WO2017028553A1 - Procédé, dispositif et système de commande de sécurité de message - Google Patents

Procédé, dispositif et système de commande de sécurité de message Download PDF

Info

Publication number
WO2017028553A1
WO2017028553A1 PCT/CN2016/080545 CN2016080545W WO2017028553A1 WO 2017028553 A1 WO2017028553 A1 WO 2017028553A1 CN 2016080545 W CN2016080545 W CN 2016080545W WO 2017028553 A1 WO2017028553 A1 WO 2017028553A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
feature code
unique feature
unique
signature
Prior art date
Application number
PCT/CN2016/080545
Other languages
English (en)
Chinese (zh)
Inventor
曹俊勇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017028553A1 publication Critical patent/WO2017028553A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • This paper relates to the field of security verification and management of messages, and more particularly to a method, device and system for verifying and controlling the security of message content.
  • a typical message security control process is that the service system receives the message, forwards the original message to the management and control platform, and the management platform analyzes the data in real time, and feeds the result back to the service system. The service system continues to deliver or terminate the process according to the result.
  • the size of traditional business messages is limited, such as 140 bytes of text messages, 300K bytes of MMS, etc., and there is no problem with the typical security management process.
  • new services such as WeChat and RCS
  • sending the original message to the security management platform, waiting for the real-time processing mode of the management platform has many drawbacks.
  • the transmission of large messages requires very high network transmission speed, and the transmission of repeated messages is extremely great for network bandwidth resources. Waste and duplication, the security check of the message is also a great waste of the processing power of the management platform.
  • the present invention will provide a message security management method, apparatus and system to alleviate the burden placed on a management platform by repeatedly initiating a full content verification request for the same message content.
  • a method for security management of messages comprising:
  • the query result includes: a message content validity or a sending identifier of the complete content of the message corresponding to the unique feature code, where the identifier is used to indicate that the complete content of the message corresponding to the unique feature code is sent to the Legality verification function.
  • the method further includes:
  • the obtained query result includes the sending identifier of the complete content of the message corresponding to the unique feature code, sending the complete content of the message corresponding to the unique feature code to the message legality verification function; receiving the message The legality of the complete content of the message returned by the legality verification function.
  • a security management device for a message comprising: a signature generation module and a data transceiver module, wherein
  • the feature code generating module is configured to: generate a unique feature code according to the message content;
  • the data transceiver module is configured to: send the unique feature code to a message legality verification function; and receive a query result returned by the message legality verification function.
  • the query result includes: a message content validity or a sending identifier of the complete content of the message corresponding to the unique feature code, where the identifier is used to indicate that the complete content of the message corresponding to the unique feature code is sent to the Legality verification function.
  • the data transceiving module is further configured to: when the query result includes a sending identifier of the complete content of the message corresponding to the unique feature code, refer to sending the complete content of the message corresponding to the unique feature code to the The message legality verification function; receiving the legality of the complete content of the message returned by the message legality verification function.
  • a method for security management of messages comprising:
  • the step of returning the query result of the message corresponding to the unique signature includes:
  • the identifier is used to indicate that the unique signature sender sends the unique signature when the unique legality record corresponding to the unique signature is not found.
  • the complete content of the corresponding message is used to indicate that the unique signature sender sends the unique signature when the unique legality record corresponding to the unique signature is not found.
  • the method further includes:
  • generating a unique feature code according to the complete content of the message After analyzing and determining the legitimacy of the complete content of the message, generating a unique feature code according to the complete content of the message; generating a unique feature code according to the complete content of the message and the determined message The legality of the complete content is saved in the signature database;
  • the step of generating a unique feature code according to the complete content of the message includes generating a unique feature code by using the same algorithm as the unique feature code sender.
  • a message security management device includes: a communication module, a signature database, and a signature query module, wherein
  • the communication module is configured to: receive a unique feature code generated according to the message content;
  • the signature database is configured to: store a correspondence between a unique signature of the message and the legitimacy of the message;
