[go: up one dir, main page]

HK40071425A - Social message processing method and apparatus, server, terminal and medium - Google Patents

Social message processing method and apparatus, server, terminal and medium Download PDF

Info

Publication number
HK40071425A
HK40071425A HK42022059792.6A HK42022059792A HK40071425A HK 40071425 A HK40071425 A HK 40071425A HK 42022059792 A HK42022059792 A HK 42022059792A HK 40071425 A HK40071425 A HK 40071425A
Authority
HK
Hong Kong
Prior art keywords
social
information
message
terminal
signature
Prior art date
Application number
HK42022059792.6A
Other languages
Chinese (zh)
Other versions
HK40071425B (en
Inventor
姚俊刚
宋立鑫
Original Assignee
腾讯科技(深圳)有限公司
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of HK40071425A publication Critical patent/HK40071425A/en
Publication of HK40071425B publication Critical patent/HK40071425B/en

Links

Description

Social message processing method, device, server, terminal and medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a social message processing method, a social message processing apparatus, a server, a terminal, and a computer storage medium.
Background
With the rapid development of social applications, the functions are increasingly rich, and various functions such as e-mail, blogs, music, television, games, and search are gradually integrated. The social application is not a simple chat tool any more, and has been developed into a comprehensive information platform integrating communication, information, entertainment, search, e-commerce, office collaboration, enterprise customer service and the like.
In the message sending phase, the user a may send the social message to the user B through the social application, and the user B may forward the social message to the user C.
Practice shows that in the process of spreading social messages, some malicious users tamper the original information by using illegal means, so that the illegal purpose is achieved. For example, an operation activity is initiated by a game, the content of the activity is to click to participate in the activity in the game, a user a sends a target social message associated with the operation activity to a user B through a social application, the user B receives the target social message and then sends the target social message to other users (for example, a user C) to invite the other users to play the game, and the other users click the target social message to accept the invitation to enter the game and then obtain gold coins. However, in the process of forwarding the message, after some malicious users (for example, the user B) receive the target social message, the target social message is maliciously forged, and the maliciously forged social message is sent to other users.
Therefore, how to increase effective verification on message content in the process of social message propagation becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides a social message processing method, a social message processing device, a server, a terminal and a medium, and signature information can be introduced to verify the validity of message contents in the social message propagation process.
In one aspect, an embodiment of the present application provides a social message processing method, which is applied to a server, and the method includes:
receiving a first social message sending request from a first terminal, wherein the first social message sending request is used for indicating that a first social message is sent to a second terminal; the first social message comprises first key information and historical signature information;
acquiring the first key information from the first social contact information, and generating signature information according to the first key information;
comparing the signature information with the historical signature information;
and if the comparison result indicates that the signature information is matched with the historical signature information, the first social contact message is sent to the second terminal.
Accordingly, an embodiment of the present application provides a social message processing apparatus, where the apparatus is configured to the server, and the apparatus includes:
the communication unit is used for receiving a first social message sending request from a first terminal, wherein the first social message sending request is used for indicating that a first social message is sent to a second terminal; the first social message comprises first key information and historical signature information;
the processing unit is used for acquiring the first key information from the first social contact information and generating signature information according to the first key information;
the processing unit is further used for comparing the signature information with the historical signature information;
the communication unit is further configured to send the first social message to the second terminal if the comparison result indicates that the signature information matches the historical signature information.
Correspondingly, the embodiment of the application also provides a server, which comprises a communication interface, a processor and a storage device; storage means for storing program instructions; and the processor is used for calling program instructions and executing the social message processing method in one aspect.
On the other hand, the embodiment of the application provides another social message processing method, which is applied to a terminal and comprises the following steps:
receiving a first social message sent by a server;
when the first social information is detected to comprise a target mark, displaying the first social information according to a display mode matched with the target mark;
the first social information is sent to the terminal by the first terminal through the server; the first social information sent to the server by the first terminal comprises historical signature information and first key information; and the target mark is determined according to a comparison result between the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
Accordingly, an embodiment of the present application provides another social message processing apparatus, where the apparatus is configured in the terminal, and the apparatus includes:
the communication unit is used for receiving a first social message sent by the server;
the processing unit is used for displaying the first social information according to a display mode matched with the target mark when the first social information is detected to comprise the target mark;
the first social information is sent to the terminal by the first terminal through the server; the first social information sent to the server by the first terminal comprises historical signature information and first key information; and the target mark is determined according to a comparison result between the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
Correspondingly, the embodiment of the application also provides a terminal, which comprises a communication interface, output equipment, a processor and a storage device; storage means for storing program instructions; and the processor is used for calling program instructions and executing the social message processing method in another aspect.
Accordingly, an embodiment of the present application further provides a computer storage medium, in which program instructions are stored, and when the program instructions are executed, the social message processing method is implemented.
Accordingly, according to an aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and executes the computer instructions to enable the computer device to execute the social message processing method provided above.
In the embodiment of the application, the server may receive a first social message sending request from the first terminal and used for indicating that the first social message is sent to the second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information matches the historical signature information, the first social message is sent to the second terminal. By implementing the method and the device, the signature information can be introduced to carry out validity verification on the message content in the social message spreading process, and the harm to the user caused by the forged message is prevented.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1a to fig. 1b are schematic views of a social message display scenario provided in an embodiment of the present application;
FIG. 2 is a block diagram illustrating an architecture of a social message processing system according to an embodiment of the present disclosure;
FIG. 3 is a schematic flow chart diagram of a social message processing scheme provided by an embodiment of the present application;
4 a-4 b are schematic diagrams of a scenario for sending a social message according to an embodiment of the present disclosure;
FIG. 5 is a schematic flow chart diagram illustrating a social message processing method according to an embodiment of the present disclosure;
6 a-6 b are schematic diagrams of a page displaying social messages provided by an embodiment of the present application;
FIG. 7 is a schematic flow chart diagram of another social message processing method provided in an embodiment of the present application;
fig. 8 is a schematic diagram of a scenario in which a second social message is sent according to an embodiment of the present application;
fig. 9a is a schematic code diagram corresponding to a second social message according to an embodiment of the present application;
fig. 9b is a schematic code diagram corresponding to a first social message according to an embodiment of the present application;
FIG. 10 is a schematic flow chart diagram illustrating yet another social message processing method provided in an embodiment of the present application;
fig. 11 is a schematic structural diagram of a social message processing apparatus according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a server provided in an embodiment of the present application;
fig. 13 is a schematic structural diagram of another social message processing apparatus provided in an embodiment of the present application;
fig. 14 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
During the use of the social application, user a may send the social message to user B through the social application, which may in turn forward the social message to user C. Currently, in the process of propagating social messages among the user a, the user B, and the user C, malicious tampering of the original message by the user may be involved, and a fake message may be propagated, so as to cause serious harm to a receiving user of the fake message (for example, property damage, identity information disclosure, account theft, and the like).
The message type of the social message may be an image type, a text type, a video type, or a graphic type. In the following, taking the message type of the social message as the image-text type as an example, a message forgery scene related to the message propagation process is described:
the first step is as follows: user A sends a target social message with message title "123" to user B through the social application, and user B views the target social message in a conversation page (as shown in FIG. 1 a) with user A.
The second step is that: after the user B views the target social message, modifying the message title of the target social message, wherein the specific modified content is as follows: the message header is modified from "123" to "456".
The third step: user B sends the modified target social message to user C, who views the modified target social message in a conversation page (shown in FIG. 1B) with user B.
As can be seen from the above, in the whole process of propagating the social message, the user C cannot perceive that the received social message has been modified, and the modified social message (hereinafter, referred to as a fake message) may cause a great harm to the user C.
Based on this, the embodiment of the application provides a social message processing system, and in the process of spreading social messages, effective verification on message contents is added, so that the harm to users caused by forged messages is prevented. Referring to fig. 2, a social message processing system provided in an embodiment of the present application may include: a plurality of terminals (such as a first terminal, a second terminal and a third terminal) running a social application and a server. Wherein, a social application may refer to an application with online conversation functionality (e.g., Tencent QQ, WeChat application, etc.); the terminal is a terminal used by a user of the social application, and may be used to receive or send a social message, where the terminal may be any one of the following: portable devices such as smart phones, tablets, laptops, etc., and desktop computers, etc.
Accordingly, the server is a server that provides a corresponding service (for example, receives or sends a social message) to a social application, and may be understood as a background server of the social application, where the server may be an independent service device, a cluster device formed by a plurality of service devices, or a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network service, cloud communication, a middleware service, a domain name service, a security service, a CDN, and a big data and artificial intelligence platform.
It should be noted that fig. 2 is only an exemplary illustration of the architecture of the social message processing system according to the embodiment of the present application, and does not limit the specific architecture of the social message processing system. For example, the social message processing system may include a fourth terminal, a fifth terminal, and the like, in addition to the first terminal, the second terminal, and the third terminal.
Based on the social message processing system, the present application provides a social message processing scheme, which may be executed by the server, the first terminal, the second terminal, and the third terminal, and it is assumed that the third terminal is a terminal used by the user a, the first terminal is a terminal used by the user B, the second terminal is a terminal used by the user C, and the related scenarios are as follows: the method comprises the following specific steps of sending a social message to a user B by a user A, forwarding the social message to a user C by the user B, and implementing the social message processing scheme as follows:
s10: the third terminal sends a second social message sending request to the server, wherein the second social message sending request is used for indicating that: and sending the second social message to the first terminal. Wherein the message type of the second social message may be an image type, a text type, a video type, or a teletext type. For example, referring to fig. 4a, assuming that the second social message is image 1, when user a wants to send image 1 to user B through his own terminal (i.e., a third terminal), the user may log in a social application, select image 1 as the second social message in a session page with user B, and send a second social message sending request for instructing to send image 1 to the first terminal (i.e., a terminal used by user B) to the server through the third terminal.
S11: and the server acquires second key information from the second social message, generates historical signature information according to the second key information, and adds the historical signature information to the second social message to obtain the first social message.
In the embodiment of the application, the key information acquired by aiming at the social messages of different message types is different. In a specific implementation, after receiving the second social message sending request, the server may obtain a second social message carried by the second social message sending request, detect a message type of the second social message, and further obtain different second key information from the second social message according to the message type of the second social message.
Specifically, if the message type of the second social message is a graph type, the second key information includes any one or more of the following: the message title, the message description, the message matching picture, the jump link and the message source corresponding to the second social message; if the message type of the second social information is a text type, the second key information is text information corresponding to the second social information; if the message type of the second social information is a video type, the second key information is binary data of a video corresponding to the second social information; and if the message type of the second social information is the image type, the second key information is binary data of the image corresponding to the second social information.
S12: the server sends the first social message to the first terminal.
S13: the method comprises the steps that a first terminal sends a first social message sending request to a server, the first social message sending request is used for indicating that a first social message is sent to a second terminal, and the first social message comprises first key information and historical signature information.
In a specific implementation, after the user B views the first social message through the first terminal, if the user B wants to forward the first social message to the user C, the first social message sending request for instructing to send the first social message to the second terminal (i.e., the terminal used by the user C) may be sent to the server through the first terminal.
Illustratively, with reference to fig. 4B, continuing to refer to the example of fig. 4a, if the second social message is image 1, then the first social message is image 1 added with the historical signature information, and after the server sends the first social message to the first terminal, user B may log in the social application through the first terminal, and view image 1 sent by user a to himself in a session page with user a. Further, if the user B wants to forward the image 1 to the image C, a first social message sending request for instructing to send the image 1 (here, the image 1 is the image 1 to which the history signature information is added) to a second terminal may be sent to the server through the first terminal.
S14: the server acquires first key information from the first social contact information, generates signature information according to the first key information, and compares the signature information with historical signature information.
S15: and if the comparison result indicates that the signature information is matched with the historical signature information, the server sends the first social message to the second terminal.
In a specific implementation, if the comparison result indicates that the signature information matches the historical signature information, the first social message is represented to be the same as the original message (i.e., the second social message sent by the user a to the user B), that is, the user B does not modify the original message in the message propagation process. Under the condition, the server sends the first social contact message to the second terminal, authenticity of the first social contact message received by the user C can be guaranteed, and the fact that the user C is harmed by forged messages is prevented.
According to the social message processing scheme provided by the embodiment of the application, in the process of propagating the social message, the validity of the message content can be verified by introducing the signature information, so that the harm to the user caused by the forged message is prevented.
Please refer to fig. 5, which is a flowchart illustrating a social message processing method according to an embodiment of the present application, where the method according to the embodiment of the present application may be executed by a server. The method of embodiments of the present application includes the following steps.
S20: the method comprises the steps of receiving a first social message sending request from a first terminal, wherein the first social message sending request is used for indicating that a first social message is sent to a second terminal, and the first social message comprises first key information and historical signature information.
For example, assuming that the third terminal is a terminal used by a user a, the first terminal is a terminal used by a user B, and the second terminal is a terminal used by a user C, the related scenarios are as follows: user a has sent a social message to user B through the server. The specific process that the user A sends the social message to the user B through the server is as follows: the user A uploads a second social message which is required to be sent to the user B to the server through the third terminal, the server acquires second key information from the second social message, historical signature information is generated according to the second key information, the historical signature information is added to the second social message, a first social message is obtained, and the first social message is sent to the first terminal corresponding to the user B. Further, after the user B views the first social message through the first terminal, if the user B wants to forward the first social message to the user C, a first social message sending request for instructing to send the first social message to the second terminal (i.e., the terminal used by the user C) may be sent to the server through the first terminal.
S21: and acquiring first key information from the first social messages, and generating signature information according to the first key information.
S22: and comparing the signature information with the historical signature information, and if the comparison result indicates that the signature information is matched with the historical signature information, sending the first social message to the second terminal. In specific implementation, if the signature information obtained by comparison is the same as the historical signature information, a comparison result used for indicating that the signature information is matched with the historical signature information can be generated; on the contrary, if the signature information obtained by comparison is not the same as the historical signature information, a comparison result indicating that the signature information is not matched with the historical signature information may be generated.
In one embodiment, if the comparison result indicates that the signature information matches the historical signature information, the server may directly send the first social message to the second terminal; or, in another embodiment, if the comparison result indicates that the signature information matches the historical signature information, the server may also add a verification-passing tag to the first social message, and send the first social message added with the verification-passing tag to the second terminal. Further, after receiving the first social message, the second terminal may display the first social message in a display manner matching the verification pass flag, for example, adding an "unmodified" identifier 60 (as shown in fig. 6 a). By adopting the method, the user corresponding to the second terminal can be intuitively reminded that the currently viewed first social message is not modified in the propagation process.
In one embodiment, if the comparison result indicates that the signature information does not match the historical signature information, then targeted processing may be performed on the first social message. The target processing comprises the following processing modes:
the first method is as follows: the sending process of sending the first social message to the second terminal is aborted, i.e. it may be understood that the server refuses to forward the first social message to the second terminal.
The second method comprises the following steps: and adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal. Further, after receiving the first social message, the second terminal may display the first social message in a display manner matching the modification mark, for example, adding a "modified" identifier 61 (as shown in fig. 6 b). By adopting the method, the user corresponding to the second terminal can be intuitively reminded that the currently viewed first social message is modified by the user corresponding to the first terminal in the propagation process.
The third method comprises the following steps: and stopping executing the sending processing of sending the first social contact message to the second terminal, and sending modification warning information aiming at the first social contact message to the first terminal, wherein the modification warning information is used for reminding a user corresponding to the first terminal and does not modify the social contact message maliciously.
The method is as follows: and stopping executing the sending processing of sending the first social contact message to the second terminal, acquiring account information of the user corresponding to the first terminal in the social contact application, adding the account information to a blacklist of the social contact application, and making the subsequent user corresponding to the first terminal unable to log in the social contact application.
It is to be understood that the above-mentioned modes one to four are examples of target processing, and the target processing may include other processing modes besides the above-mentioned modes one to four, such as: the partial processing means in the first to fourth modes are combined, and specific combination modes thereof may be, for example: adding a modification mark in the first social message, sending the first social message added with the modification mark to a second terminal, and sending modification warning information aiming at the first social message to the first terminal; or adding a modification mark in the first social message, sending the first social message added with the modification mark to the second terminal, acquiring account information of a user corresponding to the first terminal in the social application, and adding the account information to a blacklist of the social application. The present application is not particularly limited.
