp information;
under the condition that the second time point is not in the preset time interval, the second time point is not matched with the first timestamp information;
the second time point is the current time point of the second electronic device when the second information is displayed, and the preset time interval is determined by the sending time point information and the preset duration information.
In some embodiments, the second display module 1002 includes:
the processing submodule is used for decrypting the second information by using the key information under the condition that the second time point is matched with the first timestamp information to obtain first information;
and the display submodule is used for displaying the first information.
In some embodiments, the second display module 1002 is further configured to:
and under the condition that the equipment information of the second electronic equipment is not matched with the preset equipment information, displaying the second information in the second display mode.
The message transmission device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The message transmission device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The message transmission device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which is not specifically limited in the embodiment of the present application.
The message transmission apparatus provided in the embodiment of the present application can implement each process implemented in the method embodiment of fig. 3 or fig. 8, and is not described here again to avoid repetition.
Optionally, as shown in fig. 11, the embodiment of the present application further provides a first electronic device 1100, which includes a first processor 1101, a first memory 1102, and a program or instructions stored in the first memory 1102 and executable on the first processor 1101, where the program or instructions when executed by the first processor 1101 implement the processes of the information transmission method embodiment described above, which can achieve the same technical effects and are not repeated herein.
Optionally, as shown in fig. 12, an embodiment of the present application further provides a second electronic device 1200, which includes a second processor 1201, a second memory 1202, and a program or instruction stored in the second memory 1202 and executable on the second processor 1201, where the program or instruction when executed by the second processor 1201 implements the processes of the information transmission method embodiment, and further description is omitted here for avoiding repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Referring to fig. 13, fig. 13 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure, where the electronic device may be a first electronic device or a second electronic device.
As shown in fig. 13, the electronic device 130 includes, but is not limited to:
radio frequency unit 131, network module 132, audio input unit 133, input unit 134, sensor 135, display unit 136, user input unit 137, interface unit 138, memory 139, processor 1310, and power supply 1311, and the electronic device 130 further includes a camera.
Those skilled in the art will appreciate that the electronic device 130 may further include a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 1310 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system. The electronic device structure shown in fig. 13 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here. In the embodiment of the present application, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 1310 is configured to acquire first information to be sent; generating second information associated with the first information under the condition that the first information comprises private content, wherein the second information is information obtained by encrypting the first information and comprises: key information including first timestamp information of the first electronic device; and sending the second information to second electronic equipment so as to enable the second electronic equipment to display the second information in a target mode.
Or, the processor 1310 is configured to receive second information sent by a first electronic device, where the second information includes key information, and the key information includes first timestamp information of the first electronic device; displaying the second information in a first display mode under the condition that a second time point is matched with the first timestamp information; or, when the second time point does not match the first time stamp information, the second information is displayed in a second display mode.
The electronic device 130 in the embodiment of the application can solve the information privacy security problem during information transmission between electronic devices and after information transmission.
It should be understood that in the embodiment of the present application, the input Unit 134 may include a Graphics Processing Unit (GPU) 1341 and a microphone 1342, and the Graphics Processing Unit 1341 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 136 may include a display panel 1361, and the display panel 1361 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 137 includes a touch panel 1371 and other input devices 1372. The touch panel 1371 is also referred to as a touch screen. The touch panel 1371 may include two parts of a touch detection device and a touch controller. Other input devices 1372 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 139 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 1310 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communication. It will be appreciated that the modem processor described above may not be integrated into processor 1310.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the message session sending method/the message session receiving method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above-mentioned message session sending method/message session receiving method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. An information transmission method applied to a first electronic device, the method comprising:
acquiring first information to be sent;
generating second information associated with the first information under the condition that the first information comprises private content, wherein the second information is information obtained by encrypting the first information and comprises: key information, the key information including first timestamp information of the first electronic device;
sending the second information to second electronic equipment so that the second electronic equipment displays the second information in different target modes according to the matching condition of a second time point and the first timestamp information;
after sending the second information to the second electronic device, the method further comprises:
storing the second information;
displaying the second information in a first display mode under the condition that a first time point is matched with the first timestamp information;
or, when the first time point does not match the first timestamp information, displaying the second information in a second display manner;
the first timestamp information includes: sending time point information and preset duration information;
under the condition that the first time point is within a preset time interval, matching the first time point with the first timestamp information;
or, the first time point is not matched with the first timestamp information under the condition that the first time point is not in the preset time interval;
the first time point is the current time point of the first electronic device when the second information is displayed, and the preset time interval is determined by the sending time point information and the preset duration information.
2. An information transmission method applied to a second electronic device, the method comprising:
receiving second information sent by first electronic equipment, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic equipment;
displaying the second information in a first display mode under the condition that a second time point is matched with the first timestamp information;
or, when the second time point does not match the first timestamp information, displaying the second information in a second display mode;
the first timestamp information includes: sending time point information and preset duration information;
under the condition that the second time point is within a preset time interval, the second time point is matched with the first timestamp information;
under the condition that the second time point is not in the preset time interval, the second time point is not matched with the first timestamp information;
the second time point is the current time point of the second electronic device when the second information is displayed, and the preset time interval is determined by the sending time point information and the preset duration information.
3. The information transmission method according to claim 2, wherein the displaying the second information in a first display manner in a case where the second time point matches the first time stamp information includes:
under the condition that the second time point is matched with the first timestamp information, the second information is decrypted by using the key information to obtain first information;
and displaying the first information.
4. The information transmission method according to claim 2, wherein the key information further includes preset device information, and after the receiving the second information sent by the first electronic device, the method further includes:
and under the condition that the equipment information of the second electronic equipment is not matched with the preset equipment information, displaying the second information in the second display mode.
5. An information transmission device applied to a first electronic device, the device comprising:
the acquisition module is used for acquiring first information to be sent;
a generating module, configured to generate second information associated with the first information when the first information includes private content, where the second information is information obtained by encrypting the first information, and the second information includes: key information, the key information including first timestamp information of the first electronic device;
the sending module is used for sending the second information to second electronic equipment so that the second electronic equipment displays the second information in different target modes according to the matching condition of a second time point and the first timestamp information;
the device further comprises:
the storage module is used for storing the second information;
the first display module is used for displaying the second information in a first display mode under the condition that a first time point is matched with the first timestamp information; or, when the first time point does not match the first timestamp information, displaying the second information in a second display mode;
the first timestamp information includes: sending time point information and preset duration information;
under the condition that the first time point is within a preset time interval, matching the first time point with the first timestamp information; or, the first time point is not matched with the first timestamp information under the condition that the first time point is not in the preset time interval;
the first time point is the current time point of the first electronic device when the second information is displayed, and the preset time interval is determined by the sending time point information and the preset duration information.
6. An information transmission apparatus applied to a second electronic device, the apparatus comprising:
the receiving module is used for receiving second information sent by first electronic equipment, wherein the second information comprises key information, and the key information comprises first timestamp information of the first electronic equipment;
the second display module is used for displaying the second information in a first display mode under the condition that a second time point is matched with the first timestamp information; or, when the second time point does not match the first timestamp information, displaying the second information in a second display mode;
the first timestamp information includes: sending time point information and preset duration information;
under the condition that the second time point is within a preset time interval, matching the second time point with the first timestamp information;
under the condition that the second time point is not in the preset time interval, the second time point is not matched with the first timestamp information;
the second time point is the current time point of the second electronic device when the second information is displayed, and the preset time interval is determined by the sending time point information and the preset duration information.
7. The information transmission apparatus according to claim 6, wherein the second display module includes:
the processing submodule is used for decrypting the second information by using the key information under the condition that a second time point is matched with the first time stamp information to obtain first information;
and the display sub-module is used for displaying the first information.
8. The information transmission apparatus according to claim 6, wherein the key information further includes preset device information, and the second display module is further configured to:
and under the condition that the equipment information of the second electronic equipment is not matched with the preset equipment information, displaying the second information in the second display mode.
CN202110727231.2A 2021-06-29 2021-06-29 Information transmission method and device Active CN113452530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110727231.2A CN113452530B (en) 2021-06-29 2021-06-29 Information transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110727231.2A CN113452530B (en) 2021-06-29 2021-06-29 Information transmission method and device

