WO2018113756A1 - Sending method, control method, sending end and receiving end in instant messaging - Google Patents

Sending method, control method, sending end and receiving end in instant messaging Download PDF

Info

Publication number
WO2018113756A1
WO2018113756A1 PCT/CN2017/117842 CN2017117842W WO2018113756A1 WO 2018113756 A1 WO2018113756 A1 WO 2018113756A1 CN 2017117842 W CN2017117842 W CN 2017117842W WO 2018113756 A1 WO2018113756 A1 WO 2018113756A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
instant
time
instant messaging
receiving end
Prior art date
Application number
PCT/CN2017/117842
Other languages
French (fr)
Chinese (zh)
Inventor
陈耀攀
Original Assignee
北京奇虎科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201611190178.2A external-priority patent/CN106487666A/en
Priority claimed from CN201611190691.1A external-priority patent/CN106453069B/en
Application filed by 北京奇虎科技有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2018113756A1 publication Critical patent/WO2018113756A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an instant communication sending method, an instant communication control method, a transmitting end and a receiving end, and an instant messaging message sending, viewing, viewing control method and device thereof.
  • instant messaging software As a communication platform, has the characteristics of large amount of information storage and high privacy.
  • the sending message is usually displayed directly on the other party's communication platform, the privacy is not well protected, the security is very low, and the historical message stored on the instant message and the platform is It can be easily stolen, but usually the message on the platform is private and does not want to be seen by a third person, or stolen.
  • the current usage status is as long as the login password is used to log in to the personal instant messaging software, the communication
  • the historical chat records on the software will be easily browsed, copied, forwarded, etc., and the privacy of the information will not be guaranteed. Therefore, how to improve the security performance of instant messaging and ensure the privacy of instant information is the current instant communication. The problem that the field needs to solve.
  • the present invention provides an instant communication transmitting method, an instant communication control method, a transmitting end, and a receiving end that overcome the above problems or at least partially solve the above problems.
  • an embodiment of the present invention provides an instant messaging sending method, including: an instant messaging sender acquires an instant message; and the instant messaging sender adds first extension information to the instant message, thereby obtaining the processed The instant messaging sender sends the processed instant message to the instant messaging receiving end, so that the instant messaging receiving end implements the operation authority on the instant message based on the first extended information. control.
  • an embodiment of the present invention provides an instant communication control method, including: an instant communication receiving end receives a message sent by an instant communication sending end; and the instant communication receiving end reads the message by the instant communication sending end The first extension information is added; the instant communication receiving end controls the operation authority of the message according to the first extension information.
  • an embodiment of the present invention provides an instant messaging transmitting end, including: at least one processor; and at least one memory communicably connected to the at least one processor; the at least one memory includes a processor An executable instruction, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging sender to perform at least the following operations: obtaining an instant message; adding first extended information to the instant message And obtaining the processed instant message; sending the processed instant message to an instant messaging receiving end, where the instant messaging receiving end implements the instant message based on the first extended information Control of operational permissions.
  • an embodiment of the present invention provides an instant messaging receiving end, including: at least one processor; and at least one memory communicably connected to the at least one processor; the at least one memory includes a processor An executable instruction, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging receiver to perform at least the following operations: receiving an instant message sent by a sender; reading the instant message The first extension information added by the instant messaging sender; the control of the operation authority of the instant message is implemented according to the first extension information.
  • a computer program including computer readable code, is provided in an embodiment of the present invention.
  • the instant messaging sender runs the computer readable code, the method described in the first aspect is caused to be performed.
  • a computer program in the embodiment of the present invention, comprising computer readable code, when the instant communication receiving end runs the computer readable code, causing the method described in the second aspect to be performed.
  • the embodiment of the present invention provides a computer readable medium, wherein the computer program according to the fifth aspect or the sixth aspect is stored.
  • an embodiment of the present application provides a method for sending an instant messaging message, where the method includes: obtaining a time key of an instant message to be sent, where the time key is used to limit that the to-be-sent instant message can be viewed. Time period; encrypting the to-be-sent instant message according to the time key to generate an encrypted message; sending the encrypted message to a receiver, transmitting the time key to a server, and using the server according to the time-dense The key controls whether the recipient can view the encrypted message.
  • the present invention provides an instant messaging message viewing method, which is applied to an instant messaging receiving end, the method comprising: receiving an encrypted message encrypted according to a time key, wherein the time key is used to limit the encrypted message a time period that can be viewed; in response to viewing the viewing operation of the encrypted message, generating and transmitting a key request to the server, the key requesting to obtain the time key of the encrypted message; receiving the server response
  • the feedback information of the key request the feedback information is generated by the server according to the request time of the key request and the time key sent by the instant communication sending end, when the request time exceeds the time secret
  • the feedback information is information indicating that the encrypted message is invalid, and the feedback information is the time key when the request time is within a time range corresponding to the time key;
  • the feedback information is responsive to the viewing operation according to the parsing result.
  • the present invention provides an instant messaging message viewing control method, which is applied to a server, and the method includes: receiving a key request for acquiring an encrypted message time key sent by an instant communication receiving end;
  • the instant messaging receiver And comparing, by the instant messaging receiver, the request time of the time key to the time range corresponding to the time key; if the request time exceeds the time range, rejecting the instant messaging The time receiving key is issued by the receiving end, so that the instant communication receiving end cannot decrypt and view the encrypted message; if the request time does not exceed the time range, the time key is issued to the instant communication receiving end, so that the instant The communication receiving end decrypts and views the encrypted message according to the time key.
  • the present invention provides an instant messaging transmitting end, comprising: at least one processor; and at least one memory communicably coupled to the at least one processor; the at least one memory comprising a processor Executing instructions, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging sender to perform at least the following operations: obtaining a time key of an instant message to be sent, the time key The time limit for limiting the to-be-sent instant message can be viewed; the instant message to be sent is encrypted according to the time key to generate an encrypted message; the encrypted message is sent to the receiver, and the time key is sent to The server controls, by the server, whether the recipient can view the encrypted message according to the time key.
  • the present invention provides an instant messaging receiving end, comprising: at least one processor; and at least one memory communicably connected to the at least one processor; the at least one memory comprising a processor Executing instructions, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging receiver to perform at least the following: receiving an encrypted message encrypted according to a time key, the time secret a key for limiting a time period during which the encrypted message can be viewed; in response to viewing a viewing operation of the encrypted message, generating and transmitting a key request to a server, the key requesting the time for acquiring the encrypted message Receiving, by the server, feedback information in response to the key request, the feedback information being generated by the server according to the request time of the key request and the time key sent by the sending end, when the request is When the time exceeds the time range corresponding to the time key, the feedback information is information indicating that the encrypted message is invalid.
  • the feedback information is the time key when the request time is within a time
  • the present invention provides a server comprising: at least one processor; and at least one memory communicably coupled to the at least one processor; the at least one memory comprising processor executable instructions An instruction executable by the processor by the at least one processor When executed, causing the server to perform at least the following operations: receiving a key request for acquiring an encrypted message time key sent by the instant messaging receiving end; and requesting the instant communication receiving end to request the time key and the time The time range corresponding to the key is compared; when the request time exceeds the time range, the time key is denied to be issued to the instant communication receiving end, so that the instant communication receiving end cannot decrypt and view the encrypted message; When the request time does not exceed the time range, the time key is issued to the instant communication receiving end, so that the instant communication receiving end decrypts and views the encrypted message according to the time key.
  • a computer program in an embodiment of the present invention, comprising computer readable code, when the instant communication transmitting end runs the computer readable code, causing the method described in the eighth aspect to be performed.
  • a computer program is provided in the embodiment of the present invention, comprising computer readable code, when the instant communication receiving end runs the computer readable code, causing the method described in the ninth aspect to be performed.
  • a computer program in an embodiment of the present invention, comprising computer readable code, when the server runs the computer readable code, causing the method described in the tenth aspect to be performed.
  • the invention provides a computer readable medium storing the computer program as described in the fourteenth, fifteenth and sixteenth aspects.
  • the first extended information needs to be added to the instant message, and then sent to the instant messaging receiving end, so that the instant communication receiving end receives the instant communication.
  • the operation authority of the instant message can be controlled based on the first extension information included in the message, thereby controlling the operation authority of the message receiver to the received message, thereby avoiding instant message reception.
  • the party can freely deal with the adverse consequences of instant messaging, such as the instant message being spread and the chat record being stolen, so as to achieve the technical effect of improving the security of the instant communication process.
  • the encryption method of the present invention consists in encrypting an instant message to be sent by using a time key, when The inter-key is used to limit the time limit for the instant message to be sent to be viewed. After the time limit expires, the instant message can no longer be viewed, ensuring the timeliness of the instant message; and the time key used to encrypt the message It is sent to the server, and the server manages the issuance of the key, thereby controlling whether the encrypted message can be viewed, ensuring the high security of the information in the instant communication process and the timeliness of the message, and solving the instant communication in the prior art.
  • the security performance is not high, the privacy of the instant information is poor, and the technical problem is easy to be leaked.
  • FIG. 1 is a flow chart of a method for instant messaging transmission according to an embodiment of the present invention
  • FIG. 2 is a flow chart showing an instant communication control method according to a second embodiment of the present invention.
  • FIG. 3 is a schematic diagram of an instant messaging transmitting end according to a third embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an instant messaging receiving end according to a fourth embodiment of the present invention.
  • Figure 5 shows a block diagram of an instant messaging sender or instant messaging receiver for performing the method according to the invention
  • FIG. 6 shows a schematic diagram of a storage unit for maintaining or carrying program code implementing a method in accordance with Embodiment 1 or Embodiment 2 of the present invention
  • FIG. 7 is a flowchart of a method for sending an instant messaging message according to a fifth embodiment of the present invention.
  • FIG. 8 is a flowchart of a method for viewing an instant messaging message according to an embodiment 6 of the present invention.
  • FIG. 9 is a flowchart showing an instant messaging message viewing control method according to a seventh embodiment of the present invention.
  • FIG. 10 is a schematic diagram showing an instant messaging transmitting end according to an embodiment 8 of the present invention.
  • FIG. 11 is a schematic diagram of an instant messaging receiving end according to an embodiment 9 of the present invention.
  • Figure 12 is a diagram showing a server according to an embodiment 10 of the present invention.
  • Figure 13 shows a block diagram of an instant messaging sender or instant messaging receiver or server for performing the method according to the invention
  • Figure 14 shows a schematic diagram of a memory unit for holding or carrying program code implementing one of the methods according to embodiments 5 through 7 of the present invention.
  • the embodiments of the present invention provide an instant messaging sending method, an instant messaging control method, and a device, which are used to solve the technical problems in the prior art that instant messages are easily propagated and chat records are stolen.
  • an instant messaging sending method provided by an embodiment of the present application includes:
  • the instant messaging sending end adds first extended information to the instant message, thereby obtaining the processed instant message.
  • the instant messaging sender sends the processed instant message to the instant communication And a receiving end, wherein the instant messaging receiving end controls the operation authority of the instant message based on the first extended information.
  • the instant messaging method according to the embodiment of the present invention can be applied to various instant messaging softwares such as Weibo, QQ, Fetion, WeChat, etc., and the instant messaging software can be Used in terminals such as mobile phones or computers. And, it can be applied to one-on-one chat, and can also be applied to group chat.
  • Step S101 The instant messaging sender acquires an instant message.
  • the content of the instant message may include text, pictures, sounds, videos, and the like.
  • Step S102 The instant messaging sender adds first extension information to the instant message, thereby obtaining the processed instant message.
  • the first extended information is used to control the operation permission of the instant communication receiving end to forward and/or copy the instant message, for example, the first extended information is used to control the instant communication receiving end to prohibit the forwarding of the instant message. , prohibit copying, prohibit forwarding, copy prohibition, and so on.
  • the first extended information may also be used to limit the operation permission that the instant communication receiving end has visible to the daily instant communication client, such as collecting the received message, which is not limited in the present invention.
  • the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if the first extension information includes the second preset content, and the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
  • the first extended information may include a plurality of extended information, for example, a first function field, a first function tag, and the like, and the first preset content (or the second preset content) is different according to the first extended information. What content is for the first preset content (or the second preset content) will be introduced later.
  • the instant messaging receiving end may determine whether the first extended information is included in the instant message, and if the first extended information is included, may control whether the first extended information controls the operating right of the instant message. .
  • the instant messaging sender adds the first extended information to the instant message.
  • the specific steps include: the instant messaging sender implants the first function field in the instant message; the instant messaging sender assigns a value to the first function field, wherein the first function field is assigned a different value, and the instant messaging receiver is configured for the instant message. The operating permissions will be different.
  • the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if the assignment of the first function field is the second preset value, Then, the operation permission of the instant messaging receiving end to the instant message is prohibition of copying.
  • the first functional field implanted in the instant message is XX-CanNotXX, and if the XX-CanNotXX value is 0 (of course, other values, for example, 00, 10, etc.),
  • the operation permission of the instant communication receiving end to the instant message is prohibitive forwarding, and the instant communication receiving end does not provide the forwarding operation right for the instant message.
  • the first preset content in the first extended information is the first function field is given First preset value (for example: 0, 00, 10, etc.); if the XX-CanNotXX value is 1 (of course, other values, such as 01, 11, etc.), the instant messaging receiver
  • the operation permission of the instant message is that the copying is prohibited, so that the instant communication receiving end does not provide the copying operation function for the instant message, and the first preset content in the first extended information is the second preset value that the first function field is given.
  • the instant messaging receiver is on the instant message.
  • the operation permission is to prohibit copying and prohibit forwarding, from The instant messaging receiver does not provide forwarding and copying operations for instant messaging.
  • the instant messaging sender adds the first extended information to the instant message, and the specific steps include: the instant messaging sender adds the first function tag to the instant message, based on the instant received by the instant messaging receiver. Whether the first function tag exists in the message, and the instant messaging receiver has different operation rights to the instant message.
  • the instant messaging sender adds a first function tag to the instant message, and the first function tag is, for example, XX-CanNotFW, XX-CanNotCO (of course, may also be other function identifiers), and the like.
  • the communication receiving end may determine whether the first function tag is included in the instant message, thereby determining the operation authority for the instant message.
  • the operation permission of the instant communication receiving end to the instant message is controlled to prohibit forwarding, and/or copying is prohibited.
  • different first function fields may be set for forwarding rights and copy rights.
  • the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotFW, and the instant communication is received.
  • the operation right of the instant message is forbidden to forward, and the instant communication receiving end does not provide the forwarding operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotCO, the instant communication receiving end is immediately
  • the operation permission of the message is prohibition of copying, so that the instant messaging receiving end does not provide the copying operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotRE&CO, the instant messaging receiving end operates on the instant message
  • the permission is to prohibit copying and prohibiting forwarding, so that the instant messaging receiving end does not provide the forwarding and copying operation functions.
  • the correspondence between the first function field and the operation authority is merely an example and is not a limitation. In the above solution, the correspondence between the first function
  • the operation permission of the instant communication receiving end to the instant message is prohibition of forwarding
  • the first prompt information for prompting the prohibition of forwarding is given at the instant communication receiving end
  • the operation permission of the instant communication receiving end to the instant message is prohibition of copying
  • the second prompt information for prompting the copy prohibition is given at the instant communication receiving end.
  • the first prompt information (or the second prompt information) is, for example, text, a picture, a voice, and the like
  • the instant communication receiving end can determine that the instant communication receiving end operates the instant message as After the forwarding is prohibited, the first prompt information (or the second prompt information) is directly added to the instant message, and the instant communication receiving end directly reads the first prompt information (or the second prompt information) in the processed instant message and outputs the first prompt information (or the second prompt information).
  • the first prompt information (or the second prompt information); or, the instant communication receiving end only adds the corresponding first extended information to the instant message, and the instant communication After receiving the processed instant message, the receiving end generates the first prompt information and outputs if the operation permission for the instant message is parsed, and generates the first prompt information if the operation permission for the instant message is parsed. Two prompt information and output and so on.
  • the instant messaging receiving end may output the first prompting information (or the second prompting information) in the form of a pop-up prompting window, and may also adopt other prompting manners.
  • the specific display manner is not specifically limited in the present invention.
  • the instant messaging receiving end can generate prompt information (first prompt information or second prompt information) for the corresponding operation authority, thereby preventing the user of the instant communication receiving end from generating useless operations.
  • the instant messaging sender adds the first extended information to the instant message, so as to obtain the processed instant message, which specifically includes:
  • the instant messaging sender packetizes the instant message into a new message; the instant messaging sender adds the first extension information to the new message, and further obtains the processed instant message.
  • the new message is a message generated by the encryption and packing method, and the encryption algorithm used includes: a data encryption algorithm DES, a triple data encryption algorithm TDEA, a block cipher algorithm RC5, and an international data encryption algorithm IDEA.
  • the packaged new message includes the message content, the encryption key, and the identifier information of the instant messaging receiving end; the identifier information of the instant messaging receiving end includes the username information or the physical address information of the instant messaging receiving end. .
  • the instant communication receiving end parses the encrypted message, and the parsing method is: if the instant communication receiving end identification information and the instant communication sending end send the instant communication receiving The matching information of the identification information of the terminal is 1, the instant communication receiving end can obtain the encryption key, and the instant communication receiving end can use the encryption key to parse the original content of the message generated by the encryption and packaging mode; if the identification information of the instant communication receiving end is sent by instant communication The matching degree of the identity information of the instant messaging receiving end sent by the terminal is not 1, and the instant messaging receiving end cannot obtain the encryption key, and cannot parse the original content of the message generated by the encrypted packing mode, and then the encrypted message cannot be read normally.
  • the instant messaging receiver will provide a third prompt message, and the third prompt message is used to prompt the recipient.
  • the message is an encrypted message.
  • the following third prompt information “the message is an encrypted message” may be generated through a pop-up window.
  • the specific display manner of the third prompt information is not specifically limited in the present invention.
  • the processed instant message further includes: second extension information, where the second extension information is used to control an expiration time of the instant message.
  • the second extended information may be added to the message header, the message body, and the like of the instant message.
  • the invalidation time of the instant message can be effectively controlled, thereby further improving the security of instant message propagation.
  • the second extended information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point; If the value of the two-function field does not include the point in time, the instant message will not expire.
  • the second function field is XX-LoseEfficacy, and the value is: Tue, 10Feb 2015 15:36:57+0800, which means that the expiration time of the instant message is February 10, 2015. :36:57, if the current time to view the message has exceeded the expiration time of 15:36:57 on February 10, 2015, the instant message will be invalid and will not be viewed properly. Otherwise, if the value of the second function field is empty, it means that the instant message is not controlled by the expiration time, and the instant message can be viewed indefinitely.
  • the second extended information is a second function tag
  • the instant message obtained by the instant messaging receiver includes the second function tag
  • the instant message is at a preset time. After the segment expires; if the instant message obtained by the instant messaging receiver does not include the second function tag, the instant message does not expire.
  • the preset time period may be manually set by the user when sending an instant message, or may be automatically set by the system, for example, the system is set to the expiration time after 2 months from the start of the instant message sending time, where the preset time is The specific implementation form is not limited.
  • the second function is added to the instant message as XX-LoseEfficacy, and the system sets the expiration time to be 1 month after the start of the transmission time, and the sending time is 10:00 on January 1, 2016. 1 point, then it will be instant until 10:1 on February 1, 2016. At the expiration point of the message, if the current viewing time has exceeded the expiration time, the instant message has expired and will no longer be viewed.
  • the expiration time can be set in batches for the instant message, thereby improving the efficiency of the failure time setting.
  • the instant messaging sending end sends the processed instant message to the instant messaging receiving end, so that the instant messaging receiving end implements the instant message based on the first extended information.
  • Control of operational permissions Specifically, after the instant messaging terminal sends the processed instant message, that is, the instant message to which the first extended information is added, to the instant messaging receiving end, the instant messaging receiving end implements the instant message based on the specific situation of the first extended information.
  • the control of the operation authority the specific implementation method will be described in detail later.
  • an instant communication control method including:
  • the instant messaging receiving end receives the message sent by the instant messaging sender
  • the instant messaging receiving end reads the first extended information added by the instant messaging sending end in the message
  • S203 The instant messaging receiving end controls the operation authority of the message according to the first extended information.
  • Step S201 The instant messaging receiving end receives the message sent by the instant messaging sender; wherein the content of the instant message may include text, a picture, a voice, a video, and the like.
  • step S202 the instant communication receiving end reads the first extended information added by the instant messaging sending end in the message; wherein, in the embodiment of the present application, the instant messaging receiving end reads the instant message
  • the first extended information added by the instant messaging sending end is used to control the operation permission of the instant messaging receiving end to forward and/or copy the instant message, for example, controlling the instant messaging receiving end to prohibit the instant message by using the first extended information Forward, prohibit copying, prohibit forwarding, copy prohibition, etc. Wait.
  • the first extended information may also be used to limit the operation permission that the instant communication receiving end has visible to the daily instant communication client, such as collecting the received message, which is not limited in the present invention.
  • the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if the first extension information includes the second preset content, and the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
  • the first extended information may include a plurality of extended information, for example, a first function field, a first function tag, and the like, and the first preset content (or the second preset content) is different according to the first extended information. What content is for the first preset content (or the second preset content) will be introduced later.
  • the instant messaging receiving end may determine whether the first extended information is included in the instant message, and if the first extended information is included, may control whether the first extended information controls the operating right of the instant message. .
  • the instant messaging receiving end reads the first extended field that the instant messaging sending end adds the first extended information to the instant messaging for the instant messaging sending end to be embedded in the instant message; the first functional field The instant messaging sender assigns a value, wherein the first function field is assigned a different value, and the instant messaging receiver has different operating rights for the instant message.
  • the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if the assignment of the first function field is the second preset value, Then, the operation permission of the instant messaging receiving end to the instant message is prohibition of copying.
  • the first functional field implanted in the instant message is XX-CanNotXX, and if the XX-CanNotXX value is 0 (of course, other values, for example, 00, 10, etc.),
  • the operation permission of the instant communication receiving end to the instant message is prohibitive forwarding, and the instant communication receiving end does not provide the forwarding operation right for the instant message.
  • the first preset content in the first extended information is the first function field is given First preset value (for example: 0, 00, 10, etc.); if the XX-CanNotXX value is 1 (of course, other values, such as 01, 11, etc.), the instant messaging receiver The operation permission of the instant message is prohibition of copying, so that the instant communication receiving end is targeted The message does not provide the copied operation function.
  • the first preset content in the first extended information is the second preset value (eg, 1, 01, 11, etc.) to which the first function field is assigned; if XX- The value of CanNotXX is 0/1 (of course, it can also be other values, for example, 00/01, 10/11, etc.), then the operation permission of the instant messaging receiver to the instant message is prohibition of copying and prohibition of forwarding, so that the instant communication receiving end The operation function of forwarding and copying is not provided for instant messaging.
  • the second preset value eg, 1, 01, 11, etc.
  • the instant communication receiving end reads the first extended information added by the instant messaging sending end to the instant message, and the instant communication sending end adds the first function flag to the instant message, and is received by the instant messaging receiving end. Whether the first function tag exists in the incoming instant message, and the instant communication receiving end has different operation rights to the instant message.
  • the instant messaging sender adds a first function identifier to the instant message, for example, XX-CanNotFW, XX-CanNotCO (of course, may also be other function identifiers), and the like, and the instant communication receiving end is receiving. After the instant message, it can be determined whether the first function tag is included in the instant message, thereby determining the operation authority for the instant message.
  • a first function identifier for example, XX-CanNotFW, XX-CanNotCO (of course, may also be other function identifiers), and the like.
  • the operation permission of the instant communication receiving end to the instant message is controlled to prohibit forwarding, and/or copying is prohibited.
  • different first function fields may be set for forwarding rights and copy rights.
  • the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotFW, and the instant communication is received.
  • the operation right of the instant message is forbidden to forward, and the instant communication receiving end does not provide the forwarding operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotCO, the instant communication receiving end is immediately
  • the operation permission of the message is prohibition of copying, so that the instant messaging receiving end does not provide the copying operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotCO&FW, the instant messaging receiving end operates on the instant message
  • the permission is to prohibit copying and prohibiting forwarding, so that the instant messaging receiving end does not provide the forwarding and copying operation functions.
  • the correspondence between the first function field and the operation authority is merely an example and is not a limitation. In the above solution, the correspondence between the first function
  • the operation permission of the instant communication receiving end to the instant message is prohibition of forwarding
  • the first prompt information for prompting the prohibition of forwarding is given at the instant communication receiving end
  • the operation permission of the instant communication receiving end to the instant message is prohibition of copying
  • the second prompt information for prompting the copy prohibition is given at the instant communication receiving end.
  • the first prompt information (or the second prompt information) is, for example, text, a picture, a voice, and the like
  • the instant communication receiving end can determine that the instant communication receiving end operates the instant message as After the forwarding is prohibited, the first prompt information (or the second prompt information) is directly added to the instant message, and the instant communication receiving end directly reads the first prompt information (or the second prompt information) in the processed instant communication and outputs the same.
  • the first prompt information (or the second prompt information); or, the instant communication receiving end only adds the corresponding first extended information to the instant message, and the instant communication receiving end parses the pair after receiving the processed instant message If the operation permission of the instant message is prohibition of forwarding, the first prompt information is generated and output; if the operation permission for the instant message is resolved to prohibit copying, the second prompt information is generated and outputted.
  • the instant messaging receiving end may output the first prompting information (or the second prompting information) in the form of a pop-up prompting window, and may also adopt other prompting manners.
  • the specific display manner is not specifically limited in the present invention.
  • the instant messaging receiving end can generate prompt information (first prompt information or second prompt information) for the corresponding operation authority, thereby preventing the user of the instant communication receiving end from generating useless operations.
  • the instant messaging receiving end reads a new message that the instant messaging sender packs the instant message, and the first extended information that the instant messaging sender adds to the new message.
  • the new message is a message generated by the encryption and packing method, and the encryption algorithm used includes: a data encryption algorithm DES, a triple data encryption algorithm TDEA, a block cipher algorithm RC5, and an international data encryption algorithm IDEA.
  • the packaged new message includes the message content, the encryption key, and the identifier information of the instant messaging receiving end; the identifier information of the instant messaging receiving end includes the username information or the physical address information of the instant messaging receiving end. .
  • the instant messaging terminal After receiving the packetized new message, the instant messaging terminal first parses the encrypted message, and the parsing method is: if the identifier information of the instant communication receiving end and the identification information of the instant communication receiving end sent by the instant communication sending end are 1, The instant communication receiving end can obtain the encryption key, and the instant communication receiving end can use the encryption key to parse the original content of the message generated by the encryption and packaging method; if the identification information of the instant communication receiving end and the identifier of the instant communication receiving end sent by the instant communication sending end If the information matching degree is not 1, the instant communication receiving end cannot obtain the encryption key, and the original content of the message generated by the encryption and packaging method cannot be parsed, and then the encrypted message cannot be read normally.
  • the instant messaging receiving end provides a third prompting information
  • the third prompting information is used to prompt the receiving party that the message is an encrypted message.
  • the following third prompt information “the message is an encrypted message” may be generated through a pop-up window.
  • the specific display manner of the third prompt information is not specifically limited in the present invention.
  • the instant messaging receiving end reads information from the instant message further includes second extended information, where the second extended information is used to control an expiration time of the instant message.
  • the second extended information may be added to the message header, the message body, and the like of the instant message.
  • the invalidation time of the instant message can be effectively controlled, thereby further improving the security of instant message propagation.
  • the second extended information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point; If the value of the two-function field does not include the point in time, the instant message will not expire.
  • the second function field is XX-LoseEfficacy, and the value is: Tue, 10Feb 2015 15:36:57+0800, which means that the expiration time of the instant message is February 10, 2015. :36:57, if the current time to view the message has exceeded the expiration time described on February 10, 2015 at 15:36:57, then The instant message will be invalid and will not be viewed properly. Otherwise, if the value of the second function field is empty, it means that the instant message is not controlled by the expiration time, and the instant message can be viewed indefinitely.
  • the second extended information is a second function tag
  • the instant message obtained by the instant messaging receiver includes the second function tag
  • the instant message is at a preset time. After the segment expires; if the instant message obtained by the instant messaging receiver does not include the second function tag, the instant message does not expire.
  • the preset time period may be manually set by the user when sending an instant message, or may be automatically set by the system, for example, the system is set to the expiration time after 2 months from the start of the instant message sending time, where the preset time is The specific implementation form is not limited.
  • the second function is added to the instant message as XX-LoseEfficacy, and the system sets the expiration time to be 1 month after the start of the transmission time, and the sending time is 10:00 on January 1, 2016. 1 point, then 10:1 on February 1, 2016 is the expiration time point of the instant message. If the current viewing time has exceeded the expiration time, the instant message has expired and will no longer be viewed.
  • the expiration time can be set in batches for the instant message, thereby improving the efficiency of the failure time setting.
  • step S203 the instant communication receiving end implements control of the operation authority of the instant message according to the first extended information.
  • the instant communication receiving end controls the operation authority of the instant message based on the specific situation of the first extended information.
  • an instant messaging sender including:
  • the obtaining unit 31 is configured to obtain an instant message.
  • Adding unit 32 for adding first extended information to the instant message, thereby obtaining the processed instant message;
  • the sending unit 33 is configured to send the processed instant message to the instant messaging receiving end, And controlling, by the instant messaging receiving end, the operation authority of the instant message based on the first extended information.
  • the adding unit includes:
  • the implanting module 321 is configured to: implant a first function field in the instant message
  • the assignment module 322 is configured to assign a value to the first function field, wherein the first function field is assigned a different value, and the instant communication receiving end has different operation rights to the instant message.
  • the adding unit 32 further includes:
  • a first adding module 323, configured to add a first function tag to the instant message, and based on whether the first function tag exists in the instant message received by the instant messaging receiving end, the instant messaging receiving end The operation rights to the instant message are different.
  • the first extended information is used to control an operation permission of the instant messaging receiving end to forward and/or copy the instant message.
  • the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or,
  • the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
  • the first prompt information for prompting the prohibition of forwarding is given at the instant messaging receiving end;
  • the second prompting information for prompting for prohibiting copying is given at the instant messaging receiving end.
  • the adding unit 32 further includes:
  • a packaging module 325 configured to package the instant message into a new message
  • the second adding module 324 is configured to add the first extended information to the new message, and obtain the processed instant message.
  • the new message is a message generated by an encryption and packaging method.
  • the processed instant message further includes: second extension information, the second extension The information is used to control the expiration time of the instant message.
  • the second extended information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point; if the second function field is If the value does not include the time point, the instant message does not expire; or,
  • the second extension information is a second function identifier. If the instant message obtained by the instant messaging receiver includes the second function identifier, the instant message expires after a preset time period; if the receiving end is If the obtained second message is not included in the obtained instant message, the instant message does not expire.
  • the adding unit 32 is further configured to:
  • the first extended information is implanted in a message header of the instant message.
  • an instant messaging receiving end including:
  • the receiving unit 41 is configured to receive an instant message sent by the sending end.
  • the reading unit 42 is configured to read the first extended information added by the instant messaging sending end in the instant message
  • the control unit 43 is configured to implement control of the operation authority of the instant message according to the first extended information.
  • the reading unit 41 includes:
  • the first reading module 421 is configured to: read an assignment of the first function field in the instant message; and implement control on the operation authority of the instant message according to the first extension information, including:
  • the instant messaging receiver has different operating rights to the instant message based on the assignment of the first function field.
  • the reading unit further includes:
  • the second reading module 422 is configured to read a first function tag in the instant message, where different operating rights to the instant message are implemented according to whether the first function tag exists.
  • control unit is configured to:
  • Controlling the operation authority of forwarding and/or copying of the instant message is implemented according to the first extended information.
  • control unit 43 is configured to:
  • the operation permission for the instant message is prohibition of forwarding; and/or,
  • the operation authority for the instant message is prohibition of copying.
  • the instant messaging receiving end further includes: an information prompting unit, configured to:
  • the instant messaging receiving end gives first prompt information for prompting to prohibit forwarding; and/or,
  • the instant communication receiving end gives second prompt information for prompting to prohibit copying.
  • the instant message is a message generated by the instant messaging sender by encrypting and packaging.
  • the reading unit further includes:
  • the third reading module 423 is configured to: read the second extended information from the instant message; and the control unit is further configured to control, according to the second extended information, a dead time of the instant message.
  • controlling the expiration time of the instant message based on the second extended information including:
  • the second extended information is a second functional field, and the value of the second functional field includes a time point, the instant message expires after the time point; if the read second function field The value does not include the point in time, then the instant message does not expire; or,
  • the instant message expires after a preset time period; if the second function tag is not included in the instant message, the instant message does not expire.
  • the reading unit is further configured to: read the first extended information from a message header of the instant message.
  • Fig. 5 shows an instant communication receiving end (hereinafter referred to as an instant communication transmitting end or an instant communication receiving end collectively referred to as a device) of an instant communication transmitting end or an instant communication control method which can implement the instant messaging method according to the present invention.
  • the device conventionally includes a processor 1010 and a computer program product or computer readable medium in the form of a memory 1020.
  • the memory 1020 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • the memory 1020 has a memory space 1030 for executing program code 1031 of any of the above method steps.
  • storage space 1030 for program code may include various program code 1031 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such computer program products are typically portable or fixed storage units as described with reference to FIG.
  • the storage unit may have a storage section or a storage space or the like arranged similarly to the storage 1020 in FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit comprises program code 1031' for performing the steps of the method according to the invention, ie code that can be read by, for example, a processor such as 1010, which when executed by the device causes the device to perform the above Each step in the described method.
  • program code 1031' for performing the steps of the method according to the invention, ie code that can be read by, for example, a processor such as 1010, which when executed by the device causes the device to perform the above Each step in the described method.
  • a method for instant messaging transmission provided by an embodiment of the present application includes the following steps:
  • S51 Obtain a time key of an instant message to be sent, where the time key is used to limit a time limit during which the instant message to be sent can be viewed;
  • S52 Encrypt the to-be-sent instant message according to the time key to generate an encrypted message.
  • S52 Send the encrypted message to the receiver, send the time key to the server, and control, by the server, whether the receiver can view the encrypted message according to the time key.
  • the foregoing instant messaging message sending method provided by the present application may be applied to various instant messaging clients, such as commonly used QQ, WeChat or Weibo, etc. Wide range and easy to operate.
  • Step S51 Obtain a time key of an instant message to be sent, where the time key is used to limit a time limit during which the instant message to be sent can be viewed.
  • S511 Obtain an expiration time of an instant message to be sent, where the expiration time is an expiration time after the instant message is sent;
  • Step S511 obtaining an expiration time of the instant message to be sent, where the expiration time can be generated in the following manner:
  • the first way the expiration time is set by the sender.
  • the specific method is: the instant messaging sender sets the entry of the input invalidation time command before the sender sends the new message, for example, the sender can manually enter or manually select the expiration time through the portal, such as manual entry or selection.
  • the time is “2016-8-1 11:30”
  • the expiration time of the instant message is “2016-8-1 11:30”.
  • the specific method is that the expiration time is automatically generated by the time when the instant messaging sender sends the message plus a fixed period. For example, the time for sending the message is “2016-8-1 11:30”, and the fixed period is 30 days, then the expiration time is "2016-8-31 11:30".
  • the setting of the fixed term is a function integration at the time of development of the instant messaging system. Regarding the manner in which the failure time is generated, the present invention is not limited.
  • Step S512 Obtain a time key according to the expiration time.
  • the specific time key may be a time public key ID calculated by using an identification cryptographic algorithm, and at least the following two methods are:
  • the first method the original message data can be encrypted by using a symmetric encryption method.
  • the principle of the symmetric encryption algorithm is that the data sender processes the plaintext (raw data) together with the encryption key through an encryption algorithm. After that, it becomes a complex encrypted ciphertext sent out. After receiving the ciphertext, if the receiver wants to interpret the original data, it needs to decrypt the ciphertext by using the encrypted key and the inverse algorithm of the same encryption algorithm, so that it can be restored to a readable plaintext.
  • the symmetric encryption algorithm there is only one key used, and both the transmitting and receiving parties use this key to encrypt and decrypt the data.
  • the advantages of the symmetric encryption algorithm are the high speed of encryption and decryption and the difficulty of using long keys.
  • the second method the time key can also be obtained by an asymmetric encryption algorithm.
  • the asymmetric encryption algorithm requires two keys: a public key (publickey) and a private key (privatekey).
  • the public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt.
  • the characteristic of the asymmetric cryptosystem is that the encryption and decryption speed is slower than the symmetric encryption, but the encryption algorithm has complex strength and high security.
  • Step S52 Encrypt the to-be-sent instant message according to the time key to generate an encrypted message.
  • Step S52 may be implemented by using the first method: encrypting the to-be-sent instant message by using the time key to generate the encrypted message;
  • the original message data may be encrypted by using a symmetric encryption method, and the specific encrypted content is as follows:
  • EncrpytBySym instant message data ciphertext
  • fx_encryptBySym ori (instant message content), ID (time key)
  • ori is all content of instant message
  • EncrpytBySym is the message data density obtained by encryption
  • the encryption strength used for encryption is AES256.
  • Step S52 may be implemented by using the method 2: generating a session key, and encrypting the to-be-sent instant message by using the combination of the time key and the session key to generate the encrypted message;
  • the algorithm that generates the session key generates a session key. Then, using the session key to send an instant message to add The secret is generated, and the message data ciphertext in the encrypted message is generated, and the specific method is:
  • the session key is encrypted by using the time key to generate a session key ciphertext in the encrypted message;
  • the specific method may be:
  • Session key ciphertext id1_encryptdata fx_encryptByIBC (SessionPassword, ID (time key)), this encryption algorithm uses sm9 encryption algorithm, the encryption strength is RSA3072.
  • the encrypted message may be an encapsulated packet generated by the message data ciphertext and the session key ciphertext before being sent; and the message data ciphertext and the session key ciphertext are encapsulated in a P7 format,
  • the specific encapsulation format of the XXX instant messaging system is as follows:
  • Encryption algorithm id-ibc-enc-kem-sok-esbdh
  • Encoding type dem-dem3, hmacSHA
  • Decryptable time stamp yyyymmddhhnnsszzz
  • step S52 may be performed: sending the encrypted message to the receiver, sending the time key to the server, and controlling, by the server, whether the receiver can view the encryption according to the time key. Message. How the server controls the receipt according to the time key The method of whether the party can view the encrypted message will be described in detail later.
  • an instant messaging message viewing method provided by an embodiment of the present application is applied to a message receiving end, and the method includes:
  • S61 Receive an encrypted message that is encrypted according to a time key, where the time key is used to limit a time limit during which the encrypted message can be viewed;
  • S62 Respond to the viewing operation of viewing the encrypted message, generate and send a key request to the server, where the key request is used to obtain the time key of the encrypted message;
  • S63 Receive feedback information that the server responds to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end, when the request time is
  • the feedback information is information indicating that the encrypted message is invalid when the time range corresponding to the time key is exceeded, and the feedback information is the time when the request time is within a time range corresponding to the time key.
  • the responding to the viewing operation according to the parsing result includes:
  • step S641 is performed: in response to the viewing operation, prompting the user that the encrypted message has expired and cannot be viewed;
  • step S642 is performed: in response to the viewing operation, decrypting the encrypted message according to the time key, obtaining message data and displaying;
  • step S642 the decrypting the encrypted message according to the time key may be performed in two ways:
  • Method 1 decrypting the encrypted message with the time key to obtain message data
  • Or method 2 parsing the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypting the session key ciphertext with the time key to obtain a session key; using the session secret The key decrypts the message data ciphertext in the encrypted message to obtain the message data.
  • S61 Receive an encrypted message that is encrypted according to a time key, where the time key is used to limit a time limit during which the encrypted message can be viewed;
  • the time key can be the time public key ID calculated by the identification cryptographic algorithm, and there are at least two methods:
  • the first method the original message data can be encrypted by using a symmetric encryption method.
  • the principle of the symmetric encryption algorithm is that the data sender converts the plaintext (original data) together with the encryption key through the encryption algorithm to make it complex.
  • the encrypted ciphertext is sent out. After receiving the ciphertext, if the receiver wants to interpret the original data, it needs to decrypt the ciphertext by using the encrypted key and the inverse algorithm of the same encryption algorithm, so that it can be restored to a readable plaintext.
  • the symmetric encryption algorithm there is only one key used. Both parties of the sending and receiving message use this key to encrypt and decrypt the data.
  • the advantages of the symmetric encryption algorithm are the high speed of encryption and decryption and the difficulty of using long keys. .
  • the second method the time key can also be obtained by an asymmetric encryption algorithm.
  • the asymmetric encryption algorithm requires two keys: a public key (publickey) and a private key (privatekey).
  • the public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt.
  • the characteristic of the asymmetric cryptosystem is that the encryption and decryption speed is slower than the symmetric encryption, but the encryption algorithm has complex strength and high security.
  • S62 Respond to the viewing operation of viewing the encrypted message, generate and send a key request to the server, where the key request is used to obtain the time key of the encrypted message;
  • the instant message receiving end sends a key request to the server to obtain a time key, where the time key is issued by the server by verifying whether the time when the instant message receiving end applies for the time key is within a time range corresponding to the time key.
  • the server here is generally a CA server; the so-called CA, which is a digital certificate authentication center (CertficateAuthority, CA), is a key link in the security of the entire online electronic transaction. It is primarily responsible for generating, distributing, and managing the identity authentication digital certificates required by all entities involved in online transactions.
  • S63 Receive feedback information that the server responds to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end, when the request time is
  • the feedback information is information indicating that the encrypted message is invalid when the time range corresponding to the time key is exceeded, and the feedback information is the time when the request time is within a time range corresponding to the time key. Key.
  • an example is as follows:
  • the request time for the instant messaging receiver to send a key request to the server is 2016-8-20 10:10:10, and the time key sent by the instant messaging sender is 2016-8-10 10:10:10.
  • the request time exceeds the time range corresponding to the time key, and the feedback information sent by the server to the instant communication receiving end is invalid, and the time key sent by the instant communication sending end is 2016-8-30 10:10: 10:
  • the request time is within a time range corresponding to the time key, and the feedback information sent by the server to the instant communication receiving end is a time key.
  • the responding to the viewing operation according to the parsing result includes:
  • step S641 the instant communication receiving end responds to the viewing operation, prompting the user that the encrypted message has expired and cannot be viewed;
  • step S642 the instant communication receiving end responds to the viewing operation, decrypts the encrypted message according to the time key, obtains message data, and displays;
  • step S642 the decrypting the encrypted message according to the time key may be performed in two ways:
  • Method 1 decrypting the encrypted message with the time key to obtain message data
  • Or method 2 parsing the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypting the session key ciphertext with the time key to obtain a session key; using the session secret Key decrypting the message data ciphertext in the encrypted message to obtain message data;
  • the instant messaging receiving end parses the session key ciphertext with the time key to obtain the session key.
  • the session key ciphertext (id1_encryptdata)
  • get the session key SessionPassword as "1234567890”
  • the package package here is the P7 format package data generated in the foregoing instant messaging message sending method, and the specific package data is as follows:
  • Encryption algorithm id-ibc-enc-kem-sok-esbdh
  • Encoding type dem-dem3, hmacSHA
  • Decryptable time stamp yyyymmddhhnnsszzz
  • the session key ciphertext id1_encryptdata and the expiration time yyyymmddhhnnsszzz can be obtained therefrom.
  • An instant messaging message viewing control method is applied to a server, and the method includes:
  • S71 Receive a key request for acquiring an encrypted message time key sent by the instant communication receiving end;
  • executing S722 issuing the time key to the instant information receiving end, so that the instant information receiving end decrypts and views the encrypted message according to the time key.
  • step S72 corresponds to step S63.
  • step S721 and step S722 correspond to S641 and S642, respectively.
  • the foregoing method is used to perform encrypted transmission, decryption reception, and viewing control of an instant message
  • the instant communication system includes the aforementioned instant communication transmitting end, instant messaging receiving end, and server.
  • the embodiment of the present application further provides an instant messaging sending end, as shown in FIG. 10, including:
  • the obtaining unit 81 is configured to obtain a time key for sending the instant information to be sent, where the time key is used to limit a time limit during which the instant information to be sent can be viewed;
  • the encryption unit 82 is configured to: encrypt the to-be-transmitted instant information according to the time key to generate encrypted information;
  • the first sending unit 83 is configured to send the encrypted information to the receiver, send the time key to the server, and control, by the server, whether the receiver can view the encrypted message according to the time key.
  • the obtaining unit 81 includes:
  • the time acquisition subunit is configured to obtain an expiration time of the instant information to be sent, where the expiration time is an expiration time after the message is sent;
  • the time acquisition subunit is configured to obtain the expiration time by adding a sending time of the to-be-sent instant information to a fixed period.
  • a key acquisition subunit configured to obtain a time key according to the expiration time.
  • the encryption unit 82 includes:
  • a first encryption subunit configured to encrypt the to-be-transmitted instant information by using the time key to generate the encrypted information
  • the second encryption subunit is configured to generate a session key, and the instant message to be sent is encrypted by using the combination of the time key and the session key to generate the encrypted instant information.
  • the second encryption subunit is configured to:
  • the session key is encrypted with the time key to generate a session key ciphertext in the encrypted message.
  • the embodiment of the present application further provides an instant messaging message receiving end, as shown in FIG.
  • a first receiving unit 91 configured to receive an encrypted message that is encrypted according to a time key, where the time key is used to limit a time limit during which the encrypted message can be viewed;
  • the response requesting unit 92 is configured to generate and send a key request to the server in response to the viewing operation of viewing the encrypted message, where the key request is used to acquire the time key of the encrypted message;
  • the second receiving unit 93 is configured to receive feedback information that is sent by the server to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end. And the feedback information is information indicating that the encrypted message is invalid when the request time exceeds a time range corresponding to the time key, and when the request time is within a time range corresponding to the time key, The feedback information is the time key;
  • the parsing response unit 94 is configured to parse the feedback information, and respond to the viewing operation according to the parsing result.
  • the parsing response unit 94 is configured to:
  • the parsing response unit 94 includes:
  • a first parsing response subunit configured to decrypt the encrypted message with the time key to obtain message data
  • a second parsing response subunit configured to parse the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypt the session key ciphertext with the time key to obtain a session key; Decrypting the message data ciphertext in the encrypted message with the session key to obtain message data.
  • an instant messaging message viewing control method is provided.
  • the embodiment of the present application further provides a server, as shown in FIG. 12, including:
  • a third receiving unit 101 configured to receive a key request for acquiring an encrypted message time key sent by the instant information receiving end;
  • the verification unit 102 is configured to compare the request time of the time information receiving end requesting the time key with a time range corresponding to the time key;
  • the second sending unit 103 is configured to: when the request time exceeds the time range, refuse to issue the time key to the instant information receiving end, so that the instant information receiving end cannot decrypt and view the encrypted message;
  • the time key is issued to the instant information receiving end, so that the instant information receiving end decrypts and views the encrypted message according to the time key.
  • FIG. 13 is a diagram showing a server of an instant communication receiving end or an instant communication message viewing control method of an instant messaging transmitting end or instant messaging message viewing method that can implement the instant messaging sending method according to the present invention (the instant messaging transmitting end or The instant messaging receiver or server is collectively referred to as a device).
  • the device conventionally includes a processor 2010 and a computer program product or meter in the form of a memory 2020 Computer readable media.
  • the memory 2020 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • the memory 2020 has a memory space 2030 for executing program code 2031 of any of the above method steps.
  • the storage space 2030 for program code may include respective program codes 2031 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage section or a storage space or the like arranged similarly to the memory 2020 in FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit comprises program code 2031' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 2010, which when executed by the device causes the device to perform the above Each step in the described method.
  • program code 2031' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 2010, which when executed by the device causes the device to perform the above Each step in the described method.
  • the first extended information needs to be added to the instant message, and then sent to the instant messaging receiving end, so that the instant communication receiving end receives the instant communication.
  • the operation authority of the instant message can be controlled based on the first extension information included in the message, thereby controlling the operation authority of the message receiver to the received message, thereby avoiding instant message reception.
  • the party can freely deal with the adverse consequences of instant messaging, such as the instant message being spread and the chat record being stolen, so as to achieve the technical effect of improving the security of the instant communication process.
  • the encryption method of the present invention is to encrypt the instant message to be sent by using the time key, and the time key is used to limit the time limit for the instant message to be sent to be viewed, that is, after the time limit expires, the instant message can no longer be viewed.
  • the time-sensitiveness of the instant message is guaranteed; at the same time, the time key used to encrypt the message is sent to the server, and the server manages the issuance of the key, thereby controlling whether the encrypted message can be viewed, and ensuring the information in the instant communication process.
  • the high security and the timeliness of the message solve the technical problem that the security performance of the instant communication in the prior art is not high, the privacy of the instant information is poor, and the disclosure is easy to be leaked. question.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some, or all, of the gateways, proxy servers, systems in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.

Abstract

Disclosed in the present invention discloses a sending method, control method, sending end and receiving end in instant messaging. The method comprises: an instant messaging sending end obtains an instant message; the instant messaging sending end adds first extension information to the instant message, so as to obtain the processed instant message; and the instant messaging sending end sends the processed instant message to an instant messaging receiving end, so that the instant messaging receiving end controls, according to the first extension information, an operation permission of the instant message. In addition, the present invention also relates a sending method, a viewing method and a viewing control method and a device thereof for instant messaging. Negative effects such that instant message is propagated willfully and chat records are stolen caused when the instant message is processed at will by an instant message receiver can be avoided, and accordingly, the technical effects for improving the security of an instant messaging process are achieved.

Description

一种即时通信发送方法、控制方法、发送端及接收端Instant communication sending method, control method, transmitting end and receiving end 技术领域Technical field
本发明涉及通信技术领域,尤其涉及一种即时通信发送方法、即时通信控制方法、发送端及接收端,以及一种即时通信消息发送、查看、查看控制方法及其设备。The present invention relates to the field of communications technologies, and in particular, to an instant communication sending method, an instant communication control method, a transmitting end and a receiving end, and an instant messaging message sending, viewing, viewing control method and device thereof.
背景技术Background technique
目前,随着互联网的不断发展,即时通信工具如微信、飞信等,成为广大互联网用户在生活和工作中经常使用的交流工具。然而,伴随即时通信工具的普及使用,各种安全问题也随之产生,如:即时消息被肆意传播、聊天记录及音视频易于被第三方窃取等,导致即时信息的私密性得不到保护,安全性很低。因此,即时通信的安全问题成为急需解决的重要问题。At present, with the continuous development of the Internet, instant communication tools such as WeChat and Fetion have become the communication tools frequently used by Internet users in their lives and work. However, with the popularization of instant messaging tools, various security issues have also arisen, such as: instant messaging is arbitrarily spread, chat records, audio and video are easily stolen by third parties, etc., resulting in the privacy of instant information is not protected, Security is very low. Therefore, the security issue of instant messaging has become an important issue that needs to be solved urgently.
同时,随着通信技术的发展,即时通信软件的功能不断加强,由于其能够实现在线聊天和交流,方便快捷,因此得到了广泛的应用。通过即时通信软件,不仅能够实现文字、图片、表情等即时信息的发送,而且还能够即时地传送音频和视频。所以说,即时通信软件作为交流平台,具有信息存储量大、私密性高的特点。At the same time, with the development of communication technology, the function of instant communication software is continuously strengthened. Because it can realize online chat and communication, it is convenient and fast, so it has been widely used. Through instant messaging software, not only can instant messages such as text, pictures, and expressions be transmitted, but also audio and video can be transmitted on the fly. Therefore, instant messaging software, as a communication platform, has the characteristics of large amount of information storage and high privacy.
在使用过程中,由于即时通信的即时性,发送消息通常是直接显示在对方的通信平台上,私密性得不到较好的保护,安全性很低,即时消息及平台上存储的历史消息便会很容易被窃取,但是通常平台上的消息具有私密性不希望被第三人看到,或者被窃取到,然而当前的使用现状是:只要通过登录密码登录到个人的即时通信软件上,通信软件上的历史聊天记录就会被很轻易地浏览、复制、转发等,信息的私密性就得不到保障,因此说,如何提升即时通信的安全性能、保证即时信息的私密性是目前即时通信领域亟需解决的问题。 In the process of use, due to the immediacy of instant communication, the sending message is usually displayed directly on the other party's communication platform, the privacy is not well protected, the security is very low, and the historical message stored on the instant message and the platform is It can be easily stolen, but usually the message on the platform is private and does not want to be seen by a third person, or stolen. However, the current usage status is as long as the login password is used to log in to the personal instant messaging software, the communication The historical chat records on the software will be easily browsed, copied, forwarded, etc., and the privacy of the information will not be guaranteed. Therefore, how to improve the security performance of instant messaging and ensure the privacy of instant information is the current instant communication. The problem that the field needs to solve.
发明内容Summary of the invention
鉴于上述问题,本发明提出了一种克服上述问题或者至少部分地解决上述问题的一种即时通信发送方法、即时通信控制方法、发送端及接收端。In view of the above problems, the present invention provides an instant communication transmitting method, an instant communication control method, a transmitting end, and a receiving end that overcome the above problems or at least partially solve the above problems.
第一方面,本发明实施例提供一种即时通信发送方法,包括:即时通信发送端获取即时消息;所述即时通信发送端为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息;所述即时通信发送端将所述处理后的所述即时消息发送至即时通信接收端,以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。In a first aspect, an embodiment of the present invention provides an instant messaging sending method, including: an instant messaging sender acquires an instant message; and the instant messaging sender adds first extension information to the instant message, thereby obtaining the processed The instant messaging sender sends the processed instant message to the instant messaging receiving end, so that the instant messaging receiving end implements the operation authority on the instant message based on the first extended information. control.
第二方面,本发明实施例提供一种即时通信控制方法,包括:即时通信接收端接收即时通信发送端发送的消息;所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息;所述即时通信接收端根据所述第一扩展信息实现对所述消息的操作权限的控制。In a second aspect, an embodiment of the present invention provides an instant communication control method, including: an instant communication receiving end receives a message sent by an instant communication sending end; and the instant communication receiving end reads the message by the instant communication sending end The first extension information is added; the instant communication receiving end controls the operation authority of the message according to the first extension information.
第三方面,本发明实施例提供一种即时通信发送端,包括:至少一个处理器;以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信发送端执行至少以下操作:获得即时消息;为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息;将所述处理后的所述即时消息发送至即时通信接收端,以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。In a third aspect, an embodiment of the present invention provides an instant messaging transmitting end, including: at least one processor; and at least one memory communicably connected to the at least one processor; the at least one memory includes a processor An executable instruction, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging sender to perform at least the following operations: obtaining an instant message; adding first extended information to the instant message And obtaining the processed instant message; sending the processed instant message to an instant messaging receiving end, where the instant messaging receiving end implements the instant message based on the first extended information Control of operational permissions.
第四方面,本发明实施例提供一种即时通信接收端,包括:至少一个处理器;以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信接收端执行至少以下操作:接收发送端发送的即时消息;读取所述即时消息中由所述即时通信发送端添加的第一扩展信息;根据所述第一扩展信息实现对所述即时消息的操作权限的控制。In a fourth aspect, an embodiment of the present invention provides an instant messaging receiving end, including: at least one processor; and at least one memory communicably connected to the at least one processor; the at least one memory includes a processor An executable instruction, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging receiver to perform at least the following operations: receiving an instant message sent by a sender; reading the instant message The first extension information added by the instant messaging sender; the control of the operation authority of the instant message is implemented according to the first extension information.
第五方面,本发明实施例中提供了一种计算机程序,包括计算机可读代码, 当即时通信发送端运行所述计算机可读代码时,导致第一方面中所述的方法被执行。In a fifth aspect, a computer program, including computer readable code, is provided in an embodiment of the present invention. When the instant messaging sender runs the computer readable code, the method described in the first aspect is caused to be performed.
第六方面,本发明实施例中提供了一种计算机程序,包括计算机可读代码,当即时通信接收端运行所述计算机可读代码时,导致第二方面中所述的方法被执行。In a sixth aspect, a computer program is provided in the embodiment of the present invention, comprising computer readable code, when the instant communication receiving end runs the computer readable code, causing the method described in the second aspect to be performed.
第七方面,本发明实施例中提供了一种计算机可读介质,其中存储了如第五方面或第六方面所述的计算机程序。In a seventh aspect, the embodiment of the present invention provides a computer readable medium, wherein the computer program according to the fifth aspect or the sixth aspect is stored.
第八方面,本申请实施例提供一种即时通信消息发送方法,所述方法包括:获得待发送即时消息的时间密钥,所述时间密钥用于限制所述待发送即时消息可被查看的时间期限;根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息;发送所述加密消息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。In an eighth aspect, an embodiment of the present application provides a method for sending an instant messaging message, where the method includes: obtaining a time key of an instant message to be sent, where the time key is used to limit that the to-be-sent instant message can be viewed. Time period; encrypting the to-be-sent instant message according to the time key to generate an encrypted message; sending the encrypted message to a receiver, transmitting the time key to a server, and using the server according to the time-dense The key controls whether the recipient can view the encrypted message.
第九方面,本发明提供一种即时通信消息查看方法,应用于即时通信接收端,所述方法包括:接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和即时通信发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥;解析所述反馈信息,根据解析结果响应所述查看操作。According to a ninth aspect, the present invention provides an instant messaging message viewing method, which is applied to an instant messaging receiving end, the method comprising: receiving an encrypted message encrypted according to a time key, wherein the time key is used to limit the encrypted message a time period that can be viewed; in response to viewing the viewing operation of the encrypted message, generating and transmitting a key request to the server, the key requesting to obtain the time key of the encrypted message; receiving the server response The feedback information of the key request, the feedback information is generated by the server according to the request time of the key request and the time key sent by the instant communication sending end, when the request time exceeds the time secret The feedback information is information indicating that the encrypted message is invalid, and the feedback information is the time key when the request time is within a time range corresponding to the time key; The feedback information is responsive to the viewing operation according to the parsing result.
第十方面,本发明提供一种即时通信消息查看控制方法,应用于服务器,所述方法包括:接收即时通信接收端发送的获取加密消息时间密钥的密钥请求;According to a tenth aspect, the present invention provides an instant messaging message viewing control method, which is applied to a server, and the method includes: receiving a key request for acquiring an encrypted message time key sent by an instant communication receiving end;
将所述即时通信接收端请求所述时间密钥的请求时间与所述时间密钥对应的时间范围进行比较;如果所述请求时间超出所述时间范围,拒绝向即时通 信接收端发放所述时间密钥,使得即时通信接收端无法对加密消息进行解密及查看;如果所述请求时间未超出所述时间范围,向即时通信接收端发放所述时间密钥,使得即时通信接收端根据所述时间密钥对加密消息进行解密并查看。And comparing, by the instant messaging receiver, the request time of the time key to the time range corresponding to the time key; if the request time exceeds the time range, rejecting the instant messaging The time receiving key is issued by the receiving end, so that the instant communication receiving end cannot decrypt and view the encrypted message; if the request time does not exceed the time range, the time key is issued to the instant communication receiving end, so that the instant The communication receiving end decrypts and views the encrypted message according to the time key.
第十一方面,本发明提供一种即时通信发送端,包括:至少一个处理器;以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信发送端执行至少以下操作:获得待发送即时消息的时间密钥,所述时间密钥用于限制待发送即时消息可被查看的时间期限;根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息;发送所述加密消息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。In an eleventh aspect, the present invention provides an instant messaging transmitting end, comprising: at least one processor; and at least one memory communicably coupled to the at least one processor; the at least one memory comprising a processor Executing instructions, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging sender to perform at least the following operations: obtaining a time key of an instant message to be sent, the time key The time limit for limiting the to-be-sent instant message can be viewed; the instant message to be sent is encrypted according to the time key to generate an encrypted message; the encrypted message is sent to the receiver, and the time key is sent to The server controls, by the server, whether the recipient can view the encrypted message according to the time key.
第十二方面,本发明提供一种即时通信接收端,包括:至少一个处理器;以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信接收端执行至少以下操作:接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥;解析所述反馈信息,根据解析结果响应所述查看操作。According to a twelfth aspect, the present invention provides an instant messaging receiving end, comprising: at least one processor; and at least one memory communicably connected to the at least one processor; the at least one memory comprising a processor Executing instructions, when the processor-executable instructions are executed by the at least one processor, causing the instant messaging receiver to perform at least the following: receiving an encrypted message encrypted according to a time key, the time secret a key for limiting a time period during which the encrypted message can be viewed; in response to viewing a viewing operation of the encrypted message, generating and transmitting a key request to a server, the key requesting the time for acquiring the encrypted message Receiving, by the server, feedback information in response to the key request, the feedback information being generated by the server according to the request time of the key request and the time key sent by the sending end, when the request is When the time exceeds the time range corresponding to the time key, the feedback information is information indicating that the encrypted message is invalid. The feedback information is the time key when the request time is within a time range corresponding to the time key; the feedback information is parsed, and the viewing operation is responded according to the parsing result.
第十三方面,本发明提供一种服务器,包括:至少一个处理器;以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器 执行时,致使所述服务器执行至少以下操作:接收即时通信接收端发送的获取加密消息时间密钥的密钥请求;将所述即时通信接收端请求所述时间密钥的请求时间与所述时间密钥对应的时间范围进行比较;在所述请求时间超出所述时间范围时,拒绝向即时通信接收端发放所述时间密钥,使得即时通信接收端无法对加密消息进行解密及查看;在所述请求时间未超出所述时间范围时,向即时通信接收端发放所述时间密钥,使得即时通信接收端根据所述时间密钥对加密消息进行解密并查看。In a thirteenth aspect, the present invention provides a server comprising: at least one processor; and at least one memory communicably coupled to the at least one processor; the at least one memory comprising processor executable instructions An instruction executable by the processor by the at least one processor When executed, causing the server to perform at least the following operations: receiving a key request for acquiring an encrypted message time key sent by the instant messaging receiving end; and requesting the instant communication receiving end to request the time key and the time The time range corresponding to the key is compared; when the request time exceeds the time range, the time key is denied to be issued to the instant communication receiving end, so that the instant communication receiving end cannot decrypt and view the encrypted message; When the request time does not exceed the time range, the time key is issued to the instant communication receiving end, so that the instant communication receiving end decrypts and views the encrypted message according to the time key.
第十四方面,本发明实施例中提供了一种计算机程序,包括计算机可读代码,当即时通信发送端运行所述计算机可读代码时,导致第八方面中所述的方法被执行。In a fourteenth aspect, a computer program is provided in an embodiment of the present invention, comprising computer readable code, when the instant communication transmitting end runs the computer readable code, causing the method described in the eighth aspect to be performed.
第十五方面,本发明实施例中提供了一种计算机程序,包括计算机可读代码,当即时通信接收端运行所述计算机可读代码时,导致第九方面中所述的方法被执行。In a fifteenth aspect, a computer program is provided in the embodiment of the present invention, comprising computer readable code, when the instant communication receiving end runs the computer readable code, causing the method described in the ninth aspect to be performed.
第十六方面,本发明实施例中提供了一种计算机程序,包括计算机可读代码,当服务器运行所述计算机可读代码时,导致第十方面中所述的方法被执行。In a sixteenth aspect, a computer program is provided in an embodiment of the present invention, comprising computer readable code, when the server runs the computer readable code, causing the method described in the tenth aspect to be performed.
第十七方面,本发明实施例中提供了一种计算机可读介质,其中存储了如第十四、十五及十六方面所述的计算机程序。In a seventeenth aspect, the invention provides a computer readable medium storing the computer program as described in the fourteenth, fifteenth and sixteenth aspects.
本申请实施例中提供的技术方案,至少具有如下技术效果或优点:The technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
根据本发明的即时通信发送方法,在即时通信发送端发送即时消息前,需要为所述即时消息添加第一扩展信息,之后再发送至即时通信接收端,从而即时通信接收端在接收到即时通信发送端发送的消息之后,可以基于消息中所包含的第一扩展信息实现对即时消息的操作权限的控制,以此来控制消息接收方对所接收消息的操作权限,以此来避免即时消息接收方可以随意对即时消息进行处理而带来的不良后果,如即时消息被肆意传播、聊天记录被窃取等问题,从而达到提高即时通信过程的安全性的技术效果。According to the instant messaging method of the present invention, before the instant messaging sender sends the instant message, the first extended information needs to be added to the instant message, and then sent to the instant messaging receiving end, so that the instant communication receiving end receives the instant communication. After the message sent by the sender, the operation authority of the instant message can be controlled based on the first extension information included in the message, thereby controlling the operation authority of the message receiver to the received message, thereby avoiding instant message reception. The party can freely deal with the adverse consequences of instant messaging, such as the instant message being spread and the chat record being stolen, so as to achieve the technical effect of improving the security of the instant communication process.
本发明的加密方法在于利用时间密钥对待发送即时消息进行加密,该时 间密钥用于限制待发送即时消息可被查看的时间期限,即过了该时间期限,即时消息将不能再被查看,保证了即时消息的时效性;同时,用于加密消息的时间密钥是发送至服务器,由服务器来管理密钥的发放,以此来控制加密消息能否被查看,确保了即时通信过程中信息的高度安全性和消息的时效性,解决了现有技术中即时通信的安全性能不高,即时信息的私密性差、易被泄露的技术问题。The encryption method of the present invention consists in encrypting an instant message to be sent by using a time key, when The inter-key is used to limit the time limit for the instant message to be sent to be viewed. After the time limit expires, the instant message can no longer be viewed, ensuring the timeliness of the instant message; and the time key used to encrypt the message It is sent to the server, and the server manages the issuance of the key, thereby controlling whether the encrypted message can be viewed, ensuring the high security of the information in the instant communication process and the timeliness of the message, and solving the instant communication in the prior art. The security performance is not high, the privacy of the instant information is poor, and the technical problem is easy to be leaked.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
附图说明DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了根据本发明一个实施例一的一种即时通信发送方法流程图;1 is a flow chart of a method for instant messaging transmission according to an embodiment of the present invention;
图2示出了根据本发明一个实施例二的一种即时通信控制方法流程图;2 is a flow chart showing an instant communication control method according to a second embodiment of the present invention;
图3示出了根据本发明一个实施例三的一种即时通信发送端的示意图;3 is a schematic diagram of an instant messaging transmitting end according to a third embodiment of the present invention;
图4示出了根据本发明一个实施例四的一种即时通信接收端的示意图;4 is a schematic diagram of an instant messaging receiving end according to a fourth embodiment of the present invention;
图5示出了用于执行根据本发明的方法的即时通信发送端或即时通信接收端的框图;Figure 5 shows a block diagram of an instant messaging sender or instant messaging receiver for performing the method according to the invention;
图6示出了用于保持或者携带实现根据本发明实施例一或实施例二的方法的程序代码的存储单元示意图;6 shows a schematic diagram of a storage unit for maintaining or carrying program code implementing a method in accordance with Embodiment 1 or Embodiment 2 of the present invention;
图7示出了根据本发明一个实施例五的一种即时通信消息发送方法流程图;FIG. 7 is a flowchart of a method for sending an instant messaging message according to a fifth embodiment of the present invention; FIG.
图8示出了根据本发明一个实施例六的一种即时通信消息查看方法流程图;FIG. 8 is a flowchart of a method for viewing an instant messaging message according to an embodiment 6 of the present invention; FIG.
图9示出了根据本发明一个实施例七的一种即时通信消息查看控制方法流 程图;FIG. 9 is a flowchart showing an instant messaging message viewing control method according to a seventh embodiment of the present invention. Cheng Tu
图10示出了根据本发明一个实施例八的一种即时通信发送端的示意图;FIG. 10 is a schematic diagram showing an instant messaging transmitting end according to an embodiment 8 of the present invention; FIG.
图11示出了根据本发明一个实施例九的一种即时通信接收端的示意图;11 is a schematic diagram of an instant messaging receiving end according to an embodiment 9 of the present invention;
图12示出了根据本发明一个实施例十的一种服务器的示意图;Figure 12 is a diagram showing a server according to an embodiment 10 of the present invention;
图13示出了用于执行根据本发明的方法的即时通信发送端或即时通信接收端或服务器的框图;Figure 13 shows a block diagram of an instant messaging sender or instant messaging receiver or server for performing the method according to the invention;
图14示出了用于保持或者携带实现根据本发明实施例五至实施例七的其中一种方法的程序代码的存储单元示意图。Figure 14 shows a schematic diagram of a memory unit for holding or carrying program code implementing one of the methods according to embodiments 5 through 7 of the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Rather, these embodiments are provided so that this disclosure will be more fully understood and the scope of the disclosure will be fully disclosed.
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。The term "and/or" in this context is merely an association describing the associated object, indicating that there may be three relationships, for example, A and / or B, which may indicate that A exists separately, and both A and B exist, respectively. B these three situations. In addition, the character "/" in this article generally indicates that the contextual object is an "or" relationship.
本发明实施例提供一种即时通信发送方法、即时通信控制方法和装置,用以解决现有技术中即时消息被肆意传播、聊天记录被窃取等技术问题。The embodiments of the present invention provide an instant messaging sending method, an instant messaging control method, and a device, which are used to solve the technical problems in the prior art that instant messages are easily propagated and chat records are stolen.
实施例一Embodiment 1
请参考图1,本申请实施例提供的一种即时通信发送方法,该方法包括:Referring to FIG. 1 , an instant messaging sending method provided by an embodiment of the present application includes:
S101:即时通信发送端获取即时消息;S101: The instant messaging sender obtains an instant message;
S102:所述即时通信发送端为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息;S102: The instant messaging sending end adds first extended information to the instant message, thereby obtaining the processed instant message.
S103:所述即时通信发送端将所述处理后的所述即时消息发送至即时通信 接收端,以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。S103: The instant messaging sender sends the processed instant message to the instant communication And a receiving end, wherein the instant messaging receiving end controls the operation authority of the instant message based on the first extended information.
需要说明的是,在具体实施过程中,需要说明的是本发明实施例所述的即时通信方法可以应用于微博、QQ、飞信、微信等各种即时通信软件中,所述即时通信软件可应用在手机或电脑等终端。并且,可以应用于一对一聊天中,也可以应用于群聊中。It should be noted that, in the specific implementation process, it should be noted that the instant messaging method according to the embodiment of the present invention can be applied to various instant messaging softwares such as Weibo, QQ, Fetion, WeChat, etc., and the instant messaging software can be Used in terminals such as mobile phones or computers. And, it can be applied to one-on-one chat, and can also be applied to group chat.
下面,结合图1详细介绍本即时通信发送方法的具体实现步骤:The specific implementation steps of the instant messaging sending method are described in detail below with reference to FIG. 1 :
步骤S101,即时通信发送端获取即时消息。Step S101: The instant messaging sender acquires an instant message.
其中即时消息的内容可包含文本、图片、声音、视频等。The content of the instant message may include text, pictures, sounds, videos, and the like.
步骤S102,所述即时通信发送端为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息。其中,在本申请实施例中,第一扩展信息用于控制即时通信接收端对即时消息进行转发和/或复制的操作权限,例如:通过第一扩展信息控制即时通信接收端对即时消息禁止转发、禁止复制、禁止转发且禁止复制等等。需要说明的是,第一扩展信息还可用于限制即时通信接收端对接收消息进行收藏等日常即时通信客户端可见的操作权限,本发明中不做限制。Step S102: The instant messaging sender adds first extension information to the instant message, thereby obtaining the processed instant message. In the embodiment of the present application, the first extended information is used to control the operation permission of the instant communication receiving end to forward and/or copy the instant message, for example, the first extended information is used to control the instant communication receiving end to prohibit the forwarding of the instant message. , prohibit copying, prohibit forwarding, copy prohibition, and so on. It should be noted that the first extended information may also be used to limit the operation permission that the instant communication receiving end has visible to the daily instant communication client, such as collecting the received message, which is not limited in the present invention.
作为一种可选的实施例,如果所述第一扩展信息中包含第一预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止转发;和/或,如果所述第一扩展信息中包含第二预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止复制。As an optional embodiment, if the first extension information includes the first preset content, the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if The first extension information includes the second preset content, and the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
其中,第一扩展信息可以包含多种扩展信息,例如:第一功能字段、第一功能标记等等,基于第一扩展信息不同导致第一预设内容(或者第二预设内容)也不同,对于第一预设内容(或者第二预设内容)为何种内容将在后续进行介绍。即时通信接收端在接收到处理后的即时消息之后,可以判断即时消息中是否包含第一扩展信息,如果包含第一扩展信息的话,则可以基于第一扩展信息是否对即时消息的操作权限的控制。The first extended information may include a plurality of extended information, for example, a first function field, a first function tag, and the like, and the first preset content (or the second preset content) is different according to the first extended information. What content is for the first preset content (or the second preset content) will be introduced later. After receiving the processed instant message, the instant messaging receiving end may determine whether the first extended information is included in the instant message, and if the first extended information is included, may control whether the first extended information controls the operating right of the instant message. .
作为一种可选的实施例,即时通信发送端为即时消息添加第一扩展信息, 具体步骤包括:即时通信发送端在即时消息中植入第一功能字段;即时通信发送端为第一功能字段赋值,其中,第一功能字段被赋予的值不同,即时通信接收端对即时消息的操作权限就会不同。As an optional embodiment, the instant messaging sender adds the first extended information to the instant message. The specific steps include: the instant messaging sender implants the first function field in the instant message; the instant messaging sender assigns a value to the first function field, wherein the first function field is assigned a different value, and the instant messaging receiver is configured for the instant message. The operating permissions will be different.
具体的,如果第一功能字段的赋值为第一预设值,则即时通信接收端对即时消息的操作权限为禁止转发;和/或,如果第一功能字段的赋值为第二预设值,则即时通信接收端对所述即时消息的操作权限为禁止复制。Specifically, if the assignment of the first function field is the first preset value, the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if the assignment of the first function field is the second preset value, Then, the operation permission of the instant messaging receiving end to the instant message is prohibition of copying.
具体在本实施例中,举例说明:在即时消息中植入的第一功能字段为XX-CanNotXX,如果XX-CanNotXX值为0(当然还可以为其他值,例如:00、10等等),则即时通信接收端对即时消息的操作权限为禁止转发,则即时通信接收端针对即时消息不提供转发的操作权限,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第一预设值(例如:0、00、10等等);如果XX-CanNotXX值为1(当然还可以为其他值,例如:01、11等等),则即时通信接收端对所述即时消息的操作权限为禁止复制,从而即时通信接收端针对即时消息不提供复制的操作功能,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第二预设值(例如:1、01、11等等);如果XX-CanNotXX值为0/1(当然还可以为其他值,例如:00/01、10/11等等),则即时通信接收端对即时消息的操作权限为禁止复制和禁止转发,从而即时通信接收端针对即时消息不提供转发、复制的操作功能。Specifically, in this embodiment, the first functional field implanted in the instant message is XX-CanNotXX, and if the XX-CanNotXX value is 0 (of course, other values, for example, 00, 10, etc.), The operation permission of the instant communication receiving end to the instant message is prohibitive forwarding, and the instant communication receiving end does not provide the forwarding operation right for the instant message. At this time, the first preset content in the first extended information is the first function field is given First preset value (for example: 0, 00, 10, etc.); if the XX-CanNotXX value is 1 (of course, other values, such as 01, 11, etc.), the instant messaging receiver The operation permission of the instant message is that the copying is prohibited, so that the instant communication receiving end does not provide the copying operation function for the instant message, and the first preset content in the first extended information is the second preset value that the first function field is given. (Example: 1, 01, 11, etc.); if the XX-CanNotXX value is 0/1 (of course, other values, such as 00/01, 10/11, etc.), the instant messaging receiver is on the instant message. The operation permission is to prohibit copying and prohibit forwarding, from The instant messaging receiver does not provide forwarding and copying operations for instant messaging.
作为另一种可选的实施例,即时通信发送端为即时消息添加第一扩展信息,具体步骤包括:即时通信发送端为即时消息添加第一功能标记,基于即时通信接收端所接收到的即时消息中是否存在第一功能标记,即时通信接收端对即时消息的操作权限不同。As another optional embodiment, the instant messaging sender adds the first extended information to the instant message, and the specific steps include: the instant messaging sender adds the first function tag to the instant message, based on the instant received by the instant messaging receiver. Whether the first function tag exists in the message, and the instant messaging receiver has different operation rights to the instant message.
具体在本实施例中,举例说明:即时通信发送端为即时消息添加第一功能标记,第一功能标记例如为XX-CanNotFW、XX-CanNotCO(当然也可以为其他功能标识)等等,进而即时通信接收端在接收到即时消息之后,可以判断即时消息中是否包含第一功能标记,进而确定对即时消息的操作权限。 Specifically, in this embodiment, the instant messaging sender adds a first function tag to the instant message, and the first function tag is, for example, XX-CanNotFW, XX-CanNotCO (of course, may also be other function identifiers), and the like. After receiving the instant message, the communication receiving end may determine whether the first function tag is included in the instant message, thereby determining the operation authority for the instant message.
进一步的,依据在即时消息中是否存在具体的第一功能标记,来控制即时通信接收端对即时消息的操作权限是禁止转发,和/或,禁止复制。Further, according to whether a specific first function tag exists in the instant message, the operation permission of the instant communication receiving end to the instant message is controlled to prohibit forwarding, and/or copying is prohibited.
具体在本实施例中,举例说明:可以针对转发权限和复制权限设置不同的第一功能字段,例如:即时通信发送端为即时消息添加的第一功能标记为:XX-CanNotFW,则即时通信接收端对即时消息的操作权限为禁止转发,且即时通信接收端不提供转发的操作功能;如果即时通信发送端为即时消息添加的第一功能标记为:XX-CanNotCO,则即时通信接收端对即时消息的操作权限为禁止复制,从而即时通信接收端不提供复制的操作功能;如果即时通信发送端为即时消息添加的第一功能标记为:XX-CanNotRE&CO,则即时通信接收端对即时消息的操作权限为禁止复制和禁止转发,从而即时通信接收端不提供转发、复制的操作功能。当然以上第一功能字段与操作权限的对应关系仅仅为举例,并不作为限制。在上述方案中,第一预设内容(或者第二预设内容)则为第一功能字段。Specifically, in this embodiment, for example, different first function fields may be set for forwarding rights and copy rights. For example, the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotFW, and the instant communication is received. The operation right of the instant message is forbidden to forward, and the instant communication receiving end does not provide the forwarding operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotCO, the instant communication receiving end is immediately The operation permission of the message is prohibition of copying, so that the instant messaging receiving end does not provide the copying operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotRE&CO, the instant messaging receiving end operates on the instant message The permission is to prohibit copying and prohibiting forwarding, so that the instant messaging receiving end does not provide the forwarding and copying operation functions. Of course, the correspondence between the first function field and the operation authority is merely an example and is not a limitation. In the above solution, the first preset content (or the second preset content) is the first function field.
由于在上述方案中,针对即时消息只需要赋予第一功能字段,就可以实现即时通信接收端对即时消息操作权限的控制,而不需要多次操作,故而降低了即时通信发送端的处理负担。In the above solution, only the first function field needs to be assigned to the instant message, so that the instant communication receiving end can control the operation authority of the instant message without multiple operations, thereby reducing the processing load of the instant messaging sender.
进一步的,如果即时通信接收端对即时消息的操作权限为禁止转发,则在即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,Further, if the operation permission of the instant communication receiving end to the instant message is prohibition of forwarding, the first prompt information for prompting the prohibition of forwarding is given at the instant communication receiving end; and/or,
如果即时通信接收端对即时消息的操作权限为禁止复制,则在即时通信接收端给出用于提示禁止复制的第二提示信息。If the operation permission of the instant communication receiving end to the instant message is prohibition of copying, the second prompt information for prompting the copy prohibition is given at the instant communication receiving end.
具体在本实施例中,举例说明:第一提示信息(或者第二提示信息)例如为:文字、图片、声音等等,即时通信接收端可以确定出即时通信接收端对即时消息的操作权限为禁止转发之后,直接在即时消息中添加第一提示信息(或者第二提示信息),进而即时通信接收端直接读取处理后的即时消息中的第一提示信息(或者第二提示信息)并输出该第一提示信息(或者第二提示信息);又或者,即时通信接收端仅仅为即时消息添加对应的第一扩展信息,即时通信 接收端在接收到处理后的即时消息之后,如果解析出对即时消息的操作权限为禁止转发,则产生第一提示信息并输出;如果解析出对即时消息的操作权限为禁止复制,则产生第二提示信息并输出等等。Specifically, in this embodiment, the first prompt information (or the second prompt information) is, for example, text, a picture, a voice, and the like, and the instant communication receiving end can determine that the instant communication receiving end operates the instant message as After the forwarding is prohibited, the first prompt information (or the second prompt information) is directly added to the instant message, and the instant communication receiving end directly reads the first prompt information (or the second prompt information) in the processed instant message and outputs the first prompt information (or the second prompt information). The first prompt information (or the second prompt information); or, the instant communication receiving end only adds the corresponding first extended information to the instant message, and the instant communication After receiving the processed instant message, the receiving end generates the first prompt information and outputs if the operation permission for the instant message is parsed, and generates the first prompt information if the operation permission for the instant message is parsed. Two prompt information and output and so on.
即时通信接收端可以以弹出提示窗口的形式输出第一提示信息(或者第二提示信息),也可采取其它提示方式,具体显示方式本发明不做具体限制。The instant messaging receiving end may output the first prompting information (or the second prompting information) in the form of a pop-up prompting window, and may also adopt other prompting manners. The specific display manner is not specifically limited in the present invention.
由于在上述方案中,即时通信接收端针对对应的操作权限可以产生提示信息(第一提示信息或第二提示信息),故而能够防止即时通信接收端的用户产生无用的操作。In the above solution, the instant messaging receiving end can generate prompt information (first prompt information or second prompt information) for the corresponding operation authority, thereby preventing the user of the instant communication receiving end from generating useless operations.
作为另一种可选的实施例,即时通信发送端为即时消息添加第一扩展信息,从而获得处理后的即时消息,具体包括:As another optional embodiment, the instant messaging sender adds the first extended information to the instant message, so as to obtain the processed instant message, which specifically includes:
即时通信发送端将所述即时消息打包成新的消息;即时通信发送端为所述新的消息添加所述第一扩展信息,进而获得处理后的所述即时消息。具体的,新的消息为通过加密打包方式生成的消息,所使用的加密算法包括:数据加密算法DES、三重数据加密算法TDEA、分组密码算法RC5及国际数据加密算法IDEA等。The instant messaging sender packetizes the instant message into a new message; the instant messaging sender adds the first extension information to the new message, and further obtains the processed instant message. Specifically, the new message is a message generated by the encryption and packing method, and the encryption algorithm used includes: a data encryption algorithm DES, a triple data encryption algorithm TDEA, a block cipher algorithm RC5, and an international data encryption algorithm IDEA.
作为一种可选的实施例,打包后的新消息中包括消息内容、加密密钥及即时通信接收端的标识信息;即时通信接收端的标识信息包括所述即时通信接收端的用户名信息或物理地址信息。即时通信发送端将打包后的新消息发送到即时通信接收端后,即时通信接收端要对加密消息进行解析,解析方法为:如果即时通信接收端的标识信息与即时通信发送端发送的即时通信接收端的标识信息匹配度为1,则即时通信接收端可以获得加密密钥,即时通信接收端可以利用加密密钥解析加密打包方式生成的消息的原始内容;如果即时通信接收端的标识信息与即时通信发送端发送的即时通信接收端的标识信息匹配度不为1,则即时通信接收端无法获得加密密钥,也无法解析加密打包方式生成的消息的原始内容,那么就无法正常阅读加密消息。As an optional embodiment, the packaged new message includes the message content, the encryption key, and the identifier information of the instant messaging receiving end; the identifier information of the instant messaging receiving end includes the username information or the physical address information of the instant messaging receiving end. . After the instant communication sender sends the packaged new message to the instant communication receiving end, the instant communication receiving end parses the encrypted message, and the parsing method is: if the instant communication receiving end identification information and the instant communication sending end send the instant communication receiving The matching information of the identification information of the terminal is 1, the instant communication receiving end can obtain the encryption key, and the instant communication receiving end can use the encryption key to parse the original content of the message generated by the encryption and packaging mode; if the identification information of the instant communication receiving end is sent by instant communication The matching degree of the identity information of the instant messaging receiving end sent by the terminal is not 1, and the instant messaging receiving end cannot obtain the encryption key, and cannot parse the original content of the message generated by the encrypted packing mode, and then the encrypted message cannot be read normally.
同时,即时通信接收端会提供第三提示信息,第三提示信息用于提示接收 方该消息为加密消息。具体在本实施例中,可以通过弹出窗口产生以下第三提示信息“该消息为加密消息”,当然,对于第三提示信息的具体显示方式本发明不做具体限制。At the same time, the instant messaging receiver will provide a third prompt message, and the third prompt message is used to prompt the recipient. The message is an encrypted message. Specifically, in this embodiment, the following third prompt information “the message is an encrypted message” may be generated through a pop-up window. Of course, the specific display manner of the third prompt information is not specifically limited in the present invention.
进一步的,S102步骤中,处理后的即时消息中还包括:第二扩展信息,所述第二扩展信息用于控制所述即时消息的失效时间。Further, in the step S102, the processed instant message further includes: second extension information, where the second extension information is used to control an expiration time of the instant message.
具体在本实施例中,举例说明:第二扩展信息可以添加于即时消息的消息头、消息体等区域。Specifically, in this embodiment, the second extended information may be added to the message header, the message body, and the like of the instant message.
通过上述方案,能够对即时消息的失效时间进行有效控制,从而进一步的提高即时消息传播的安全性。Through the above solution, the invalidation time of the instant message can be effectively controlled, thereby further improving the security of instant message propagation.
作为一种可选实施例,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效。例如,在具体实施例中,所述第二功能字段为XX-LoseEfficacy,设值为:Tue,10Feb 2015 15:36:57+0800,这表示即时消息的失效时间为2015年2月10日15:36:57,如果当前查看消息的时间已经超出了所述的失效时间2015年2月10日15:36:57,那么即时消息将失效,将无法正常查看。否则,如果第二功能字段的值为空,则代表即时消息不受失效时间控制,所述即时消息可以被无限期的查看。In an optional embodiment, the second extended information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point; If the value of the two-function field does not include the point in time, the instant message will not expire. For example, in a specific embodiment, the second function field is XX-LoseEfficacy, and the value is: Tue, 10Feb 2015 15:36:57+0800, which means that the expiration time of the instant message is February 10, 2015. :36:57, if the current time to view the message has exceeded the expiration time of 15:36:57 on February 10, 2015, the instant message will be invalid and will not be viewed properly. Otherwise, if the value of the second function field is empty, it means that the instant message is not controlled by the expiration time, and the instant message can be viewed indefinitely.
作为另一种可选实施例,所述第二扩展信息为第二功能标记,若所述即时通信接收端所获得即时消息中包含所述第二功能标记,则所述即时消息在预设时间段之后失效;若所述即时通信接收端所获得的即时消息中不包含所述第二功能标记,则所述即时消息不会失效。其中,所述预设时间段可以由用户在发送即时消息时手动设置,也可以由系统自动设置生成,如系统设置为即时消息发送时间开始的2个月后为失效时间,这里的预设时间的具体实现形式不做限制。例如,在具体实施例中,若在即时消息中添加第二功能标记为XX-LoseEfficacy,且系统设置的失效时间为发送时间开始1个月后,而发送时间为2016年1月1日10点1分,那么到2016年2月1日10点1分就为即时 消息的失效时间点,若当前查看时间已超过该失效时间,那么即时消息就已经失效,将不能再被查看。In another optional embodiment, the second extended information is a second function tag, and if the instant message obtained by the instant messaging receiver includes the second function tag, the instant message is at a preset time. After the segment expires; if the instant message obtained by the instant messaging receiver does not include the second function tag, the instant message does not expire. The preset time period may be manually set by the user when sending an instant message, or may be automatically set by the system, for example, the system is set to the expiration time after 2 months from the start of the instant message sending time, where the preset time is The specific implementation form is not limited. For example, in a specific embodiment, if the second function is added to the instant message as XX-LoseEfficacy, and the system sets the expiration time to be 1 month after the start of the transmission time, and the sending time is 10:00 on January 1, 2016. 1 point, then it will be instant until 10:1 on February 1, 2016. At the expiration point of the message, if the current viewing time has exceeded the expiration time, the instant message has expired and will no longer be viewed.
通过上述方案,可以针对即时消息批量设置失效时间,由此提高了对失效时间设置的效率。Through the above scheme, the expiration time can be set in batches for the instant message, thereby improving the efficiency of the failure time setting.
接下来执行S103步骤,所述即时通信发送端将所述处理后的所述即时消息发送至即时通信接收端,以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。具体的,即时通信发送端将处理后的即时消息,即添加了第一扩展信息的即时消息发送到即时通信接收端后,即时通信接收端基于第一扩展信息的具体情况来实现对即时消息的操作权限的控制,具体实现方法将在后面内容中详细描述。Next, the step S103 is performed, the instant messaging sending end sends the processed instant message to the instant messaging receiving end, so that the instant messaging receiving end implements the instant message based on the first extended information. Control of operational permissions. Specifically, after the instant messaging terminal sends the processed instant message, that is, the instant message to which the first extended information is added, to the instant messaging receiving end, the instant messaging receiving end implements the instant message based on the specific situation of the first extended information. The control of the operation authority, the specific implementation method will be described in detail later.
实施例二Embodiment 2
请参考图2,根据本发明的另一个方面,还提供了一种即时通信控制方法,包括:Referring to FIG. 2, according to another aspect of the present invention, an instant communication control method is further provided, including:
S201:即时通信接收端接收即时通信发送端发送的消息;S201: The instant messaging receiving end receives the message sent by the instant messaging sender;
S202:所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息;S202: The instant messaging receiving end reads the first extended information added by the instant messaging sending end in the message;
S203:所述即时通信接收端根据所述第一扩展信息实现对所述消息的操作权限的控制。S203: The instant messaging receiving end controls the operation authority of the message according to the first extended information.
下面,结合图2详细介绍本即时通信控制方法的具体实现步骤:The specific implementation steps of the instant messaging control method are described in detail below with reference to FIG. 2:
步骤S201,即时通信接收端接收即时通信发送端发送的消息;其中即时消息的内容可包含文本、图片、声音、视频等。Step S201: The instant messaging receiving end receives the message sent by the instant messaging sender; wherein the content of the instant message may include text, a picture, a voice, a video, and the like.
然后执行步骤S202,所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息;其中,在本申请实施例中,即时通信接收端读取所述即时消息中由所述即时通信发送端添加的第一扩展信息用于控制即时通信接收端对即时消息进行转发和/或复制的操作权限,例如:通过第一扩展信息控制即时通信接收端对即时消息禁止转发、禁止复制、禁止转发且禁止复制等 等。需要说明的是,第一扩展信息还可用于限制即时通信接收端对接收消息进行收藏等日常即时通信客户端可见的操作权限,本发明中不做限制。Then, in step S202, the instant communication receiving end reads the first extended information added by the instant messaging sending end in the message; wherein, in the embodiment of the present application, the instant messaging receiving end reads the instant message The first extended information added by the instant messaging sending end is used to control the operation permission of the instant messaging receiving end to forward and/or copy the instant message, for example, controlling the instant messaging receiving end to prohibit the instant message by using the first extended information Forward, prohibit copying, prohibit forwarding, copy prohibition, etc. Wait. It should be noted that the first extended information may also be used to limit the operation permission that the instant communication receiving end has visible to the daily instant communication client, such as collecting the received message, which is not limited in the present invention.
作为一种可选的实施例,如果所述第一扩展信息中包含第一预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止转发;和/或,如果所述第一扩展信息中包含第二预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止复制。As an optional embodiment, if the first extension information includes the first preset content, the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if The first extension information includes the second preset content, and the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
其中,第一扩展信息可以包含多种扩展信息,例如:第一功能字段、第一功能标记等等,基于第一扩展信息不同导致第一预设内容(或者第二预设内容)也不同,对于第一预设内容(或者第二预设内容)为何种内容将在后续进行介绍。即时通信接收端在接收到处理后的即时消息之后,可以判断即时消息中是否包含第一扩展信息,如果包含第一扩展信息的话,则可以基于第一扩展信息是否对即时消息的操作权限的控制。The first extended information may include a plurality of extended information, for example, a first function field, a first function tag, and the like, and the first preset content (or the second preset content) is different according to the first extended information. What content is for the first preset content (or the second preset content) will be introduced later. After receiving the processed instant message, the instant messaging receiving end may determine whether the first extended information is included in the instant message, and if the first extended information is included, may control whether the first extended information controls the operating right of the instant message. .
作为一种可选的实施例,即时通信接收端读取所述即时通信发送端为即时消息添加第一扩展信息为即时通信发送端在即时消息中植入的第一功能字段;第一功能字段由即时通信发送端赋值,其中,第一功能字段被赋予的值不同,即时通信接收端对即时消息的操作权限就会不同。As an optional embodiment, the instant messaging receiving end reads the first extended field that the instant messaging sending end adds the first extended information to the instant messaging for the instant messaging sending end to be embedded in the instant message; the first functional field The instant messaging sender assigns a value, wherein the first function field is assigned a different value, and the instant messaging receiver has different operating rights for the instant message.
具体的,如果第一功能字段的赋值为第一预设值,则即时通信接收端对即时消息的操作权限为禁止转发;和/或,如果第一功能字段的赋值为第二预设值,则即时通信接收端对所述即时消息的操作权限为禁止复制。Specifically, if the assignment of the first function field is the first preset value, the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or, if the assignment of the first function field is the second preset value, Then, the operation permission of the instant messaging receiving end to the instant message is prohibition of copying.
具体在本实施例中,举例说明:在即时消息中植入的第一功能字段为XX-CanNotXX,如果XX-CanNotXX值为0(当然还可以为其他值,例如:00、10等等),则即时通信接收端对即时消息的操作权限为禁止转发,则即时通信接收端针对即时消息不提供转发的操作权限,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第一预设值(例如:0、00、10等等);如果XX-CanNotXX值为1(当然还可以为其他值,例如:01、11等等),则即时通信接收端对所述即时消息的操作权限为禁止复制,从而即时通信接收端针对即 时消息不提供复制的操作功能,此时第一扩展信息中的第一预设内容为第一功能字段被赋予的第二预设值(例如:1、01、11等等);如果XX-CanNotXX值为0/1(当然还可以为其他值,例如:00/01、10/11等等),则即时通信接收端对即时消息的操作权限为禁止复制和禁止转发,从而即时通信接收端针对即时消息不提供转发、复制的操作功能。Specifically, in this embodiment, the first functional field implanted in the instant message is XX-CanNotXX, and if the XX-CanNotXX value is 0 (of course, other values, for example, 00, 10, etc.), The operation permission of the instant communication receiving end to the instant message is prohibitive forwarding, and the instant communication receiving end does not provide the forwarding operation right for the instant message. At this time, the first preset content in the first extended information is the first function field is given First preset value (for example: 0, 00, 10, etc.); if the XX-CanNotXX value is 1 (of course, other values, such as 01, 11, etc.), the instant messaging receiver The operation permission of the instant message is prohibition of copying, so that the instant communication receiving end is targeted The message does not provide the copied operation function. The first preset content in the first extended information is the second preset value (eg, 1, 01, 11, etc.) to which the first function field is assigned; if XX- The value of CanNotXX is 0/1 (of course, it can also be other values, for example, 00/01, 10/11, etc.), then the operation permission of the instant messaging receiver to the instant message is prohibition of copying and prohibition of forwarding, so that the instant communication receiving end The operation function of forwarding and copying is not provided for instant messaging.
作为另一种可选的实施例,即时通信接收端读取即时通信发送端为即时消息添加的第一扩展信息为即时通信发送端为即时消息添加第一功能标记,基于即时通信接收端所接收到的即时消息中是否存在第一功能标记,即时通信接收端对即时消息的操作权限不同。As another optional embodiment, the instant communication receiving end reads the first extended information added by the instant messaging sending end to the instant message, and the instant communication sending end adds the first function flag to the instant message, and is received by the instant messaging receiving end. Whether the first function tag exists in the incoming instant message, and the instant communication receiving end has different operation rights to the instant message.
具体在本实施例中,举例说明:即时通信发送端为即时消息添加第一功能标记例如为XX-CanNotFW、XX-CanNotCO(当然也可以为其他功能标识)等等,进而即时通信接收端在接收到即时消息之后,可以判断即时消息中是否包含第一功能标记,进而确定对即时消息的操作权限。Specifically, in this embodiment, the instant messaging sender adds a first function identifier to the instant message, for example, XX-CanNotFW, XX-CanNotCO (of course, may also be other function identifiers), and the like, and the instant communication receiving end is receiving. After the instant message, it can be determined whether the first function tag is included in the instant message, thereby determining the operation authority for the instant message.
进一步的,依据在即时消息中是否存在具体的第一功能标记,来控制即时通信接收端对即时消息的操作权限是禁止转发,和/或,禁止复制。Further, according to whether a specific first function tag exists in the instant message, the operation permission of the instant communication receiving end to the instant message is controlled to prohibit forwarding, and/or copying is prohibited.
具体在本实施例中,举例说明:可以针对转发权限和复制权限设置不同的第一功能字段,例如:即时通信发送端为即时消息添加的第一功能标记为:XX-CanNotFW,则即时通信接收端对即时消息的操作权限为禁止转发,且即时通信接收端不提供转发的操作功能;如果即时通信发送端为即时消息添加的第一功能标记为:XX-CanNotCO,则即时通信接收端对即时消息的操作权限为禁止复制,从而即时通信接收端不提供复制的操作功能;如果即时通信发送端为即时消息添加的第一功能标记为:XX-CanNotCO&FW,则即时通信接收端对即时消息的操作权限为禁止复制和禁止转发,从而即时通信接收端不提供转发、复制的操作功能。当然以上第一功能字段与操作权限的对应关系仅仅为举例,并不作为限制。在上述方案中,第一预设内容(或者第二预设内容)则为第一功能字段。 Specifically, in this embodiment, for example, different first function fields may be set for forwarding rights and copy rights. For example, the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotFW, and the instant communication is received. The operation right of the instant message is forbidden to forward, and the instant communication receiving end does not provide the forwarding operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotCO, the instant communication receiving end is immediately The operation permission of the message is prohibition of copying, so that the instant messaging receiving end does not provide the copying operation function; if the first function added by the instant messaging sender to the instant message is marked as: XX-CanNotCO&FW, the instant messaging receiving end operates on the instant message The permission is to prohibit copying and prohibiting forwarding, so that the instant messaging receiving end does not provide the forwarding and copying operation functions. Of course, the correspondence between the first function field and the operation authority is merely an example and is not a limitation. In the above solution, the first preset content (or the second preset content) is the first function field.
由于在上述方案中,针对即时消息只需要赋予第一功能字段,就可以实现即时通信接收端对即时消息操作权限的控制,而不需要多次操作,故而降低了即时通信发送端的处理负担。In the above solution, only the first function field needs to be assigned to the instant message, so that the instant communication receiving end can control the operation authority of the instant message without multiple operations, thereby reducing the processing load of the instant messaging sender.
进一步的,如果即时通信接收端对即时消息的操作权限为禁止转发,则在即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,Further, if the operation permission of the instant communication receiving end to the instant message is prohibition of forwarding, the first prompt information for prompting the prohibition of forwarding is given at the instant communication receiving end; and/or,
如果即时通信接收端对即时消息的操作权限为禁止复制,则在即时通信接收端给出用于提示禁止复制的第二提示信息。If the operation permission of the instant communication receiving end to the instant message is prohibition of copying, the second prompt information for prompting the copy prohibition is given at the instant communication receiving end.
具体在本实施例中,举例说明:第一提示信息(或者第二提示信息)例如为:文字、图片、声音等等,即时通信接收端可以确定出即时通信接收端对即时消息的操作权限为禁止转发之后,直接在即时消息中添加第一提示信息(或者第二提示信息),进而即时通信接收端直接读取处理后的即时通信中的第一提示信息(或者第二提示信息)并输出该第一提示信息(或者第二提示信息);又或者,即时通信接收端仅仅为即时消息添加对应的第一扩展信息,即时通信接收端在接收到处理后的即时消息之后,如果解析出对即时消息的操作权限为禁止转发,则产生第一提示信息并输出;如果解析出对即时消息的操作权限为禁止复制,则产生第二提示信息并输出等等。Specifically, in this embodiment, the first prompt information (or the second prompt information) is, for example, text, a picture, a voice, and the like, and the instant communication receiving end can determine that the instant communication receiving end operates the instant message as After the forwarding is prohibited, the first prompt information (or the second prompt information) is directly added to the instant message, and the instant communication receiving end directly reads the first prompt information (or the second prompt information) in the processed instant communication and outputs the same. The first prompt information (or the second prompt information); or, the instant communication receiving end only adds the corresponding first extended information to the instant message, and the instant communication receiving end parses the pair after receiving the processed instant message If the operation permission of the instant message is prohibition of forwarding, the first prompt information is generated and output; if the operation permission for the instant message is resolved to prohibit copying, the second prompt information is generated and outputted.
即时通信接收端可以以弹出提示窗口的形式输出第一提示信息(或者第二提示信息),还可以采用其它提示方式,具体显示方式本发明不做具体限制。The instant messaging receiving end may output the first prompting information (or the second prompting information) in the form of a pop-up prompting window, and may also adopt other prompting manners. The specific display manner is not specifically limited in the present invention.
由于在上述方案中,即时通信接收端针对对应的操作权限可以产生提示信息(第一提示信息或第二提示信息),故而能够防止即时通信接收端的用户产生无用的操作。In the above solution, the instant messaging receiving end can generate prompt information (first prompt information or second prompt information) for the corresponding operation authority, thereby preventing the user of the instant communication receiving end from generating useless operations.
作为另一种可选的实施例,即时通信接收端读取的是即时通信发送端将即时消息打包成的新消息,以及即时通信发送端为所述新的消息添加的第一扩展信息。具体的,新的消息为通过加密打包方式生成的消息,所使用的加密算法包括:数据加密算法DES、三重数据加密算法TDEA、分组密码算法RC5及国际数据加密算法IDEA等。 As another optional embodiment, the instant messaging receiving end reads a new message that the instant messaging sender packs the instant message, and the first extended information that the instant messaging sender adds to the new message. Specifically, the new message is a message generated by the encryption and packing method, and the encryption algorithm used includes: a data encryption algorithm DES, a triple data encryption algorithm TDEA, a block cipher algorithm RC5, and an international data encryption algorithm IDEA.
作为一种可选的实施例,打包后的新消息中包括消息内容、加密密钥及即时通信接收端的标识信息;即时通信接收端的标识信息包括所述即时通信接收端的用户名信息或物理地址信息。即时通信接送端接收到打包后的新消息后,要先对加密消息进行解析,解析方法为:如果即时通信接收端的标识信息与即时通信发送端发送的即时通信接收端的标识信息匹配度为1,则即时通信接收端可以获得加密密钥,即时通信接收端可以利用加密密钥解析加密打包方式生成的消息的原始内容;如果即时通信接收端的标识信息与即时通信发送端发送的即时通信接收端的标识信息匹配度不为1,则即时通信接收端无法获得加密密钥,也无法解析加密打包方式生成的消息的原始内容,那么就无法正常阅读加密消息。As an optional embodiment, the packaged new message includes the message content, the encryption key, and the identifier information of the instant messaging receiving end; the identifier information of the instant messaging receiving end includes the username information or the physical address information of the instant messaging receiving end. . After receiving the packetized new message, the instant messaging terminal first parses the encrypted message, and the parsing method is: if the identifier information of the instant communication receiving end and the identification information of the instant communication receiving end sent by the instant communication sending end are 1, The instant communication receiving end can obtain the encryption key, and the instant communication receiving end can use the encryption key to parse the original content of the message generated by the encryption and packaging method; if the identification information of the instant communication receiving end and the identifier of the instant communication receiving end sent by the instant communication sending end If the information matching degree is not 1, the instant communication receiving end cannot obtain the encryption key, and the original content of the message generated by the encryption and packaging method cannot be parsed, and then the encrypted message cannot be read normally.
同时,即时通信接收端会提供第三提示信息,第三提示信息用于提示接收方该消息为加密消息。具体在本实施例中,可以通过弹出窗口产生以下第三提示信息“该消息为加密消息”,当然,对于第三提示信息的具体显示方式本发明不做具体限制。At the same time, the instant messaging receiving end provides a third prompting information, and the third prompting information is used to prompt the receiving party that the message is an encrypted message. Specifically, in this embodiment, the following third prompt information “the message is an encrypted message” may be generated through a pop-up window. Of course, the specific display manner of the third prompt information is not specifically limited in the present invention.
进一步的,S202步骤中,即时通信接收端从所述即时消息中读取信息还包括第二扩展信息,所述第二扩展信息用于控制所述即时消息的失效时间。Further, in step S202, the instant messaging receiving end reads information from the instant message further includes second extended information, where the second extended information is used to control an expiration time of the instant message.
具体在本实施例中,举例说明:第二扩展信息可以添加于即时消息的消息头、消息体等区域。Specifically, in this embodiment, the second extended information may be added to the message header, the message body, and the like of the instant message.
通过上述方案,能够对即时消息的失效时间进行有效控制,从而进一步的提高即时消息传播的安全性。Through the above solution, the invalidation time of the instant message can be effectively controlled, thereby further improving the security of instant message propagation.
作为一种可选实施例,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效。例如,在具体实施例中,所述第二功能字段为XX-LoseEfficacy,设值为:Tue,10Feb 2015 15:36:57+0800,这表示即时消息的失效时间为2015年2月10日15:36:57,如果当前查看消息的时间已经超出了所述的失效时间2015年2月10日15:36:57,那么 即时消息将失效,将无法正常查看。否则,如果第二功能字段的值为空,则代表即时消息不受失效时间控制,所述即时消息可以被无限期的查看。In an optional embodiment, the second extended information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point; If the value of the two-function field does not include the point in time, the instant message will not expire. For example, in a specific embodiment, the second function field is XX-LoseEfficacy, and the value is: Tue, 10Feb 2015 15:36:57+0800, which means that the expiration time of the instant message is February 10, 2015. :36:57, if the current time to view the message has exceeded the expiration time described on February 10, 2015 at 15:36:57, then The instant message will be invalid and will not be viewed properly. Otherwise, if the value of the second function field is empty, it means that the instant message is not controlled by the expiration time, and the instant message can be viewed indefinitely.
作为另一种可选实施例,所述第二扩展信息为第二功能标记,若所述即时通信接收端所获得即时消息中包含所述第二功能标记,则所述即时消息在预设时间段之后失效;若所述即时通信接收端所获得的即时消息中不包含所述第二功能标记,则所述即时消息不会失效。其中,所述预设时间段可以由用户在发送即时消息时手动设置,也可以由系统自动设置生成,如系统设置为即时消息发送时间开始的2个月后为失效时间,这里的预设时间的具体实现形式不做限制。例如,在具体实施例中,若在即时消息中添加第二功能标记为XX-LoseEfficacy,且系统设置的失效时间为发送时间开始1个月后,而发送时间为2016年1月1日10点1分,那么到2016年2月1日10点1分就为即时消息的失效时间点,若当前查看时间已超过该失效时间,那么即时消息就已经失效,将不能再被查看。In another optional embodiment, the second extended information is a second function tag, and if the instant message obtained by the instant messaging receiver includes the second function tag, the instant message is at a preset time. After the segment expires; if the instant message obtained by the instant messaging receiver does not include the second function tag, the instant message does not expire. The preset time period may be manually set by the user when sending an instant message, or may be automatically set by the system, for example, the system is set to the expiration time after 2 months from the start of the instant message sending time, where the preset time is The specific implementation form is not limited. For example, in a specific embodiment, if the second function is added to the instant message as XX-LoseEfficacy, and the system sets the expiration time to be 1 month after the start of the transmission time, and the sending time is 10:00 on January 1, 2016. 1 point, then 10:1 on February 1, 2016 is the expiration time point of the instant message. If the current viewing time has exceeded the expiration time, the instant message has expired and will no longer be viewed.
通过上述方案,可以针对即时消息批量设置失效时间,由此提高了对失效时间设置的效率。Through the above scheme, the expiration time can be set in batches for the instant message, thereby improving the efficiency of the failure time setting.
接下来执行步骤S203,所述即时通信接收端根据所述第一扩展信息实现对所述即时消息的操作权限的控制。Next, in step S203, the instant communication receiving end implements control of the operation authority of the instant message according to the first extended information.
具体的,即时通信接收端读取第一扩展信息后,即时通信接收端基于第一扩展信息的具体情况来实现对即时消息的操作权限的控制。Specifically, after the instant communication receiving end reads the first extended information, the instant communication receiving end controls the operation authority of the instant message based on the specific situation of the first extended information.
实施例三Embodiment 3
请参考图3,根据本发明的另一个方面,还提供了一种即时通信发送端,包括:Referring to FIG. 3, according to another aspect of the present invention, an instant messaging sender is further provided, including:
获取单元31:用于获得即时消息;The obtaining unit 31 is configured to obtain an instant message.
添加单元32:用于为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息;Adding unit 32: for adding first extended information to the instant message, thereby obtaining the processed instant message;
发送单元33:用于将所述处理后的所述即时消息发送至即时通信接收端, 以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。The sending unit 33 is configured to send the processed instant message to the instant messaging receiving end, And controlling, by the instant messaging receiving end, the operation authority of the instant message based on the first extended information.
可选的,所述添加单元,包括:Optionally, the adding unit includes:
植入模块321:用于在所述即时消息中植入第一功能字段;The implanting module 321 is configured to: implant a first function field in the instant message;
赋值模块322:用于为所述第一功能字段赋值,其中,所述第一功能字段被赋予的值不同,所述即时通信接收端对所述即时消息的操作权限不同。The assignment module 322 is configured to assign a value to the first function field, wherein the first function field is assigned a different value, and the instant communication receiving end has different operation rights to the instant message.
可选的,所述添加单元32,还包括:Optionally, the adding unit 32 further includes:
第一添加模块323:用于为所述即时消息添加第一功能标记,基于所述即时通信接收端所接收到的所述即时消息中是否存在所述第一功能标记,所述即时通信接收端对所述即时消息的操作权限不同。a first adding module 323, configured to add a first function tag to the instant message, and based on whether the first function tag exists in the instant message received by the instant messaging receiving end, the instant messaging receiving end The operation rights to the instant message are different.
可选的,所述第一扩展信息用于控制所述即时通信接收端对所述即时消息进行转发和/或复制的操作权限。Optionally, the first extended information is used to control an operation permission of the instant messaging receiving end to forward and/or copy the instant message.
可选的,如果所述第一扩展信息中包含第一预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止转发;和/或,Optionally, if the first extension information includes the first preset content, the operation permission of the instant messaging receiver to the instant message is prohibition of forwarding; and/or,
如果所述第一扩展信息中包含第二预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止复制。If the first extension information includes the second preset content, the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
可选的,如果所述即时通信接收端对所述即时消息的操作权限为禁止转发,则在即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,Optionally, if the operation permission of the instant messaging receiving end to the instant message is prohibitive forwarding, the first prompt information for prompting the prohibition of forwarding is given at the instant messaging receiving end; and/or,
如果所述即时通信接收端对所述即时消息的操作权限为禁止复制,则在所述即时通信接收端给出用于提示禁止复制的第二提示信息。And if the operation permission of the instant messaging receiving end to the instant message is prohibition of copying, the second prompting information for prompting for prohibiting copying is given at the instant messaging receiving end.
可选的,所述添加单元32,还包括:Optionally, the adding unit 32 further includes:
打包模块325:用于将所述即时消息打包成新的消息;a packaging module 325: configured to package the instant message into a new message;
第二添加模块324:用于为所述新的消息添加所述第一扩展信息,进而获得处理后的所述即时消息。The second adding module 324 is configured to add the first extended information to the new message, and obtain the processed instant message.
可选的,所述新的消息为通过加密打包方式生成的消息。Optionally, the new message is a message generated by an encryption and packaging method.
可选的,所述处理后的即时消息中还包括:第二扩展信息,所述第二扩展 信息用于控制所述即时消息的失效时间。Optionally, the processed instant message further includes: second extension information, the second extension The information is used to control the expiration time of the instant message.
可选的,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效;或者,Optionally, the second extended information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point; if the second function field is If the value does not include the time point, the instant message does not expire; or,
所述第二扩展信息为第二功能标记,若所述即时通信接收端所获得即时消息中包含所述第二功能标记,则所述即时消息在预设时间段之后失效;若所述接收端所获得的即时消息中不包含所述第二功能标记,则所述即时消息不会失效。The second extension information is a second function identifier. If the instant message obtained by the instant messaging receiver includes the second function identifier, the instant message expires after a preset time period; if the receiving end is If the obtained second message is not included in the obtained instant message, the instant message does not expire.
可选的,所述添加单元32,还用于:Optionally, the adding unit 32 is further configured to:
在所述即时消息的消息头植入所述第一扩展信息。The first extended information is implanted in a message header of the instant message.
实施例四Embodiment 4
请参考图4,根据本发明的另一个方面,还提供了一种即时通信接收端,包括:Referring to FIG. 4, according to another aspect of the present invention, an instant messaging receiving end is further provided, including:
接收单元41:用于接收发送端发送的即时消息;The receiving unit 41 is configured to receive an instant message sent by the sending end.
读取单元42:用于读取所述即时消息中由所述即时通信发送端添加的第一扩展信息;The reading unit 42 is configured to read the first extended information added by the instant messaging sending end in the instant message;
控制单元43:用于根据所述第一扩展信息实现对所述即时消息的操作权限的控制。The control unit 43 is configured to implement control of the operation authority of the instant message according to the first extended information.
可选的,所述读取单元41,包括:Optionally, the reading unit 41 includes:
第一读取模块421:用于读取所述即时消息中的第一功能字段的赋值;根据所述第一扩展信息实现对所述即时消息的操作权限的控制,包括:The first reading module 421 is configured to: read an assignment of the first function field in the instant message; and implement control on the operation authority of the instant message according to the first extension information, including:
基于第一功能字段的赋值不同,所述即时通信接收端对所述即时消息的操作权限不同。The instant messaging receiver has different operating rights to the instant message based on the assignment of the first function field.
可选的,所述读取单元,还包括:Optionally, the reading unit further includes:
第二读取模块422:用于读取所述即时消息中的第一功能标记;其中,根据所述第一功能标记是否存在来实现对所述即时消息不同的操作权限。 The second reading module 422 is configured to read a first function tag in the instant message, where different operating rights to the instant message are implemented according to whether the first function tag exists.
可选的,所述控制单元用于:Optionally, the control unit is configured to:
根据所述第一扩展信息实现对所述即时消息的转发和/或复制的操作权限的控制。Controlling the operation authority of forwarding and/or copying of the instant message is implemented according to the first extended information.
可选的,所述控制单元43用于:Optionally, the control unit 43 is configured to:
如果所述第一扩展信息中包含第一预设内容,对所述即时消息的操作权限为禁止转发;和/或,If the first extended content includes the first preset content, the operation permission for the instant message is prohibition of forwarding; and/or,
如果所述第一扩展信息中包含第二预设内容,对所述即时消息的操作权限为禁止复制。If the first extension information includes the second preset content, the operation authority for the instant message is prohibition of copying.
可选的,所述即时通信接收端还包括:信息提示单元,用于Optionally, the instant messaging receiving end further includes: an information prompting unit, configured to:
如果所述即时通信接收端对所述即时消息的操作权限为禁止转发,所述即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,If the operation permission of the instant messaging receiving end to the instant message is prohibitive forwarding, the instant messaging receiving end gives first prompt information for prompting to prohibit forwarding; and/or,
如果所述即时通信接收端对所述即时消息的操作权限为禁止复制,所述即时通信接收端给出用于提示禁止复制的第二提示信息。And if the operation permission of the instant communication receiving end to the instant message is prohibition of copying, the instant communication receiving end gives second prompt information for prompting to prohibit copying.
可选的,所述即时消息为所述即时通信发送端通过加密打包生成的消息。Optionally, the instant message is a message generated by the instant messaging sender by encrypting and packaging.
可选的,所述读取单元还包括:Optionally, the reading unit further includes:
第三读取模块423:用于从所述即时消息中读取第二扩展信息;所述控制单元还用于,基于所述第二扩展信息对所述即时消息的失效时间进行控制。The third reading module 423 is configured to: read the second extended information from the instant message; and the control unit is further configured to control, according to the second extended information, a dead time of the instant message.
可选的,基于所述第二扩展信息对所述即时消息的失效时间进行控制,包括:Optionally, controlling the expiration time of the instant message based on the second extended information, including:
若所述第二扩展信息为第二功能字段,且所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若读取到的所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效;或者,If the second extended information is a second functional field, and the value of the second functional field includes a time point, the instant message expires after the time point; if the read second function field The value does not include the point in time, then the instant message does not expire; or,
若所述第二扩展信息为第二功能标记,则所述即时消息在预设时间段之后失效;若所述即时消息中不包含所述第二功能标记,则所述即时消息不会失效。If the second extended information is a second function tag, the instant message expires after a preset time period; if the second function tag is not included in the instant message, the instant message does not expire.
可选的,所述读取单元还用于:从所述即时消息的消息头读取所述第一扩展信息。 Optionally, the reading unit is further configured to: read the first extended information from a message header of the instant message.
图5示出了可以实现根据本发明的即时通信方法的即时通信发送端或即时通信控制方法的即时通信接收端(下述将即时通信发送端或即时通信接收端统称为设备)。该设备传统上包括处理器1010和以存储器1020形式的计算机程序产品或者计算机可读介质。存储器1020可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器1020具有用于执行上述方法中的任何方法步骤的程序代码1031的存储空间1030。例如,用于程序代码的存储空间1030可以包括分别用于实现上面的方法中的各种步骤的各个程序代码1031。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图6所述的便携式或者固定存储单元。该存储单元可以具有与图5中的存储器1020类似布置的存储段或者存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括用于执行根据本发明的方法步骤的程序代码1031’,即可以由例如诸如1010之类的处理器读取的代码,这些代码当由设备运行时,导致该设备执行上面所描述的方法中的各个步骤。Fig. 5 shows an instant communication receiving end (hereinafter referred to as an instant communication transmitting end or an instant communication receiving end collectively referred to as a device) of an instant communication transmitting end or an instant communication control method which can implement the instant messaging method according to the present invention. The device conventionally includes a processor 1010 and a computer program product or computer readable medium in the form of a memory 1020. The memory 1020 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. The memory 1020 has a memory space 1030 for executing program code 1031 of any of the above method steps. For example, storage space 1030 for program code may include various program code 1031 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such computer program products are typically portable or fixed storage units as described with reference to FIG. The storage unit may have a storage section or a storage space or the like arranged similarly to the storage 1020 in FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit comprises program code 1031' for performing the steps of the method according to the invention, ie code that can be read by, for example, a processor such as 1010, which when executed by the device causes the device to perform the above Each step in the described method.
实施例五Embodiment 5
请参考图7,本申请实施例提供的一种即时通信发送的方法,该方法包括以下步骤:Referring to FIG. 7, a method for instant messaging transmission provided by an embodiment of the present application includes the following steps:
S51:获得待发送即时消息的时间密钥,所述时间密钥用于限制所述待发送即时消息可被查看的时间期限;S51: Obtain a time key of an instant message to be sent, where the time key is used to limit a time limit during which the instant message to be sent can be viewed;
S52:根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息;S52: Encrypt the to-be-sent instant message according to the time key to generate an encrypted message.
S52:发送所述加密消息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。S52: Send the encrypted message to the receiver, send the time key to the server, and control, by the server, whether the receiver can view the encrypted message according to the time key.
需要说明的是,在具体实施过程中,本申请提供的上述即时通信消息发送方法可应用各种即时通信客户端,如常用的QQ、微信或者微博等,该方法应 用广泛,操作方便。It should be noted that, in the specific implementation process, the foregoing instant messaging message sending method provided by the present application may be applied to various instant messaging clients, such as commonly used QQ, WeChat or Weibo, etc. Wide range and easy to operate.
下面,结合图7详细介绍本即时通信消息发送方法的具体实现步骤:The specific implementation steps of the instant messaging message sending method are described in detail below with reference to FIG. 7:
步骤S51,获得待发送即时消息的时间密钥,所述时间密钥用于限制所述待发送即时消息可被查看的时间期限。Step S51: Obtain a time key of an instant message to be sent, where the time key is used to limit a time limit during which the instant message to be sent can be viewed.
具体包括:Specifically include:
S511:获得待发送即时消息的失效时间,所述失效时间为所述即时消息发送后过期失效的时间;S511: Obtain an expiration time of an instant message to be sent, where the expiration time is an expiration time after the instant message is sent;
S512:根据所述失效时间得到时间密钥;S512: Obtain a time key according to the expiration time;
其中步骤S511,获得待发送即时消息的失效时间,所述失效时间的生成可以采用以下方式:Step S511, obtaining an expiration time of the instant message to be sent, where the expiration time can be generated in the following manner:
第一种方式:失效时间由发件人设定。The first way: the expiration time is set by the sender.
具体方法为:即时通信发送端为发信人在编辑新消息发送前,设定有输入失效时间指令的入口,比如,发件人可以通过这个入口手动录入或者手动选择失效时间,比如手动录入或选择的时间为“2016-8-1 11:30”,则即时消息的失效时间为“2016-8-1 11:30”。The specific method is: the instant messaging sender sets the entry of the input invalidation time command before the sender sends the new message, for example, the sender can manually enter or manually select the expiration time through the portal, such as manual entry or selection. The time is “2016-8-1 11:30”, and the expiration time of the instant message is “2016-8-1 11:30”.
第二种方式:失效时间由即时通信发送端系统自动生成。The second way: the expiration time is automatically generated by the instant messaging sender system.
具体方法为,所述失效时间是由即时通信发送端的发送消息的时间加上一个固定的期限自动生成,比如说,发送消息的时间为“2016-8-1 11:30”,固定的期限为30天,那么所述失效时间为“2016-8-31 11:30”。所述固定期限的设定为即时通信系统开发时的功能集成。关于失效时间的生成方式,本发明不做限制。The specific method is that the expiration time is automatically generated by the time when the instant messaging sender sends the message plus a fixed period. For example, the time for sending the message is “2016-8-1 11:30”, and the fixed period is 30 days, then the expiration time is "2016-8-31 11:30". The setting of the fixed term is a function integration at the time of development of the instant messaging system. Regarding the manner in which the failure time is generated, the present invention is not limited.
步骤S512:根据所述失效时间得到时间密钥。Step S512: Obtain a time key according to the expiration time.
具体的时间密钥可以为利用标识密码算法计算得到的时间公钥ID,至少有以下两种方法:The specific time key may be a time public key ID calculated by using an identification cryptographic algorithm, and at least the following two methods are:
第一种方法:可以使用对称加密的方法对原始消息数据加密,对称加密算法的原理是:数据发信方将明文(原始数据)和加密密钥一起经过加密算法处理 后,使其变成复杂的加密密文发送出去。接收方收到密文后,若想解读原始数据,则需要使用加密用过的密钥及相同加密算法的逆算法对密文进行解密,才能使其恢复成可读明文。在对称加密算法中,使用的密钥只有一个,发收双方都使用这个密钥对数据进行加密和解密,对称加密算法的优点在于加解密的高速度和使用长密钥时的难破解性。The first method: the original message data can be encrypted by using a symmetric encryption method. The principle of the symmetric encryption algorithm is that the data sender processes the plaintext (raw data) together with the encryption key through an encryption algorithm. After that, it becomes a complex encrypted ciphertext sent out. After receiving the ciphertext, if the receiver wants to interpret the original data, it needs to decrypt the ciphertext by using the encrypted key and the inverse algorithm of the same encryption algorithm, so that it can be restored to a readable plaintext. In the symmetric encryption algorithm, there is only one key used, and both the transmitting and receiving parties use this key to encrypt and decrypt the data. The advantages of the symmetric encryption algorithm are the high speed of encryption and decryption and the difficulty of using long keys.
第二种方法:时间密钥还可以用非对称加密算法得到,非对称加密算法需要两个密钥:公开密钥(publickey)和私有密钥(privatekey)。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。非对称密码体制的特点在于:加密解密速度较对称加密慢,但加密算法强度复杂、安全性高。The second method: the time key can also be obtained by an asymmetric encryption algorithm. The asymmetric encryption algorithm requires two keys: a public key (publickey) and a private key (privatekey). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt. The characteristic of the asymmetric cryptosystem is that the encryption and decryption speed is slower than the symmetric encryption, but the encryption algorithm has complex strength and high security.
步骤S52,根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息;Step S52: Encrypt the to-be-sent instant message according to the time key to generate an encrypted message.
步骤S52具体的可以采用方法一实现:用所述时间密钥对所述待发送即时消息进行加密生成所述加密消息;Step S52 may be implemented by using the first method: encrypting the to-be-sent instant message by using the time key to generate the encrypted message;
具体在本实施例中,此处可以采用对称加密的方法对原始消息数据加密,具体加密内容如下:Specifically, in this embodiment, the original message data may be encrypted by using a symmetric encryption method, and the specific encrypted content is as follows:
EncrpytBySym(即时消息数据密文)=fx_encryptBySym(ori(即时消息内容),ID(时间密钥)),ori为即时消息的所有内容,采用的是二进制数据格式,EncrpytBySym即为加密获得的消息数据密文,加密使用的加密强度为AES256。EncrpytBySym (instant message data ciphertext) = fx_encryptBySym (ori (instant message content), ID (time key)), ori is all content of instant message, using binary data format, EncrpytBySym is the message data density obtained by encryption The encryption strength used for encryption is AES256.
步骤S52也可以采用方法二实现:生成会话密钥,用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密生成所述加密消息;Step S52 may be implemented by using the method 2: generating a session key, and encrypting the to-be-sent instant message by using the combination of the time key and the session key to generate the encrypted message;