In the embodiment of the application, the server may receive a first social message sending request from the first terminal and used for indicating that the first social message is sent to the second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information matches the historical signature information, the first social message is sent to the second terminal. By implementing the embodiment of the application, the signature information can be introduced to carry out validity verification on the message content in the social message spreading process, so that the harm to the user caused by counterfeiting the message is prevented.
Please refer to fig. 7, which is a flowchart illustrating another social message processing method according to an embodiment of the present application, where the method according to the embodiment of the present application may be executed by a server. The method of an embodiment of the present application includes the following steps.
S30: receiving a second social messaging request from the third terminal, the second social messaging request indicating: and sending the second social message to the first terminal.
S31: and acquiring second key information from the second social messages. The message type of the second social message includes an image type, a text type, a video type, or an image-text type, and as can be seen from the above, the second key information obtained for the second social messages of different message types is different, and taking the message type of the second social message as the image-text type as an example, the second key information may include any one or more of the following: and the message title, the message description, the message matching picture, the jump link and the message source corresponding to the second social message.
Exemplarily, assuming that the message type of the second social message is a teletext type, referring to fig. 8, the second social message sent by the user a to the user B through the social application is a message 80, and the message 80 can be expressed by the code shown in fig. 9a in the actual sending process. In fig. 9a, a field "tile" represents a message title, a field "desc" represents a message description, a field "jumpuurl" represents a jump link, a field "preview" represents a message match, and a field "tag" represents a message source, so that, correspondingly, the server can obtain second key information, such as a message title, a message description, a jump link, a message match and a message source, corresponding to the second social message by extracting contents corresponding to the fields "tile", "desc", "jumpUrl", "preview" and "tag" from the second social message respectively.
S32: and generating historical signature information according to the second key information.
In one embodiment, the second key information may be spliced into a character string according to a target sequence, signature requirement data is obtained, and a signature character string is generated through the signature requirement data and the character string. The target sequence is pre-configured for the social messages of different message types in advance, and can be adjusted subsequently according to actual requirements. Illustratively, taking a teletext type message as an example, the target sequence may be, in order: message header, message description, jump link, message match map, and message source.
Wherein the signature requirement data comprises any one or more of the following: a timestamp determined based on a current time, a random number determined based on a random number generation rule, and a target signature password. Exemplarily, assuming that the signature requirement data includes a Timestamp, a random number, and a target signature password P, the signature string is a string + Timestamp + target signature password P + random number.
In a specific implementation, the target signature password is configured in advance, and in order to prevent the target signature password from being leaked, the target signature password may be periodically updated, and the signature password update record may be updated, where the validity time and the expiration time of each signature password are recorded in the signature password update record. In this case, when the server needs to acquire the target password information, the signature password update record may be acquired, and the signature password in the valid state at the current time may be acquired according to the signature password update record, and the signature password in the valid state at the current time may be determined as the target signature password. That is, in the embodiment of the present application, the target signature password used is the signature password in the valid state at the current time.
Further, after the server generates the signature string, the hash calculation may be performed on the signature string by a hash algorithm, and the hash calculation result may be determined as the historical signature information.
The hash algorithm may be MD5 (message digest algorithm), SHA1 (secure hash algorithm), SHA256 (secure hash algorithm), SHA512 (secure hash algorithm), or the like. MD5 is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value, typically expressed in textual format as a 32-bit hexadecimal number. When the signature string is subjected to hash calculation through MD5, the hash calculation result is a 128-bit (16-byte) hash value obtained by performing hash calculation on the signature string through MD 5.
SHA1 (secure hash algorithm) is a cryptographic hash function designed by the united states national security agency. SHA1 produces a 160-bit (20-byte) hash value, typically represented as a hexadecimal number, 40 bits in length. When the signature string is subjected to hash calculation by the SHA1, the hash calculation result is a 160-bit (20-byte) hash value obtained by performing hash calculation on the signature string by the SHA 1.
SHA256 (secure hash algorithm) is a cryptographic hash function designed by the united states national security agency. SHA256 generates a 256-bit (32-byte) hash value, typically represented as a hexadecimal number, 64 bits long. When the signature string is subjected to hash calculation by the SHA256, the hash calculation result is a 256-bit (32-byte) hash value obtained by performing hash calculation on the signature string by the SHA 256.
SHA512 (secure hash algorithm) is a cryptographic hash function designed by the united states national security agency. SHA512 generates a 512-bit (64-byte) hash value, typically expressed as a hexadecimal number, 128 bits long. When the SHA512 is used to perform hash calculation on the signature string, the hash calculation result is a 512-bit (64-byte) hash value obtained by performing hash calculation on the signature string through the SHA 512.
S33: adding the historical signature information to the second social message to obtain a first social message, and sending the first social message to the first terminal, so that after the first terminal receives the first social message, the first terminal sends a first social message sending request in the following step S34 to the server.
In a specific implementation, assuming that the historical signature information is generated according to the Timestamp, the random number, and the target signature password P, when the server executes step S33, in addition to adding the historical signature information to the second social message, the Timestamp and the random number may be added to the second social message, so as to obtain the first social message. Subsequently, when the server performs step S35 described below, the first key information, the Timestamp and the random number may be obtained from the first social message, and the signature information may be generated according to the first key information, the Timestamp and the random number. The manner in which the server generates the signature information according to the first key information, the Timestamp and the random number is similar to the manner in which the server generates the historical signature information according to the second key information, and is not described herein again.