Publications (2)

Publication Number Publication Date
CN113452530A CN113452530A (en) 2021-09-28
CN113452530B true CN113452530B (en) 2023-02-03

Family

ID=77813893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110727231.2A Active CN113452530B (en) 2021-06-29 2021-06-29 Information transmission method and device

Country Status (1)

Country Link
CN (1) CN113452530B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430640A (en) * 2015-12-09 2016-03-23 青岛海信移动通信技术股份有限公司 Short message encryption and authentication method, terminal and system
CN106709383A (en) * 2016-11-30 2017-05-24 广东欧珀移动通信有限公司 Communication message protection method and device and mobile terminal
CN107743086A (en) * 2016-10-18 2018-02-27 腾讯科技(深圳)有限公司 A kind of message treatment method and system, message is sent and reception device
CN111090887A (en) * 2019-12-30 2020-05-01 论客科技(广州)有限公司 Conversation content destroying method and device based on instant chat tool

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333811A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Display method and electronic equipment
US9432382B2 (en) * 2014-08-19 2016-08-30 Verizon Patent And Licensing Inc. Transmitting and receiving self-destructing messages
CN112163239A (en) * 2020-09-29 2021-01-01 维沃移动通信有限公司 Privacy information protection method and device and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430640A (en) * 2015-12-09 2016-03-23 青岛海信移动通信技术股份有限公司 Short message encryption and authentication method, terminal and system
CN107743086A (en) * 2016-10-18 2018-02-27 腾讯科技(深圳)有限公司 A kind of message treatment method and system, message is sent and reception device
CN106709383A (en) * 2016-11-30 2017-05-24 广东欧珀移动通信有限公司 Communication message protection method and device and mobile terminal
CN111090887A (en) * 2019-12-30 2020-05-01 论客科技(广州)有限公司 Conversation content destroying method and device based on instant chat tool

Also Published As

Publication number Publication date
CN113452530A (en) 2021-09-28

Similar Documents

Publication Publication Date Title
CN111193695B (en) Encryption method and device for third party account login and storage medium
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN109146470B (en) Method and device for generating payment code
CN110417543B (en) Data encryption method, device and storage medium
CN104954126B (en) Sensitive operation verification method, device and system
CN108900553B (en) Communication method, device and computer readable storage medium
CN110365501B (en) Method and device for group joining processing based on graphic code
US11245530B2 (en) System and method for secure communication
CN111818469B (en) Calling method, calling device, electronic equipment and network equipment
CN112243000B (en) Application data processing method and device, computer equipment and storage medium
CN109120576B (en) Data sharing method and device, computer equipment and storage medium
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN113452530B (en) Information transmission method and device
CN113193956B (en) Account information processing method and device
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN112270004B (en) Content encryption method and device and electronic equipment
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN113965640A (en) Message processing method and device
CN113434904A (en) Data processing method and device, computer equipment and storage medium
WO2019136496A1 (en) System and method for secure communication
CN114430343B (en) Data synchronization method and device, electronic equipment and readable storage medium
CN115277192B (en) Information encryption method and device and electronic equipment
CN115242453B (en) Data encryption method, data decryption method and device
CN112765628B (en) Information interaction method and electronic equipment
CN115514479A (en) Data information processing method, device and equipment based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant