WO2013000298A1 - Method for adding contacts - Google Patents

Method for adding contacts Download PDF

Info

Publication number
WO2013000298A1
WO2013000298A1 PCT/CN2012/072650 CN2012072650W WO2013000298A1 WO 2013000298 A1 WO2013000298 A1 WO 2013000298A1 CN 2012072650 W CN2012072650 W CN 2012072650W WO 2013000298 A1 WO2013000298 A1 WO 2013000298A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
contact
record
contact information
Prior art date
Application number
PCT/CN2012/072650
Other languages
French (fr)
Chinese (zh)
Inventor
吴廷彬
金峰
瞿晋萍
黄江吉
洪锋
Original Assignee
北京小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米科技有限责任公司 filed Critical 北京小米科技有限责任公司
Publication of WO2013000298A1 publication Critical patent/WO2013000298A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4594Address books, i.e. directories containing contact information about correspondents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

Disclosed is a method for adding contacts. A client encrypts every record of contact information of a user; the client sends the encrypted contact information to a server; the server matches every record of encrypted contact information of a user with every record of encrypted contact information of another user; if the matching succeeds, the two users send information thereof interactively, and the two users are added as respective contacts. By means of the technical solution of the present invention, it is helpful for the user to add contacts and expand the social range, and moreover, it is ensured that user private information is not revealed.