For example, taking advantage of the example shown in fig. 9a, the second social message is the message 80, the first social message may be expressed by the code shown in fig. 9b in an actual sending process, and the field "abcdefghigk" corresponding to the field "token" in fig. 9b is the history signature information.
S34: the method comprises the steps of receiving a first social message sending request from a first terminal, wherein the first social message sending request is used for indicating that a first social message is sent to a second terminal, and the first social message comprises first key information and historical signature information.
S35: and acquiring first key information from the first social messages, and generating signature information according to the first key information. Here, a manner of obtaining the first key information from the first social message is similar to the manner of obtaining the second key information from the second social message, and a manner of generating the signature information according to the first key information is similar to the manner of generating the historical signature information according to the second key information, which is not repeated herein.
S36: and comparing the signature information with the historical signature information, and if the comparison result indicates that the signature information is matched with the historical signature information, sending the first social message to the second terminal. For specific implementation of step S34 and step S36, reference may be made to the related description of step S20 and step S22 in the foregoing embodiment, and details are not repeated here.
Please refer to fig. 10, which is a flowchart illustrating a social message processing method according to an embodiment of the present application, where the method according to the embodiment of the present application may be executed by a terminal (e.g., the second terminal). The method of an embodiment of the present application includes the following steps.
S40: and receiving a first social message sent by the server.
S41: and when the first social information is detected to comprise the target mark, displaying the first social information according to a display mode matched with the target mark.
The first social information is sent by the first terminal to the terminal (for example, the second terminal) through the server, and the first social information sent by the first terminal to the server includes the historical signature information and the first key information. Specifically, the target mark is determined by the server according to a comparison result between signature information and historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
The target mark comprises a modification mark and a verification passing mark, wherein the modification mark is added in the first social information after the server determines that the signature information does not match with the historical signature information according to the indication of the comparison result. The verification passing mark is added in the first social information after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
In the embodiment of the application, if the first social contact message includes the verification passing flag, the representation server verifies that the message content of the first social contact message issued this time passes, that is, the representation server represents that the user corresponding to the first terminal does not modify the original message in the message propagation process. In this case, the terminal may display the first social information in a display manner matched with the verification passing flag, and the specific display manner may be, for example: an "unmodified" identification is added (as shown in fig. 6 a). By adopting the mode, the user corresponding to the second terminal can be intuitively reminded, and the currently viewed first social message is not modified in the propagation process.
If the first social contact message comprises the modification mark, the representation server does not verify the message content of the first social contact message issued this time, that is, the representation server represents that the user corresponding to the first terminal modifies the original message in the message transmission process. In this case, the terminal may display the first social information according to a display mode matched with the modification mark, and the specific display mode may be, for example: and adding a 'modified' identifier (as shown in fig. 6 b), and in such a way, intuitively reminding a user corresponding to the second terminal that the currently viewed first social message is modified by the user corresponding to the first terminal in the propagation process.
In the embodiment of the application, the terminal can receive the first social information sent by the server, and when the first social information is detected to include the target mark, the first social information is displayed according to a display mode matched with the target mark. The user can be intuitively reminded whether the first social message has been modified during the propagation process.
The embodiment of the present application further provides a computer storage medium, in which program instructions are stored, and when the program instructions are executed, the computer storage medium is used for implementing the corresponding method described in the above embodiment.
Referring to fig. 11 again, the structure of the social message processing apparatus according to the embodiment of the present disclosure is schematically illustrated, and the social message processing apparatus according to the embodiment of the present disclosure may be disposed in the server, or may be a computer program (including a program code) running in the server.
In one implementation of the apparatus of the embodiment of the application, the apparatus includes the following structure.
A communication unit 50, configured to receive a first social message sending request from a first terminal, where the first social message sending request is used to instruct to send a first social message to a second terminal; the first social message comprises first key information and historical signature information;
a processing unit 51, configured to obtain the first key information from the first social message, and generate signature information according to the first key information;
the processing unit 51 is further configured to compare the signature information with the historical signature information;
the communication unit 50 is further configured to send the first social message to the second terminal if the comparison result indicates that the signature information matches the historical signature information.
In one embodiment, before receiving the first social messaging request from the first terminal, the communication unit 50 is further configured to receive a second social messaging request from the third terminal, where the second social messaging request is used to indicate: sending a second social message to the first terminal; the processing unit 51 is further configured to obtain second key information from the second social message, generate the historical signature information according to the second key information, and add the historical signature information to the second social message to obtain the first social message; the communication unit 50 is further configured to send a first social message to the first terminal, so that the first terminal sends the first social message sending request to the server after receiving the first social message.
In an embodiment, the processing unit 51 is further configured to, if the comparison result indicates that the signature information does not match the historical signature information, perform target processing on the first social message, where the target processing includes:
suspending execution of a transmission process of transmitting the first social message to the second terminal;
or adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal;
or, the sending process of sending the first social message to the second terminal is stopped, and modification warning information aiming at the first social message is sent to the first terminal.
In one embodiment, the message type of the second social message comprises an image type, a text type, a video type, or a teletext type;
if the message type of the second social message is a picture-text type, the second key information includes any one or more of the following: the message title, the message description, the message matching picture, the jump link and the message source corresponding to the second social message;
if the message type of the second social contact information is a text type, the second key information is text information corresponding to the second social contact information;
if the message type of the second social contact information is a video type, the second key information is binary data of a video corresponding to the second social contact information;
and if the message type of the second social information is an image type, the second key information is binary data of an image corresponding to the second social information.
