CN107888474A - A kind of method of controlling security and device for the interconnection of different instantaneous communication systems - Google Patents
A kind of method of controlling security and device for the interconnection of different instantaneous communication systems Download PDFInfo
- Publication number
- CN107888474A CN107888474A CN201610867308.5A CN201610867308A CN107888474A CN 107888474 A CN107888474 A CN 107888474A CN 201610867308 A CN201610867308 A CN 201610867308A CN 107888474 A CN107888474 A CN 107888474A
- Authority
- CN
- China
- Prior art keywords
- communication system
- instantaneous communication
- mark
- user
- instantaneous
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of method of controlling security for the interconnection of different instantaneous communication systems, including:Instantaneous communication system stores user's mark of the system and the mark of other instantaneous communication systems in accesses control list;First instantaneous communication system receives the interconnection request of the second instantaneous communication system, checks accesses control list, determines that can the first instantaneous communication system establish network connection with the second instantaneous communication system;First instantaneous communication system receives the instant messaging request of the user of the second instantaneous communication system, check accesses control list, if the mark of destinations traffic user is in accesses control list, and the mark of the second instantaneous communication system is associated with, the first instantaneous communication system allows the destinations traffic user and the user of the second instantaneous communication system to carry out instant messaging.The invention also discloses a kind of safety control for the interconnection of different instantaneous communication systems.
Description
Technical field
The invention belongs to instant messaging field, is related to interconnecting for different instantaneous communication systems, more particularly to such as
How the interconnection to different instantaneous communication systems carries out security control.
Background technology
Instant messaging (Instant Messaging, abbreviation IM) is utilized between mobile phone, tablet personal computer and computer user
Network carries out transmission and the receive process of instant message, can transmit the information such as word, picture, sound and video, be very general
All over and one of welcome network application.Typical IM applications have wechat, QQ, Linkdood, Michat, WhatsApp and
Telegram etc..
Most instant messaging now all occurs in an instantaneous communication system, and the information such as privacy of user is stored in
In system public server on internet, there is very big information leakage risk.Based on being considered to information security, some
Independent instantaneous communication system is built using privately owned server or rental Cloud Server by enterprise, administration, R&D institution etc.,
Improve the security of instant messaging.But in the case where different instantaneous communication systems interconnect, information security issue again will
Occur, instantaneous communication system needs the authority that management system itself connects with the cross-system of user, to ensure information security.And mesh
Before, when different instantaneous communication systems interconnect, the emphasis of concern is still also focused in protocol conversion, and information security issue is examined
Consider less.
The content of the invention
The purpose of the present invention, be interconnecting for different instantaneous communication systems, there is provided a kind of method of controlling security and
Device so that instantaneous communication system can be attached on the premise of inherently safe is ensured with other instantaneous communication systems, its
User can carry out safe instant messaging.
In a first aspect, the embodiments of the invention provide a kind of security control side for the interconnection of different instantaneous communication systems
Method, it is characterised in that methods described includes:
Instantaneous communication system stores user's mark and other instant messaging systems of the system in accesses control list
The mark of system, user's mark are associated with the mark for other instantaneous communication systems that the user is able to access that;
First instantaneous communication system receives the interconnection request from the second instantaneous communication system, checks accesses control list,
If the mark of the second instantaneous communication system is in accesses control list, the first instantaneous communication system and the second instantaneous communication system
Identity is mutually authenticated, establishes network connection;
First instantaneous communication system receives the instant messaging request of the user of the second instantaneous communication system, checks access control
List, if the mark of destinations traffic user in accesses control list, and is associated with the mark of the second instantaneous communication system,
One instantaneous communication system allows the destinations traffic user and the user of the second instantaneous communication system to carry out instant messaging.
Method of controlling security as mentioned, it is characterised in that received in first instantaneous communication system from second i.e.
When communication system interconnection request before, the second instantaneous communication system can inquire about the accesses control list of oneself, and only first is
When communication system mark in accesses control list when, interconnection request can just be sent from the second instantaneous communication system.