具体在本实施例中,举例说明,生成会话密钥的算法为根据随机数生成一段会话密钥,如SessionPassword=fx_randomSession(“1234567890”),SessionPassword=会话密钥,1234567890即为一个随机数,通过生成会话密钥的算法即生成一段会话密钥。然后,用所述会话密钥对待发送即时消息进行加 密,生成所述加密消息中的消息数据密文,具体方法是:Specifically, in this embodiment, the algorithm for generating a session key is to generate a session key according to a random number, such as SessionPassword=fx_randomSession ("1234567890"), SessionPassword=session key, and 1234567890 is a random number. The algorithm that generates the session key generates a session key. Then, using the session key to send an instant message to add The secret is generated, and the message data ciphertext in the encrypted message is generated, and the specific method is:
EncrpytBySym(消息数据密文)=fx_encryptBySym(ori(消息内容),SessionPassword,ID),EncrpytBySym即为用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密生成的消息数据密文。EncrpytBySym (message data ciphertext)=fx_encryptBySym (ori (message content), SessionPassword, ID), EncrpytBySym is a message generated by encrypting the to-be-sent instant message with the combination of the time key and the session key Data ciphertext.
接下来,用所述时间密钥对所述会话密钥进行加密,生成所述加密消息中的会话密钥密文;具体方法可以是:Next, the session key is encrypted by using the time key to generate a session key ciphertext in the encrypted message; the specific method may be:
会话密钥密文id1_encryptdata=fx_encryptByIBC(SessionPassword(会话密钥),ID(时间密钥)),此加密算法采用sm9加密算法,加密强度是RSA3072。Session key ciphertext id1_encryptdata=fx_encryptByIBC (SessionPassword, ID (time key)), this encryption algorithm uses sm9 encryption algorithm, the encryption strength is RSA3072.
进一步的,其中的加密消息具体可以是在发送前将由所述消息数据密文和会话密钥密文进行封装后生成的封装包;对消息数据密文和会话密钥密文进行P7格式封装,结合本实施例,具体封装为XXX即时消息系统格式如下:Further, the encrypted message may be an encapsulated packet generated by the message data ciphertext and the session key ciphertext before being sent; and the message data ciphertext and the session key ciphertext are encapsulated in a P7 format, In combination with the embodiment, the specific encapsulation format of the XXX instant messaging system is as follows:
P7Data=SEQUENCE{P7Data=SEQUENCE{
加密类型=XXXImEncryption type = XXXIm
加密算法=id-ibc-enc-kem-sok-esbdhEncryption algorithm = id-ibc-enc-kem-sok-esbdh
摘要类型=aes256Summary type=aes256
编码类型=dem-dem3,hmacSHAEncoding type = dem-dem3, hmacSHA
可解密时间信息={Decryptible time information = {
可解密时间标识=yyyymmddhhnnsszzzDecryptable time stamp = yyyymmddhhnnsszzz
域=360jiamiyou_olymDomain=360jiamiyou_olym
版本=1Version=1
会话密钥密文(id1_encryptdata)Session key ciphertext (id1_encryptdata)
}}
数据密文(EncryptBySym)Data ciphertext (EncryptBySym)
}}
上述工作完成后,就可以进行步骤S52:发送所述加密消息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。关于服务器如何根据所述时间密钥控制所述收件 方是否可查看所述加密消息的方法将在后面内容作详细描述。After the foregoing work is completed, step S52 may be performed: sending the encrypted message to the receiver, sending the time key to the server, and controlling, by the server, whether the receiver can view the encryption according to the time key. Message. How the server controls the receipt according to the time key The method of whether the party can view the encrypted message will be described in detail later.
实施例六Embodiment 6
请参考图8:本申请实施例提供的一种即时通信消息查看方法,应用于消息接收端,所述方法包括:Please refer to FIG. 8 : an instant messaging message viewing method provided by an embodiment of the present application is applied to a message receiving end, and the method includes:
S61:接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;S61: Receive an encrypted message that is encrypted according to a time key, where the time key is used to limit a time limit during which the encrypted message can be viewed;
S62:响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;S62: Respond to the viewing operation of viewing the encrypted message, generate and send a key request to the server, where the key request is used to obtain the time key of the encrypted message;
S63:接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥;S63: Receive feedback information that the server responds to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end, when the request time is The feedback information is information indicating that the encrypted message is invalid when the time range corresponding to the time key is exceeded, and the feedback information is the time when the request time is within a time range corresponding to the time key. Key
S64:解析所述反馈信息,根据解析结果响应所述查看操作;S64: Parse the feedback information, and respond to the viewing operation according to the parsing result;
所述根据解析结果响应所述查看操作,包括:The responding to the viewing operation according to the parsing result includes:
当解析结果为所述加密消息无效时,执行步骤S641:响应所述查看操作,提示用户所述加密消息已过期无法被查看;When the parsing result is invalid for the encrypted message, step S641 is performed: in response to the viewing operation, prompting the user that the encrypted message has expired and cannot be viewed;
当解析结果为所述时间密钥时,执行步骤S642:响应所述查看操作,根据所述时间密钥解密所述加密消息,获得消息数据并显示;When the parsing result is the time key, step S642 is performed: in response to the viewing operation, decrypting the encrypted message according to the time key, obtaining message data and displaying;
在执行步骤S642中,所述根据所述时间密钥解密所述加密消息,可以采用两种办法:In step S642, the decrypting the encrypted message according to the time key may be performed in two ways:
方法一:用所述时间密钥解密所述加密消息,得到消息数据;Method 1: decrypting the encrypted message with the time key to obtain message data;
或者方法二:解析所述加密消息的封装包得到所述加密消息中的会话密钥密文;用所述时间密钥解密所述会话密钥密文,得到会话密钥;用所述会话密钥解密所述加密消息中的消息数据密文,得到消息数据。Or method 2: parsing the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypting the session key ciphertext with the time key to obtain a session key; using the session secret The key decrypts the message data ciphertext in the encrypted message to obtain the message data.
下面,结合图8详细介绍本申请实施例中即时通信消息查看方法的具体实 现步骤:The specific implementation of the instant messaging message viewing method in the embodiment of the present application is described in detail below with reference to FIG. Now steps:
S61:接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;S61: Receive an encrypted message that is encrypted according to a time key, where the time key is used to limit a time limit during which the encrypted message can be viewed;
时间密钥可以为利用标识密码算法计算得到的时间公钥ID,至少有以下两种方法:The time key can be the time public key ID calculated by the identification cryptographic algorithm, and there are at least two methods:
第一种方法:可以使用对称加密的方法对原始消息数据加密,对称加密算法的原理是:数据发信方将明文(原始数据)和加密密钥一起经过加密算法处理后,使其变成复杂的加密密文发送出去。接收方收到密文后,若想解读原始数据,则需要使用加密用过的密钥及相同加密算法的逆算法对密文进行解密,才能使其恢复成可读明文。在对称加密算法中,使用的密钥只有一个,发收消息双方都使用这个密钥对数据进行加密和解密,对称加密算法的优点在于加解密的高速度和使用长密钥时的难破解性。The first method: the original message data can be encrypted by using a symmetric encryption method. The principle of the symmetric encryption algorithm is that the data sender converts the plaintext (original data) together with the encryption key through the encryption algorithm to make it complex. The encrypted ciphertext is sent out. After receiving the ciphertext, if the receiver wants to interpret the original data, it needs to decrypt the ciphertext by using the encrypted key and the inverse algorithm of the same encryption algorithm, so that it can be restored to a readable plaintext. In the symmetric encryption algorithm, there is only one key used. Both parties of the sending and receiving message use this key to encrypt and decrypt the data. The advantages of the symmetric encryption algorithm are the high speed of encryption and decryption and the difficulty of using long keys. .
第二种方法:时间密钥还可以用非对称加密算法得到,非对称加密算法需要两个密钥:公开密钥(publickey)和私有密钥(privatekey)。公开密钥与私有密钥是一对,如果用公开密钥对数据进行加密,只有用对应的私有密钥才能解密;如果用私有密钥对数据进行加密,那么只有用对应的公开密钥才能解密。非对称密码体制的特点在于:加密解密速度较对称加密慢,但加密算法强度复杂、安全性高。The second method: the time key can also be obtained by an asymmetric encryption algorithm. The asymmetric encryption algorithm requires two keys: a public key (publickey) and a private key (privatekey). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used for decryption; if the data is encrypted with the private key, only the corresponding public key can be used. Decrypt. The characteristic of the asymmetric cryptosystem is that the encryption and decryption speed is slower than the symmetric encryption, but the encryption algorithm has complex strength and high security.
S62:响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;S62: Respond to the viewing operation of viewing the encrypted message, generate and send a key request to the server, where the key request is used to obtain the time key of the encrypted message;
所述即时消息接收端向服务器发送密钥请求获得时间密钥,所述时间密钥是服务器通过验证所述即时消息接收端申请时间密钥的时间是否在时间密钥对应的时间范围内来发放的,此处服务器一般为CA服务器;所谓CA,即为数字证书认证中心(CertficateAuthority,CA),是整个网上电子交易安全的关键环节。它主要负责产生、分配并管理所有参与网上交易的实体所需的身份认证数字证书。 The instant message receiving end sends a key request to the server to obtain a time key, where the time key is issued by the server by verifying whether the time when the instant message receiving end applies for the time key is within a time range corresponding to the time key. The server here is generally a CA server; the so-called CA, which is a digital certificate authentication center (CertficateAuthority, CA), is a key link in the security of the entire online electronic transaction. It is primarily responsible for generating, distributing, and managing the identity authentication digital certificates required by all entities involved in online transactions.
S63:接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥。S63: Receive feedback information that the server responds to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end, when the request time is The feedback information is information indicating that the encrypted message is invalid when the time range corresponding to the time key is exceeded, and the feedback information is the time when the request time is within a time range corresponding to the time key. Key.
具体在本实施例中,举例说明:Specifically, in this embodiment, an example is as follows:
即时通信接收端向服务器发送密钥请求的请求时间是2016-8-20 10:10:10,而即时通信发送端发送的时间密钥对应的时间是2016-8-10 10:10:10,则请求时间超出所述时间密钥对应的时间范围,服务器给即时通信接收端的反馈信息即为加密消息无效,即时通信发送端发送的时间密钥对应的时间是2016-8-30 10:10:10,则请求时间在所述时间密钥对应的时间范围内,此时服务器给即时通信接收端的反馈信息为时间密钥。The request time for the instant messaging receiver to send a key request to the server is 2016-8-20 10:10:10, and the time key sent by the instant messaging sender is 2016-8-10 10:10:10. The request time exceeds the time range corresponding to the time key, and the feedback information sent by the server to the instant communication receiving end is invalid, and the time key sent by the instant communication sending end is 2016-8-30 10:10: 10: The request time is within a time range corresponding to the time key, and the feedback information sent by the server to the instant communication receiving end is a time key.
S64:解析所述反馈信息,根据解析结果响应所述查看操作;S64: Parse the feedback information, and respond to the viewing operation according to the parsing result;
所述根据解析结果响应所述查看操作,包括:The responding to the viewing operation according to the parsing result includes:
当解析结果为所述加密消息无效时,执行步骤S641:即时通信接收端响应所述查看操作,提示用户所述加密消息已过期无法被查看;When the parsing result is invalid, the step S641 is performed: the instant communication receiving end responds to the viewing operation, prompting the user that the encrypted message has expired and cannot be viewed;
当解析结果为所述时间密钥时,执行步骤S642:即时通信接收端响应所述查看操作,根据所述时间密钥解密所述加密消息,获得消息数据并显示;When the parsing result is the time key, step S642 is performed: the instant communication receiving end responds to the viewing operation, decrypts the encrypted message according to the time key, obtains message data, and displays;
在执行步骤S642中,所述根据所述时间密钥解密所述加密消息,可以采用两种办法:In step S642, the decrypting the encrypted message according to the time key may be performed in two ways:
方法一:用所述时间密钥解密所述加密消息,得到消息数据;Method 1: decrypting the encrypted message with the time key to obtain message data;
或者方法二:解析所述加密消息的封装包得到所述加密消息中的会话密钥密文;用所述时间密钥解密所述会话密钥密文,得到会话密钥;用所述会话密钥解密所述加密消息中的消息数据密文,得到消息数据;Or method 2: parsing the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypting the session key ciphertext with the time key to obtain a session key; using the session secret Key decrypting the message data ciphertext in the encrypted message to obtain message data;
具体的,即时通信接收端在得到时间密钥后,会用所述时间密钥解析所述会话密钥密文,得到所述会话密钥。在本实施例中,通过解析会话密钥密文 (id1_encryptdata),得到会话密钥SessionPassword为“1234567890”,然后通过会话密钥SessionPassword来解析消息数据密文,如在加密时,EncrpytBySym(消息数据密文)=fx_encryptBySym(ori(消息内容),SessionPassword(会话密钥)),解密后,最后得到消息数据ORI。Specifically, after obtaining the time key, the instant messaging receiving end parses the session key ciphertext with the time key to obtain the session key. In this embodiment, by parsing the session key ciphertext (id1_encryptdata), get the session key SessionPassword as "1234567890", and then parse the message data ciphertext through the session key SessionPassword, such as EncrpytBySym (message data ciphertext) = fx_encryptBySym (ori (message content), SessionPassword (in encryption) Session key)), after decryption, finally get the message data ORI.
此处的封装包如前述即时通信消息发送方法中所述的生成的P7格式封装数据,具体封装数据如下:The package package here is the P7 format package data generated in the foregoing instant messaging message sending method, and the specific package data is as follows:
P7Data=SEQUENCE{P7Data=SEQUENCE{
加密类型=XXXsImEncryption type = XXXsIm
加密算法=id-ibc-enc-kem-sok-esbdhEncryption algorithm = id-ibc-enc-kem-sok-esbdh
摘要类型=aes256Summary type=aes256
编码类型=dem-dem3,hmacSHAEncoding type = dem-dem3, hmacSHA
可解密时间信息={Decryptible time information = {
可解密时间标识=yyyymmddhhnnsszzzDecryptable time stamp = yyyymmddhhnnsszzz
域=XXXjiamiyou_olymDomain=XXXjiamiyou_olym
版本=1Version=1
会话密钥密文(id1_encryptdata)Session key ciphertext (id1_encryptdata)
}}
数据密文(EncryptBySym)Data ciphertext (EncryptBySym)
}。}.
通过对P7格式封装包解析,可从中得到会话密钥密文id1_encryptdata和失效时间yyyymmddhhnnsszzz。By parsing the P7 format encapsulation packet, the session key ciphertext id1_encryptdata and the expiration time yyyymmddhhnnsszzz can be obtained therefrom.
实施例七Example 7
请参考图9:一种即时通信消息查看控制方法,应用于服务器,方法包括:Please refer to FIG. 9 : An instant messaging message viewing control method is applied to a server, and the method includes:
S71:接收即时通信接收端发送的获取加密消息时间密钥的密钥请求;S71: Receive a key request for acquiring an encrypted message time key sent by the instant communication receiving end;
S72:将所述即时通信接收端请求所述时间密钥的请求时间与所述时间密钥对应的时间范围进行比较; S72: Compare, by the instant messaging receiver, a request time for requesting the time key with a time range corresponding to the time key;
如果所述请求时间超出所述时间范围,执行S721:拒绝向即时信息接收端发放所述时间密钥,使得即时信息接收端无法对加密消息进行解密及查看;If the request time exceeds the time range, executing S721: refusing to issue the time key to the instant information receiving end, so that the instant information receiving end cannot decrypt and view the encrypted message;
如果所述请求时间未超出所述时间范围,执行S722:向即时信息接收端发放所述时间密钥,使得即时信息接收端根据所述时间密钥对加密消息进行解密并查看。If the request time does not exceed the time range, executing S722: issuing the time key to the instant information receiving end, so that the instant information receiving end decrypts and views the encrypted message according to the time key.
步骤S72的具体原理和操作方法与步骤S63相对应。The specific principle and operation method of step S72 correspond to step S63.
步骤S721和步骤S722的具体原理和操作方法分别与S641和S642相对应。The specific principles and operation methods of step S721 and step S722 correspond to S641 and S642, respectively.
作为对应于上述加密方法的即时通信系统,采用前述的方法进行即时消息的加密发送、解密接收和查看控制,该即时通信系统包括前述的即时通信发送端、即时通信接收端和服务器。As an instant messaging system corresponding to the above encryption method, the foregoing method is used to perform encrypted transmission, decryption reception, and viewing control of an instant message, and the instant communication system includes the aforementioned instant communication transmitting end, instant messaging receiving end, and server.
实施例八Example eight
基于上述实施例提供的一种即时通信消息发送方法,本申请实施例还对应提供一种即时通信发送端,如图10所示,包括:Based on the foregoing method for transmitting an instant messaging message, the embodiment of the present application further provides an instant messaging sending end, as shown in FIG. 10, including:
获取单元81:用于获得待发送即时信息的时间密钥,所述时间密钥用于限制待发送即时信息可被查看的时间期限;The obtaining unit 81 is configured to obtain a time key for sending the instant information to be sent, where the time key is used to limit a time limit during which the instant information to be sent can be viewed;
加密单元82:用于根据所述时间密钥,对所述待发送即时信息进行加密生成加密信息;The encryption unit 82 is configured to: encrypt the to-be-transmitted instant information according to the time key to generate encrypted information;
第一发送单元83:用于发送所述加密信息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。The first sending unit 83 is configured to send the encrypted information to the receiver, send the time key to the server, and control, by the server, whether the receiver can view the encrypted message according to the time key.
获取单元81,包括:The obtaining unit 81 includes:
时间获取子单元,一种可选实施例,时间获取子单元用于获得待发送即时信息的失效时间,所述失效时间为所述消息发送后过期失效的时间;a time acquisition subunit, an optional embodiment, the time acquisition subunit is configured to obtain an expiration time of the instant information to be sent, where the expiration time is an expiration time after the message is sent;
另一种可选实施例,所述时间获取子单元,用于获得将所述待发送即时信息的发送时间加上固定期限生成所述失效时间。In another optional embodiment, the time acquisition subunit is configured to obtain the expiration time by adding a sending time of the to-be-sent instant information to a fixed period.
密钥获取子单元,用于根据所述失效时间得到时间密钥。 a key acquisition subunit, configured to obtain a time key according to the expiration time.
加密单元82,包括:The encryption unit 82 includes:
第一加密子单元,用于用所述时间密钥对所述待发送即时信息进行加密生成所述加密信息;或者a first encryption subunit, configured to encrypt the to-be-transmitted instant information by using the time key to generate the encrypted information; or
第二加密子单元;a second encryption subunit;
一种可选实施例,第二加密子单元用于生成会话密钥,用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密生成所述加密即时信息。In an optional embodiment, the second encryption subunit is configured to generate a session key, and the instant message to be sent is encrypted by using the combination of the time key and the session key to generate the encrypted instant information.
另一种可选实施例,第二加密子单元,用于:In another optional embodiment, the second encryption subunit is configured to:
用所述会话密钥对待发送即时信息进行加密,生成所述加密消息中的信息数据密文;And encrypting the instant information to be sent by using the session key, and generating the information data ciphertext in the encrypted message;
用所述时间密钥对所述会话密钥进行加密,生成所述加密消息中的会话密钥密文。The session key is encrypted with the time key to generate a session key ciphertext in the encrypted message.
实施例九Example nine
基于上述实施例提供的一种及时通信消息查看方法,本申请实施例还对应提供一种即时通信消息接收端,如图11所示,包括:Based on the method for viewing a timely communication message provided by the foregoing embodiment, the embodiment of the present application further provides an instant messaging message receiving end, as shown in FIG.
第一接收单元91:用于接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;a first receiving unit 91: configured to receive an encrypted message that is encrypted according to a time key, where the time key is used to limit a time limit during which the encrypted message can be viewed;
响应请求单元92:用于响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;The response requesting unit 92 is configured to generate and send a key request to the server in response to the viewing operation of viewing the encrypted message, where the key request is used to acquire the time key of the encrypted message;
第二接收单元93:用于接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥;The second receiving unit 93 is configured to receive feedback information that is sent by the server to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end. And the feedback information is information indicating that the encrypted message is invalid when the request time exceeds a time range corresponding to the time key, and when the request time is within a time range corresponding to the time key, The feedback information is the time key;
解析响应单元94:用于解析所述反馈信息,根据解析结果响应所述查看操作。The parsing response unit 94 is configured to parse the feedback information, and respond to the viewing operation according to the parsing result.
具体的,解析响应单元94,用于: Specifically, the parsing response unit 94 is configured to:
当解析结果为所述加密消息无效时,响应所述查看操作,提示用户所述加密消息已过期无法被查看;When the parsing result is invalid for the encrypted message, in response to the viewing operation, prompting the user that the encrypted message has expired cannot be viewed;
当解析结果为所述时间密钥时,响应所述查看操作,根据所述时间密钥解密所述加密消息,获得消息数据并显示;When the parsing result is the time key, in response to the viewing operation, decrypting the encrypted message according to the time key, obtaining message data and displaying;
所述解析响应单元94,包括:The parsing response unit 94 includes:
第一解析响应子单元,用于用所述时间密钥解密所述加密消息,得到消息数据;或者a first parsing response subunit, configured to decrypt the encrypted message with the time key to obtain message data; or
第二解析响应子单元,用于解析所述加密消息的封装包得到所述加密消息中的会话密钥密文;用所述时间密钥解密所述会话密钥密文,得到会话密钥;用所述会话密钥解密所述加密消息中的消息数据密文,得到消息数据。a second parsing response subunit, configured to parse the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypt the session key ciphertext with the time key to obtain a session key; Decrypting the message data ciphertext in the encrypted message with the session key to obtain message data.
实施例十Example ten
基于上述实施例提供的一种即时通信消息查看控制方法,本申请实施例还对应提供一种服务器,如图12所示,包括:Based on the foregoing embodiment, an instant messaging message viewing control method is provided. The embodiment of the present application further provides a server, as shown in FIG. 12, including:
第三接收单元101:用于接收即时信息接收端发送的获取加密消息时间密钥的密钥请求;a third receiving unit 101: configured to receive a key request for acquiring an encrypted message time key sent by the instant information receiving end;
验证单元102:用于将所述即时信息接收端请求所述时间密钥的请求时间与所述时间密钥对应的时间范围进行比较;The verification unit 102 is configured to compare the request time of the time information receiving end requesting the time key with a time range corresponding to the time key;
第二发送单元103:用于在所述请求时间超出所述时间范围时,拒绝向即时信息接收端发放所述时间密钥,使得即时信息接收端无法对加密消息进行解密及查看;The second sending unit 103 is configured to: when the request time exceeds the time range, refuse to issue the time key to the instant information receiving end, so that the instant information receiving end cannot decrypt and view the encrypted message;
在所述请求时间未超出所述时间范围时,向即时信息接收端发放所述时间密钥,使得即时信息接收端根据所述时间密钥对加密消息进行解密并查看。And when the request time does not exceed the time range, the time key is issued to the instant information receiving end, so that the instant information receiving end decrypts and views the encrypted message according to the time key.
图13示出了可以实现根据本发明的即时通信消息发送方法的即时通信发送端或即时通信消息查看方法的即时通信接收端或即时通信消息查看控制方法的服务器(下述将即时通信发送端或即时通信接收端或服务器统称为设备)。该设备传统上包括处理器2010和以存储器2020形式的计算机程序产品或者计 算机可读介质。存储器2020可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器2020具有用于执行上述方法中的任何方法步骤的程序代码2031的存储空间2030。例如,用于程序代码的存储空间2030可以包括分别用于实现上面的方法中的各种步骤的各个程序代码2031。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图14所述的便携式或者固定存储单元。该存储单元可以具有与图13中的存储器2020类似布置的存储段或者存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括用于执行根据本发明的方法步骤的程序代码2031’,即可以由例如诸如2010之类的处理器读取的代码,这些代码当由设备运行时,导致该设备执行上面所描述的方法中的各个步骤。本申请实施例中提供的技术方案,至少具有如下技术效果或优点:13 is a diagram showing a server of an instant communication receiving end or an instant communication message viewing control method of an instant messaging transmitting end or instant messaging message viewing method that can implement the instant messaging sending method according to the present invention (the instant messaging transmitting end or The instant messaging receiver or server is collectively referred to as a device). The device conventionally includes a processor 2010 and a computer program product or meter in the form of a memory 2020 Computer readable media. The memory 2020 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. The memory 2020 has a memory space 2030 for executing program code 2031 of any of the above method steps. For example, the storage space 2030 for program code may include respective program codes 2031 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have a storage section or a storage space or the like arranged similarly to the memory 2020 in FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit comprises program code 2031' for performing the steps of the method according to the invention, ie code that can be read by a processor such as 2010, which when executed by the device causes the device to perform the above Each step in the described method. The technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
根据本发明的即时通信发送方法,在即时通信发送端发送即时消息前,需要为所述即时消息添加第一扩展信息,之后再发送至即时通信接收端,从而即时通信接收端在接收到即时通信发送端发送的消息之后,可以基于消息中所包含的第一扩展信息实现对即时消息的操作权限的控制,以此来控制消息接收方对所接收消息的操作权限,以此来避免即时消息接收方可以随意对即时消息进行处理而带来的不良后果,如即时消息被肆意传播、聊天记录被窃取等问题,从而达到提高即时通信过程的安全性的技术效果。According to the instant messaging method of the present invention, before the instant messaging sender sends the instant message, the first extended information needs to be added to the instant message, and then sent to the instant messaging receiving end, so that the instant communication receiving end receives the instant communication. After the message sent by the sender, the operation authority of the instant message can be controlled based on the first extension information included in the message, thereby controlling the operation authority of the message receiver to the received message, thereby avoiding instant message reception. The party can freely deal with the adverse consequences of instant messaging, such as the instant message being spread and the chat record being stolen, so as to achieve the technical effect of improving the security of the instant communication process.
本发明的加密方法在于利用时间密钥对待发送即时消息进行加密,该时间密钥用于限制待发送即时消息可被查看的时间期限,即过了该时间期限,即时消息将不能再被查看,保证了即时消息的时效性;同时,用于加密消息的时间密钥是发送至服务器,由服务器来管理密钥的发放,以此来控制加密消息能否被查看,确保了即时通信过程中信息的高度安全性和消息的时效性,解决了现有技术中即时通信的安全性能不高,即时信息的私密性差、易被泄露的技术问 题。The encryption method of the present invention is to encrypt the instant message to be sent by using the time key, and the time key is used to limit the time limit for the instant message to be sent to be viewed, that is, after the time limit expires, the instant message can no longer be viewed. The time-sensitiveness of the instant message is guaranteed; at the same time, the time key used to encrypt the message is sent to the server, and the server manages the issuance of the key, thereby controlling whether the encrypted message can be viewed, and ensuring the information in the instant communication process. The high security and the timeliness of the message solve the technical problem that the security performance of the instant communication in the prior art is not high, the privacy of the instant information is poor, and the disclosure is easy to be leaked. question.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided herein are not inherently related to any particular computer, virtual system, or other device. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。 Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that although some embodiments herein include certain features included in other embodiments and not other features, combinations of features of different embodiments are intended to be within the scope of the present invention. And different embodiments are formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的网关、代理服务器、系统中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) may be used in practice to implement some or all of the functionality of some, or all, of the gateways, proxy servers, systems in accordance with embodiments of the present invention. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。 It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.