Description

说 明 书 一种添加联系人的方法  Description A method of adding contacts
技术领域 Technical field
本发明涉及社交网络技术领域, 尤其涉及一种添加联系人的方法。 背景技术  The present invention relates to the field of social network technologies, and in particular, to a method for adding a contact. Background technique
随着移动终端技术的发展,移动终端已经成为人们生活中必不可少的个人 电子设备, 人们通过移动终端获取信息, 进行办公和娱乐, 庞大的移动终端用 户群已然形成为社交网络。而社交网络技术也在不断变化, 用户可能会变化自 己所在的社交网络, 或者希望不断扩大自己的社交范围, 这两者都要求给用户 增加新的联系人。  With the development of mobile terminal technology, mobile terminals have become an indispensable personal electronic device in people's lives. People access information through mobile terminals for office and entertainment, and a large mobile terminal user group has formed into a social network. While social networking technologies are constantly changing, users may change their social networks, or they may want to expand their social reach, both of which require new contacts to be added to users.
目前的社交网络技术已经能够帮助用户增加相关联系人,比如通过用户与 联系人在其他领域的相互关系来建立社交网络中的关系,但是这里存在一个问 题, 要帮助用户寻找联系人, 服务器必须从用户处获取其联系人的信息, 而用 户联系人信息对于用户来说, 属于隐私信息, 是不希望第三方获取的, 如果服 务器主动获取, 更是侵犯了用户的隐私信息。 发明内容  The current social network technology has been able to help users to increase related contacts, such as the relationship between users and contacts in other areas to establish relationships in social networks, but there is a problem here, to help users find contacts, the server must The user obtains the information of the contact, and the user contact information belongs to the private information for the user, and is not expected to be obtained by the third party. If the server actively acquires, the user's private information is infringed. Summary of the invention
本发明的目的在于提出一种添加联系人的方法,既能够帮助用户增加联系 人, 扩大社交范围, 又能够保证不泄露用户保密信息。  The object of the present invention is to provide a method for adding a contact, which can help the user to increase the contact person, expand the social scope, and ensure that the user's confidential information is not disclosed.
为达此目的, 本发明采用以下技术方案:  To this end, the present invention employs the following technical solutions:
一种添加联系人的方法, 包括以下步骤:  A method of adding a contact, including the following steps:
A、 客户端将用户的联系人信息的每一条记录进行加密;  A. The client encrypts each record of the user's contact information;
B、 客户端将加密后的联系人信息发送给服务器; c、 服务器将一个用户联系人信息加密后的每一条记录与另一个用户联系 人信息的加密后的每一条记录进行匹配; B. The client sends the encrypted contact information to the server; c. The server matches each record encrypted by one user contact information with each encrypted record of another user contact information;
D、 如果匹配成功, 则将两个用户的信息交互发送, 各自添加成联系人。 步骤 A中, 加密采用的是单向加密算法。  D. If the matching is successful, the information of the two users is sent interactively, and each is added as a contact. In step A, the encryption uses a one-way encryption algorithm.
步骤 B进一步还包括以下步骤:  Step B further includes the following steps:
服务器对收到的联系人信息再次加密。 采用了本发明的技术方案, 由于从用户处获取的是加密的信息, 而且比对 也是采用加密后的信息进行比对,所以在帮助用户添加联系人的同时, 不会侵 犯用户的隐私信息。 附图说明  The server encrypts the received contact information again. By adopting the technical solution of the present invention, since the encrypted information is obtained from the user, and the comparison is also performed by using the encrypted information, the user is added to the contact, and the privacy information of the user is not invaded. DRAWINGS
图 1是本发明具体实施方式中添加联系人的流程图。 具体实施方式  1 is a flow chart of adding contacts in a specific embodiment of the present invention. detailed description
下面结合附图并通过具体实施方式来进一步说明本发明的技术方案。 图 1是本发明具体实施方式中添加联系人的流程图。如图 1所示, 该添加联 系人的流程包括以下步骤:  The technical solution of the present invention will be further described below with reference to the accompanying drawings and specific embodiments. 1 is a flow chart of adding contacts in a specific embodiment of the present invention. As shown in Figure 1, the process of adding a contact includes the following steps:
步骤 101、客户端将用户的联系人信息的每一条记录采用单向加密算法进 行加密, 这样第三方都无法获取用户联系人信息。  Step 101: The client encrypts each record of the user's contact information by using a one-way encryption algorithm, so that the third party cannot obtain the user contact information.
步骤 102、 客户端将加密后的联系人信息发送给服务器, 服务器对收到的 联系人信息再次加密。  Step 102: The client sends the encrypted contact information to the server, and the server encrypts the received contact information again.
步骤 103、服务器将一个用户联系人信息加密后的每一条记录与另一个用 户联系人信息的加密后的每一条记录进行匹配。  Step 103: The server matches each record encrypted by one user contact information with each encrypted record of another user contact information.
步骤 104、如果一个用户的一个联系人记录与另一个用户的一个联系人记 录匹配相同, 则表示两个用户同时认识一个人, 这样将两个用户的信息交互发 送, 各自添加成联系人。 以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局 限于此,任何熟悉该技术的人在本发明所揭露的技术范围内, 可轻易想到的变 化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应该 以权利要求的保护范围为准。 Step 104, if one contact record of one user and one contact record of another user If the records match the same, it means that two users know one person at the same time, so that the information of the two users is sent interactively and each is added as a contact. The above is only a preferred embodiment of the present invention, but the scope of protection of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or replacements within the technical scope of the present invention. All should be covered by the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims

权 利 要 求 书 Claim
1、 一种添加联系人的方法, 其特征在于, 包括以下步骤: A method for adding a contact, comprising the steps of:
A、 客户端将用户的联系人信息的每一条记录进行加密;  A. The client encrypts each record of the user's contact information;
B、 客户端将加密后的联系人信息发送给服务器;  B. The client sends the encrypted contact information to the server;
C、 服务器将一个用户联系人信息加密后的每一条记录与另一个用户联系 人信息的加密后的每一条记录进行匹配;  C. The server matches each record encrypted by one user contact information with each encrypted record of another user contact information;
D、 如果匹配成功, 则将两个用户的信息交互发送, 各自添加成联系人。 D. If the matching is successful, the information of the two users is sent interactively, and each is added as a contact.
2、 根据权利要求 1所述的一种添加联系人的方法, 其特征在于, 步骤 A 中, 加密采用的是单向加密算法。 2. A method for adding a contact according to claim 1, wherein in step A, the encryption uses a one-way encryption algorithm.
3、 根据权利要求 1或者 2所述的一种添加联系人的方法, 其特征在于,  3. A method of adding a contact according to claim 1 or 2, characterized in that
PCT/CN2012/072650 2011-06-30 2012-03-20 Method for adding contacts WO2013000298A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2011101819242A CN102624683A (en) 2011-06-30 2011-06-30 Method for adding contact person
CN201110181924.2 2011-06-30

