CN114143012A - Message queue management method, device, equipment and computer readable storage medium - Google Patents

Message queue management method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN114143012A
CN114143012A CN202111421765.9A CN202111421765A CN114143012A CN 114143012 A CN114143012 A CN 114143012A CN 202111421765 A CN202111421765 A CN 202111421765A CN 114143012 A CN114143012 A CN 114143012A
Authority
CN
China
Prior art keywords
message
signature
information
signing
signature information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111421765.9A
Other languages
Chinese (zh)
Inventor
黎志勇
陈孝良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202111421765.9A priority Critical patent/CN114143012A/en
Publication of CN114143012A publication Critical patent/CN114143012A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a message queue management method, a message queue management device, message queue management equipment and a computer readable storage medium, and belongs to the technical field of computers. The method comprises the following steps: acquiring a first message to be sent; determining signature information of the first message and a signature key corresponding to a sender of the first message; signing the signature information by adopting the signature secret key to obtain a signature of the first message; and sending the first message, the signature and the signature information to a corresponding message queue. The other method comprises the following steps: receiving a first message, a signature and signature information, and acquiring a signature key of the first message; and signing the signature information by adopting the signature secret key, comparing the obtained signature with the signature of the first message, and determining the authenticity of the first message according to the comparison result. The method and the device use the same signature key to sign the signature information of the first message by the sender and the receiver of the message queue, and determine the authenticity of the first message in the message queue according to the comparison result of the signatures.

Description

Message queue management method, device, equipment and computer readable storage medium
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a message queue management method, a message queue management device, message queue management equipment and a computer readable storage medium.
Background
In a message transmission scenario, message queues are widely used. In the application of the message queue, a sending party is responsible for sending a message to the message queue, and a receiving party receives the message in the message queue.
In the related art, a plurality of accounts of the message queue may be created according to different systems, and the sender may use different accounts to send different messages to the message queue by accessing different virtual machines. And the receiver receives the message in the message queue by using the account corresponding to any virtual machine.
In the message queue management method provided by the related art, the message is at risk of being tampered in the processes of sending the message to the message queue by the sending party and storing the message through the message queue. In addition, in the process of sending the message to the message queue by the sender, the risk of mistakenly sending the message queue exists, so that the authenticity of the message cannot be ensured.
Disclosure of Invention
The embodiment of the application provides a message queue management method, a message queue management device, message queue management equipment and a computer readable storage medium, which can be used for solving the problems in the related art. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a message queue management method, where the method includes:
acquiring a first message to be sent;
determining signature information of the first message and a signature key corresponding to a sender of the first message, wherein different senders correspond to different signature keys;
signing the signature information by adopting the signature secret key to obtain a signature of the first message;
and sending the first message, the signature and the signature information to a corresponding message queue.
In one possible implementation, the signing information includes at least two kinds of information, and signing the signing information with a signing key to obtain a signature of the first message includes:
sequencing at least two kinds of information included in the signature information to obtain a sequencing result;
and encrypting the sequencing result by using the signature key, and taking the encryption result as the signature of the first message.
In one possible implementation, the signature information includes an APPID (application identification) that identifies a sender of the first message.
In a possible implementation manner, the signature information further includes at least one of a timestamp of the first message and a message identifier of the first message, the message identifier is used for identifying the first message, and the timestamp is used for identifying a sending time of the first message.
In a second aspect, an embodiment of the present application provides a message queue management method, where the method includes:
receiving a first message, a signature of the first message and signature information from a message queue;
acquiring a signature key of a first message;
and signing the signature information by adopting the signature secret key, comparing the obtained signature with the signature of the first message, and determining the authenticity of the first message according to the comparison result.
In one possible implementation, the signing information includes at least two kinds of information, and signing the signing information with a signing key includes:
sequencing at least two kinds of information included in the signature information to obtain a sequencing result;
and encrypting the sequencing result by adopting a signature key, and taking the encryption result as the obtained signature.
In one possible implementation, the signature information includes an APPID for identifying a sender of the first message; obtaining a signing key for a first message, comprising:
and searching in a database based on the APPID to obtain a signature key, wherein the database stores the signature keys corresponding to different senders.
In a possible implementation manner, the signature information further includes a timestamp of the first message, where the timestamp is used to identify a sending time of the first message, and after receiving the first message, the signature of the first message, and the signature information from the message queue, the method further includes:
checking the timestamp;
and when the time corresponding to the time stamp is within the allowable time error range, determining that the first message is a valid message.
In a possible implementation manner, the signature information further includes a message identifier of the first message, where the message identifier is used to identify the first message, and after receiving the first message, the signature of the first message, and the signature information from the message queue, the method further includes:
determining whether the first message has been processed based on the message identification;
when the first message is determined not to be processed based on the message identification, the processing operation for the first message is performed.
In a possible implementation manner, after determining the authenticity of the first message according to the comparison result, the method further includes:
and when the first message is determined to have no authenticity according to the comparison result, abandoning the processing of the first message.
In a third aspect, there is provided a message queue management apparatus, comprising:
the acquisition module is used for acquiring a first message to be sent;
the determining module is used for determining the signature information of the first message and a signature key corresponding to a sender of the first message, wherein different senders correspond to different signature keys;
the signature module is used for signing the signature information by adopting the signature secret key to obtain a signature of the first message;
and the sending module is used for sending the first message, the signature and the signature information to the corresponding message queue.
In a possible implementation manner, the signature information includes at least two kinds of information, and the signature module is configured to sort the at least two kinds of information included in the signature information to obtain a sorting result; and encrypting the sequencing result by using the signature key, and taking the encryption result as the signature of the first message.
In one possible implementation, the signature information includes an APPID that identifies the sender of the first message.
In a possible embodiment, the signature information further includes at least one of a timestamp of the first message and a message identifier of the first message, the message identifier being used to identify the first message, and the timestamp being used to identify a transmission time of the first message.
In a fourth aspect, there is provided a message queue management apparatus, comprising:
the receiving module is used for receiving the first message, the signature of the first message and the signature information from the message queue;
the acquisition module is used for acquiring a signature key of the first message;
the signature module is used for signing the signature information by adopting a signature secret key;
and the first determining module is used for comparing the obtained signature with the signature of the first message and determining the authenticity of the first message according to a comparison result.
In a possible implementation manner, the signature information includes at least two kinds of information, and the signature module is configured to sort the at least two kinds of information included in the signature information to obtain a sorting result; and encrypting the sequencing result by adopting a signature key, and taking the encryption result as the obtained signature.
In one possible embodiment, the signature information includes an APPID for identifying a sender of the first message; and the acquisition module is used for searching in a database based on the APPID to obtain the signature secret key, and the database stores the signature secret keys corresponding to different senders.
In a possible embodiment, the signature information further includes a timestamp of the first message, the timestamp identifying a transmission time of the first message, and the apparatus further includes:
the checking module is used for checking the timestamp;
and the second determining module is used for determining the first message as a valid message when the time corresponding to the time stamp is within the allowable time error range.
In a possible embodiment, the signature information further includes a message identifier of the first message, the message identifier is used to identify the first message, and the apparatus further includes:
a third determining module, configured to determine whether the first message has been processed based on the message identifier;
and the processing module is used for executing the processing operation on the first message when the first message is determined not to be processed based on the message identification.
In one possible embodiment, the apparatus further comprises:
and the processing module is used for abandoning the processing of the first message when the first message is determined not to have the authenticity according to the comparison result.
In another aspect, a computer device is provided, the computer device includes a processor and a memory, the memory stores at least one computer program, and the at least one computer program is loaded and executed by the processor, so that the computer device realizes any one of the above message queue management methods.
In another aspect, a computer-readable storage medium is provided, in which at least one computer program is stored, and the at least one computer program is loaded and executed by a processor, so as to enable a computer to implement any one of the above message queue management methods.
In another aspect, a computer program product or a computer program is also provided, the computer program product or the computer program comprising computer instructions, the computer instructions being stored in a computer readable storage medium. A processor of the computer device reads computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform any of the message queue management methods described above.
The technical scheme provided by the embodiment of the application at least has the following beneficial effects:
in the embodiment of the application, a sender signs the signature information by adopting a signature secret key corresponding to the sender to obtain the signature of the first message; the receiver also adopts the same signature key to perform the same signature operation on the signature information, compares the obtained signature with the signature of the first message, and determines the authenticity of the first message according to the comparison result, so that the authenticity of the message is ensured, and the reliability of message transmission is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic illustration of an implementation environment provided by an embodiment of the present application;
fig. 2 is a flowchart of a message queue management method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a message queue management process provided in an embodiment of the present application;
fig. 4 is a schematic diagram of a message queue management apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of a message queue management apparatus according to an embodiment of the present application;
FIG. 6 is a schematic structural diagram of a computer device according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
It is noted that the terms "first," "second," and the like (if any) in the description and claims of this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Referring to fig. 1, a schematic diagram of an implementation environment provided in the embodiment of the present application is shown. The implementation environment may include: a first terminal 11, a server 12 and a second terminal 13.
The first terminal 11 can perform message queue management by using the method provided in the embodiment of the present application, and the first terminal 11 can sign the signature information to obtain the signature of the first message, and send the signature of the first message, and the signature information to the corresponding message queue. The server 12 may receive the first message in the message queue, the signature of the first message, and the signature information, and sign the signature information.
Or, the first terminal 11 can perform message queue management by using the method provided in the embodiment of the present application, and the first terminal 11 may sign the signature information to obtain a signature of the first message, and send the signature of the first message, and the signature information to the corresponding message queue. The second terminal 13 may receive the first message, the signature of the first message, and the signature information in the message queue, and sign the signature information.
Or, the server 12 can perform message queue management by applying the method provided in the embodiment of the present application, and the first terminal 11 may sign the signature information to obtain a signature of the first message, and send the signature of the first message, and the signature information to the corresponding message queue. The second terminal 13 may receive the first message, the signature of the first message, and the signature information in the message queue, and sign the signature information.