Method of controlling security as mentioned, it is characterised in that received in first instantaneous communication system from second i.e.
When communication system interconnection request, check after accesses control list, if the mark of the second instantaneous communication system is not accessing
Control in list, the first instantaneous communication system will refuse the connection request of the second instantaneous communication system.
Method of controlling security as mentioned, it is characterised in that the interconnection request bag contains the mark of the second instantaneous communication system
Knowledge and its digital certificate.
Method of controlling security as mentioned, it is characterised in that first instantaneous communication system and the second instant messaging system
Identity is mutually authenticated in system, including:
The mark and its digital certificate of second instantaneous communication system of first instantaneous communication system in interconnection request, are tested
Demonstrate,prove the identity of the second instantaneous communication system;
After being verified, the first instantaneous communication system sends the response message being proved to be successful to the second instantaneous communication system,
The response message includes the mark and its digital certificate of the first instantaneous communication system;
Second instantaneous communication system is according to the response message, the identity of the first instantaneous communication system of checking.
Method of controlling security as mentioned, it is characterised in that in first instantaneous communication system and the second instant messaging
When identity is mutually authenticated in system, if either party authentication to other side fails, the first instantaneous communication system is with second
When communication system will not establish network connection.
Method of controlling security as mentioned, it is characterised in that receive the second IMU in first instantaneous communication system
Before the instant messaging request of the user of letter system, the second instantaneous communication system can inquire about the accesses control list of oneself, only
The mark of the user of second instantaneous communication system is associated with the mark of the first instantaneous communication system in accesses control list,
Instant messaging request can just be sent from the second instantaneous communication system.
Method of controlling security as mentioned, it is characterised in that receive the second IMU in first instantaneous communication system
After the instant messaging request of the user of letter system, if the mark of destinations traffic user not in accesses control list, or does not have
The mark of relevant second instantaneous communication system, the first instantaneous communication system will refuse user and the institute of the second instantaneous communication system
State destinations traffic user and carry out instant messaging.
Second aspect, the embodiments of the invention provide a kind of security control dress for the interconnection of different instantaneous communication systems
Put, it is characterised in that the device includes:
Accesses control list, the user for storing instantaneous communication system identifies and the mark of other instantaneous communication systems
Know, user's mark is associated with the mark for other instantaneous communication systems that the user is able to access that;
System interconnects security module, for being received when the first instantaneous communication system from any one the second instant messaging system
System interconnection request when, check accesses control list, if the mark of the second instantaneous communication system in accesses control list, and
Identity success is mutually authenticated in first instantaneous communication system and the second instantaneous communication system, allows for the first instantaneous communication system and the
Two instantaneous communication systems establish network connection;
User's COMSEC module, for when the first instantaneous communication system receive the second instantaneous communication system user i.e.
When communication request when, accesses control list is checked, if the mark of destinations traffic user in accesses control list, and is associated with
The mark of second instantaneous communication system, allow for the destinations traffic user and the second instant messaging of the first instantaneous communication system
The user of system carries out instant messaging.
Safety control as mentioned, it is characterised in that first instantaneous communication system and the second instant messaging system
Identity is mutually authenticated in system, including:
The system interconnection security module of first instantaneous communication system, according to the interconnection instantaneous communication system of requests verification second
Identity, the interconnection request bag contain the mark and its digital certificate of the second instantaneous communication system;
After being verified, the system of the first instantaneous communication system interconnects security module and tested to the transmission of the second instantaneous communication system
Successful response message is demonstrate,proved, the response message includes the mark and its digital certificate of the first instantaneous communication system;
The system interconnection security module of second instantaneous communication system verifies the first instant messaging system according to the response message
The identity of system.
Technique according to the invention scheme, it is possible to achieve the safety between different instantaneous communication systems is interconnected, and it is used
Family can carry out the instant messaging of safe ready.