In an embodiment, the second key information includes one or more, and the processing unit 51 is specifically configured to:
splicing the second key information into character strings according to the target sequence;
acquiring signature demand data, and generating a signature character string through the signature demand data and the character string;
and performing hash calculation on the signature character string through a hash algorithm, and determining a hash calculation result as the historical signature information.
In one embodiment, the signature requirements data comprises any one or more of: a timestamp determined based on a current time, a nonce determined based on a nonce generation rule, and a target signature password.
In an embodiment, the signature requirement data includes the target signature password, and the processing unit 51 is further specifically configured to:
acquiring a signature password updating record, and acquiring a signature password in an effective state at the current time according to the signature password updating record;
and determining the signature password in the effective state at the current time as a target signature password.
In an embodiment, the processing unit 51 is further specifically configured to:
if the comparison result indicates that the signature information is matched with the historical signature information, adding a verification passing mark in the first social contact message;
the first social message added with the authentication passing flag is sent to the second terminal through the communication unit 50.
In the embodiment of the present application, the detailed implementation of the above units can refer to the description of relevant contents in the embodiments corresponding to the foregoing drawings.
The social message processing device in the embodiment of the application may receive a first social message sending request from a first terminal and used for indicating that a first social message is sent to a second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information matches the historical signature information, the first social message is sent to the second terminal. The signature information can be introduced to carry out validity verification on the message content in the social message transmission process, so that the harm to the user caused by the forged message is prevented.
Fig. 12 is a schematic structural diagram of a server according to an embodiment of the present application. The server of the embodiment of the present application includes a processor 600, a storage 601, and a communication interface 602. Data can be exchanged among the processor 600, the storage device 601 and the communication interface 602, and the processor 600 implements corresponding social message processing functions.
The storage 601 may include a volatile memory (volatile memory), such as a random-access memory (RAM); the storage device 601 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), or the like; the storage means 601 may also comprise a combination of memories of the kind described above.
Processor 600 may be a Central Processing Unit (CPU) 600. In one embodiment, processor 600 may also be a Graphics processor 600 (GPU). The processor 600 may also be a combination of a CPU and a GPU. In the server, a plurality of CPUs and GPUs may be included as necessary to perform corresponding social message processing.
In one embodiment, the storage device 601 is used to store program instructions. Processor 600 may invoke program instructions to implement the various methods as described above in the embodiments of the present application.
In a first possible embodiment, the processor 600 of the server calls program instructions stored in the storage means 601 for: receiving a first social messaging request from a first terminal through the communication interface 602, the first social messaging request indicating that a first social message is to be sent to a second terminal; the first social message comprises first key information and historical signature information; acquiring the first key information from the first social contact information, and generating signature information according to the first key information; comparing the signature information with the historical signature information; and if the comparison result indicates that the signature information is matched with the historical signature information, sending the first social message to the second terminal through a communication interface 602.
In one embodiment, before receiving the first social messaging request from the first terminal, the processor 600 is further configured to receive a second social messaging request from the third terminal through the communication interface 602, the second social messaging request indicating: sending a second social message to the first terminal; acquiring second key information from the second social contact information, generating historical signature information according to the second key information, and adding the historical signature information into the second social contact information to obtain the first social contact information; sending a first social message to the first terminal through a communication interface 602, so that the first terminal sends the first social message sending request to the server after receiving the first social message.
In one embodiment, the processor 600 is further configured to perform target processing on the first social message if the comparison result indicates that the signature information does not match the historical signature information, the target processing including:
suspending execution of a transmission process of transmitting the first social message to the second terminal;
or adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal;
or, the sending process of sending the first social message to the second terminal is stopped, and modification warning information aiming at the first social message is sent to the first terminal.
In one embodiment, the message type of the second social message comprises an image type, a text type, a video type, or a teletext type;
if the message type of the second social message is a picture-text type, the second key information includes any one or more of the following: a message title, a message description, a message matching picture, a jump link and a message source corresponding to the second social message;
if the message type of the second social contact information is a text type, the second key information is text information corresponding to the second social contact information;
if the message type of the second social information is a video type, the second key information is binary data of a video corresponding to the second social information;
and if the message type of the second social information is an image type, the second key information is binary data of an image corresponding to the second social information.
In an embodiment, the second key information includes one or more, and the processor 600 is specifically configured to:
splicing the second key information into character strings according to the target sequence;
acquiring signature demand data, and generating a signature character string through the signature demand data and the character string;
and performing hash calculation on the signature character string through a hash algorithm, and determining a hash calculation result as the historical signature information.
In one embodiment, the signature requirements data comprises any one or more of: a timestamp determined based on a current time, a nonce determined based on a nonce generation rule, and a target signature password.
In an embodiment, the signature requirement data includes the target signature password, and the processor 600 is further specifically configured to:
acquiring a signature password updating record, and acquiring a signature password in an effective state at the current time according to the signature password updating record;
and determining the signature password in the effective state at the current time as a target signature password.
In one embodiment, processor 600 is further specifically configured to:
if the comparison result indicates that the signature information is matched with the historical signature information, adding a verification passing mark in the first social contact message;
sending the first social message added with the authentication passing token to the second terminal through the communication interface 602.
In the embodiment of the present application, the specific implementation of the processor 600 may refer to the description of relevant contents in the embodiments corresponding to the foregoing drawings.
