WO2019161599A1 - Procédé de protection d'informations de messagerie instantanée, appareil et dispositif, et support d'informations d'ordinateur - Google Patents

Procédé de protection d'informations de messagerie instantanée, appareil et dispositif, et support d'informations d'ordinateur Download PDF

Info

Publication number
WO2019161599A1
WO2019161599A1 PCT/CN2018/082245 CN2018082245W WO2019161599A1 WO 2019161599 A1 WO2019161599 A1 WO 2019161599A1 CN 2018082245 W CN2018082245 W CN 2018082245W WO 2019161599 A1 WO2019161599 A1 WO 2019161599A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
chat window
chat
time
sending
Prior art date
Application number
PCT/CN2018/082245
Other languages
English (en)
Chinese (zh)
Inventor
伍旭鸿
金梅
周琳琳
刘腾
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019161599A1 publication Critical patent/WO2019161599A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Definitions

  • the present application relates to the field of instant messaging, and in particular, to an IM information protection method, apparatus, device, and computer storage medium.
  • Some instant messaging software itself does not securely process information when it is sent. It only prompts when financial information is involved in the user IM information. Such IM information is insufficiently secure and can be easily tampered by malicious people.
  • the IM information is usually automatically saved, and the history message is automatically saved in the message recording function.
  • the user can view the history message, and the message recording function of the instant messaging software brings convenience to the people, and also brings With a series of security risks, for example, when the user leaves the office seat, as long as the instant messaging software does not exit, others can see the historical chat history on the instant messaging interface, so that there is a risk of message leakage, how can it be used by the user?
  • Instant messaging software chat to ensure the security of information, has become an urgent problem to be solved.
  • the present application provides a method, an apparatus, a device, and a computer storage medium for protecting IM information performed by a computer device, which can prevent the IM information from being tampered with, leaked, and the like by improving the security of the IM information.
  • the present application provides a method of protecting IM information performed by a computer device, the method comprising the steps of:
  • the cloud chat window starts the time-limited chat mode
  • the IM information in the cloud chat window is encrypted according to a preset encryption rule
  • the IM information in the first chat window and/or the second chat window is deleted.
  • the step of encrypting the IM information in the cloud chat window according to a preset encryption rule includes:
  • the sending identifier information of the sending end and the receiving identifier information of the receiving end are obtained, so that the two-way authentication of the sending end and the receiving end is performed;
  • the IM information is encrypted according to a preset encryption rule to ensure the security of the IM information.
  • the step of sending the IM information that is completed by the encryption process to the second chat window of the receiving end, and monitoring the read status of the IM information in the second chat window includes:
  • the receiving end is at least two, monitoring the read status of the IM information in the second chat window corresponding to each receiving end;
  • the receiving end corresponds to the complete reading of the IM information in the second chat window, deleting the IM information in the first chat window and/or the second chat window;
  • the receiving end corresponds to the completion of the IM information in the second chat window, it is determined whether the preset time node has been reached;
  • the IM information in the first chat window and/or the second chat window is deleted.
  • the step of deleting the IM information in the first chat window and/or the second chat window includes:
  • the IM information is added to the read tag
  • the method includes:
  • the IM recovery information related to the IM information recovery instruction is acquired, and the IM recovery information is displayed in the first chat window and/or the second chat window.
  • acquiring the IM recovery information related to the IM information recovery instruction, and displaying the IM recovery information after the step of the first chat window and/or the second chat window includes:
  • the IM information including the keyword and/or the IM information in the query time are obtained as the query information, and the query information is highlighted in the first chat window and/or the second chat window for the user to view.
  • the method includes:
  • the sending time on the time stamp exceeds a preset threshold, the IM information in the first chat window and/or the second chat window is automatically deleted.
  • the present application further provides an IM information security device
  • the IM information protection device includes:
  • the receiving and receiving module is configured to receive a sending request triggered by the first chat window of the sending end, acquire IM information in the sending request, and establish a cloud chat window corresponding to the IM information;
  • the mode determining module is configured to determine, according to the associated information of the first chat window, whether the cloud chat window starts the time-limited chat mode;
  • the encryption processing module is configured to start the time-limited chat mode in the cloud chat window, and encrypt the IM information in the cloud chat window according to a preset encryption rule;
  • the sending monitoring module is configured to send the IM information completed by the encryption processing to the second chat window of the receiving end, and monitor the reading status of the IM information in the second chat window;
  • the detecting deletion module is configured to delete the IM information in the first chat window and/or the second chat window when detecting that the IM information reading in the second chat window is completed.
  • the present application further provides an IM information protection device
  • the IM information protection device includes: a memory, a processor, and an IM information protection program stored on the memory and operable on the processor, wherein:
  • the IM information protection program is implemented by the processor to implement the steps of the IM information protection method as described above.
  • the present application further provides a computer storage medium
  • the computer storage medium stores an IM information protection program, and the IM information protection program is executed by the processor to implement the steps of the IM information protection method as described above.
  • the IM information protection method includes the following steps: receiving a sending request triggered by a first chat window of a sending end, and acquiring an IM in the sending request Information, and establish a cloud chat window corresponding to the IM information; according to the associated information of the first chat window, determine whether the cloud chat window starts the time-limited chat mode; if the limited-time chat mode is activated, the IM information in the cloud chat window is encrypted according to a preset Rule encryption processing; sending the IM information completed by the encryption processing to the second chat window of the receiving end, and monitoring the reading status of the IM information in the second chat window; when detecting that the IM information reading is completed, deleting the first chat window and / or IM information in the second chat window, the encryption of the transmitted IM information can ensure the security of the information transmission, in the process of IM information transmission is not maliciously tampering by Trojans, etc., at the same time, in
  • FIG. 1 is a schematic structural diagram of an apparatus of a hardware operating environment involved in an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a first embodiment of an IM information protection method according to the present application
  • FIG. 3 is a schematic diagram of a specific scenario of a first embodiment of an IM information protection method according to the present application.
  • FIG. 4 is a schematic flowchart of the refinement of step S13 of the IM information protection method in FIG. 2;
  • FIG. 5 is a schematic flowchart of the refinement of step S14 of the IM information protection method in FIG. 2;
  • FIG. 6 is a schematic flowchart of a second embodiment of an IM information protection method according to the present application.
  • FIG. 7 is another schematic flowchart of a second embodiment of an IM information protection method according to the present application.
  • FIG. 8 is a schematic flowchart of a third embodiment of an IM information protection method according to the present application.
  • FIG. 9 is a schematic diagram of functional modules of an embodiment of an IM information protection apparatus according to the present application.
  • FIG. 1 is a schematic structural diagram of a server (also called an IM information protection device) in a hardware operating environment according to an embodiment of the present application.
  • the server may include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between these components.
  • the user interface 1003 can include a display, an input unit such as a keyboard, and the optional user interface 1003 can also include a standard wired interface, a wireless interface.
  • the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
  • the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
  • the server may also include a camera, RF (Radio) Frequency, RF) circuit, sensor, audio circuit, WiFi module; input unit, display screen, touch screen; network interface optional in addition to wireless interface in addition to WiFi, Bluetooth, probe, 3G/4G/5G networked base station equipment, etc. .
  • RF Radio
  • the server structure illustrated in FIG. 1 does not constitute a limitation to the server, and may include more or fewer components than those illustrated, or some components may be combined, or different component arrangements.
  • the computer software product is stored in a storage medium (storage medium: also called computer storage medium, computer medium, readable medium, readable storage medium, computer readable storage medium or directly called medium, such as ROM).
  • storage medium also called computer storage medium, computer medium, readable medium, readable storage medium, computer readable storage medium or directly called medium, such as ROM).
  • /RAM, disk, CD-ROM including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the various embodiments of the present application as a
  • the memory 1005 of the computer storage medium may include an operating system, a network communication module, a user interface module, and an IM information protection application.
  • the network interface 1004 is mainly used to connect to the background server and perform data communication with the background server.
  • the user interface 1003 is mainly used to connect to the client (the user end, the receiving end and the sending end in the embodiment of the present application)