To make the above-mentioned purpose of the present invention, feature and advantage more obvious understandable, preferred embodiment cited below particularly, and match somebody with somebody
Accompanying drawing appended by conjunction, is described in detail below.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached
Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair
The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this
A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 is a kind of method of controlling security for the interconnection of different instantaneous communication systems that the embodiment of the present invention is provided
Flow chart.
Fig. 2 is a kind of safety control for the interconnection of different instantaneous communication systems that the embodiment of the present invention is provided
Structural representation.
Fig. 3 is the message structure body of instant messaging request.
Fig. 4 is the flow chart that identity process is mutually authenticated between the instantaneous communication system of the embodiment of the present invention.
Fig. 5 is the application example schematic diagram across instantaneous communication system interconnection of the embodiment of the present invention.
The step of Fig. 6 is across the instantaneous communication system interconnection of the embodiment of the present invention is schemed.
Embodiment
The present invention is further detailed explanation with reference to the accompanying drawings and detailed description.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.The present invention implementation being generally described and illustrated herein in the accompanying drawings
The component of example can be configured to arrange and design with a variety of.
Therefore, below the detailed description of the embodiments of the invention to providing in the accompanying drawings be not intended to limit it is claimed
The scope of the present invention, but be merely representative of the present invention selected embodiment.It is common based on the embodiment in the present invention, this area
The every other embodiment that technical staff is obtained under the premise of creative work is not made, belong to the model that the present invention protects
Enclose.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi
It is defined, then it further need not be defined and explained in subsequent accompanying drawing in individual accompanying drawing.
In the description of the invention, it is necessary to which explanation, term " first ", " second ", " the 3rd " etc. are only used for differentiation and retouched
State, and it is not intended that instruction or hint relative importance.
In the description of the invention, it is necessary to illustrate, to make expression easy, by " first is in part paragraph, accompanying drawing
When communication system " " the second instantaneous communication system " be reduced to " S1 systems ", " S2 systems ", represent first with " v ", " v1 ", " v2 "
User on instantaneous communication system, the user on the second instantaneous communication system is represented with " u ", " u1 ", " u2 ".
As shown in figure 1, it is a kind of security control for the interconnection of different instantaneous communication systems of present pre-ferred embodiments
The flow chart of method.It the described method comprises the following steps:
Step S110, user's mark of the system is being stored in the typing of instantaneous communication system safety control 200
Know and the mark of other instantaneous communication systems, user's mark are associated with other instant messagings that the user is able to access that
The mark of system;
Keeper typing storage access can control list on instant communication server, and control list can include:With
Family terminal unique mark, the mark of other instantaneous communication systems, user described in the user-association are able to access that other IMUs
Believe system banner.User's mark can be including but not limited to mobile terminal device sequence number or user account herein, Suo Youke
It is all within the scope of the present invention uniquely to distinguish the mark of user.
Keeper whether each system user can be allowed in list is controlled to communicate with other instantaneous communication systems into
Row setting.The structure of control list is generally<Instant communication users identify, and instantaneous communication system mark, action (allows or prohibited
Only)>.For example, the user u1 in S2 instantaneous communication systems in S2 control list, can will appear as with S1 interconnections<
U1, S1, it is allowed to>.
Step S120:First instantaneous communication system receives the interconnection request from the second instantaneous communication system, checks access
List is controlled, if the mark of the second instantaneous communication system, in accesses control list, the first instantaneous communication system is with second
When communication system identity is mutually authenticated, establish network connection;
Step S130:First instantaneous communication system receives the instant messaging request of the user of the second instantaneous communication system, looks into
Accesses control list is seen, if the mark of destinations traffic user in accesses control list, and is associated with the second instant messaging system
The mark of system, the first instantaneous communication system allow the destinations traffic user and the user of the second instantaneous communication system to carry out immediately
Communication.
Specifically, Fig. 5, Fig. 6 are refer to, the specific implementation step for hereinafter having the embodiment of the present invention.
As shown in Fig. 2 it is a kind of safety control for the interconnection of different instantaneous communication systems of the embodiment of the present invention
200 structural representation, as shown in Fig. 2 the safety control includes:Accesses control list 210, system interconnection security module
220 and user's COMSEC module 230.