Alternatively, the first terminal 11 and the second terminal 13 may be any electronic product capable of performing man-machine interaction with a user through one or more modes of a keyboard, a touch pad, a touch screen, a remote controller, voice interaction or handwriting equipment, such as a PC (Personal Computer), a mobile phone, a smart phone, a PDA (Personal Digital Assistant), a wearable device, a PPC (Pocket PC, palmtop), a tablet Computer, a smart car, a smart television, a smart speaker, and the like. The server 12 may be a server, a server cluster composed of a plurality of servers, or a cloud computing service center. The first terminal 11, the second terminal 13 and the server 12 establish communication connection through a wired or wireless network.
It should be understood by those skilled in the art that the first terminal 11, the second terminal 13 and the server 12 are only examples, and other existing or future terminals or servers may be included within the scope of the present application, as applicable, and are herein incorporated by reference.
Based on the implementation environment shown in fig. 1, an embodiment of the present application provides a message queue management method, which is applied to interaction between a first terminal 11 and a second terminal 13 as an example. The first terminal 11 may be a sender, and the sender may sign the signature information to obtain a signature of the first message, and send the signature of the first message, and the signature information to a corresponding message queue. The second terminal 13 may be a receiving party, and the receiving party may receive the first message in the message queue, the signature of the first message, and the signature information, and sign the signature information. As shown in fig. 2, the method provided by the embodiment of the present application may include the following steps:
step 201, a sender acquires a first message to be sent.
The method and the device for acquiring the first message to be sent do not limit the mode of acquiring the first message to be sent, and do not limit the application scene of the message queue management method. For example, an application scenario of the message queue management method may be an e-commerce scenario, in which the first message may be an order message, a commodity message, or the like. Taking the first message as an order message as an example, in an e-commerce scenario, a user may place an order for any commodity of a merchant, a sender may obtain the order message based on an operation of placing the order by the user, and the order message may include a user ID (Identification), a commodity ID order of a commodity in the order, and the like.
In step 202, a sender determines signature information of a first message and a signature key corresponding to the sender of the first message, and different senders correspond to different signature keys.
Optionally, the signature information comprises an APPID for identifying the sender of the first message.
The format and the obtaining mode of the APPID are not limited in the embodiment of the present application, for example, the APPID may be obtained by allocating based on an application or a service, and any sender corresponds to a unique APPID.
Optionally, the signature information further includes at least one of a timestamp of the first message and a message ID of the first message, the message ID being used for identifying the first message, and the timestamp being used for identifying a sending time of the first message.
The embodiment of the application does not limit the format and the acquisition mode of the timestamp, and does not limit the format and the acquisition mode of the message ID. For example, the first message is an order message with an order time of 19: 30/8/1/2005. If the signature information determined by a certain sender includes an APPID, a timestamp, and a message ID, where the APPID is an identifier of the sender, the timestamp may be set to 200508011930 according to the order placing time, and the message ID may be generated by any message ID generation algorithm, and any first message corresponds to a unique message ID.
In a possible implementation manner, the signing key may be configured by the sender before obtaining the first message, and the format and the determination manner of the signing key are not limited in this embodiment of the application. For example, the signing key may be determined by any encryption Algorithm, for example, by an MD5(Message-Digest Algorithm 5) encryption Algorithm, and configured by the sender before the first Message is obtained. Any sender corresponds to a unique signing key, which also corresponds to the sender's APPID.
Step 203, the sender signs the signature information by using the signature secret key to obtain the signature of the first message.
Optionally, the signing information includes at least two kinds of information, and signing the signing information with a signing key to obtain a signature of the first message includes: the sender sorts at least two kinds of information included in the signature information to obtain a sorting result; and the sender encrypts the sequencing result by adopting the signature key, and the encrypted result is used as the signature of the first message.
The order of the sorting is not limited in the embodiments of the present application, and for example, the order may be a dictionary order. In one possible implementation, the signature information may include an APPID, a timestamp, and a message ID. And the sender sorts the APPID, the timestamp and the message ID according to the dictionary sequence to obtain a sorting result.
In one possible implementation, the signing key is determined by an MD5 encryption algorithm, and the sorting result is MD5 encrypted using the signing key, and the encrypted result is used as the signature of the first message.
Step 204, the sender sends the first message, the signature and the signature information to a corresponding message queue.
The embodiment of the application does not limit the type of the message queue, and can select the type according to the requirement on the message queue. For example, if a message queue is required with high reliability and flexible routing, the first message, signature and signature information may be optionally sent to a RabbitMQ (a message queue).
In step 205, the receiving party receives the first message, the signature of the first message and the signature information from the message queue.
Optionally, for a case that the signature information further includes a timestamp of the first message, and the timestamp is used for identifying a sending time of the first message, after receiving the first message, the signature of the first message, and the signature information from the message queue, the method further includes: the receiver checks the timestamp; and when the time corresponding to the time stamp is within the allowable time error range, the receiver determines that the first message is a valid message.