  • the client can communicate with the server
  • the client can also include sensors such as light sensors, motion sensors, and other sensors
  • the server communicates with the client; and the processor 1001 can be used to invoke
  • the IM information stored in the memory 1005 protects the application and performs the steps of the IM information protection method.
  • the existing IM IM instant messaging application software, such as IM cloud, nail, Tencent QQ, WeChat application software
  • a request message (request, hereinafter referred to as R)
  • a response message (acknowledge, hereinafter referred to as A) is sent back to the sender.
  • the server generates a notification message (notify, hereinafter referred to as N) to send the sender's sending information to the receiving end.
  • a corresponding response reference is formed according to the UDP protocol or the TCP protocol.
  • the response mechanism usually sends the response packet immediately after the message receiver receives the message, and the sender only needs to determine whether the other party actually "receives” the message according to the response packet, which makes the determination of the packet loss simple.
  • the terminal of the IM (the terminal of the IM includes the sender and the receiver) and the server complete the delivery of the message by sending a message (that is, a request packet).
  • the IM information protection method includes:
  • Step S11 Receive a sending request triggered by the first chat window of the sending end, acquire IM information in the sending request, and establish a cloud chat window corresponding to the IM information.
  • the terminal acquires the IM information in the sending request (IM information: Referring to the chat information in the instant messaging software, the IM information is sent to the server, and the IM information is transmitted by the server of the instant messaging application to the receiving end corresponding to the receiving user. Specifically, the first chat window of the receiving end of the server is triggered. Sending a request, the server obtains the IM information in the sending request, and establishes a cloud chat window corresponding to the IM information in the server navigation, as shown in FIG. 3, the server corresponding to the instant messaging software establishes a corresponding in the server cloud according to the sending request of the sending end. Cloud chat window for interaction between the sender and the receiver.
  • IM information Referring to the chat information in the instant messaging software, the IM information is sent to the server, and the IM information is transmitted by the server of the instant messaging application to the receiving end corresponding to the receiving user. Specifically, the first chat window of the receiving end of the server is triggered. Sending a request, the server obtains the
  • Step S12 Determine, according to the associated information of the first chat window, whether the cloud chat window starts the time-limited chat mode.
  • the server determines, according to the associated information of the first chat window, whether the cloud chat window of the instant messaging software starts the time-limited chat mode (the time-limited chat mode is also called the IM information protection mode, and the instant messaging software encrypts the information sent by the user in the limited-time chat mode).
  • the service monitors the reading status of the IM information, and automatically deletes the IM information when the IM information reading is completed to avoid information leakage, wherein the first chat window
  • the associated information includes mode information of the first chat window and input information of the user in the first chat window.
  • the first chat window starts a time-limited chat mode
  • the server determines that the cloud chat window starts a time-limited chat mode
  • the IM information relates to sensitive information
  • the server can automatically start the cloud chat window to start the time-limited chat mode in real time.
  • the time-limited chat mode can be manually set by the user in the first chat window of the sender, and the cloud chat window of the server also corresponds to the start time-limited chat mode; or the server instant messaging software can automatically start according to the IM information sent by the user.
  • the cloud chat window on the server also starts the limited-time chat mode; or the server receives the IM information in the send request, and performs IM information analysis. If the IM information involves sensitive information (sensitive information refers to money-related information), the server automatically starts the time-limited chat mode of the cloud chat window.
  • sensitive information refers to money-related information
  • Step S13 If the cloud chat window starts the time-limited chat mode, the IM information in the cloud chat window is encrypted according to a preset encryption rule.
  • the server presses the preset encryption rule (the preset encryption rule: refers to the encryption rule preset in the instant messaging software, and the preset encryption rule has The following functions: Encryption, Authentication, and Identification; Encryption: Prevent bad people from obtaining user data; Authentication: Prevent bad people from modifying user data but users do not find it; Authentication: Prevent bad guys from impersonating users ) Perform encryption processing.