As shown in figure 3, be the embodiment of the present invention instantaneous communication system in user to another instantaneous communication system
In the message structure schematic diagram of instant messaging request message that sends of user, including message header and message content, wherein, message
Head further comprises the mark of local instantaneous communication system, local user's mark, target instantaneous communication system mark, targeted customer's mark
Know.Such as the user u1 in S2 instantaneous communication systems wants to carry out instant messaging, hair with the user v1 in S1 instantaneous communication systems
Send instant messaging request message be exactly:
<Local instantaneous communication system S2, local user u1, target instantaneous communication system S1, targeted customer v1><In message
Hold>;
As shown in figure 4, be the embodiment of the present invention instantaneous communication system between the flow chart of identity process is mutually authenticated.Method
Comprise the following steps:
Step S210:The mark and its number of second instantaneous communication system of first instantaneous communication system in interconnection request
Word certificate, verify the identity of the second instantaneous communication system;
The mark of the instantaneous communication system is unique existing, and it is the service in instantaneous communication system that can be, but not limited to
Device ID.
The digital certificate can be by a Third Party Authentication center CA trusty, be responsible for digital certificate generation,
Sign and issue, download and nullify, can specifically be given birth to according to the mark of instantaneous communication system and CA itself private key for instantaneous communication system
Into digital certificate.
Step S220:After being verified, the first instantaneous communication system sends what is be proved to be successful to the second instantaneous communication system
Response message, the response message include the mark and its digital certificate of the first instantaneous communication system;
Step S230:Second instantaneous communication system is according to the response message, the identity of the first instantaneous communication system of checking.
As shown in Figure 5, Figure 6, be embodiments of the invention across instantaneous communication system interconnection application example schematic diagram with
The step of across instantaneous communication system interconnection of the embodiment of the present invention, schemes.
For example, when instantaneous communication system S2 control list includes<U1, S1, it is allowed to>, S1 control list includes<V1,
S2, it is allowed to>.Now, the user u1 on instantaneous communication system S2 wants to contact with the user v1 on instantaneous communication system S1, to
Instantaneous communication system S2 have issued connection request:<Local instantaneous communication system:S2, local user:U1, target instant messaging system
System:S1, targeted customer:v2><Message content>, instantaneous communication system S2 instant messaging safety device 200 receives described disappear
After ceasing body, start the operation that identity is mutually authenticated between instantaneous communication system, user's communication security by system interconnection security module 220
Module 230 reads the local user's mark analyzed in the connection request message and identified with target instantaneous communication system<It is local to use
Family:U1, target instantaneous communication system:S1>, queried access control control list 210<U1, S1, it is allowed to>, analyze and draw and can send out
The message is given, instantaneous communication system S2 and instantaneous communication system S1 is established and contacted, and the connection request message is sent to i.e.
When communication system S1 instant messaging safety device 200 on, instantaneous communication system S1 instant messaging safety device 200 is to described
Message body is analyzed, and the targeted customer analyzed in the connection request message is read by user's COMSEC module 230 and is identified
Identified with local instantaneous communication system<Local instantaneous communication system:S2, targeted customer:v2>, queried access control control list
210<V1, S2, it is allowed to>, analysis, which is drawn, can establish connection.The cross-system that user u1 is able to establish safety with user v1 is connected.
In another embodiment of the present invention, the second instantaneous communication system is received in first instantaneous communication system
User instant messaging request after, if the mark of destinations traffic user not in the first instant messaging accesses control list,
Or the mark without the second instantaneous communication system of association, the first instantaneous communication system will refuse the user of the second instantaneous communication system
Instant messaging is carried out with the destinations traffic user.For example, when instantaneous communication system S2 control list includes<U1, S1, it is allowed to
>, S1 control list includes<V2, S2, forbid>.Now, the user u1 on instantaneous communication system S2 thinks and instantaneous communication system
User v2 on S1 is contacted, and connection request is have issued to instantaneous communication system S1:<Local instantaneous communication system:S2, it is local
User:U1, target instantaneous communication system:S1, targeted customer:v2><Message content>, instantaneous communication system S1 instant messaging peace
After full device 200 receives the message body, body is mutually authenticated between starting instantaneous communication system by system interconnection security module 220
The operation of part, user's COMSEC module 230, which reads the local user analyzed in the connection request message and identified with target, is
When communication system identify<Local instantaneous communication system:S2, targeted customer:v2>, queried access control control list 210<V2,
S2, forbid>, analyze and perform refusal and establish connection decision.