The allowable time error range is not limited in the embodiment of the present application, and for example, the allowable time error range may be five minutes. In a possible implementation manner, the signature information further includes a timestamp, and the receiver checks the timestamp, and determines that the first message is a valid message when the time corresponding to the timestamp is within five minutes. And if the time corresponding to the timestamp is not within five minutes, the receiver determines that the first message is not a valid message, and discards the first message.
According to the method and the device, whether the first message is the valid message or not is determined by checking the timestamp, and the validity of message transmission is guaranteed.
Optionally, for the case that the signature information further includes a message identification ID of the first message, and the message ID is used to identify the first message, after receiving the first message, the signature of the first message, and the signature information from the message queue, the method further includes: the receiver determines whether the first message has been processed based on the message ID; when it is determined that the first message is not processed based on the message ID, the recipient performs a processing operation on the first message again.
The embodiment of the application does not limit a specific method for the receiver to determine whether the first message is processed based on the message ID, for example, whether the first message is received by the receiver for the first time may be determined by the message ID, and whether the first message is processed by the receiver is determined according to a determination result. In one possible embodiment, the determining, by the recipient based on the message ID, whether the first message was processed comprises: if the first message is determined not to be received by the receiver for the first time based on the message ID, the first message is determined to be processed, the first message is abandoned, the message is ensured not to be processed repeatedly, and the effectiveness of message transmission is ensured.
The method for determining whether the first message is received by the receiver for the first time based on the message ID is not limited in the embodiment of the present application, including but not limited to comparing the message ID of the first message with the ID of the received message, and if the message ID of the first message does not exist in the ID of the received message, determining that the first message is received for the first time. Optionally, if the message ID of the first message exists in the IDs of the already received messages, it is determined that the first message is not received for the first time.
It should be noted that, when the signature information includes a timestamp and a message ID, the embodiment of the present application does not limit the sequence of checking the timestamp and determining whether the first message is processed.
In a possible implementation manner, the signature information includes a timestamp and a message ID, the receiver checks the timestamp, and when the time corresponding to the timestamp is within the allowable time error range, the receiver determines that the first message is a valid message. Then the receiver determines whether the first message is processed based on the message ID, and when the first message is not processed based on the message ID, the receiver performs the processing operation on the first message. The processing operation is not limited in the embodiment of the present application, and for example, the processing operation may be an operation of acquiring a signing key of the first message in steps 206 to 207, signing the signing information with the signing key, and verifying the authenticity of the first message according to the signature.
And if the time corresponding to the time stamp is not within the allowable time error range or the first message is determined to be processed based on the message ID, discarding the first message.
The method and the device for processing the first message determine whether the first message is processed or not based on the message ID, and when the first message is not processed, the receiver executes processing operation on the first message again, so that the message is ensured not to be processed repeatedly, and the validity of message transmission is ensured.
In step 206, the receiving party obtains the signing key of the first message.
Optionally, the signature information includes an application identification APPID, the APPID being used to identify a sender of the first message; obtaining a signing key for a first message, comprising: the receiver searches in the database based on the APPID to obtain the signature secret key, and the database stores the signature secret keys corresponding to different senders.
The embodiment of the application does not limit the source and the type of the database, for example, in an electronic commerce scene, after a user places an order, the e-commerce platform sends an order message to a merchant, and the database is a database agreed by the e-commerce platform and the merchant. The database can store a plurality of APPIDs corresponding to a plurality of senders and a plurality of signature keys corresponding to the APPIDs. And the receiver searches in the database based on the APPID included in the signature information to obtain a signature key corresponding to the APPID.
In one possible embodiment, when the signature information includes at least one of a timestamp and a message ID, after the receiving party obtains the signature key of the first message, the timestamp is checked and it is determined whether the first message has been processed accordingly. For example, if the signature information includes a timestamp, the receiver first obtains a signature key of the first message, signs the signature information using the signature key, determines that the first message has authenticity according to the signature, and then verifies the timestamp. If the first message is determined to have no authenticity according to the signature, the first message is discarded, the timestamp is not checked, and the time cost is reduced.
In one possible embodiment, when the signature information includes at least one of a timestamp and a message ID, the timestamp is checked and it is determined whether the first message has been processed, and then a signature key of the first message is obtained. For example, if the signature information includes a timestamp, the receiver checks the timestamp, determines that the first message has validity based on the timestamp, and then obtains a signature key of the first message. If the first message is determined to have no validity based on the timestamp, the first message is discarded, the signature key of the first message is not acquired, and the time cost is reduced.
And step 207, the receiver signs the signature information by using the signature secret key, compares the obtained signature with the signature of the first message, and determines the authenticity of the first message according to the comparison result.
Optionally, the signature information includes at least two kinds of information, and signing the signature information with a signature key includes: sequencing at least two kinds of information included in the signature information to obtain a sequencing result; and encrypting the sequencing result by adopting a signature key, and taking the encryption result as the obtained signature.
In one possible implementation, the order of the sorting employed by the receiver is the same as the order of the sorting employed by the sender. The signature key and the encryption algorithm adopted by the receiver are the same as those adopted by the sender.
