Supercharge Your Innovation With Domain-Expert AI Agents!

An instant messaging method and system

A communication method and communication service technology, which are applied in the field of instant communication methods and systems, and can solve the problems of tampering, malicious attack and deletion of communication content.

Active Publication Date: 2022-07-12
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing instant messaging method, the instant messaging server usually uses an encryption algorithm to encrypt the communication content before transmission. However, it is found in practice that the existing method encrypts the communication content as a layer of encryption, and the encryption key needs to be in The exchange between the instant messaging client and the instant messaging server results in that the ciphertext of the encrypted communication content of the instant messaging client can be decrypted into plaintext after it is transmitted to the instant messaging server, and the communication content has been tampered with or deleted. , the risk of being maliciously attacked
It can be seen that the security of the existing instant messaging method is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An instant messaging method and system
  • An instant messaging method and system
  • An instant messaging method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] see figure 1 , figure 1 The embodiment of the present application provides a schematic flowchart of an instant communication method. Wherein, the instant messaging method includes:

[0079] S101. Acquire first key information of a first client and a server public key of an instant messaging server.

[0080] In the embodiment of the present application, the execution body of the method may be the first user terminal, and may specifically be a communication device such as a computer, a smart phone, a tablet computer, a wearable communication device, etc., which is not limited in this embodiment.

[0081] In this embodiment of the present application, the first key information includes a first client key pair, a first dynamic key, and a second dynamic key, which is not limited in this embodiment of the present application.

[0082] In this embodiment of the present application, the first client may generate and store a first client key pair by using an asymmetric encryp...

Embodiment 2

[0114] see figure 2 , figure 2 This is a schematic flowchart of an instant messaging method provided by an embodiment of the present application. like figure 2 shown, wherein the instant messaging method includes:

[0115] S201. Generate a first client key pair by using an asymmetric encryption algorithm, where the first client key pair includes a first public key and a first private key.

[0116] S202. Generate a first dynamic key and a second dynamic key respectively through a random algorithm.

[0117] S203: Obtain the server public key generated by the instant messaging server through an asymmetric encryption algorithm.

[0118] In this embodiment of the present application, when acquiring the server public key SPubKey of the instant messaging server, the first client can also send the first public key PubKey1 and the first dynamic key TempSKey1 to the instant messaging server.

[0119] In the embodiment of this application, for the first client, the first client f...

Embodiment 3

[0143] see image 3 , image 3 This is a schematic flowchart of an instant messaging method provided by an embodiment of the present application. like image 3 As shown, the instant messaging method is applied to an instant messaging server, including:

[0144] S301. Obtain a server key pair of an instant messaging server, wherein the server key pair includes a server public key and a server private key.

[0145] In the embodiment of the present application, the instant messaging server generates and stores a server key pair through an asymmetric encryption algorithm, wherein the server key pair includes the server public key SPubKey and the server private key SPrivateKey.

[0146] In this embodiment of the present application, the instant messaging server may specifically be a server, which may be deployed in a private cloud network, which is not limited in this embodiment of the present application.

[0147] S302. Send the server public key to the first client and the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An instant messaging method and system, relating to the field of communications technology, the instant messaging method comprising: acquiring first key information of a first client and a server public key of an instant messaging server, and generating a first key information according to the first key information and the server public key. a public key; receive the second public key encrypted information sent by the instant messaging server, decrypt the second public key encrypted information according to the first public key, and obtain the second public key of the second client; key information and the second public key to generate a second public key with the second client; perform secondary encryption processing on the communication information through the second public key and the first public key to obtain the first communication encrypted information , and send the encrypted information of the first communication to the second client through the pre-built private cloud network to complete the instant communication process. Through the secondary encryption processing, the security of communication can be improved, thereby ensuring the information security of communication users.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, to an instant communication method and system. Background technique [0002] Instant Messaging (abbreviated as IM) refers to the business that can instantly send and receive Internet messages. It is a terminal service that allows two or more people to instantly transfer text, Documents, voice and video to communicate. In the existing instant messaging method, the instant messaging server usually encrypts the communication content with an encryption algorithm and then transmits it. However, in practice, it is found that the existing method encrypts the communication content as a layer of encryption, and the encryption key needs to be in the The exchange between the instant messaging client and the instant messaging server results in that after the encrypted cipher text of the communication content of the instant messaging client is transmitted to the instant ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/16H04L51/04
CPCH04L63/0435H04L9/0869H04L9/16H04L51/04
Inventor 姜新利陈天凯罗元
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More