In another embodiment of the present invention, instant messaging interconnection is sent in the user of second instantaneous communication system
After request, if the mark of local instant communication users is not in the second instant messaging accesses control list, or do not associate
The mark of first instantaneous communication system, the second instantaneous communication system will refuse user and carry out IMU with the destinations traffic user
Letter.
For example, when instantaneous communication system S2 control list includes<U2, S1, forbid>, S1 control list includes<V1,
S2, it is allowed to>.Now, the user u2 on instantaneous communication system S2 wants to contact with the user v1 on instantaneous communication system S1, to
Instantaneous communication system S2 have issued connection request:<Local instantaneous communication system:S2, local user:U2, target instant messaging system
System:S1, targeted customer:v21><Message content>, instantaneous communication system S2 instant messaging safety device 200 receives described disappear
After ceasing body, the analysis connection request message is read by system interconnection security module 220, user's COMSEC module 230 at once
In local user mark with target instantaneous communication system identify<Local user:U2, target instantaneous communication system:S1>, inquiry
Access control controls list 210<U2, S1, forbid>, analyze and perform refusal and establish connection decision.
According to a kind of embodiment, the safety control of instantaneous communication system show that refusal establishes determining for connection in analysis
After determining and performing, can will for example " connection failure, you not with S1 systems interconnection authority " information be sent to user end
End.
In summary, a kind of method of controlling security and dress for the interconnection of different instantaneous communication systems provided by the invention
Put, by setting the accesses control list 210 in safety control 200, setting instant communication users connection instant messaging system
The authority of system, then divided again by the system interconnection security module 220 in safety control 200 with user information safety module 230
The identification parameter in connection request message is analysed, queried access control list 210, draws the decision for whether establishing connection.It is in this way, real
The security control across instantaneous communication system interconnection is showed.Method provided by the invention is simple and easy, is effectively saved cost, and carry
High Consumer's Experience.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included in the scope of the protection.
Claims (10)
1. a kind of method of controlling security for the interconnection of different instantaneous communication systems, it is characterised in that methods described includes:
Instantaneous communication system stores the user's mark and other instantaneous communication systems of the system in accesses control list
Mark, user's mark are associated with the mark for other instantaneous communication systems that the user is able to access that;
First instantaneous communication system receives the interconnection request from the second instantaneous communication system, checks accesses control list, if
For the mark of second instantaneous communication system in accesses control list, the first instantaneous communication system and the second instantaneous communication system are mutual
Identity is verified, establishes network connection;
First instantaneous communication system receives the instant messaging request of the user of the second instantaneous communication system, checks that access control arranges
Table, if the mark of destinations traffic user in accesses control list, and is associated with the mark of the second instantaneous communication system, first
Instantaneous communication system allows the destinations traffic user and the user of the second instantaneous communication system to carry out instant messaging.
2. method of controlling security according to claim 1, it is characterised in that receive to come in first instantaneous communication system
From before the interconnection request of the second instantaneous communication system, the second instantaneous communication system can inquire about the accesses control list of oneself, only
When having the mark of the first instantaneous communication system in accesses control list, interconnection request can just be sent out from the second instantaneous communication system
Go out.
3. method of controlling security according to claim 1, it is characterised in that receive to come in first instantaneous communication system
Ask, check after accesses control list, if the mark of the second instantaneous communication system from the interconnection of the second instantaneous communication system
Not in accesses control list, the first instantaneous communication system will refuse the connection request of the second instantaneous communication system.