  • the preset encryption rule refers to the encryption rule preset in the instant messaging software, and the preset encryption rule has The following functions: Encryption, Authentication, and Identification; Encryption: Prevent bad people from obtaining user data; Authentication: Prevent bad people from modifying user data but users do not find it; Authentication: Prevent bad guys from impersonating users ) Perform encryption processing.
  • the server encrypts the IM information to ensure information security during the information transmission process, and at the same time, only the specified receiving end can decrypt and view the encrypted information, thereby ensuring security in the IM information transmission process.
  • Step S14 Send the IM information completed by the encryption process to the second chat window of the receiving end, and monitor the read status of the IM information in the second chat window.
  • the server sends the encrypted IM information to the second chat window of the receiving end, that is, the server obtains the IM information input by the user in the first chat window of the sending end, and encrypts the IM information and sends the IM information to the second chat window of the receiving end. And monitoring the read status of the IM information in the second chat window.
  • Step S15 when it is detected that the IM information reading in the second chat window is completed, deleting the IM information in the first chat window and/or the second chat window.
  • the server of the instant messaging software monitors the reading status of the IM information in the chat window in real time.
  • the server automatically deletes the IM information, that is, the automatic deletion of the IM information refers to reading the IM information in the user.
  • the server is at a preset time interval (the preset time interval can be set according to a specific situation, for example, the preset time interval matches the working time, and is set to 8 hours), after the first chat window of the server to the sender / or the IM information in the second chat window on the receiving end is automatically deleted to prevent other users from viewing the IM information.
  • the server may select to delete only the first chat window IM information according to user settings; or delete only the IM information in the second chat window. It should be added that the IM information of the cloud chat window in the server is not deleted, and the server associates the IM information in the cloud chat window with the user identity information, and saves the associated IM information and association relationship, if necessary, the user. The deleted IM information can be restored when needed.
  • step S15 includes:
  • Step 151 When it is detected that the IM information reading in the second chat window is completed, the IM information is added to the read tag.
  • the server monitors the IM information reading status in the second chat window.
  • the server detects that the user reads the IM information in the second chat window, and the server reads the IM information.
  • the preset preset time period (the preset time period is set according to a specific scenario, for example, may be set to one minute) to determine that the IM information in the second chat window is read, and the server adds the IM information to the read tag.
  • Step 152 Delete the IM information of the read tag in the first chat window and/or the second chat window, and save the IM information of the added tag to the cloud chat window.
  • the server deletes the IM information of the read tag in the first chat window and/or the second chat window to ensure that the information is not leaked, and the server saves the IM information of the added tag to the cloud chat window, so that the server can be customized according to the user's needs. Perform IM information recovery.
  • the security of the information transmission can be ensured by encrypting the transmitted IM information, and the tampering is not performed by the Trojan or the like in the process of sending the IM information, and at the same time, the IM information arrives at the receiving terminal.
  • real-time monitoring of the reading status of the IM information can avoid the late leakage of important IM information, without requiring the user to manually delete the chat record, thereby improving the user experience.
  • the embodiment is further provided on the basis of the first embodiment of the present application.
  • This embodiment is a refinement of step S13 in the first embodiment, and the instant messaging software is described in this embodiment.
  • the IM information protection method includes:
  • Step S131 If the cloud chat window starts the time-limited chat mode, the sending identifier information of the sending end and the receiving identifier information of the receiving end are obtained, so that the two-way authentication of the sending end and the receiving end is performed.
  • the server of the instant messaging software obtains the sending identification information of the sending end of the instant messaging software and the receiving identification information of the receiving end.
  • the IM information carries the device information of the sending end and the user account information of the receiving end, and the server will The device information at the transmitting end and the user account information at the receiving end are used as identification information, and the instant messaging software server performs two-way verification between the transmitting end and the receiving end according to the identification information.
  • the server obtains a message authentication code (MAC) of the sender.
  • the message authentication code is a keyed hash function based on the key and hash function.
  • the two parties agree in advance and cannot let the third party know.
