Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Group message interaction realization method and system

A group information and group message technology, applied in the network field, can solve the problems of data information loss, inability to authenticate and control, time-consuming and labor-intensive, etc.

Inactive Publication Date: 2011-07-20
SUZHOU CODYY NETWORK SCI & TECH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the popularization and application of these instant messaging tools, their disadvantages are constantly exposed:
[0004] (1) All data information communicated by users is stored in the computer terminal. Once the computer is lost or the storage hard disk or other storage devices are damaged, the data information will be permanently lost
[0005] (2) The user must download and install the client software and upgrade it in time, which is time-consuming and laborious
[0007] As the number of Web IM users continues to increase, everyone's functional requirements for Web IM are also gradually increasing. From the original simple one-to-one chat, it has begun to shift to group communication and multi-person communication, but there is no specific implementation plan
In addition, the synchronization of messages is often passive, and effective authentication control cannot be carried out, which may easily cause security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group message interaction realization method and system
  • Group message interaction realization method and system
  • Group message interaction realization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] User A logs in to the webpage and obtains the ID of each group that the user joins;

[0072] The webpage loads the flash plug-in, the flash plug-in connects to the communication server, and the flash plug-in starts to monitor messages;

[0073] The Flash plug-in sends all group IDs and user accounts to the synchronous storage server through the communication server;

[0074] After the synchronous storage server receives the message, it searches out the member hash table corresponding to each group ID from the group hash table, and adds the user account to the member hash table corresponding to each group ID;

[0075] The source user sends a group message command to the communication server, and the communication server performs authentication after receiving the group message command sent by the source user: source user identity authentication, data command authority authentication (whether the source user has the authority to send group message commands) , authenticat...

Embodiment 2

[0080] User A logs in to the webpage and obtains the ID of each group that the user joins;

[0081] The webpage loads the flash plug-in, the flash plug-in connects to the communication server, and the flash plug-in starts to monitor messages;

[0082] The Flash plug-in sends all group IDs and user accounts to the communication server;

[0083] After the communication server receives the message, it searches out the member hash table corresponding to each group ID from the group hash table, and adds the user account to the member hash table corresponding to each group ID;

[0084] The source user sends a group message command to the communication server, and the communication server performs authentication after receiving the group message command sent by the source user: source user identity authentication, data command authority authentication (whether the source user has the authority to send group message commands) , authentication of the target authority of the source use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a group message interaction realization method, which comprises the following steps of: a communication server authenticates the received group message instruction transmission right of a source user, authenticates the group message instruction receiving rights of group members after the group message instruction transmission right of the source user passes the authentication, and transmits a group message and the information of each member in a member Hash table corresponding to a found group identifier to a synchronous storage server after the group message instruction receiving rights of the group members pass the authentication; and after receiving the group message, the synchronous storage server stores and updates the group message with the group identifier, and transmits the updated group message with the group identifier to each group member in the member Hash table corresponding to the group identifier. The invention provides a group message interaction realization system. By the method and the system, secure group communication and multi-member secure communication can be realized without downloading and installing any software.

Description

technical field [0001] The invention belongs to the field of network technology, and in particular relates to a method and system for realizing group information interaction. Background technique [0002] The rapid development of Internet technology allows people to chat with others and participate in business meetings without leaving home, and has truly realized instant messaging. In addition to mobile phones, landline phones and e-mails, MSN, QQ, Netease Bubbles, etc. are common instant messaging tools. With the help of these instant messaging tools, users can conduct single-person or multi-person video, hold online video conferences, and conduct online distance education, which greatly reduces communication costs and improves communication efficiency. [0003] However, with the popularization and application of these instant messaging tools, their disadvantages are constantly exposed: [0004] (1) All data information communicated by users is stored in the computer term...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58H04L29/06H04L9/32H04L29/08
Inventor 胡加明
Owner SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products