4. the method for controlling security according to claims 1 to 3, it is characterised in that the interconnection request bag is instant containing second
The mark and its digital certificate of communication system.
5. method of controlling security according to claim 1, it is characterised in that first instantaneous communication system is with second
When communication system identity is mutually authenticated, including:
First instantaneous communication system asked according to interconnection in the second instantaneous communication system mark and its digital certificate, checking the
The identity of two instantaneous communication systems;
After being verified, the first instantaneous communication system sends the response message being proved to be successful to the second instantaneous communication system, described
Response message includes the mark and its digital certificate of the first instantaneous communication system;
Second instantaneous communication system is according to the response message, the identity of the first instantaneous communication system of checking.
6. method of controlling security according to claim 1, it is characterised in that in first instantaneous communication system and second
When identity is mutually authenticated in instantaneous communication system, if either party authentication to other side fails, the first instantaneous communication system
Network connection will not be established with the second instantaneous communication system.
7. method of controlling security according to claim 1, it is characterised in that receive in first instantaneous communication system
Before the instant messaging request of the user of two instantaneous communication systems, the second instantaneous communication system can inquire about the access control row of oneself
Table, the only mark of the user of the second instantaneous communication system are associated with the first instantaneous communication system in accesses control list
Mark, instant messaging request can just be sent from the second instantaneous communication system.
8. method of controlling security according to claim 1, it is characterised in that receive in first instantaneous communication system
After the instant messaging request of the user of two instantaneous communication systems, if the mark of destinations traffic user is not in accesses control list
In, or the mark without the second instantaneous communication system of association, the first instantaneous communication system will refuse second instantaneous communication system
User carries out instant messaging with the destinations traffic user.
9. a kind of safety control for the interconnection of different instantaneous communication systems, it is characterised in that the device includes:
Accesses control list, the user for storing instantaneous communication system identifies and the mark of other instantaneous communication systems, institute
State the mark that user's mark is associated with other instantaneous communication systems that the user is able to access that;
System interconnects security module, for being received when the first instantaneous communication system from any one the second instantaneous communication system
During interconnection request, check accesses control list, if the mark of the second instantaneous communication system in accesses control list, and first
Instantaneous communication system and the second instantaneous communication system be mutually authenticated identity success, allow for the first instantaneous communication system with second i.e.
When communication system establish network connection;
User's COMSEC module, the IMU of the user for receiving the second instantaneous communication system when the first instantaneous communication system
During letter request, accesses control list is checked, if the mark of destinations traffic user in accesses control list, and is associated with second
The mark of instantaneous communication system, allow for the destinations traffic user and the second instantaneous communication system of the first instantaneous communication system
User carry out instant messaging.
10. safety control according to claim 9, it is characterised in that first instantaneous communication system and second
Identity is mutually authenticated in instantaneous communication system, including:
The system interconnection security module of first instantaneous communication system, according to the body of the interconnection instantaneous communication system of requests verification second
Part, the interconnection request bag contains the mark and its digital certificate of the second instantaneous communication system;
After being verified, the system of the first instantaneous communication system interconnect security module to the second instantaneous communication system send checking into
The response message of work(, the response message include the mark and its digital certificate of the first instantaneous communication system;
The system interconnection security module of second instantaneous communication system verifies the first instantaneous communication system according to the response message