  • the server uses the MAC algorithm to calculate the MAC value of the message, and adds it to the receiving end after being appended to the verification message.
  • the receiving end calculates the MAC value of the received message by using the same MAC algorithm, and compares with the received MAC value to complete the mutual authentication between the transmitting end and the receiving end.
  • Step S132 When it is detected that the two-way authentication of the transmitting end and the receiving end is completed, the preset encryption rule determined by the two-way authentication is obtained.
  • the receiving end receives the verification information sent by the server, and the receiving end forms a feedback message based on the verification information, and the server obtains the feedback message to determine that the two-way authentication of the sending end and the receiving end is completed.
  • the server detects that the two-way authentication of the sending end and the receiving end is completed, the server performs two-way authentication. Determined preset encryption rules, for example, the server will determine the encryption method when verifying, and unify the encryption and decryption methods on the sender and receiver.
  • step S133 the IM information is encrypted according to a preset encryption rule to ensure the security of the IM information.
  • the server encrypts the IM information according to a preset encryption rule. For example, the sender sends data to the receiver, and the sender initiates a dialog request to the server, and the server generates a key.
  • the server sends the key to the sending end, and the sending terminal encrypts the data by using the key to obtain the ciphertext C, and sends the C to the server, the server obtains the ciphertext C, and decrypts the data to obtain the data.
  • the pre-set key encrypts the data and sends the encrypted ciphertext to the receiving end.
  • the IM information is encrypted to prevent the IM information from being intercepted, interrupted, falsified, or forged during the transmission process, thereby ensuring the security of the transmission of the IM information, and the IM information is not transmitted during the information transmission.
  • the IM information is distorted.
  • the embodiment is further provided on the basis of the first embodiment of the present application.
  • This embodiment is a refinement of step S14 in the first embodiment, and the instant messaging software is described in this embodiment.
  • the IM information monitors the step of reading the status.
  • the IM information protection method includes:
  • Step S141 Send the IM information that is completed by the encryption process to the second chat window of the receiving end, and determine whether the receiving end has at least two.
  • the server sends the encrypted IM information to the second chat window of the receiving end, and the server monitors the read status of the IM information of the receiving end to delete the IM information according to the read status of the IM information, but the group for the instant messaging software When chatting, there may be multiple receiving ends.
  • the server needs to monitor the IM information reading status of each receiving end. That is, the server obtains the information of the receiving end and determines whether the receiving end has at least two.
  • Step S142 if at least two receiving ends, monitoring the reading status of the IM information in the second chat window corresponding to each receiving end.
  • the server monitors the reading status of the IM information in the second chat window of each receiving end.
  • the server cloud chat window separately monitors the reading status of the IM information in the second chat window of each receiving end.
  • Step S143 if all receiving ends of the IM information in the second chat window are completed, the IM information in the first chat window and/or the second chat window is deleted.
  • the server If the server detects that all the readings of the IM information in the second chat window are completed by the receiving end, the server deletes the IM information in the first chat window and/or the second chat window, for example, in a group of 5 people.
  • the server detects that all the readings of the IM information in the second chat window are completed by the five receiving ends, and the server deletes the IM information in the first chat window and/or the second chat window.
  • Step S144 If each receiving end corresponds to the completion of all the IM information in the second chat window, it is determined whether the preset time node has been reached.
  • the server determines whether the preset time node has been reached. For example, when the group has 200 people chatting, the server monitors 100. The receiving end corresponds to the reading of the IM information in the second chat window, that is, when all the IM information in the second chat window is not completely read, the server acquires the IM information sending time point and the current time point, and the server according to the sending time point. And the current time point determines the IM information transmission time period, and determines whether the IM information transmission time period has reached the preset time node (the preset time node is set according to the specific situation, and can be set to 10 minutes).
  • Step S145 if the preset time node has been reached, the IM information in the first chat window and/or the second chat window is deleted.