Claims (73)

  1. 一种即时通信方法,包括:An instant communication method includes:
    即时通信发送端获取即时消息;The instant messaging sender obtains an instant message;
    所述即时通信发送端为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息;The instant messaging sender adds the first extension information to the instant message, thereby obtaining the processed instant message;
    所述即时通信发送端将所述处理后的所述即时消息发送至即时通信接收端,以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。The instant messaging sending end sends the processed instant message to the instant messaging receiving end, so that the instant messaging receiving end controls the operation authority of the instant message based on the first extended information.
  2. 如权利要求1所述的方法,其特征在于,所述即时通信发送端为所述即时消息添加第一扩展信息,包括:The method of claim 1, wherein the instant messaging sender adds the first extension information to the instant message, including:
    所述即时通信发送端在所述即时消息中植入第一功能字段;The instant messaging sender implants a first function field in the instant message;
    所述即时通信发送端为所述第一功能字段赋值,其中,所述第一功能字段被赋予的值不同,所述即时通信接收端对所述即时消息的操作权限不同。The instant messaging sender assigns a value to the first function field, wherein the first function field is assigned a different value, and the instant messaging receiver has different operating rights to the instant message.
  3. 如权利要求1所述的方法,其特征在于,所述即时通信发送端为所述即时消息添加第一扩展信息,包括:The method of claim 1, wherein the instant messaging sender adds the first extension information to the instant message, including:
    所述即时通信发送端为所述即时消息添加第一功能标记,基于所述即时通信接收端所接收到的所述即时消息中是否存在所述第一功能标记,所述即时通信接收端对所述即时消息的操作权限不同。The instant messaging sending end adds a first function tag to the instant message, and based on whether the first function tag exists in the instant message received by the instant messaging receiving end, the instant messaging receiving end is opposite The operation rights of the instant message are different.
  4. 如权利要求1所述的方法,其特征在于,所述第一扩展信息用于控制所述即时通信接收端对所述即时消息进行转发和/或复制的操作权限。The method according to claim 1, wherein said first extension information is used to control an operation authority of said instant messaging receiving end to forward and/or copy said instant message.
  5. 如权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 wherein the method further comprises:
    如果所述第一扩展信息中包含第一预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止转发;和/或,If the first extended content includes the first preset content, the operation permission of the instant messaging receiving end to the instant message is prohibition of forwarding; and/or,
    如果所述第一扩展信息中包含第二预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止复制。 If the first extension information includes the second preset content, the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
  6. 如权利要求1所述的方法,其特征在于,如果所述即时通信接收端对所述即时消息的操作权限为禁止转发,则在即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,The method according to claim 1, wherein if the operation permission of the instant communication receiving end to the instant message is prohibition of forwarding, the first prompt information for prompting prohibition of forwarding is given at the instant communication receiving end. ;and / or,
    如果所述即时通信接收端对所述即时消息的操作权限为禁止复制,则在所述即时通信接收端给出用于提示禁止复制的第二提示信息。And if the operation permission of the instant messaging receiving end to the instant message is prohibition of copying, the second prompting information for prompting for prohibiting copying is given at the instant messaging receiving end.
  7. 如权利要求1-6任一所述的方法,其特征在于,所述即时通信发送端为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息,包括:The method according to any one of claims 1-6, wherein the instant messaging sender adds the first extension information to the instant message, thereby obtaining the processed instant message, including:
    所述即时通信发送端将所述即时消息打包成新的消息;The instant messaging sender packages the instant message into a new message;
    所述即时通信发送端为所述新的消息添加所述第一扩展信息,进而获得处理后的所述即时消息。The instant messaging sender adds the first extension information to the new message, and further obtains the processed instant message.
  8. 如权利要求7所述的方法,其特征在于,所述新的消息为通过加密打包方式生成的消息。The method of claim 7, wherein the new message is a message generated by an encrypted packing method.
  9. 如权利要求1-6任一所述的方法,其特征在于,所述处理后的即时消息中还包括:第二扩展信息,所述第二扩展信息用于控制所述即时消息的失效时间。The method according to any one of claims 1-6, wherein the processed instant message further comprises: second extension information, wherein the second extension information is used to control an expiration time of the instant message.
  10. 如权利要求9所述的方法,其特征在于,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效;或者,The method according to claim 9, wherein the second extension information is a second function field, and if the value of the second function field includes a time point, the instant message expires after the time point If the value of the second function field does not include the time point, the instant message does not expire; or,
    所述第二扩展信息为第二功能标记,若所述即时通信接收端所获得即时消息中包含所述第二功能标记,则所述即时消息在预设时间段之后失效;若所述即时通信接收端所获得的即时消息中不包含所述第二功能标记,则所述即时消息不会失效。The second extension information is a second function identifier, and if the instant message obtained by the instant messaging receiver includes the second function identifier, the instant message expires after a preset time period; if the instant communication is If the second function tag is not included in the instant message obtained by the receiving end, the instant message does not expire.
  11. 如权利要求1-6任一所述的方法,其特征在于,所述即时通信发送端为所述即时通信添加第一扩展信息,包括:The method according to any one of claims 1-6, wherein the instant messaging sender adds the first extended information to the instant messaging, including:
    所述即时通信发送端在所述即时通信的消息头植入所述第一扩展信息。 The instant messaging sender implants the first extended information in a message header of the instant messaging.
  12. 一种即时通信控制方法,包括:An instant communication control method includes:
    即时通信接收端接收即时通信发送端发送的消息;The instant messaging receiving end receives the message sent by the instant messaging sender;
    所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息;The instant messaging receiving end reads the first extended information added by the instant messaging sending end in the message;
    所述即时通信接收端根据所述第一扩展信息实现对所述消息的操作权限的控制。The instant messaging receiving end implements control of the operating authority of the message according to the first extended information.
  13. 如权利要求12所述的即时通信控制方法,其特征在于,所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息,包括:The instant messaging control method according to claim 12, wherein the instant communication receiving end reads the first extended information added by the instant messaging sending end in the message, including:
    所述即时通信接收端读取所述消息中的第一功能字段的赋值;The instant messaging receiving end reads the assignment of the first function field in the message;
    所述即时通信接收端根据所述第一扩展信息实现对所述消息的操作权限的控制,包括:The instant messaging receiving end controls the operation authority of the message according to the first extended information, including:
    基于第一功能字段的赋值不同,所述即时通信接收端对所述消息的操作权限不同。The instant messaging receiver has different operating rights to the message based on the assignment of the first function field.
  14. 如权利要求12所述的方法,其特征在于,所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息,包括:The method of claim 12, wherein the instant messaging receiving end reads the first extended information added by the instant messaging sender in the message, including:
    所述即时通信接收端读取所述消息中的第一功能标记;The instant messaging receiving end reads the first function tag in the message;
    其中,所述即时通信接收端根据所述第一功能标记是否存在来实现对所述消息不同的操作权限。The instant messaging receiving end implements different operating rights to the message according to whether the first function tag exists.
  15. 如权利要求12所述的方法,其特征在于,所述即时通信接收端根据所述第一扩展信息实现对所述消息的操作权限的控制,包括:The method of claim 12, wherein the instant messaging receiving end controls the operation authority of the message according to the first extended information, including:
    所述即时通信接收端根据所述第一扩展信息实现对所述消息的转发和/或复制的操作权限的控制。The instant messaging receiving end controls the operation authority of forwarding and/or copying the message according to the first extended information.
  16. 如权利要求12所述的方法,其特征在于,所述即时通信接收端根据所述第一扩展信息实现对所述即时消息的操作权限的控制,包括:The method of claim 12, wherein the instant messaging receiving end controls the operation authority of the instant message according to the first extended information, including:
    如果所述第一扩展信息中包含第一预设内容,所述即时通信接收端对所述即时消息的操作权限为禁止转发;和/或, If the first extended content includes the first preset content, the operation permission of the instant messaging receiving end to the instant message is prohibition of forwarding; and/or,
    如果所述第一扩展信息中包含第二预设内容,所述即时通信接收端对所述即时消息的操作权限为禁止复制。If the first extension information includes the second preset content, the operation permission of the instant messaging receiving end to the instant message is prohibition of copying.
  17. 如权利要求12所述的方法,其特征在于,所述方法还包括:The method of claim 12, wherein the method further comprises:
    如果所述即时通信接收端对所述即时消息的操作权限为禁止转发,所述即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,If the operation permission of the instant messaging receiving end to the instant message is prohibitive forwarding, the instant messaging receiving end gives first prompt information for prompting to prohibit forwarding; and/or,
    如果所述即时通信接收端对所述即时消息的操作权限为禁止复制,所述即时通信接收端给出用于提示禁止复制的第二提示信息。And if the operation permission of the instant communication receiving end to the instant message is prohibition of copying, the instant communication receiving end gives second prompt information for prompting to prohibit copying.
  18. 如权利要求12所述的方法,其特征在于,所述消息为通过加密打包方式生成的消息。The method of claim 12 wherein said message is a message generated by an encrypted packing method.
  19. 如权利要求12-17任一所述的方法,其特征在于,所述方法还包括:The method of any of claims 12-17, wherein the method further comprises:
    所述即时通信接收端从所述消息中读取第二扩展信息;The instant messaging receiving end reads the second extended information from the message;
    所述即时通信接收端基于所述第二扩展信息对所述消息的失效时间进行控制。The instant messaging receiving end controls the expiration time of the message based on the second extended information.
  20. 如权利要求19所述的方法,其特征在于,所述即时通信接收端基于所述第二扩展信息对所述消息的失效时间进行控制,包括:The method of claim 19, wherein the instant messaging receiving end controls the expiration time of the message based on the second extended information, including:
    若所述第二扩展信息为第二功能字段,且所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若读取到的所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效;或者,If the second extended information is a second functional field, and the value of the second functional field includes a time point, the instant message expires after the time point; if the read second function field The value does not include the point in time, then the instant message does not expire; or,
    若所述第二扩展信息为第二功能标记,则所述消息在预设时间段之后失效;若所述消息中不包含所述第二功能标记,则所述即时消息不会失效。If the second extended information is a second function tag, the message expires after a preset time period; if the second function tag is not included in the message, the instant message does not expire.
  21. 如权利要求12-17任一所述的方法,其特征在于,所述即时通信接收端读取所述消息中由所述即时通信发送端添加的第一扩展信息,包括:The method according to any one of claims 12-17, wherein the instant messaging receiving end reads the first extended information added by the instant messaging sending end in the message, including:
    所述即时通信接收端从所述消息的消息头读取所述第一扩展信息。The instant messaging receiving end reads the first extended information from a message header of the message.
  22. 一种即时通信发送端,包括:An instant messaging sender includes:
    至少一个处理器;At least one processor;
    以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至 少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信发送端执行至少以下操作:And at least one memory communicably coupled to the at least one processor; One less memory includes processor-executable instructions that, when executed by the at least one processor, cause the instant messenger to perform at least the following operations:
    获得即时消息;Get instant messages;
    为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息;Adding first extended information to the instant message, thereby obtaining the processed instant message;
    将所述处理后的所述即时消息发送至即时通信接收端,以供所述即时通信接收端基于所述第一扩展信息实现对所述即时消息的操作权限的控制。And sending the processed instant message to the instant messaging receiving end, so that the instant messaging receiving end controls the operation authority of the instant message based on the first extended information.
  23. 如权利要求22所述的即时通信发送端,其特征在于,所述为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息的操作方式包括:The instant messaging sender of claim 22, wherein the adding the first extension information to the instant message, thereby obtaining the processed operation of the instant message comprises:
    在所述即时消息中植入第一功能字段;Implanting a first function field in the instant message;
    为所述第一功能字段赋值,其中,所述第一功能字段被赋予的值不同,所述即时通信接收端对所述即时消息的操作权限不同。And assigning a value to the first function field, wherein the first function field is assigned a different value, and the instant communication receiving end has different operation rights to the instant message.
  24. 如权利要求22所述的即时通信发送端,其特征在于,所述为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息的操作方式包括:The instant messaging sender of claim 22, wherein the adding the first extension information to the instant message, thereby obtaining the processed operation of the instant message comprises:
    为所述即时消息添加第一功能标记,基于所述即时通信接收端所接收到的所述即时消息中是否存在所述第一功能标记,所述即时通信接收端对所述即时消息的操作权限不同。Adding a first function tag to the instant message, based on whether the first function tag exists in the instant message received by the instant communication receiving end, and the instant communication receiving end operates the instant message different.
  25. 如权利要求22所述的即时通信发送端,其特征在于,所述第一扩展信息用于控制所述即时通信接收端对所述即时消息进行转发和/或复制的操作权限。The instant messaging sender of claim 22, wherein the first extension information is used to control an operation right of the instant messaging receiver to forward and/or copy the instant message.
  26. 如权利要求22所述的即时通信发送端,其特征在于,The instant messaging transmitting end according to claim 22, wherein
    如果所述第一扩展信息中包含第一预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止转发;和/或,If the first extended content includes the first preset content, the operation permission of the instant messaging receiving end to the instant message is prohibition of forwarding; and/or,
    如果所述第一扩展信息中包含第二预设内容,则所述即时通信接收端对所述即时消息的操作权限为禁止复制。If the first extension information includes the second preset content, the operation permission of the instant communication receiving end to the instant message is prohibition of copying.
  27. 如权利要求22所述的即时通信发送端,其特征在于,The instant messaging transmitting end according to claim 22, wherein
    如果所述即时通信接收端对所述即时消息的操作权限为禁止转发,则在即 时通信接收端给出用于提示禁止转发的第一提示信息;和/或,If the operation permission of the instant messaging receiving end to the instant message is prohibitive forwarding, then The communication receiving end gives first prompt information for prompting prohibition of forwarding; and/or,
    如果所述即时通信接收端对所述即时消息的操作权限为禁止复制,则在所述即时通信接收端给出用于提示禁止复制的第二提示信息。And if the operation permission of the instant messaging receiving end to the instant message is prohibition of copying, the second prompting information for prompting for prohibiting copying is given at the instant messaging receiving end.
  28. 如权利要求22-27任一所述的即时通信发送端,其特征在于,所述为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息的操作方式包括:The instant messaging sender according to any one of claims 22-27, wherein the adding the first extension information to the instant message, so as to obtain the processed operation manner of the instant message, includes:
    将所述即时消息打包成新的消息;Packaging the instant message into a new message;
    为所述新的消息添加所述第一扩展信息,进而获得处理后的所述即时消息。Adding the first extension information to the new message, and obtaining the processed instant message.
  29. 如权利要求28所述的即时通信发送端,其特征在于,所述新的消息为通过加密打包方式生成的消息。The instant messaging sender of claim 28, wherein the new message is a message generated by an encrypted packing method.
  30. 如权利要求22-27任一所述的即时通信发送端,其特征在于,所述处理后的即时消息中还包括:第二扩展信息,所述第二扩展信息用于控制所述即时消息的失效时间。The instant messaging sender according to any one of claims 22-27, wherein the processed instant message further comprises: second extension information, wherein the second extension information is used to control the instant message. Dead time.
  31. 如权利要求30所述的即时通信发送端,其特征在于,所述第二扩展信息为第二功能字段,若所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效;或者,The instant messaging sender according to claim 30, wherein the second extension information is a second function field, and if the value of the second function field includes a time point, the instant message is at the time After the point expires; if the value of the second function field does not include the time point, the instant message does not expire; or,
    所述第二扩展信息为第二功能标记,若所述即时通信接收端所获得即时消息中包含所述第二功能标记,则所述即时消息在预设时间段之后失效;若所述接收端所获得的即时消息中不包含所述第二功能标记,则所述即时消息不会失效。The second extension information is a second function identifier. If the instant message obtained by the instant messaging receiver includes the second function identifier, the instant message expires after a preset time period; if the receiving end is If the obtained second message is not included in the obtained instant message, the instant message does not expire.
  32. 如权利要求22-27任一所述的即时通信发送端,其特征在于,所述为所述即时消息添加第一扩展信息,从而获得处理后的所述即时消息的操作方式包括:The instant messaging sender according to any one of claims 22-27, wherein the adding the first extension information to the instant message, so as to obtain the processed operation manner of the instant message, includes:
    在所述即时消息的消息头植入所述第一扩展信息。The first extended information is implanted in a message header of the instant message.
  33. 一种即时通信接收端,包括: An instant messaging receiver includes:
    至少一个处理器;At least one processor;
    以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信接收端执行至少以下操作:And at least one memory communicatively coupled to the at least one processor; the at least one memory comprising processor-executable instructions when the processor-executable instructions are executed by the at least one processor Causing the instant messaging receiver to perform at least the following operations:
    接收发送端发送的即时消息;Receiving an instant message sent by the sender;
    读取所述即时消息中由所述即时通信发送端添加的第一扩展信息;Reading the first extended information added by the instant messaging sender in the instant message;
    根据所述第一扩展信息实现对所述即时消息的操作权限的控制。Controlling the operation authority of the instant message is implemented according to the first extension information.
  34. 如权利要求33所述的即时通信接收端,其特征在于,所述读取所述即时消息中由所述即时通信发送端添加的第一扩展信息的操作方式包括:The instant messaging receiving end according to claim 33, wherein the operation mode of reading the first extended information added by the instant messaging sending end in the instant message comprises:
    读取所述即时消息中的第一功能字段的赋值;Reading an assignment of the first function field in the instant message;
    基于第一功能字段的赋值不同,对所述即时消息的操作权限不同。The operation rights to the instant message are different based on the assignment of the first function field.
  35. 如权利要求33所述的即时通信接收端,其特征在于,所述读取所述即时消息中由所述即时通信发送端添加的第一扩展信息的操作方式包括:The instant messaging receiving end according to claim 33, wherein the operation mode of reading the first extended information added by the instant messaging sending end in the instant message comprises:
    读取所述即时消息中的第一功能标记;Reading a first function tag in the instant message;
    其中,根据所述第一功能标记是否存在来实现对所述即时消息不同的操作权限。The operating authority for the instant message is different according to whether the first function tag exists.
  36. 如权利要求33所述的即时通信接收端,其特征在于,所述根据所述第一扩展信息实现对所述即时消息的操作权限的控制的操作方式包括:The instant messaging receiving end according to claim 33, wherein the operation mode of implementing the control of the operation authority of the instant message according to the first extended information comprises:
    根据所述第一扩展信息实现对所述即时消息的转发和/或复制的操作权限的控制。Controlling the operation authority of forwarding and/or copying of the instant message is implemented according to the first extended information.
  37. 如权利要求33所述的即时通信接收端,其特征在于,所述根据所述第一扩展信息实现对所述即时消息的操作权限的控制的操作方式包括:The instant messaging receiving end according to claim 33, wherein the operation mode of implementing the control of the operation authority of the instant message according to the first extended information comprises:
    如果所述第一扩展信息中包含第一预设内容,对所述即时消息的操作权限为禁止转发;和/或,If the first extended content includes the first preset content, the operation permission for the instant message is prohibition of forwarding; and/or,
    如果所述第一扩展信息中包含第二预设内容,对所述即时消息的操作权限为禁止复制。 If the first extension information includes the second preset content, the operation authority for the instant message is prohibition of copying.
  38. 如权利要求33所述的即时通信接收端,其特征在于,所述操作还包括:The instant messaging receiver of claim 33, wherein the operation further comprises:
    如果所述即时通信接收端对所述即时消息的操作权限为禁止转发,所述即时通信接收端给出用于提示禁止转发的第一提示信息;和/或,If the operation permission of the instant messaging receiving end to the instant message is prohibitive forwarding, the instant messaging receiving end gives first prompt information for prompting to prohibit forwarding; and/or,
    如果所述即时通信接收端对所述即时消息的操作权限为禁止复制,所述即时通信接收端给出用于提示禁止复制的第二提示信息。And if the operation permission of the instant communication receiving end to the instant message is prohibition of copying, the instant communication receiving end gives second prompt information for prompting to prohibit copying.
  39. 如权利要求33所述的即时通信接收端,其特征在于,所述即时消息为所述即时通信发送端通过加密打包生成的消息。The instant messaging receiving end according to claim 33, wherein the instant message is a message generated by the instant messaging sender by encrypting and packaging.
  40. 如权利要求33-38任一所述的即时通信接收端,其特征在于,所述读取所述即时消息中由所述即时通信发送端添加的第一扩展信息的操作方式包括,从所述即时消息中读取第二扩展信息;The instant messaging receiving end according to any one of claims 33 to 38, wherein said reading the operation mode of the first extended information added by the instant messaging transmitting end in the instant message comprises: Reading the second extended information in the instant message;
    所述根据所述第一扩展信息实现对所述即时消息的操作权限的控制的具操作方式还包括,基于所述第二扩展信息对所述即时消息的失效时间进行控制。The operating mode of implementing the control of the operation authority of the instant message according to the first extended information further includes controlling the expiration time of the instant message based on the second extended information.
  41. 如权利要求40所述的即时通信接收端,其特征在于,所述根据所述第一扩展信息实现对所述即时消息的操作权限的控制的操作方式包括:The instant messaging receiving end according to claim 40, wherein the operation mode of implementing the control of the operation authority of the instant message according to the first extended information comprises:
    若所述第二扩展信息为第二功能字段,且所述第二功能字段的值包含时间点,则所述即时消息在所述时间点后失效;若读取到的所述第二功能字段的值不包含所述时间点,则所述即时消息不会失效;或者,If the second extended information is a second functional field, and the value of the second functional field includes a time point, the instant message expires after the time point; if the read second function field The value does not include the point in time, then the instant message does not expire; or,
    若所述第二扩展信息为第二功能标记,则所述即时消息在预设时间段之后失效;若所述即时消息中不包含所述第二功能标记,则所述即时消息不会失效。If the second extended information is a second function tag, the instant message expires after a preset time period; if the second function tag is not included in the instant message, the instant message does not expire.
  42. 如权利要求33-38任一所述的即时通信接收端,其特征在于,所述读读取所述即时消息中由所述即时通信发送端添加的第一扩展信息的操作方式包括:从所述即时消息的消息头读取所述第一扩展信息。The instant messaging receiving end according to any one of claims 33 to 38, wherein the reading and reading the operation mode of the first extended information added by the instant messaging transmitting end in the instant message comprises: The header of the instant message reads the first extended information.
  43. 一种计算机程序,包括计算机可读代码,当即时通信发送端运行所述计算机可读代码时,导致权利要求1-11中的任一项权利要求所述的方法被执行。A computer program comprising computer readable code, when the instant messaging sender runs the computer readable code, causing the method of any of claims 1-11 to be performed.
  44. 一种计算机程序,包括计算机可读代码,当即时通信接收端运行所述计算机可读代码时,导致权利要求12-21中的任一项权利要求所述的方法被执 行。A computer program comprising computer readable code, when the instant communication receiving end runs the computer readable code, causing the method of any one of claims 12-21 to be executed Row.
  45. 一种计算机可读介质,其中存储了如权利要求43或44所述的计算机程序。A computer readable medium storing the computer program of claim 43 or 44.
  46. 一种即时通信消息发送方法,所述方法包括:An instant messaging message sending method, the method comprising:
    获得待发送即时消息的时间密钥,所述时间密钥用于限制所述待发送即时消息可被查看的时间期限;Obtaining a time key of an instant message to be sent, where the time key is used to limit a time limit during which the instant message to be sent can be viewed;
    根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息;And encrypting the to-be-sent instant message according to the time key to generate an encrypted message;
    发送所述加密消息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。Sending the encrypted message to the recipient, transmitting the time key to the server, and controlling, by the server, whether the recipient can view the encrypted message according to the time key.
  47. 如权利要求46所述的方法,其特征在于,所述获得待发送即时消息的时间密钥,包括:The method of claim 46, wherein the obtaining the time key of the instant message to be sent comprises:
    获得待发送即时消息的失效时间,所述失效时间为所述即时消息发送后过期失效的时间;Obtaining an expiration time of the instant message to be sent, where the expiration time is an expiration time after the instant message is sent;
    根据所述失效时间得到时间密钥。A time key is obtained according to the expiration time.
  48. 如权利要求46所述的方法,其特征在于,所述根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息,具体方法包括:The method according to claim 46, wherein the encrypting the to-be-sent instant message according to the time key generates an encrypted message, and the specific method includes:
    用所述时间密钥对所述待发送即时消息进行加密生成所述加密消息;或者Encrypting the to-be-sent instant message with the time key to generate the encrypted message; or
    生成会话密钥,用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密生成所述加密消息。Generating a session key, and encrypting the to-be-sent instant message with the combination of the time key and the session key to generate the encrypted message.
  49. 如权利要求48所述的方法,其特征在于,所述用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密,包括:The method of claim 48, wherein the encrypting the to-be-sent instant message with the combination of the time key and the session key comprises:
    用所述会话密钥对待发送即时消息进行加密,生成所述加密消息中的消息数据密文;And encrypting the instant message to be sent by using the session key, and generating a message data ciphertext in the encrypted message;
    用所述时间密钥对所述会话密钥进行加密,生成所述加密消息中的会话密钥密文。The session key is encrypted with the time key to generate a session key ciphertext in the encrypted message.
  50. 如权利要求49所述的方法,其特征在于,所述加密消息具体是:在发送前将由所述消息数据密文和会话密钥密文进行封装后生成的封装包。 The method according to claim 49, wherein the encrypted message is specifically: an encapsulated packet generated by the message data ciphertext and the session key ciphertext before being sent.
  51. 如权利要求46~50任一所述的方法,其特征在于,所述时间密钥为利用标识密码算法计算得到的时间公钥。The method according to any one of claims 46 to 50, wherein the time key is a time public key calculated by an identification cryptographic algorithm.
  52. 如权利要求47所述的方法,其特征在于,所述获得待发送即时消息的失效时间,包括:The method of claim 47, wherein the obtaining the expiration time of the instant message to be sent comprises:
    将所述待发送即时消息的发送时间加上固定期限生成所述失效时间。The expiration time is generated by adding a sending time of the to-be-sent instant message to a fixed period.
  53. 一种即时通信消息查看方法,应用于即时通信接收端,所述方法包括:An instant messaging message viewing method is applied to an instant messaging receiving end, and the method includes:
    接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;Receiving an encrypted message encrypted according to a time key, the time key being used to limit a time period during which the encrypted message can be viewed;
    响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;And generating, in response to viewing the viewing operation of the encrypted message, a key request to the server, where the key request is used to acquire the time key of the encrypted message;
    接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和即时通信发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥;Receiving feedback information of the server in response to the key request, where the feedback information is generated by the server according to the request time of the key request and the time key sent by the instant communication sending end, when the request time The feedback information is information indicating that the encrypted message is invalid when the time range corresponding to the time key is exceeded, and the feedback information is the time when the request time is within a time range corresponding to the time key. Key
    解析所述反馈信息,根据解析结果响应所述查看操作。Parsing the feedback information, and responding to the viewing operation according to the parsing result.
  54. 如权利要求53所述的方法,其特征在于,所述加密消息为:The method of claim 53 wherein said encrypted message is:
    用所述时间密钥加密生成的消息;或者Encrypting the generated message with the time key; or
    用所述时间密钥和所述会话密钥的组合进行加密生成的消息。The message generated by the encryption is encrypted with the combination of the time key and the session key.
  55. 如权利要求53或54所述的方法,其特征在于,所述根据解析结果响应所述查看操作,包括:The method according to claim 53 or 54, wherein the responding to the viewing operation according to the parsing result comprises:
    当解析结果为所述加密消息无效时,响应所述查看操作,提示用户所述加密消息已过期无法被查看;When the parsing result is invalid for the encrypted message, in response to the viewing operation, prompting the user that the encrypted message has expired cannot be viewed;
    当解析结果为所述时间密钥时,响应所述查看操作,根据所述时间密钥解密所述加密消息,获得消息数据并显示。When the parsing result is the time key, in response to the viewing operation, the encrypted message is decrypted according to the time key, and the message data is obtained and displayed.
  56. 如权利要求55所述的方法,其特征在于,所述根据所述时间密钥解密 所述加密消息,包括:The method of claim 55, wherein said decrypting according to said time key The encrypted message includes:
    用所述时间密钥解密所述加密消息,得到消息数据;或者Decrypting the encrypted message with the time key to obtain message data; or
    解析所述加密消息的封装包得到所述加密消息中的会话密钥密文;用所述时间密钥解密所述会话密钥密文,得到会话密钥;用所述会话密钥解密所述加密消息中的消息数据密文,得到消息数据。Parsing the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypting the session key ciphertext with the time key to obtain a session key; decrypting the session key by using the session key Encrypt the message data ciphertext in the message to get the message data.
  57. 一种即时通信消息查看控制方法,应用于服务器,所述方法包括:An instant messaging message viewing control method is applied to a server, and the method includes:
    接收即时通信接收端发送的获取加密消息时间密钥的密钥请求;Receiving a key request for acquiring an encrypted message time key sent by the instant communication receiving end;
    将所述即时通信接收端请求所述时间密钥的请求时间与所述时间密钥对应的时间范围进行比较;Comparing, by the instant messaging receiver, a request time for requesting the time key with a time range corresponding to the time key;
    如果所述请求时间超出所述时间范围,拒绝向即时通信接收端发放所述时间密钥,使得即时通信接收端无法对加密消息进行解密及查看;If the request time exceeds the time range, the time key is refused to be issued to the instant communication receiving end, so that the instant communication receiving end cannot decrypt and view the encrypted message;
    如果所述请求时间未超出所述时间范围,向即时通信接收端发放所述时间密钥,使得即时通信接收端根据所述时间密钥对加密消息进行解密并查看。If the request time does not exceed the time range, the time key is issued to the instant messaging receiving end, so that the instant messaging receiving end decrypts and views the encrypted message according to the time key.
  58. 一种即时通信发送端,包括:An instant messaging sender includes:
    至少一个处理器;At least one processor;
    以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信发送端执行至少以下操作:And at least one memory communicatively coupled to the at least one processor; the at least one memory comprising processor-executable instructions when the processor-executable instructions are executed by the at least one processor Causing the instant messaging sender to perform at least the following operations:
    获得待发送即时消息的时间密钥,所述时间密钥用于限制待发送即时消息可被查看的时间期限;Obtaining a time key of an instant message to be sent, where the time key is used to limit a time limit during which an instant message to be sent can be viewed;
    根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息;And encrypting the to-be-sent instant message according to the time key to generate an encrypted message;
    发送所述加密消息至接收方,发送所述时间密钥至服务器并通过所述服务器根据所述时间密钥控制所述接收方是否可查看所述加密消息。Sending the encrypted message to the recipient, transmitting the time key to the server, and controlling, by the server, whether the recipient can view the encrypted message according to the time key.
  59. 如权利要求58所述即时通信发送端,其特征在于:所述获得待发送即时消息的时间密钥,所述时间密钥用于限制待发送即时消息可被查看的时间期限的具体操作方式包括: The instant messaging sender according to claim 58, wherein the obtaining a time key of the instant message to be sent, the specific operation mode of the time key for limiting the time limit in which the instant message to be sent can be viewed includes: :
    获得待发送即时消息的失效时间,所述失效时间为所述即时消息发送后过期失效的时间;Obtaining an expiration time of the instant message to be sent, where the expiration time is an expiration time after the instant message is sent;
    根据所述失效时间得到时间密钥。A time key is obtained according to the expiration time.
  60. 如权利要求57所述的即时通信发送端,其特征在于,所述根据所述时间密钥,对所述待发送即时消息进行加密生成加密消息的具体操作方式包括:The instant messaging sender according to claim 57, wherein the specific operation manner of encrypting the to-be-sent instant message according to the time key to generate an encrypted message comprises:
    用所述时间密钥对所述待发送即时消息进行加密生成所述加密消息;或者Encrypting the to-be-sent instant message with the time key to generate the encrypted message; or
    生成会话密钥,用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密生成所述加密消息。Generating a session key, and encrypting the to-be-sent instant message with the combination of the time key and the session key to generate the encrypted message.
  61. 如权利要求60所述的即时通信发送端,其特征在于,所述生成会话密钥,用所述时间密钥和所述会话密钥的组合对所述待发送即时消息进行加密生成所述加密消息的操作方式包括:The instant messaging sender according to claim 60, wherein said generating a session key, encrypting said to-be-sent instant message with said combination of said time key and said session key to generate said encryption How messages are handled includes:
    用所述会话密钥对待发送即时信息进行加密,生成所述加密信息中的消息数据密文;And encrypting the instant information to be sent by using the session key, and generating a message data ciphertext in the encrypted information;
    用所述时间密钥对所述会话密钥进行加密,生成所述加密信息中的会话密钥密文。The session key is encrypted with the time key to generate a session key ciphertext in the encrypted information.
  62. 如权利要求61所述的即时通信发送端,其特征在于,所述加密消息包括:在发送前将由所述消息数据密文和会话密钥密文进行封装后生成的封装包。The instant messaging sender of claim 61, wherein the encrypted message comprises: an encapsulated packet generated by the message data ciphertext and the session key ciphertext before being sent.
  63. 如权利要求58~62任一所述的即时通信发送端,其特征在于,所述时间密钥为利用标识密码算法计算得到的时间公钥。The instant messaging sender according to any one of claims 58 to 62, wherein the time key is a time public key calculated by using an identification cryptographic algorithm.
  64. 如权利要求59所述的即时通信发送端,其特征在于,所述获得待发送即时消息的失效时间,所述失效时间为所述即时消息发送后过期失效的时间的操作方式包括:The instant messaging sender of claim 59, wherein the obtaining an expiration time of the instant message to be sent, and the operating time of the expiration time after the instant message is expired is:
    将所述待发送即时消息的发送时间加上固定期限生成所述失效时间。The expiration time is generated by adding a sending time of the to-be-sent instant message to a fixed period.
    所述获得待发送即时消息的失效时间,包括:The obtaining the expiration time of the instant message to be sent includes:
    将所述待发送即时消息的发送时间加上固定期限生成所述失效时间。The expiration time is generated by adding a sending time of the to-be-sent instant message to a fixed period.
  65. 一种即时通信接收端,包括: An instant messaging receiver includes:
    至少一个处理器;At least one processor;
    以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述即时通信接收端执行至少以下操作:And at least one memory communicatively coupled to the at least one processor; the at least one memory comprising processor-executable instructions when the processor-executable instructions are executed by the at least one processor Causing the instant messaging receiver to perform at least the following operations:
    接收根据时间密钥进行加密的加密消息,所述时间密钥用于限制所述加密消息可被查看的时间期限;Receiving an encrypted message encrypted according to a time key, the time key being used to limit a time period during which the encrypted message can be viewed;
    响应查看所述加密消息的查看操作,生成并发送密钥请求至服务器,所述密钥请求用于获取所述加密消息的所述时间密钥;And generating, in response to viewing the viewing operation of the encrypted message, a key request to the server, where the key request is used to acquire the time key of the encrypted message;
    接收所述服务器响应所述密钥请求的反馈信息,所述反馈信息由所述服务器根据所述密钥请求的请求时间和发送端发送的所述时间密钥生成,当所述请求时间超出所述时间密钥对应的时间范围时所述反馈信息为表征所述加密消息无效的信息,当所述请求时间在所述时间密钥对应的时间范围内时所述反馈信息为所述时间密钥;Receiving feedback information of the server in response to the key request, the feedback information is generated by the server according to the request time of the key request and the time key sent by the sending end, when the request time exceeds the The feedback information is information indicating that the encrypted message is invalid, and the feedback information is the time key when the request time is within a time range corresponding to the time key. ;
    解析所述反馈信息,根据解析结果响应所述查看操作。Parsing the feedback information, and responding to the viewing operation according to the parsing result.
  66. 如权利要求65所述的即时通信接收端,其特征在于,所述加密消息为:The instant messaging receiver of claim 65, wherein the encrypted message is:
    用所述时间密钥加密生成的消息;或者Encrypting the generated message with the time key; or
    用所述时间密钥和所述会话密钥的组合进行加密生成的消息。The message generated by the encryption is encrypted with the combination of the time key and the session key.
  67. 如权利要求65或66所述的即时通信接收端,其特征在于,所述解析所述反馈信息,根据解析结果响应所述查看操作的操作方式包括:The instant messaging receiving end according to claim 65 or claim 66, wherein the parsing the feedback information and responding to the viewing operation according to the parsing result comprises:
    当解析结果为所述加密消息无效时,响应所述查看操作,提示用户所述加密消息已过期无法被查看;When the parsing result is invalid for the encrypted message, in response to the viewing operation, prompting the user that the encrypted message has expired cannot be viewed;
    当解析结果为所述时间密钥时,响应所述查看操作,根据所述时间密钥解密所述加密消息,获得消息数据并显示。When the parsing result is the time key, in response to the viewing operation, the encrypted message is decrypted according to the time key, and the message data is obtained and displayed.
  68. 如权利要求66所述的即时通信接收端,其特征在于,所述解析所述反馈信息,根据解析结果响应所述查看操作的操作方式包括:The instant messaging receiving end according to claim 66, wherein the parsing the feedback information and responding to the viewing operation according to the parsing result comprises:
    用所述时间密钥解密所述加密消息,得到消息数据;或者 Decrypting the encrypted message with the time key to obtain message data; or
    解析所述加密消息的封装包得到所述加密消息中的会话密钥密文;用所述时间密钥解密所述会话密钥密文,得到会话密钥;用所述会话密钥解密所述加密消息中的消息数据密文,得到消息数据。Parsing the encapsulated packet of the encrypted message to obtain a session key ciphertext in the encrypted message; decrypting the session key ciphertext with the time key to obtain a session key; decrypting the session key by using the session key Encrypt the message data ciphertext in the message to get the message data.
  69. 一种服务器,包括:A server that includes:
    至少一个处理器;At least one processor;
    以及,至少一个存储器,其与所述至少一个处理器可通信地连接;所述至少一个存储器包括处理器可执行的指令,当所述处理器可执行的指令由所述至少一个处理器执行时,致使所述服务器执行至少以下操作:And at least one memory communicatively coupled to the at least one processor; the at least one memory comprising processor-executable instructions when the processor-executable instructions are executed by the at least one processor Causing the server to perform at least the following operations:
    接收即时通信接收端发送的获取加密消息时间密钥的密钥请求;Receiving a key request for acquiring an encrypted message time key sent by the instant communication receiving end;
    将所述即时通信接收端请求所述时间密钥的请求时间与所述时间密钥对应的时间范围进行比较;Comparing, by the instant messaging receiver, a request time for requesting the time key with a time range corresponding to the time key;
    在所述请求时间超出所述时间范围时,拒绝向即时通信接收端发放所述时间密钥,使得即时通信接收端无法对加密消息进行解密及查看;When the request time exceeds the time range, the time key is refused to be issued to the instant communication receiving end, so that the instant communication receiving end cannot decrypt and view the encrypted message;
    在所述请求时间未超出所述时间范围时,向即时通信接收端发放所述时间密钥,使得即时通信接收端根据所述时间密钥对加密消息进行解密并查看。And when the request time does not exceed the time range, the time key is issued to the instant communication receiving end, so that the instant communication receiving end decrypts and views the encrypted message according to the time key.
  70. 一种计算机程序,包括计算机可读代码,当即时通信发送端运行所述计算机可读代码时,导致权利要求46-52中的任一项权利要求所述的方法被执行。A computer program comprising computer readable code, when the instant messaging sender runs the computer readable code, causing the method of any of claims 46-52 to be performed.
  71. 一种计算机程序,包括计算机可读代码,当即时通信接收端运行所述计算机可读代码时,导致权利要求53-56中的任一项权利要求所述的方法被执行。A computer program comprising computer readable code, when the instant communication receiving end runs the computer readable code, causing the method of any of claims 53-56 to be performed.
  72. 一种计算机程序,包括计算机可读代码,当服务器运行所述计算机可读代码时,导致权利要求57中所述的方法被执行。A computer program comprising computer readable code, when the server runs the computer readable code, causing the method of claim 57 to be performed.
  73. 一种计算机可读介质,其中存储了如权利要求70-72任一所述的计算机程序。 A computer readable medium storing the computer program of any of claims 70-72.
PCT/CN2017/117842 2016-12-21 2017-12-21 Sending method, control method, sending end and receiving end in instant messaging WO2018113756A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201611190178.2 2016-12-21
CN201611190691.1 2016-12-21
CN201611190178.2A CN106487666A (en) 2016-12-21 2016-12-21 A kind of instant messaging sending method, control method, transmitting terminal and receiving terminal
CN201611190691.1A CN106453069B (en) 2016-12-21 2016-12-21 A kind of instant communication message sends, checks, checking control method and its equipment

Publications (1)

Publication Number Publication Date
WO2018113756A1 true WO2018113756A1 (en) 2018-06-28

Family

ID=62624576

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117842 WO2018113756A1 (en) 2016-12-21 2017-12-21 Sending method, control method, sending end and receiving end in instant messaging

Country Status (1)

Country Link
WO (1) WO2018113756A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110890968A (en) * 2019-10-24 2020-03-17 成都卫士通信息产业股份有限公司 Instant messaging method, device, equipment and computer readable storage medium
CN114900803A (en) * 2022-05-31 2022-08-12 深圳市智信科技有限公司 Distributed short message verification message sending method based on computer cloud platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060182084A1 (en) * 2005-02-11 2006-08-17 Microsoft Corporation Method and system for placing restrictions on sessions
CN101263500A (en) * 2005-09-12 2008-09-10 诺基亚公司 Data access control
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
CN104518956A (en) * 2013-10-04 2015-04-15 三星电子株式会社 Instant message transmitting and receiving system, terminal device and controlling method thereof
CN105119799A (en) * 2015-06-15 2015-12-02 阿里巴巴集团控股有限公司 Instant communication message processing method and client
CN106453069A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Instant communication message sending, viewing and viewing control method and device thereof
CN106487666A (en) * 2016-12-21 2017-03-08 北京奇虎科技有限公司 A kind of instant messaging sending method, control method, transmitting terminal and receiving terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060182084A1 (en) * 2005-02-11 2006-08-17 Microsoft Corporation Method and system for placing restrictions on sessions
CN101263500A (en) * 2005-09-12 2008-09-10 诺基亚公司 Data access control
CN104518956A (en) * 2013-10-04 2015-04-15 三星电子株式会社 Instant message transmitting and receiving system, terminal device and controlling method thereof
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
CN105119799A (en) * 2015-06-15 2015-12-02 阿里巴巴集团控股有限公司 Instant communication message processing method and client
CN106453069A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Instant communication message sending, viewing and viewing control method and device thereof
CN106487666A (en) * 2016-12-21 2017-03-08 北京奇虎科技有限公司 A kind of instant messaging sending method, control method, transmitting terminal and receiving terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110890968A (en) * 2019-10-24 2020-03-17 成都卫士通信息产业股份有限公司 Instant messaging method, device, equipment and computer readable storage medium
CN110890968B (en) * 2019-10-24 2022-08-23 成都卫士通信息产业股份有限公司 Instant messaging method, device, equipment and computer readable storage medium
CN114900803A (en) * 2022-05-31 2022-08-12 深圳市智信科技有限公司 Distributed short message verification message sending method based on computer cloud platform

Similar Documents

Publication Publication Date Title
US11914684B2 (en) Secure messaging service with digital rights management using blockchain technology
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
CN106487765B (en) Authorized access method and device using the same
US20030081774A1 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
US20010029581A1 (en) System and method for controlling and enforcing access rights to encrypted media
KR20170131577A (en) Key export techniques
US11412385B2 (en) Methods for a secure mobile text message and object sharing application and system
CN105580311A (en) Data security using request-supplied keys
JP2020505849A (en) Digital certificate management method and device
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
TW201417546A (en) Instant messaging method and system
WO2022142112A1 (en) Blockchain-based mail processing method, and mail sending end, mail receiving end and device
CN114338247B (en) Data transmission method and apparatus, electronic device, storage medium, and program product
US20160034718A1 (en) Method and apparatus for communicating private messages with partially obscured content to limit or prevent unauthorized use of data to impede privacy violations
TW201626776A (en) Improved system for establishing a secure communication channel
WO2018113708A1 (en) Mail sending, reading, and read control method, and apparatus for same
KR20220039779A (en) Enhanced security encryption and decryption system
US20160359822A1 (en) Sovereign share encryption protocol
CN102404337A (en) Data encryption method and device
JP6930053B2 (en) Data encryption method and system using device authentication key
CN111431922A (en) Internet of things data encryption transmission method and system
WO2018113756A1 (en) Sending method, control method, sending end and receiving end in instant messaging
CN1784643A (en) Method and system for controlling the disclosure time of information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17884230

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17884230

Country of ref document: EP

Kind code of ref document: A1