In the embodiment of the application, the server may receive a first social message sending request from the first terminal and used for indicating that the first social message is sent to the second terminal, obtain first key information from the first social message, and generate signature information according to the first key information. Further, the signature information and the historical signature information included in the first social message may be compared, and if the comparison result indicates that the signature information matches the historical signature information, the first social message is sent to the second terminal. The signature information can be introduced to carry out validity verification on the message content in the social message transmission process, so that the harm to the user caused by the forged message is prevented.
Referring to fig. 13 again, it is a schematic structural diagram of another social message processing apparatus according to an embodiment of the present disclosure, where the social message processing apparatus according to the embodiment of the present disclosure may be disposed in the terminal (for example, the second terminal), or may be a computer program (including a program code) running in the terminal.
In one implementation of the apparatus of the embodiment of the application, the apparatus includes the following structure.
A communication unit 70, configured to receive a first social message sent by a server;
a processing unit 71, configured to, when it is detected that the first social message includes a target mark, display the first social message in a display manner matching the target mark;
the first social information is sent to the terminal by the first terminal through the server; the first social information sent to the server by the first terminal comprises historical signature information and first key information; and the target mark is determined according to a comparison result between the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
In one embodiment, the target mark comprises a modification mark and a verification passing mark, wherein the modification mark is added in the first social information after the server determines that the signature information does not match the historical signature information according to the indication of the comparison result;
the verification passing mark is added in the first social information after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
In the embodiment of the present application, the detailed implementation of the above units can refer to the description of relevant contents in the embodiments corresponding to the foregoing drawings.
In this embodiment of the application, the social message processing device may receive a first social message sent by the server, and when it is detected that the first social message includes the target mark, display the first social message in a display mode matched with the target mark. The user can be intuitively reminded whether the first social message has been modified during the propagation process.
Referring to fig. 14, it is a schematic structural diagram of a terminal according to an embodiment of the present application, where the terminal may refer to the second terminal. The terminal of the embodiment of the present application includes a processor 800, a storage 801, an output device 802, and a communication interface 803. Data can be interacted among the processor 800, the storage device 801, the output device 802 and the communication interface 803, and the processor 800 realizes corresponding social message processing functions.
The storage 801 may include a volatile memory (volatile memory), such as a random-access memory (RAM); the storage device 801 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), or the like; the memory device 801 may also comprise a combination of memories of the kind described above.
The processor 800 may be a Central Processing Unit (CPU) 800. In one embodiment, processor 800 may also be a Graphics processor 800 (GPU). The processor 800 may also be a combination of a CPU and a GPU. In the terminal, a plurality of CPUs and GPUs can be included as needed to perform corresponding social message processing.
Output devices 802 may include a display (LCD, etc.), speakers, and the like.
In one embodiment, the memory device 801 is used to store program instructions. The processor 800 may invoke program instructions to implement the various methods as described above in the embodiments of the present application.
In a first possible embodiment, the processor 800 of the terminal calls the program instructions stored in the storage means 801 for: receiving a first social message sent by a server through a communication interface 803; when detecting that the first social information includes the target mark, displaying the first social information through the output device 802 in a display manner matched with the target mark; the first social information is sent to the terminal by the first terminal through the server; the first social information sent to the server by the first terminal comprises historical signature information and first key information; and the target mark is determined according to a comparison result between the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
In one embodiment, the target mark comprises a modification mark and a verification passing mark, wherein the modification mark is added in the first social information after the server determines that the signature information does not match the historical signature information according to the indication of the comparison result;
the verification passing mark is added in the first social information after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
In the embodiment of the present application, the specific implementation of the processor 800 may refer to the description related to the embodiments corresponding to the foregoing drawings.
The terminal in the embodiment of the application can receive the first social information sent by the server, and when the first social information is detected to include the target mark, the first social information is displayed according to a display mode matched with the target mark. The user can be intuitively reminded whether the first social message has been modified during the propagation process.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
While the invention has been described with reference to a number of embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (15)

1. A social message processing method is applied to a server and comprises the following steps:
receiving a first social message sending request from a first terminal, wherein the first social message sending request is used for indicating that a first social message is sent to a second terminal; the first social message comprises first key information and historical signature information;
acquiring the first key information from the first social contact information, and generating signature information according to the first key information;
comparing the signature information with the historical signature information;
and if the comparison result indicates that the signature information is matched with the historical signature information, the first social contact message is sent to the second terminal.
2. The method of claim 1, wherein prior to receiving the first social messaging request from the first terminal, the method further comprises:
receiving a second social messaging request from a third terminal, the second social messaging request indicating: sending a second social message to the first terminal;
acquiring second key information from the second social contact information, and generating the historical signature information according to the second key information;
adding the historical signature information to the second social message to obtain the first social message;
and sending a first social message to the first terminal, so that the first terminal sends the first social message sending request to the server after receiving the first social message.
3. The method of claim 1 or 2, wherein the method further comprises:
if the comparison result indicates that the signature information does not match the historical signature information, performing target processing on the first social message, wherein the target processing comprises:
suspending execution of a transmission process of transmitting the first social message to the second terminal;
or adding a modification mark in the first social message, and sending the first social message added with the modification mark to the second terminal;
or, the sending process of sending the first social message to the second terminal is stopped, and modification warning information aiming at the first social message is sent to the first terminal.
4. The method of claim 2, wherein the message type of the second social message comprises an image type, a text type, a video type, or a teletext type;
if the message type of the second social message is a picture-text type, the second key information includes any one or more of the following: the message title, the message description, the message matching picture, the jump link and the message source corresponding to the second social message;
if the message type of the second social contact information is a text type, the second key information is text information corresponding to the second social contact information;
if the message type of the second social information is a video type, the second key information is binary data of a video corresponding to the second social information;
and if the message type of the second social information is an image type, the second key information is binary data of an image corresponding to the second social information.