  • the server deletes the IM information in the first chat window and/or the second chat window; if the preset time node is not reached, the server monitors the IM information in the second chat window corresponding to each receiving end. The reading state until the receiving end corresponds to the completion of the IM information in the second chat window, or the preset time node is reached, and the server deletes the IM information in the first chat window and/or the second chat window.
  • the server monitors the read status of the IM information of the group chat.
  • both the read status of the IM information and the security of the IM information are considered, so that the time-limited chat is enabled. More flexible.
  • a second embodiment of the IM information protection method of the present application is further proposed, which is different from the first embodiment of the present application in the IM information protection method of the present application.
  • the user can recover the deleted IM information.
  • the IM information protection method includes:
  • Step S21 Receive an IM information recovery instruction triggered by the first chat window and/or the second chat window, and acquire an identity verification message included in the IM information recovery instruction.
  • Step S22 performing user identity verification based on the identity verification message.
  • the server performs IM message record deletion according to the IM information read status, and the user can obtain IM information recovery based on the first chat window of the instant messaging software and/or the IM information recovery instruction triggered by the second chat window.
  • the server performs user identity verification according to the authentication information.
  • the IM information recovery command includes identity information such as the user account of the user instant messaging software and the user's mobile phone number, and the server pre-stores the IM information recovery command user identity information and the login account in the instant messaging software. Identity information is compared for user authentication.
  • step S23 if the user identity verification is passed, the IM recovery information related to the IM information recovery instruction is acquired, and the IM recovery information is displayed in the first chat window and/or the second chat window.
  • the server compares the IM information recovery instruction user identity information with the login account pre-stored identity information in the instant messaging software. If the IM information recovery instruction user identity information is the same as the login account pre-stored identity information in the instant messaging software, the server detects that the identity verification is passed. The server obtains the IM recovery information related to the IM information recovery instruction, and displays the IM recovery information in the first chat window and/or the second chat window. For example, the server acquires the time node information included in the IM information recovery instruction, and the server acquires the cloud. The IM information contained in the time node information in the chat window is used as the IM recovery information, and the server restores the IM recovery information so that the user can perform the IM information query again in the chat window.
  • step S23 if the user identity verification is passed, the IM recovery information related to the IM information recovery instruction is acquired, and the IM recovery information is displayed after the first chat window and/or the second chat window, and include:
  • Step S24 Receive an IM information query request triggered by the first chat window and/or the second chat window, and obtain a keyword and/or a query time in the IM information query request.
  • the IM information query request triggered by the user in the first chat window and/or the second chat window receives the IM information query request triggered by the first chat window and/or the second chat window, and the server obtains the IM information query request included in the request Query keywords and/or query time.
  • step S25 the IM information including the keyword and/or the IM information in the query time are acquired as the query information, and the query information is highlighted in the first chat window and/or the second chat window for the user to view.
  • the server will obtain the IM information including the keyword and/or the IM information in the query time as the query information, and the server query information is highlighted in the first chat window and/or the second chat window for the user to view. For example, if the user includes the keyword input by the user in the query request, the server uses the keyword input by the user as the query dimension, acquires the read IM information including the keyword, and displays the read IM information, or the user is
  • the query request includes the determined sender information input by the user, and the sender information is used as the query dimension to obtain the IM information sent by the sender, and the read IM information is highlighted, and the highlighted information may be Highlighting can also be a way of bolding.
  • step S24 and step S25 in this embodiment may be combined with other embodiments of the present application, that is, the user may perform IM information query at any time, so that the server highlights according to the user's query instruction. .
  • the IM information deleted in the previous period is restored, and when the IM information is leaked, if the user has a need to view the user later, the user may be authenticated, and after the user identity verification is passed, the IM information that the user queries is obtained. Display and highlight based on the user's query dimensions for user convenience.
  • the IM information protection method includes:
