An instant messaging method and system
A communication method and communication service technology, which are applied in the field of instant communication methods and systems, and can solve the problems of tampering, malicious attack and deletion of communication content.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] see figure 1 , figure 1 The embodiment of the present application provides a schematic flowchart of an instant communication method. Wherein, the instant messaging method includes:
[0079] S101. Acquire first key information of a first client and a server public key of an instant messaging server.
[0080] In the embodiment of the present application, the execution body of the method may be the first user terminal, and may specifically be a communication device such as a computer, a smart phone, a tablet computer, a wearable communication device, etc., which is not limited in this embodiment.
[0081] In this embodiment of the present application, the first key information includes a first client key pair, a first dynamic key, and a second dynamic key, which is not limited in this embodiment of the present application.
[0082] In this embodiment of the present application, the first client may generate and store a first client key pair by using an asymmetric encryp...
Embodiment 2
[0114] see figure 2 , figure 2 This is a schematic flowchart of an instant messaging method provided by an embodiment of the present application. like figure 2 shown, wherein the instant messaging method includes:
[0115] S201. Generate a first client key pair by using an asymmetric encryption algorithm, where the first client key pair includes a first public key and a first private key.
[0116] S202. Generate a first dynamic key and a second dynamic key respectively through a random algorithm.
[0117] S203: Obtain the server public key generated by the instant messaging server through an asymmetric encryption algorithm.
[0118] In this embodiment of the present application, when acquiring the server public key SPubKey of the instant messaging server, the first client can also send the first public key PubKey1 and the first dynamic key TempSKey1 to the instant messaging server.
[0119] In the embodiment of this application, for the first client, the first client f...
Embodiment 3
[0143] see image 3 , image 3 This is a schematic flowchart of an instant messaging method provided by an embodiment of the present application. like image 3 As shown, the instant messaging method is applied to an instant messaging server, including:
[0144] S301. Obtain a server key pair of an instant messaging server, wherein the server key pair includes a server public key and a server private key.
[0145] In the embodiment of the present application, the instant messaging server generates and stores a server key pair through an asymmetric encryption algorithm, wherein the server key pair includes the server public key SPubKey and the server private key SPrivateKey.
[0146] In this embodiment of the present application, the instant messaging server may specifically be a server, which may be deployed in a private cloud network, which is not limited in this embodiment of the present application.
[0147] S302. Send the server public key to the first client and the se...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com