5. The method of claim 2, wherein the second key information includes one or more, the generating the historical signature information in accordance with the second key information comprising:
splicing the second key information into character strings according to the target sequence;
acquiring signature demand data, and generating a signature character string through the signature demand data and the character string;
and performing hash calculation on the signature character string through a hash algorithm, and determining a hash calculation result as the historical signature information.
6. The method of claim 5, wherein the signature requirements data comprises any one or more of: a timestamp determined based on a current time, a nonce determined based on a nonce generation rule, and a target signature password.
7. The method of claim 5, wherein the signature requirements data includes the target signature password, and wherein the obtaining signature requirements data includes:
acquiring a signature password updating record, and acquiring a signature password in an effective state at the current time according to the signature password updating record;
and determining the signature password in the effective state at the current time as a target signature password.
8. The method of claim 1, wherein sending the first social message to the second terminal if the comparison indicates that the signature information matches the historical signature information comprises:
if the comparison result indicates that the signature information is matched with the historical signature information, adding a verification passing mark in the first social contact message;
and sending the first social message added with the verification passing mark to the second terminal.
9. A social message processing method is applied to a terminal and comprises the following steps:
receiving a first social message sent by a server;
when the first social information is detected to comprise a target mark, displaying the first social information according to a display mode matched with the target mark;
the first social information is sent to the terminal by the first terminal through the server; the first social information sent to the server by the first terminal comprises historical signature information and first key information; and the target mark is determined according to a comparison result between the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
10. The method of claim 9, wherein the target flag includes a modification flag and a verification-passed flag, the modification flag being added to the first social information after the server determines that the signature information does not match the historical signature information in accordance with the indication of the comparison result;
the verification passing mark is added in the first social information after the server determines that the signature information is matched with the historical signature information according to the indication of the comparison result.
11. An apparatus for processing a social message, the apparatus being configured with a server, the apparatus comprising:
the communication unit is used for receiving a first social message sending request from a first terminal, wherein the first social message sending request is used for indicating that a first social message is sent to a second terminal; the first social message comprises first key information and historical signature information;
the processing unit is used for acquiring the first key information from the first social contact information and generating signature information according to the first key information;
the processing unit is further used for comparing the signature information with the historical signature information;
the communication unit is further configured to send the first social message to the second terminal if the comparison result indicates that the signature information matches the historical signature information.
12. An apparatus for processing social messages, the apparatus being configured in a terminal, the apparatus comprising:
the communication unit is used for receiving a first social message sent by the server;
the processing unit is used for displaying the first social information according to a display mode matched with the target mark when the first social information is detected to comprise the target mark;
the first social information is sent to the terminal by the first terminal through the server; the first social information sent to the server by the first terminal comprises historical signature information and first key information; and the target mark is determined according to a comparison result between the signature information and the historical signature information, wherein the first key information is obtained from the first social information after the server receives the first social information sent by the first terminal, the signature information is generated according to the first key information, and the comparison result is obtained according to the signature information and the historical signature information.
13. A server, characterized in that the server comprises a processor and a storage device, the processor and the storage device being connected to each other, wherein the storage device is configured to store a computer program, the computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method according to any one of claims 1-8.
14. A terminal, characterized in that the terminal comprises a processor and a storage device, the processor and the storage device being interconnected, wherein the storage device is configured to store a computer program, the computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method according to any one of claims 9-10.
15. A computer storage medium having stored thereon program instructions for implementing a method according to any one of claims 1 to 10 when executed.
HK42022059792.6A 2022-09-08 Social message processing method and apparatus, server, terminal and medium HK40071425B (en)

Publications (2)

Publication Number Publication Date
HK40071425A true HK40071425A (en) 2022-11-11
HK40071425B HK40071425B (en) 2024-06-07

Family

ID=

Similar Documents

Publication Publication Date Title
US10790976B1 (en) System and method of blockchain wallet recovery
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
TWI672648B (en) Business process method and device, data share system, and storage medium
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
US12132836B2 (en) Verified presentation of non-fungible tokens
US20210241270A1 (en) System and method of blockchain transaction verification
CN108805571B (en) Data protection method, platform, block chain node, system and storage medium
CN109981576B (en) Key migration method and device
WO2023034423A1 (en) Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger
KR20220066823A (en) Blockchain - based phishing prevention system, apparatus, and method thereof
CN115001714A (en) Resource access method and device, electronic equipment and storage medium
CN117349895B (en) Block chain-based automobile financial digital archive management method and device
CN114266033A (en) Verification code generation method and device, verification code login system and electronic equipment
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN104917738A (en) Finance platform data processing method and system
CN113987062A (en) Data uplink storage method, system, device and storage medium
CN112565156B (en) Information registration method, device and system
CN114827074B (en) Social message processing method, device, server, terminal and medium
HK40071425A (en) Social message processing method and apparatus, server, terminal and medium
CN111382451A (en) Security level identification method and device, electronic equipment and storage medium
CN113824693B (en) Multimedia data sharing method, device and system, electronic equipment and storage medium
CN117997519A (en) Data processing method, apparatus, program product, computer device, and medium
KR20220066842A (en) Blockchain-based Smishing Prevention method and apparatus thereof
CN109688158B (en) Financial execution chain authentication method, electronic device and storage medium
CN110740112B (en) Authentication method, apparatus and computer readable storage medium