Optionally, after the receiving party determines the authenticity of the first message according to the comparison result, the method further includes: and when the first message is determined to have no authenticity according to the comparison result, abandoning the processing of the first message.
In one possible implementation, the receiving party searches in the database through the APPID to obtain a signature key, encrypts the sorting result with the signature key, and uses the encryption result as the obtained signature. And when the comparison result of the signature obtained by the receiver and the signature of the first message is inconsistent, the receiver determines that the first message does not have authenticity, and abandons the processing of the first message, so that the reliability of message transmission is improved. And when the comparison result of the signature obtained by the receiver and the signature of the first message is consistent, the receiver determines that the first message has the authenticity, and then starts to process the first message.
In the embodiment of the application, a sender signs the signature information by adopting a signature secret key corresponding to the sender to obtain the signature of the first message; the receiver also adopts the same signature key to perform the same signature operation on the signature information, compares the obtained signature with the signature of the first message, and determines the authenticity of the first message according to the comparison result, so that the authenticity of the message is ensured, and the reliability of message transmission is improved.
As shown in fig. 3, a schematic process diagram of message queue management provided in the embodiment of the present application is as follows:
301, a sender obtains a first message, determines signature information of the first message and a signature key corresponding to the sender of the first message.
The implementation manner of this step may refer to step 201 and step 202, which are not described herein again.
And 302, the sender signs the signature information by using the signature secret key to finally obtain a first signature.
The implementation manner of this step can be referred to the above step 203, and is not described herein again.
303, the sender sends the first message, the signature and the signature information to the corresponding message queue.
The implementation manner of this step can be referred to as step 204 above, and is not described here again.
304, the receiver receives the first message, the signature of the first message and the signature information in the message queue, obtains the signature key of the first message, and signs the signature information based on the signature key of the first message to obtain a second signature.
The implementation manner of this step can be referred to above from step 205 to step 207, and is not described herein again.
305, the receiver compares the first signature with the second signature, and determines the authenticity of the first message when the first signature is the same as the second signature, and performs subsequent business operation;
and 306, the receiver compares the first signature with the second signature, determines that the first message does not have the authenticity when the first signature is not identical with the second signature, abandons the processing of the first message and ends the process.
The implementation manner of this step can be referred to as step 207 above, and is not described here again.
Referring to fig. 4, an embodiment of the present application provides a message queue management apparatus, including:
an obtaining module 401, configured to obtain a first message to be sent;
a determining module 402, configured to determine signature information of the first message and a signature key corresponding to a sender of the first message, where different senders correspond to different signature keys;
the signature module 403 is configured to sign the signature information with a signature key to obtain a signature of the first message;
a sending module 404, configured to send the first message, the signature, and the signature information to a corresponding message queue.
Optionally, the signature information includes at least two kinds of information, and the signature module 403 is configured to: sequencing at least two kinds of information included in the signature information to obtain a sequencing result; and encrypting the sequencing result by using the signature key, and taking the encryption result as the signature of the first message.
Optionally, the signature information comprises an APPID for identifying the sender of the first message.
Optionally, the signature information further includes at least one of a timestamp of the first message and a message ID of the first message, the message ID being used for identifying the first message, and the timestamp being used for identifying a sending time of the first message.
Referring to fig. 5, an embodiment of the present application provides a message queue management apparatus, including:
a receiving module 501, configured to receive a first message, a signature of the first message, and signature information from a message queue;
an obtaining module 502, configured to obtain a signature key of the first message;
a signature module 503, configured to sign the signature information with a signature key;
the first determining module 504 is configured to compare the obtained signature with a signature of the first message, and determine the authenticity of the first message according to a comparison result.
Optionally, the signature information includes at least two kinds of information, and the signature module 503 is configured to sort the at least two kinds of information included in the signature information to obtain a sorting result; and encrypting the sequencing result by adopting a signature key, and taking the encryption result as the obtained signature.
Optionally, the signature information includes an APPID for identifying a sender of the first message; the obtaining module 502 is configured to perform retrieval in a database based on the APPID to obtain a signature key, where the database stores signature keys corresponding to different senders.
Optionally, the signature information further includes a timestamp of the first message, the timestamp is used for identifying a sending time of the first message, and the apparatus further includes:
the checking module is used for checking the timestamp;
and the second determining module is used for determining the first message as a valid message when the time corresponding to the time stamp is within the allowable time error range.
Optionally, the signature information further includes a message ID of the first message, the message ID is used to identify the first message, and the apparatus further includes:
a third determining module for determining whether the first message has been processed based on the message ID;
and the processing module is used for executing the processing operation on the first message when the first message is determined not to be processed based on the message ID.
Optionally, the apparatus further comprises:
and the processing module is used for abandoning the processing of the first message when the first message is determined not to have the authenticity according to the comparison result.
It should be noted that, when the apparatus provided in the foregoing embodiment implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present application, where the computer device may be a server, and the server may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 601 and one or more memories 602, where at least one computer program is stored in the one or more memories 602, and is loaded and executed by the one or more processors 601, so that the server implements the message queue management method according to the foregoing method embodiments. Of course, the server may also have components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input/output, and the server may also include other components for implementing the functions of the device, which are not described herein again.
Fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present application. The device may be a terminal, and may be, for example: a smart phone, a tablet computer, an MP3(Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4) player, a notebook computer or a desktop computer. A terminal may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, etc.
Generally, a terminal includes: a processor 701 and a memory 702.
The processor 701 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. The processor 701 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 701 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 701 may be integrated with a GPU (Graphics Processing Unit) which is responsible for rendering and drawing the content required to be displayed by the display screen. In some embodiments, the processor 701 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 702 may include one or more computer-readable storage media, which may be non-transitory. Memory 702 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 702 is configured to store at least one instruction, which is configured to be executed by the processor 701, to enable the terminal to implement the message queue management method provided by the method embodiment in the present application.
In some embodiments, the terminal may further include: a peripheral interface 703 and at least one peripheral. The processor 701, the memory 702, and the peripheral interface 703 may be connected by buses or signal lines. Various peripheral devices may be connected to peripheral interface 703 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of a radio frequency circuit 704, a display screen 705, a camera assembly 706, an audio circuit 707, a positioning component 708, and a power source 709.
The peripheral interface 703 may be used to connect at least one peripheral related to I/O (Input/Output) to the processor 701 and the memory 702. In some embodiments, processor 701, memory 702, and peripheral interface 703 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 701, the memory 702, and the peripheral interface 703 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 704 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 704 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 704 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 704 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 704 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: metropolitan area networks, various generation mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 704 may also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 705 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 705 is a touch display screen, the display screen 705 also has the ability to capture touch signals on or over the surface of the display screen 705. The touch signal may be input to the processor 701 as a control signal for processing. At this point, the display 705 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 705 may be one, disposed on the front panel of the terminal; in other embodiments, the display 705 may be at least two, respectively disposed on different surfaces of the terminal or in a folded design; in other embodiments, the display 705 may be a flexible display, disposed on a curved surface or on a folded surface of the terminal. Even more, the display 705 may be arranged in a non-rectangular irregular pattern, i.e. a shaped screen. The Display 705 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 706 is used to capture images or video. Optionally, camera assembly 706 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 706 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuitry 707 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 701 for processing or inputting the electric signals to the radio frequency circuit 704 to realize voice communication. For the purpose of stereo sound collection or noise reduction, a plurality of microphones can be arranged at different parts of the terminal respectively. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 701 or the radio frequency circuit 704 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, the audio circuitry 707 may also include a headphone jack.
The positioning component 708 is used to locate the current geographic Location of the terminal to implement navigation or LBS (Location Based Service). The Positioning component 708 can be a Positioning component based on the GPS (Global Positioning System) in the united states, the beidou System in china, the graves System in russia, or the galileo System in the european union.
The power supply 709 is used to supply power to various components in the terminal. The power source 709 may be alternating current, direct current, disposable batteries, or rechargeable batteries. When power source 709 includes a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, the terminal also includes one or more sensors 710. The one or more sensors 710 include, but are not limited to: acceleration sensor 711, gyro sensor 712, pressure sensor 713, fingerprint sensor 714, optical sensor 715, and proximity sensor 716.
The acceleration sensor 711 can detect the magnitude of acceleration on three coordinate axes of a coordinate system established with the terminal. For example, the acceleration sensor 711 may be used to detect components of the gravitational acceleration in three coordinate axes. The processor 701 may control the display screen 705 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 711. The acceleration sensor 711 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 712 may detect a body direction and a rotation angle of the terminal, and the gyro sensor 712 may cooperate with the acceleration sensor 711 to acquire a 3D motion of the terminal by the user. From the data collected by the gyro sensor 712, the processor 701 may implement the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensors 713 may be disposed on the side frames of the terminal and/or underneath the display 705. When the pressure sensor 713 is arranged on the side frame of the terminal, a holding signal of a user to the terminal can be detected, and the processor 701 performs left-right hand identification or shortcut operation according to the holding signal collected by the pressure sensor 713. When the pressure sensor 713 is disposed at a lower layer of the display screen 705, the processor 701 controls the operability control on the UI interface according to the pressure operation of the user on the display screen 705. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 714 is used for collecting a fingerprint of a user, and the processor 701 identifies the identity of the user according to the fingerprint collected by the fingerprint sensor 714, or the fingerprint sensor 714 identifies the identity of the user according to the collected fingerprint. When the user identity is identified as a trusted identity, the processor 701 authorizes the user to perform relevant sensitive operations, including unlocking a screen, viewing encrypted information, downloading software, paying, changing settings, and the like. The fingerprint sensor 714 may be disposed on the front, back, or side of the terminal. When a physical key or a vendor Logo (trademark) is provided on the terminal, the fingerprint sensor 714 may be integrated with the physical key or the vendor Logo.