Identity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610867308.5A CN107888474A (en) | 2016-09-30 | 2016-09-30 | A kind of method of controlling security and device for the interconnection of different instantaneous communication systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610867308.5A CN107888474A (en) | 2016-09-30 | 2016-09-30 | A kind of method of controlling security and device for the interconnection of different instantaneous communication systems |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107888474A true CN107888474A (en) | 2018-04-06 |
Family
ID=61769052
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610867308.5A Pending CN107888474A (en) | 2016-09-30 | 2016-09-30 | A kind of method of controlling security and device for the interconnection of different instantaneous communication systems |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888474A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021128152A1 (en) * | 2019-12-26 | 2021-07-01 | Mastercard Shanghai Business Consulting Ltd. | A method and system for processing a plurality of messages between different social network services |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050044412A1 (en) * | 2003-06-11 | 2005-02-24 | Bishop James William | Method and apparatus for private messaging among users supported by independent and interoperating couriers |
CN102202015A (en) * | 2011-06-09 | 2011-09-28 | 张李影 | Method and system for realizing intercommunication among different kinds of instant messaging tools |
CN104811370A (en) * | 2015-04-27 | 2015-07-29 | 北京北信源软件股份有限公司 | Safe instant messaging system structure based on identification |
CN105577505A (en) * | 2014-10-14 | 2016-05-11 | 北京信威通信技术股份有限公司 | Cross-platform instant messaging system and message intercommunication method thereof |
CN106817294A (en) * | 2015-11-30 | 2017-06-09 | 北京北信源软件股份有限公司 | A kind of enterprise-level instantaneous communication system for supporting cross-system to communicate and method |
-
2016
- 2016-09-30 CN CN201610867308.5A patent/CN107888474A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050044412A1 (en) * | 2003-06-11 | 2005-02-24 | Bishop James William | Method and apparatus for private messaging among users supported by independent and interoperating couriers |
CN102202015A (en) * | 2011-06-09 | 2011-09-28 | 张李影 | Method and system for realizing intercommunication among different kinds of instant messaging tools |
CN105577505A (en) * | 2014-10-14 | 2016-05-11 | 北京信威通信技术股份有限公司 | Cross-platform instant messaging system and message intercommunication method thereof |
CN104811370A (en) * | 2015-04-27 | 2015-07-29 | 北京北信源软件股份有限公司 | Safe instant messaging system structure based on identification |
CN106817294A (en) * | 2015-11-30 | 2017-06-09 | 北京北信源软件股份有限公司 | A kind of enterprise-level instantaneous communication system for supporting cross-system to communicate and method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021128152A1 (en) * | 2019-12-26 | 2021-07-01 | Mastercard Shanghai Business Consulting Ltd. | A method and system for processing a plurality of messages between different social network services |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10614199B2 (en) | Online account access control by mobile device | |
CN109600306B (en) | Method, device and storage medium for creating session | |
CN104025539B (en) | The method and apparatus for promoting single-sign-on services | |
JP4384117B2 (en) | Data processing system user authentication method and system | |
US10460309B2 (en) | Payment verification method, apparatus and system | |
CN107634973B (en) | Service interface safe calling method | |
US8082213B2 (en) | Method and system for personalized online security | |
CN107770192A (en) | Identity authentication method and computer-readable recording medium in multisystem | |
US20180026959A1 (en) | Preventing Unauthorized Access to Secured Information Systems Using Tokenized Authentication Techniques | |
CN104700021A (en) | Remote unlocking method and system | |
CN105354482A (en) | Single sign-on method and device | |
CN106161475A (en) | The implementation method of subscription authentication and device | |
CN109460647B (en) | Multi-device secure login method | |
KR101133167B1 (en) | Method and apparatus for user verifing process with enhanced security | |
CN105142141A (en) | Terminal equipment, authentication server, system and method for mobile office identity verification | |
US20240236094A1 (en) | Virtual agent trust mechanism | |
CN107888474A (en) | A kind of method of controlling security and device for the interconnection of different instantaneous communication systems | |
WO2015151251A1 (en) | Network service providing device, network service providing method, and program | |
JP2011192129A (en) | Log-in authentication system using portable telephone terminal | |
CN111814130B (en) | Single sign-on method and system | |
CN204206214U (en) | A kind of secure access control system | |
CN107846410B (en) | Network access verification method and device | |
CN113297557A (en) | Account data authorization method, device, equipment and computer readable storage medium | |
CN106506520B (en) | A kind of authentication method and device based on single-sign-on | |
KR101879842B1 (en) | User authentication method and system using one time password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180406 |
|
WD01 | Invention patent application deemed withdrawn after publication |