Publications (1)

Publication Number Publication Date
WO2013000298A1 true WO2013000298A1 (en) 2013-01-03

Family

ID=46564369

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/072650 WO2013000298A1 (en) 2011-06-30 2012-03-20 Method for adding contacts

Country Status (2)

Country Link
CN (1) CN102624683A (en)
WO (1) WO2013000298A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592191A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Method and apparatus for storing private information of contact

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891860A (en) * 2012-10-24 2013-01-23 北京深思洛克软件技术股份有限公司 Method for securely establishing relationships among contacts
CN103634313B (en) * 2013-11-27 2017-05-10 中国科学院深圳先进技术研究院 Address list processing method and device, as well as mobile terminal
CN104768148B (en) * 2015-03-11 2019-01-18 浙江翼信科技有限公司 A kind of message encryption method and device
CN105141679A (en) * 2015-08-18 2015-12-09 耿懿超 Method and system for adding contacts
CN105554292B (en) * 2015-12-23 2019-04-23 Oppo广东移动通信有限公司 Add the method and device of contact person

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020042045A (en) * 2000-11-29 2002-06-05 김용민 Method of Transmitting and Receiving An E-mail
CN101605143A (en) * 2009-06-19 2009-12-16 杨昕吉 The implementation method of new network electronic business card system and system
CN101815100A (en) * 2010-04-23 2010-08-25 黄景楠 Information sharing and pushing system based on address list of mobile phone

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101237426B (en) * 2008-03-06 2010-09-01 腾讯科技(深圳)有限公司 Friend addition device and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020042045A (en) * 2000-11-29 2002-06-05 김용민 Method of Transmitting and Receiving An E-mail
CN101605143A (en) * 2009-06-19 2009-12-16 杨昕吉 The implementation method of new network electronic business card system and system
CN101815100A (en) * 2010-04-23 2010-08-25 黄景楠 Information sharing and pushing system based on address list of mobile phone

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592191A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Method and apparatus for storing private information of contact

Also Published As

Publication number Publication date
CN102624683A (en) 2012-08-01

Similar Documents

Publication Publication Date Title
US11050723B1 (en) Methods and systems for transmitting anonymized information
Jiang et al. User centric three‐factor authentication protocol for cloud‐assisted wearable devices
CN104737494B (en) For providing the method and apparatus of secure communication based on trust evaluation in a distributed way
US20190373469A1 (en) Techniques for enabling computing devices to identify when they are in proximity to one another
WO2013000298A1 (en) Method for adding contacts
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
Aditya et al. Encore: Private, context-based communication for mobile social apps
JP6138958B2 (en) Drawing management system and drawing management method by fingerprint authentication
WO2013082991A1 (en) Anonymous friend-making method, system, network server and storage medium
EP2805298B1 (en) Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests
TW200841682A (en) Key exchange verification
JP2015526782A5 (en)
Dao et al. Achievable multi-security levels for lightweight IoT-enabled devices in infrastructureless peer-aware communications
US20220247796A1 (en) Electronic conferencing
Abbas et al. PRISM: PRivacy-aware interest sharing and matching in mobile social networks
Chiou et al. Mobile common friends discovery with friendship ownership and replay-attack resistance
Tsai et al. enclosure: Group communication via encounter closures
Chung et al. DiscoverFriends: Secure social network communication in mobile ad hoc networks
CN106856605A (en) One kind is based on the wireless network anonymous switching authentication method of false identity
EP4030687A1 (en) Authenticating anonymous information
Distl et al. Social power for privacy protected opportunistic networks
WO2014079241A1 (en) Method and system for changing contact information about mobile phone terminals of others by sending messages
JP2007020031A (en) Location management and method for integrating key management
Mocktoolah et al. Privacy challenges in proximity based social networking: Techniques & solutions
Yu et al. On the security of data collection and transmission from wireless sensor networks in the context of internet of things

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12804334

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 100414

122 Ep: pct application non-entry in european phase

Ref document number: 12804334

Country of ref document: EP

Kind code of ref document: A1