The optical sensor 715 is used to collect the ambient light intensity. In one embodiment, the processor 701 may control the display brightness of the display screen 705 based on the ambient light intensity collected by the optical sensor 715. Specifically, when the ambient light intensity is high, the display brightness of the display screen 705 is increased; when the ambient light intensity is low, the display brightness of the display screen 705 is adjusted down. In another embodiment, processor 701 may also dynamically adjust the shooting parameters of camera assembly 706 based on the ambient light intensity collected by optical sensor 715.
A proximity sensor 716, also known as a distance sensor, is typically provided on the front panel of the terminal. The proximity sensor 716 is used to collect the distance between the user and the front face of the terminal. In one embodiment, when the proximity sensor 716 detects that the distance between the user and the front surface of the terminal gradually decreases, the processor 701 controls the display screen 705 to switch from the bright screen state to the dark screen state; when the proximity sensor 716 detects that the distance between the user and the front face of the terminal is gradually increased, the processor 701 controls the display 705 to switch from the rest state to the bright state.
Those skilled in the art will appreciate that the configuration shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
In an exemplary embodiment, a computer device is also provided, the computer device comprising a processor and a memory, the memory having at least one computer program stored therein. The at least one computer program is loaded and executed by one or more processors to cause the computer apparatus to implement any of the message queue management methods described above.
In an exemplary embodiment, there is also provided a computer-readable storage medium having at least one computer program stored therein, the at least one computer program being loaded and executed by a processor of a computer device to cause the computer to implement any of the above-mentioned message queue management methods.
In one possible implementation, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact Disc Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer program product or computer program is also provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform any of the above-described message queue management methods.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The above description is only exemplary of the present application and is not intended to limit the present application, and any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (15)

1. A method of message queue management, the method comprising:
acquiring a first message to be sent;
determining signature information of the first message and a signature key corresponding to a sender of the first message, wherein different senders correspond to different signature keys;
signing the signature information by adopting the signature secret key to obtain a signature of the first message;
and sending the first message, the signature and the signature information to a corresponding message queue.
2. The method of claim 1, wherein the signing information comprises at least two types of information, and wherein signing the signing information with the signing key to obtain the signature of the first message comprises:
sequencing at least two kinds of information included in the signature information to obtain a sequencing result;
and encrypting the sequencing result by adopting the signature secret key, and taking the encryption result as the signature of the first message.
3. The method according to claim 1 or 2, wherein the signature information comprises an application identification APPID for identifying a sender of the first message.
4. The method of claim 3, wherein the signature information further comprises at least one of a timestamp of the first message and a message identifier of the first message, wherein the message identifier is used to identify the first message, and wherein the timestamp is used to identify a transmission time of the first message.
5. A method of message queue management, the method comprising:
receiving a first message, a signature of the first message and signature information from a message queue;
acquiring a signature key of the first message;
and signing the signature information by adopting the signature secret key, comparing the obtained signature with the signature of the first message, and determining the authenticity of the first message according to a comparison result.
6. The method of claim 5, wherein the signing information comprises at least two types of information, and wherein signing the signing information with the signing key comprises:
sequencing at least two kinds of information included in the signature information to obtain a sequencing result;
and encrypting the sequencing result by adopting the signature secret key, and taking the encryption result as the obtained signature.
7. The method of claim 5, wherein the signature information comprises an application identification (APPID) that identifies a sender of the first message; the obtaining of the signing key of the first message includes:
and searching in a database based on the APPID to obtain the signature secret key, wherein the database stores the signature secret keys corresponding to different senders.
8. The method of claim 7, wherein the signature information further comprises a timestamp of the first message, wherein the timestamp is used to identify a sending time of the first message, and wherein receiving the first message, the signature of the first message, and the signature information from the message queue further comprises:
verifying the timestamp;
and when the time corresponding to the timestamp is within the allowable time error range, determining that the first message is a valid message.
9. The method of claim 7, wherein the signature information further comprises a message identifier of the first message, wherein the message identifier is used to identify the first message, and wherein receiving the first message, the signature of the first message, and the signature information from the message queue further comprises:
determining whether the first message has been processed based on the message identification;
and when the first message is determined not to be processed based on the message identification, processing the first message is executed again.
10. The method according to any one of claims 5-9, wherein after determining the authenticity of the first message according to the comparison result, further comprising:
and when the first message is determined to have no authenticity according to the comparison result, the processing of the first message is abandoned.
11. A message queue management apparatus, the apparatus comprising:
the acquisition module is used for acquiring a first message to be sent;
the determining module is used for determining the signature information of the first message and a signature key corresponding to a sender of the first message, wherein different senders correspond to different signature keys;
the signature module is used for signing the signature information by adopting the signature secret key to obtain a signature of the first message;
and the sending module is used for sending the first message, the signature and the signature information to a corresponding message queue.
12. A message queue management apparatus, the apparatus comprising:
the receiving module is used for receiving a first message, a signature of the first message and signature information from a message queue;
an obtaining module, configured to obtain a signature key of the first message;
the signature module is used for signing the signature information by adopting the signature secret key;
and the determining module is used for comparing the obtained signature with the signature of the first message and determining the authenticity of the first message according to a comparison result.