  • the feature code querying module is configured to: query, according to the received unique feature code, whether the message corresponding to the unique feature code is legal from the feature code database, and return a query result.
  • the signature query module is configured to return the query result as follows:
  • the unique feature code pair is found from the signature database
  • the validity of the message is returned, the legality of the message is returned to the sender of the unique signature;
  • the complete content transmission identifier of the message corresponding to the unique signature is returned to the unique signature sender, and the unique signature sender is sent to send the The complete content of the message corresponding to the unique signature.
  • the communication module is further configured to: receive the complete content of the message corresponding to the unique signature sent by the sender of the unique signature;
  • the device further includes: a legality verification module, the legality verification module is configured to: analyze and determine the legality of the complete content of the message corresponding to the unique feature code; and return the legality of the complete content of the message to The unique signature sender.
  • a legality verification module is configured to: analyze and determine the legality of the complete content of the message corresponding to the unique feature code; and return the legality of the complete content of the message to The unique signature sender.
  • the device further includes:
  • the feature code generating module is configured to: generate a unique feature code according to the complete content of the message corresponding to the unique feature code; generate a unique feature code and the legality check module according to the complete content of the message corresponding to the unique feature code Determining the legitimacy of the complete content of the message corresponding to the unique feature code in the signature database;
  • the method for generating the unique feature code by the feature code generating module is consistent with the method for generating the unique feature code received by the communication module.
  • a message security management system includes: any of the above-mentioned security management devices that can be executed on the service system side and any of the above-mentioned security management devices that can execute messages on the side of the message legality verification function.
  • a computer program comprising program instructions that, when executed by a business system, cause the business system to perform any of the above-described corresponding security management methods of messages.
  • a computer program comprising program instructions that, when executed by a message validity verification function, cause the message validity verification function to perform a security tube of any of the corresponding messages described above Control method.
  • a message security management system includes: a service module and a security management module, wherein
  • the service module is configured to: generate a unique feature code according to the message content, and send the unique feature code to the security management module;
  • the security management module is configured to: determine validity of the message according to the unique feature code, and return a result.
  • the security management module includes: a feature code storage submodule and a feature code query submodule;
  • the feature code storage sub-module is configured to: store the validity of the unique feature code and the message corresponding to the unique feature code;
  • the feature code query sub-module is configured to: according to the unique feature code, query whether the message corresponding to the unique feature code is legal from the feature code storage sub-module, and return a query result.
  • the query result returned by the signature query sub-module includes:
  • the service module is further configured to send the complete content of the message corresponding to the unique feature code to the security management module;
  • the security management module further includes: a legality verification submodule
  • the validity check sub-module is configured to: receive the complete content of the message corresponding to the unique feature code; analyze and determine the legality of the complete content of the message corresponding to the unique feature code; and return the complete content of the message legality.
  • the security management module further includes a feature code generation submodule configured to: according to Generating a unique feature code for the complete content of the message corresponding to the unique feature code; storing the generated unique feature code and the legality result of the complete content of the message corresponding to the unique feature code determined by the legality verification sub-module in the The feature code storage sub-module;
  • the method for generating the unique feature code by the feature code generation sub-module is consistent with the method for generating the unique feature code sent by the service module.
  • the invention provides a message security management and control method, device and system, which change the manner in which the complete message content is sent to the security management platform for message security verification in the related technical solution, and the existing message content is unchanged, and the message body
  • the new feature of the message type service is that the unique feature code of the message is extracted from the message to be verified, and the unique feature code is sent to the security management platform for verification; the unique feature is not saved only on the security management platform.
  • the complete message is sent to the security management platform when the code and the security verification result of the corresponding message are obtained.
  • the invention provides a message security management and control method, device and system, which avoids the network bandwidth pressure caused by repeatedly initiating a complete content verification request for the same message content, and at the same time, after verifying the validity of the complete message content once,
  • the unique signature and legality verification result corresponding to the message are saved, and the subsequent verification results only perform the query verification result according to the unique signature, which greatly improves the security verification efficiency.
  • FIG. 1 is a flowchart of a method for security management and control of a message according to Embodiment 1 of the present invention
  • FIG. 2 is a structural diagram of a message security management device according to Embodiment 2 of the present invention.
  • FIG. 3 is a flowchart of a method for security management and control of a message according to Embodiment 3 of the present invention.
  • FIG. 4 is a structural diagram of a message security management device according to Embodiment 4 of the present invention.
  • FIG. 5 is a structural diagram of a message security management system according to Embodiment 5 of the present invention.
  • the embodiment provides a security management and control method for a message, which can be executed on the service system side, as shown in FIG. 1 , and includes:
  • Step 101 Generate a unique feature code according to the content of the message
  • Step 102 Send the unique feature code to the message legality verification function, and obtain a query result returned by the message legality verification function.
  • the unique feature code is generated according to the content of the message, and the content of the message may be processed by using the message digest MD5 algorithm; or the content of the message may be processed by using the secure hash SHA1 algorithm; or It can also be generated by using other unique feature code generation algorithms, and the generated unique feature code can uniquely represent the content of the message.
  • the unique feature code generated by the corresponding feature code is also different; those skilled in the art according to the embodiment The specific generation algorithm described above can be modified or replaced reasonably to implement the technical solution of the present invention.
  • the message legality verification function queries the signature database according to the unique signature, and when the validity verification result of the message corresponding to the unique signature can be found from the signature database, the verification result is returned to the unique feature.
  • the sender of the code includes the legality of the content of the message, indicating the legality of the message corresponding to the unique feature code; when the validity of the message legality corresponding to the unique feature code cannot be found from the signature database, the result is returned.
  • the query result includes a sending identifier of the complete content of the unique signature corresponding to the message, and indicates that the unique signature sender sends the complete content of the message corresponding to the unique feature to the message legality verification function.
  • the complete content of the message corresponding to the unique feature code is sent to the message legality verification function;
  • the verification result returned by the legality verification function according to the complete content of the message; at this time, the verification result includes the legality of the message content, indicating the legitimacy of the complete message.
  • the legality verification function performs legality verification on the complete content of the message, and the legality of the message content can be verified by using the solution in the related technology; at the same time, different service platforms define the legitimacy of the message content. Different standards are different, and the corresponding legality verification methods are also different; the specific implementation of the solution of the present invention is not limited to the specific verification scheme of the message content legality;
  • the function of the legality verification function in this embodiment is a software module that has the capability of verifying the validity of the message, and may be a software module that implements the security management method described in the third embodiment; or it may be implemented in the third embodiment.
  • the embodiment provides a message security management device, as shown in FIG. 2, including: a first feature code generating module 201 and a data transceiver module 202, wherein
  • the first feature code generating module 201 is configured to: generate a unique feature code according to the message content;
  • the data transceiver module 202 is configured to: send the unique feature code to the message legality verification function; and receive the query result returned by the message legality verification function.
  • the query result includes: a message content validity or a sending identifier of a complete content of the message corresponding to the unique feature code.
  • the data transceiver module 202 is further configured to: when the query result includes a sending identifier of the complete content of the message corresponding to the unique feature code, indicating that the complete content of the message corresponding to the unique feature code is sent And transmitting the complete content of the message corresponding to the unique feature code to the message legality verification function; and receiving the verification result of the message legality verification function.
  • the embodiment further provides a message security control method, which can be executed on the message legality verification function side, as shown in FIG. 3, including:
  • Step 301 Receive a unique feature code generated according to the content of the message
  • Step 302 Query a feature code database according to the unique feature code; return the unique feature The validity of the message corresponding to the message.
  • step 302 the validity verification result of the message corresponding to the unique feature code is returned, including: when the legality record of the message corresponding to the unique feature code is found in the feature code database, returning The legality of the message corresponding to the unique feature code;
  • the step of generating a unique feature code according to the complete content of the message includes: generating a unique feature code by using the same algorithm as the unique feature code sender; that is, for the same message, the unique feature code sent by the sender
  • the unique signature generated based on the full content of the message is the same.
  • the unique feature code is generated by using the message digest MD5 algorithm to process the content of the message; or the content of the message may be processed by using the secure hash SHA1 algorithm; or other unique feature codes may be generated.
  • the algorithm generates, and the generated unique feature code can uniquely represent the content of the message. When the message content is different, the corresponding unique feature code generated is also different.
  • An algorithm for generating a unique feature code including but not limited to the above algorithm, may be made by a person skilled in the art without any departure from the concept of the present invention. It is considered to be within the scope of protection of the present invention.
  • the signature database is configured to: save a correspondence between the unique signature of the message and the legality of the content of the message, for example:
  • the legality of the content of the message may be verified according to the complete content of the message, and the legality of the message content may be verified by using a solution in the related technology.
  • different service platforms define different standards for the legality of the message content, and corresponding
  • the legality verification method is also different; the specific implementation of the solution of the present invention is not limited to the specific message content legality verification scheme.
  • the embodiment further provides a message security management device, which can be located on the message legality verification function side, as shown in FIG. 4, including: a communication module 401, a signature database 402, and a signature query module 403.
  • a message security management device which can be located on the message legality verification function side, as shown in FIG. 4, including: a communication module 401, a signature database 402, and a signature query module 403.
  • the communication module 401 is configured to: receive a unique feature code generated according to the content of the message;
  • the signature database 402 is configured to: store a correspondence between a unique signature of the message and the legitimacy of the message;
  • the signature query module 403 is configured to query, from the signature database 402, whether the message corresponding to the unique signature is legal according to the received unique signature, and return a query result.
  • the feature code query module 403 returns the query result, including: when the validity of the corresponding message is found from the feature code database according to the unique feature code, the corresponding legality is returned; Corresponding to the validity of the message, the complete content sending identifier of the unique signature corresponding message is returned, and the sender of the unique signature is sent to send the complete content of the message corresponding to the unique signature.
  • the communication module 401 is further configured to: receive the complete content of the message corresponding to the unique feature code;
  • the device further includes: a validity check module 404, configured to: analyze and determine the validity of the complete content of the message corresponding to the unique feature code; and return the legitimacy of the complete content of the message.
  • a validity check module 404 configured to: analyze and determine the validity of the complete content of the message corresponding to the unique feature code; and return the legitimacy of the complete content of the message.
  • the device further includes:
  • the second feature code generating module 405 is configured to: generate a unique feature code according to the complete content of the message corresponding to the unique feature code; generate a unique feature code and the legality according to the complete content of the message corresponding to the unique feature code The validity result of the complete content of the message corresponding to the unique feature code determined by the verification module is saved in the signature database;
  • the method for generating the unique feature code by the second feature code generating module 405 is consistent with the method for generating the unique feature code received by the communication module.
  • the unique feature code is generated by using the message digest MD5 algorithm to process the content of the message; or the content of the message may be processed by using the secure hash SHA1 algorithm; or other unique feature codes may be generated.
  • the algorithm generates, and the generated unique feature code can uniquely represent the content of the message. When the message content is different, the corresponding unique feature code generated is also different.
  • An algorithm for generating a unique feature code including but not limited to the above algorithm, may be made by a person skilled in the art without any departure from the concept of the present invention. It is considered to be within the scope of protection of the present invention.
  • the embodiment further provides a message security management and control system, as shown in FIG. 5, comprising: a service module and a security management module, wherein
  • a service module configured to: generate a unique feature code according to the message content, and send the unique feature code to the security management module;
  • the security management module is configured to: determine the validity of the message according to the unique feature code, and return a result.
  • the security management module includes: a feature code storage submodule and a feature code query submodule;
  • the feature code storage submodule is configured to: store the unique feature code and the only The legitimacy of a message corresponding to a signature;
  • the feature code query sub-module is configured to: according to the unique feature code, query whether the message corresponding to the unique feature code is legal from the feature code storage sub-module, and return a query result.
  • the query result returned by the signature query sub-module includes:
  • the service module is further configured to: send the complete content of the message corresponding to the unique feature code to the security management module;
  • the security management module further includes: a legality verification submodule, configured to: receive the complete content of the message corresponding to the unique signature; analyze and determine the legality of the complete content of the message corresponding to the unique signature; The legitimacy of the complete content of the message.
  • a legality verification submodule configured to: receive the complete content of the message corresponding to the unique signature; analyze and determine the legality of the complete content of the message corresponding to the unique signature; The legitimacy of the complete content of the message.
  • the security management module further includes: a feature code generation sub-module, configured to: generate a unique feature code according to the complete content of the message corresponding to the unique feature code; and generate the unique feature code and the legality The validity result of the complete content of the message corresponding to the unique feature code determined by the test module is saved in the feature code storage submodule;
  • the method for generating the unique feature code by the feature code generation sub-module is consistent with the method for generating the unique feature code sent by the service module, that is, for the same message, the unique feature code sent by the sender is generated according to the complete content of the message.
  • the unique signature is the same.
  • the unique feature code is generated by using the message digest MD5 algorithm to process the content of the message; or the content of the message may be processed by using the secure hash SHA1 algorithm; or other unique feature code generation algorithms may be used. Generated, the generated unique feature code can uniquely represent the content of the message, and when the message content is different, the corresponding unique feature code generated is also different.
  • the algorithm for generating a unique feature code includes, but is not limited to, the above-mentioned algorithm.
  • a number of simple deductions or substitutions may be made without departing from the inventive concept. It is considered to be within the scope of protection of the present invention.
  • the signature database is configured to: store the validity of the message corresponding to the unique signature and the unique signature, and may be stored in a database manner or in a file manner, and is not limited to the implementation.
  • the technical solution of the present invention can be implemented by a person skilled in the art according to the manner of storing the database table exemplified in the embodiment, which can be reasonably modified or replaced.
  • the signature storage sub-module in the security management module of the security management system stores the legality records of the unique signature and the corresponding message in the form of a database table as shown in the following table:
  • the message 1 to be verified is a multimedia message whose content is picture file 1;
  • the service module sends a unique signature corresponding to the picture file 1 - 35b8569127e3c91a87aa52dc494ee3d6 to the security management module;
  • the security management module receives the unique signature, and the signature query sub-module queries the upper table in the signature storage sub-module to obtain the validity of the message corresponding to the unique signature: legal, the security management module returns the legal sexual results to the business module.
  • the service module processes the picture file 1 by using the MD5 algorithm to obtain a unique feature code.
  • the message 2 to be verified is a multimedia message whose content is short video file 2;
  • the service module sends a unique signature corresponding to the video file 2, d5edec82547a3b7b0628472927934d78, to the security management module;
  • the security management module receives the unique signature, and the signature query sub-module queries the upper table in the signature storage sub-module to obtain the validity of the message corresponding to the unique signature: the file is invalid, and the security control module returns the The result of the legality is given to the business module.
  • the service module processes the video file 2 by using the MD5 algorithm to obtain a unique feature code.
  • the message 3 to be verified is a multimedia message whose content is a short video file 3;
  • the service module sends a unique feature code corresponding to the video file 3, 611e33d077b007142a613b1f05ef681a, to the security management module;
  • the service module processes the video file 3 by using the MD5 algorithm to obtain the above unique feature code.
  • the security management module receives the unique signature, and the signature query sub-module queries from the upper table in the signature storage sub-module, and fails to find the message legality result corresponding to the unique signature; then returns the complete content of the message. Sending an identifier, informing the service module to send the complete content of the message corresponding to the unique signature.
  • the service module sends the video file 3 of the message 3 to the security management module;
  • the security management module receives the video file 3, and the legality verification sub-module analyzes and processes the video file 3 to determine that the legality of the video file 3 is legal: the security control module returns the validity result to the service module.
  • the security management module also processes the video file 3 by using the MD5 algorithm, and obtains the unique feature code 611e33d077b007142a613b1f05ef681a, and saves the validity result determined by the unique signature and the validity check submodule into the signature storage submodule, in the table.
  • the new corresponding record in 1 is as follows:
  • the legality verification sub-module analyzes and determines the legality of the message content according to the complete content of the message, and can verify the legality of the message content by using the solution in the related technology; at the same time, different service platforms define the legality of the message content. Different standards are different, and the corresponding legality verification methods are also different; the specific implementation of the solution of the present invention is not limited to the specific message content legality verification scheme.
  • the embodiment of the invention further discloses a message security management system, comprising: any of the above-mentioned security management devices that can be executed on the service system side and any of the above-mentioned security management devices that can execute messages on the message legality verification function side.
  • the embodiment of the invention further discloses a computer program, comprising program instructions, when the program instruction is executed by the service system, so that the service system can execute the security management method of any of the above messages.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • the embodiment of the invention further discloses a computer program, comprising program instructions, when the program instruction is executed by the message legality verification function, so that the message legality verification function can execute the security management method of any of the above messages.
  • the embodiment of the invention also discloses a carrier carrying the computer program.
  • the embodiment provided by the present invention changes the related information scheme to send the complete message content each time to The security management platform performs message security verification.
  • the message is extracted from the message to be verified.
  • the unique signature is verified by the security management platform; the complete message is sent to the security management platform only when the security verification platform does not save the security verification result of the unique signature and the corresponding message.
  • the network bandwidth pressure caused by repeatedly initiating the complete content verification request for the same message content is avoided, and at the same time, after verifying the validity of the complete message content, the unique signature corresponding to the message is saved. And the validity verification result, for subsequent verification, only the unique feature code is used to perform the query verification result, which greatly improves the security verification efficiency.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the technical solution of the present invention changes the manner in which the message security verification is performed every time the complete message content is sent to the security management platform in the related technical solution, and the new message content is unchanged, and the message volume data is large.
  • the feature is that the unique feature code of the message is extracted from the message to be verified, and the unique feature code is sent to the security management platform for verification; only when the security verification platform does not save the security verification result of the unique feature code and the corresponding message. Only send a complete message to the security management platform.
  • the invention provides a message security management and control method, device and system, which avoids the network bandwidth pressure caused by repeatedly initiating a complete content verification request for the same message content, and at the same time, after verifying the validity of the complete message content once,
  • the unique signature and legality verification result corresponding to the message are saved, and the subsequent verification results only perform the query verification result according to the unique signature, which greatly improves the security verification efficiency. Therefore, the present invention has strong industrial applicability.

Abstract

La présente invention concerne un procédé, un dispositif et un système de commande de sécurité de message, le procédé de commande de sécurité de message consistant à : recevoir un code de caractéristique unique généré en fonction du contenu du message ; en fonction du code de caractéristique unique, interroger une base de données de codes de caractéristique ; renvoyer un résultat de vérification de validité du message correspondant au code de caractéristique unique.
PCT/CN2016/080545 2015-08-19 2016-04-28 Procédé, dispositif et système de commande de sécurité de message WO2017028553A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510512432.5A CN106470107A (zh) 2015-08-19 2015-08-19 一种消息安全管控方法、装置和系统
CN201510512432.5 2015-08-19

Publications (1)

Publication Number Publication Date
WO2017028553A1 true WO2017028553A1 (fr) 2017-02-23

Family

ID=58050666

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/080545 WO2017028553A1 (fr) 2015-08-19 2016-04-28 Procédé, dispositif et système de commande de sécurité de message

Country Status (2)

Country Link
CN (1) CN106470107A (fr)
WO (1) WO2017028553A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277794A (zh) * 2017-06-09 2017-10-20 中国联合网络通信集团有限公司 建立通信连接的方法、装置及移动终端

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051963A (zh) * 2007-05-24 2007-10-10 中国联合通信有限公司 一种内容监控方法及装置
CN101072380A (zh) * 2007-06-08 2007-11-14 华为技术有限公司 内容下发方法及系统、网络设备、移动数据业务管理平台
CN101656927A (zh) * 2009-09-22 2010-02-24 中兴通讯股份有限公司 一种基于内容识别技术的彩信内容监控系统和方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7328349B2 (en) * 2001-12-14 2008-02-05 Bbn Technologies Corp. Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses
CN1969524B (zh) * 2003-12-24 2012-08-15 赛门铁克公司 识别网络中的文件内容的方法和系统
CN100454909C (zh) * 2006-07-04 2009-01-21 华为技术有限公司 一种即时通信中信息过滤和保密的方法和装置
CN101340396B (zh) * 2008-08-07 2012-02-08 腾讯科技(深圳)有限公司 图片消息过滤方法及即时通信客户端
CN102945349B (zh) * 2012-10-19 2016-06-22 北京奇虎科技有限公司 未知文件处理方法与装置
CN103309937A (zh) * 2013-04-19 2013-09-18 无锡成电科大科技发展有限公司 一种云平台内容监管的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051963A (zh) * 2007-05-24 2007-10-10 中国联合通信有限公司 一种内容监控方法及装置
CN101072380A (zh) * 2007-06-08 2007-11-14 华为技术有限公司 内容下发方法及系统、网络设备、移动数据业务管理平台
CN101656927A (zh) * 2009-09-22 2010-02-24 中兴通讯股份有限公司 一种基于内容识别技术的彩信内容监控系统和方法

Also Published As

Publication number Publication date
CN106470107A (zh) 2017-03-01

Similar Documents

Publication Publication Date Title
US11521176B2 (en) Service flow system and service data processing method and apparatus
CN108734028B (zh) 基于区块链的数据管理方法、区块链节点及存储介质
US20200336907A1 (en) Authenticating digital evidence
US11563560B2 (en) Blockchain-based data evidence storage method and apparatus
KR101145789B1 (ko) 콘텐츠 분류 방법 및 시스템
CN113157648A (zh) 基于区块链的分布式数据存储方法、装置、节点及系统
EP3659311B1 (fr) Intégrité de flux de données
CN108805571B (zh) 数据保护方法、平台、区块链节点、系统和存储介质
US9438609B2 (en) Device verification prior to registration
CN108764902B (zh) 用于存储数据的方法、节点和区块链系统
CN112163412A (zh) 数据校验方法、装置、电子设备及存储介质
CN114245323B (zh) 消息处理方法及其装置、计算机设备、存储介质
CN112988470B (zh) 联盟链中的共识方法、共识节点和系统
CN113129008B (zh) 数据处理方法、装置、计算机可读介质及电子设备
WO2016037489A1 (fr) Procédé, dispositif et système de surveillance de pourriels de rcs
CN114116637A (zh) 一种数据共享方法、装置、设备及存储介质
EP3627361A1 (fr) Contrôle de contenus multimédia
WO2017028553A1 (fr) Procédé, dispositif et système de commande de sécurité de message
WO2020130864A1 (fr) Système de gestion et de dépôt automatiques de hachage de documents (images) dans une technologie de chaîne de blocs
CN110807203B (zh) 数据处理方法、业务运营中心平台、系统以及存储介质
CN104573518A (zh) 文件扫描方法、装置、服务器及系统
CN112995098B (zh) 鉴权的方法、电子设备及存储介质
CN113836331A (zh) 图像查询方法、设备及存储介质
WO2021027505A1 (fr) Procédé de traitement de données basé sur un contrat intelligent et dispositif associé
CN114979996B (zh) 基于sim卡的名片生成方法、装置及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16836418

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16836418

Country of ref document: EP

Kind code of ref document: A1