  • Step S31 If the cloud chat window does not start the time-limited chat mode, send the IM information to the second chat window of the receiving end.
  • step S32 the sending time of the IM information is obtained, and the sending time of the IM information is used as the time label of the IM information.
  • the server sends the IM information included in the sending request to the corresponding receiving end.
  • the second chat window is such that the receiving terminal can receive the IM information.
  • the server obtains the sending time of the IM information, the server uses the sending time of the IM information as the time tag of the IM information, and saves the IM information to the cloud chat window, and the server sorts the IM information of the cloud chat window according to the time sequence of the time tag. .
  • step S33 the sending time on the time stamp is compared with a preset threshold.
  • Step S34 If the sending time on the time tag exceeds the preset threshold, the IM information in the first chat window and/or the second chat window is automatically deleted.
  • the server compares the sending time on the time label with a preset threshold (preset threshold: can be set according to the actual situation, can be set to 1 month, or other); if the sending time on the time label exceeds the preset threshold, The server automatically deletes the IM information. If the sending time on the time label does not exceed the preset threshold, the IM information is not processed.
  • a preset threshold can be set according to the actual situation, can be set to 1 month, or other
  • the IM information when the instant messaging software is not in the time-limited chat mode, the IM information can be associated with the sending time.
  • the IM information exceeds the preset threshold, the IM information in the instant messaging software can be automatically deleted, without the user The means is deleted, which reduces the occupied space of the terminal and improves the user experience.
  • the embodiment of the present application further provides an IM information protection apparatus, where the IM information protection apparatus includes:
  • the receiving and obtaining module 10 is configured to receive a sending request triggered by the first chat window of the sending end, acquire IM information in the sending request, and establish a cloud chat window corresponding to the IM information;
  • the mode determining module 20 is configured to determine, according to the associated information of the first chat window, whether the cloud chat window starts the time-limited chat mode;
  • the encryption processing module 30 is configured to: when the cloud chat window starts the time-limited chat mode, encrypt the IM information in the cloud chat window according to a preset encryption rule;
  • the sending monitoring module 40 is configured to send the IM information completed by the encryption processing to the second chat window of the receiving end, and monitor the reading status of the IM information in the second chat window;
  • the detection deletion module 50 is configured to delete the IM information in the first chat window and/or the second chat window when detecting that the IM information reading in the second chat window is completed.
  • the steps of implementing the function of the IM information protection device can refer to various embodiments of the IM information protection method of the present application, and details are not described herein again. It should be added that the IM information protection device in this proposal point may be a component of the IM information protection device, or may constitute an IM information protection device independently.
  • the embodiment of the present application further provides a computer storage medium.
  • the computer storage medium stores an IM information protection program, and the IM information protection program is executed by the processor to implement various embodiments of the IM information method, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé de protection d'informations d'IM, comprenant les étapes suivantes consistant : à recevoir une demande d'envoi déclenchée par une première fenêtre de conversation en ligne d'une extrémité d'envoi, à acquérir des informations d'IM dans la demande d'envoi, et à établir une fenêtre de conversation en ligne en nuage correspondant aux informations d'IM ; à déterminer, en fonction d'informations associées de la première fenêtre de conversation en ligne, si un mode de conversation en ligne limité dans le temps de la fenêtre de conversation en ligne en nuage est activé ; si le mode de conversation en ligne limité dans le temps est activé, à chiffrer les informations d'IM dans la fenêtre de conversation en ligne en nuage selon une règle de chiffrement prédéfinie ; à envoyer les informations d'IM chiffrées à une seconde fenêtre de conversation en ligne d'une extrémité de réception, et à surveiller l'état de lecture des informations d'IM dans la seconde fenêtre de conversation en ligne ; et à supprimer les informations d'IM dans la première fenêtre de conversation en ligne et/ou dans la seconde fenêtre de conversation en ligne après que la lecture des informations d'IM a été détectée. L'invention concerne également un dispositif et un appareil de protection d'informations d'IM, et un support d'informations d'ordinateur.
PCT/CN2018/082245 2018-02-23 2018-04-09 Procédé de protection d'informations de messagerie instantanée, appareil et dispositif, et support d'informations d'ordinateur WO2019161599A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810156888.6A CN108390819A (zh) 2018-02-23 2018-02-23 Im信息保护方法、装置、设备和计算机存储介质
CN201810156888.6 2018-02-23

Publications (1)

Publication Number Publication Date
WO2019161599A1 true WO2019161599A1 (fr) 2019-08-29

Family

ID=63069093

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/082245 WO2019161599A1 (fr) 2018-02-23 2018-04-09 Procédé de protection d'informations de messagerie instantanée, appareil et dispositif, et support d'informations d'ordinateur

Country Status (2)

Country Link
CN (1) CN108390819A (fr)
WO (1) WO2019161599A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205319A (zh) * 2020-09-18 2022-03-18 腾讯科技(深圳)有限公司 一种即时通讯方法及装置

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181905B (zh) * 2019-06-28 2021-11-19 腾讯科技(深圳)有限公司 文件加密方法及装置
CN111818466B (zh) * 2020-05-29 2022-02-22 维沃移动通信有限公司 信息发送、接收方法及装置、电子设备及可读存储介质
CN112217714B (zh) * 2020-11-05 2022-08-02 上海云鱼智能科技有限公司 即时通讯会话中双向删除信息的方法、装置、服务器、客户端、终端和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102325096A (zh) * 2011-08-29 2012-01-18 上海量明科技发展有限公司 用以实现通信内容寿命管理的方法、终端及系统
CN102685018A (zh) * 2011-03-07 2012-09-19 腾讯科技(深圳)有限公司 一种网络即时通信信息处理的方法、系统及即时通信设备
CN104158727A (zh) * 2014-08-29 2014-11-19 蓝信工场(北京)科技有限公司 一种定时删除即时消息的方法和装置
CN104954237A (zh) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 一种即时通信方法
CN105791105A (zh) * 2016-05-20 2016-07-20 北京北信源软件股份有限公司 一种即时通信消息的阅后即焚实现方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685018A (zh) * 2011-03-07 2012-09-19 腾讯科技(深圳)有限公司 一种网络即时通信信息处理的方法、系统及即时通信设备
CN102325096A (zh) * 2011-08-29 2012-01-18 上海量明科技发展有限公司 用以实现通信内容寿命管理的方法、终端及系统
CN104158727A (zh) * 2014-08-29 2014-11-19 蓝信工场(北京)科技有限公司 一种定时删除即时消息的方法和装置
CN104954237A (zh) * 2015-07-15 2015-09-30 山西佰纳得科技有限公司 一种即时通信方法
CN105791105A (zh) * 2016-05-20 2016-07-20 北京北信源软件股份有限公司 一种即时通信消息的阅后即焚实现方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205319A (zh) * 2020-09-18 2022-03-18 腾讯科技(深圳)有限公司 一种即时通讯方法及装置
CN114205319B (zh) * 2020-09-18 2023-12-01 腾讯科技(深圳)有限公司 一种即时通讯方法及装置

Also Published As

Publication number Publication date
CN108390819A (zh) 2018-08-10

Similar Documents

Publication Publication Date Title
WO2019161599A1 (fr) Procédé de protection d'informations de messagerie instantanée, appareil et dispositif, et support d'informations d'ordinateur
WO2015137745A1 (fr) Système et procédé de chiffrement de dossier dans un dispositif
WO2019196213A1 (fr) Procédé, appareil et dispositif de test d'interface, et support d'informations lisible par ordinateur
WO2016178548A1 (fr) Procédé et appareil de fourniture de profil
WO2019231252A1 (fr) Dispositif électronique utilisé pour authentifier un utilisateur, et procédé de commande associé
WO2017035695A1 (fr) Procédé de transmission d'informations et dispositif mobile
WO2015172684A1 (fr) Procédé de connexion à un ap, terminal et serveur
WO2019001110A1 (fr) Procédé, système et dispositif d'authentification d'autorité, et support d'informations lisible par ordinateur
WO2016167536A1 (fr) Procédé et appareil de gestion d'un profil d'un terminal dans un système de communication sans fil
WO2019205280A1 (fr) Procédé, appareil, et dispositif d'essai de serveur, et support de stockage lisible par ordinateur
WO2020235782A1 (fr) Procédé d'authentification d'identification personnelle dans un environnement distribué
WO2017099342A1 (fr) Procédé, appareil et système pour fournir des informations de compte temporaire
WO2018082482A1 (fr) Procédé de partage de réseau et procédé et système d'accès à un réseau
WO2021075867A1 (fr) Procédé de stockage et de récupération de clés pour système basé sur des chaînes de blocs et dispositif associé
WO2016126052A2 (fr) Procédé et système d'authentification
WO2019100531A1 (fr) Procédé de génération de signature numérique et dispositif associé, procédé de vérification et dispositif associé, et support d'informations
EP3284274A1 (fr) Procédé et appareil de gestion d'un profil d'un terminal dans un système de communication sans fil
WO2017054481A1 (fr) Procédé et appareil de vérification et de traitement d'informations, et système de traitement d'informations
WO2019161597A1 (fr) Procédé, appareil et dispositif d'envoi d'informations sur la base d'une messagerie instantanée, et support d'informations
WO2017007132A1 (fr) Procédé, appareil, et système de surveillance de session de communication de données chiffrées
WO2016076638A1 (fr) Appareil et procédé de paiement
WO2021040205A1 (fr) Dispositif électronique et procédé de transfert d'instruction de commande à un dispositif cible par un dispositif électronique
WO2015194836A1 (fr) Procédé et dispositif de partage de clé
WO2019146812A1 (fr) Système de mise à jour de véhicule et procédé de commande
WO2018034491A1 (fr) Dispositif primaire, dispositif accessoire et procédés de traitement d'opérations sur le dispositif primaire et le dispositif accessoire

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18907055

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18907055

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10/11/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18907055

Country of ref document: EP

Kind code of ref document: A1