13. A computer device comprising a processor and a memory, the memory having stored therein at least one computer program, the at least one computer program being loaded and executed by the processor to cause the computer device to carry out the message queue management method according to any one of claims 1 to 4 or the message queue management method according to any one of claims 5 to 10.
14. A computer-readable storage medium, having stored therein at least one computer program, which is loaded and executed by a processor, to cause a computer to implement the message queue management method according to any one of claims 1 to 4, or the message queue management method according to any one of claims 5 to 10.
15. A computer program product, characterized in that it comprises computer instructions stored in a computer-readable storage medium, from which a processor of a computer device reads said computer instructions, the processor executing said computer instructions, causing the computer device to execute the message queue management method according to any one of claims 1 to 4, or
A message queue management method according to any of claims 5 to 10.
CN202111421765.9A 2021-11-26 2021-11-26 Message queue management method, device, equipment and computer readable storage medium Pending CN114143012A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111421765.9A CN114143012A (en) 2021-11-26 2021-11-26 Message queue management method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111421765.9A CN114143012A (en) 2021-11-26 2021-11-26 Message queue management method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114143012A true CN114143012A (en) 2022-03-04

Family

ID=80388166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111421765.9A Pending CN114143012A (en) 2021-11-26 2021-11-26 Message queue management method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114143012A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626294A (en) * 2008-07-07 2010-01-13 华为技术有限公司 Certifying method based on identity, method, equipment and system for secure communication
CN104509027A (en) * 2012-05-29 2015-04-08 罗伯特·博世有限公司 System and method for message verification in broadcast and multicast networks|using homomorphic signatures
CN107682859A (en) * 2017-08-31 2018-02-09 上海华为技术有限公司 Message treatment method and relevant device
WO2018076242A1 (en) * 2016-10-27 2018-05-03 华为技术有限公司 Information transmition method and device
CN110289947A (en) * 2019-04-29 2019-09-27 北京开态智慧科技有限公司 Data transmit consistency desired result method, apparatus, computer equipment and storage medium
US20200195617A1 (en) * 2018-12-18 2020-06-18 Bae Systems Information And Electronic Systems Integration Inc. Securing data in motion
CN112491549A (en) * 2020-12-08 2021-03-12 平安国际智慧城市科技股份有限公司 Data information encryption verification method, system and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626294A (en) * 2008-07-07 2010-01-13 华为技术有限公司 Certifying method based on identity, method, equipment and system for secure communication
CN104509027A (en) * 2012-05-29 2015-04-08 罗伯特·博世有限公司 System and method for message verification in broadcast and multicast networks|using homomorphic signatures
WO2018076242A1 (en) * 2016-10-27 2018-05-03 华为技术有限公司 Information transmition method and device
CN107682859A (en) * 2017-08-31 2018-02-09 上海华为技术有限公司 Message treatment method and relevant device
US20200195617A1 (en) * 2018-12-18 2020-06-18 Bae Systems Information And Electronic Systems Integration Inc. Securing data in motion
CN110289947A (en) * 2019-04-29 2019-09-27 北京开态智慧科技有限公司 Data transmit consistency desired result method, apparatus, computer equipment and storage medium
CN112491549A (en) * 2020-12-08 2021-03-12 平安国际智慧城市科技股份有限公司 Data information encryption verification method, system and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN108306771B (en) Log reporting method, device and system
CN110674022B (en) Behavior data acquisition method and device and storage medium
CN110278464B (en) Method and device for displaying list
CN113204298B (en) Method and device for displaying release progress, electronic equipment and storage medium
CN112256320B (en) Version number generation method, device, terminal and storage medium
CN111241115B (en) Data synchronization method, device, equipment and storage medium
CN110677262B (en) Information notarization method, device and system based on blockchain
CN110290191B (en) Resource transfer result processing method, device, server, terminal and storage medium
CN111523878A (en) Service processing method, device, system and storage medium
CN111131392A (en) Method, device, electronic equipment and medium for processing message
CN110597840B (en) Partner relationship establishment method, device, equipment and storage medium based on blockchain
CN111881423A (en) Method, device and system for limiting function use authorization
CN112528311B (en) Data management method, device and terminal
CN110971692B (en) Method and device for opening service and computer storage medium
CN114595019A (en) Theme setting method, device and equipment of application program and storage medium
CN110764808B (en) Client upgrade detection method, device and computer readable storage medium
CN114091998A (en) Order delivery method, device, equipment and computer readable storage medium
CN110380956B (en) Method, device and system for transmitting instant communication message
CN108683684B (en) Method, device and system for logging in target instant messaging application
CN113076452A (en) Application classification method, device, equipment and computer readable storage medium
CN114143012A (en) Message queue management method, device, equipment and computer readable storage medium
CN111191254A (en) Access verification method and device, computer equipment and storage medium
CN111741040A (en) Connection establishing method, address obtaining method, device, equipment and storage medium
CN113688379B (en) Platform registration method and device and computer equipment
CN110688519B (en) Method, device, system, equipment and storage medium for playing media data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination