CN111277489A - Instant messaging sending method, device and equipment - Google Patents

Instant messaging sending method, device and equipment Download PDF

Info

Publication number
CN111277489A
CN111277489A CN202010067298.3A CN202010067298A CN111277489A CN 111277489 A CN111277489 A CN 111277489A CN 202010067298 A CN202010067298 A CN 202010067298A CN 111277489 A CN111277489 A CN 111277489A
Authority
CN
China
Prior art keywords
carrier
information
communication interface
user
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010067298.3A
Other languages
Chinese (zh)
Inventor
田辉
张理想
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei High Dimensional Data Technology Co ltd
Original Assignee
Hefei High Dimensional Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei High Dimensional Data Technology Co ltd filed Critical Hefei High Dimensional Data Technology Co ltd
Priority to CN202010067298.3A priority Critical patent/CN111277489A/en
Publication of CN111277489A publication Critical patent/CN111277489A/en
Priority to PCT/CN2021/071490 priority patent/WO2021147727A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/08Annexed information, e.g. attachments

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an instant messaging sending method, an instant messaging sending device and instant messaging equipment, wherein the instant messaging sending method comprises the following steps: acquiring first information to be sent and a camouflage carrier; when an information sending instruction input by a user is received, a steganography program is called to steganographically process the first information and the camouflage carrier, and the first information is hidden in the camouflage carrier after the steganography success to obtain second information; and sending the second information to a receiving terminal, and displaying the currently sent information as a camouflage carrier in a communication interface, wherein the communication interface is an interface for communicating with the receiving terminal to display the communication information. The instant messaging sending method can hide the first information in the camouflage carrier, avoid the first information from being stolen and seen, enhance the concealment of the information and guarantee the safety of the information.

Description

Instant messaging sending method, device and equipment
Technical Field
The present invention relates to the field of information communication technologies, and in particular, to a method, an apparatus, and a device for sending an instant message.
Background
Instant messaging refers to a service capable of instantly sending and receiving internet information, and is a terminal service that allows two or more people to instantly communicate text, voice, and video information using a network. The instant messaging tool has a huge user group, and the more advanced information technology and propagation media, the higher the possibility that the personal privacy is leaked, and therefore, the more urgent the requirements of people on information security and personal privacy are.
In order to solve the above problems, it is urgently required to propose a scheme capable of simultaneously ensuring encryption of communication contents and hiding of communication behavior (covert communication). In the existing covert communication, an information sending end utilizes a steganographic tool to hide secret information in an object carrier file, and the object carrier file carrying the secret information is shared on a social platform or is sent to an information receiving end in other information transmission modes; and the information receiving end decrypts the obtained target carrier file by using a steganographic decryption tool so as to obtain the secret information.
Obviously, in the existing covert communication mode, an information sending user needs to manually complete an information hiding function, so that the problems of complicated information hiding operation and poor user experience are caused; moreover, the information sending end and the information receiving end cannot perform instant communication on the object carrier file carrying the secret information.
Disclosure of Invention
Therefore, a first object of the present invention is to provide an instant messaging method, which can hide the first information in a disguised carrier, avoid the first information from being stolen, enhance the concealment of the information, and ensure the security of the information.
The second objective of the present invention is to provide an instant messaging transmitting device.
A third objective of the present invention is to provide an instant messaging sending device.
To achieve the above object, an embodiment of a first aspect of the present invention provides an instant messaging method, including the following steps: acquiring first information to be sent and a camouflage carrier; when an information sending instruction input by a user is received, calling a steganography program to steganographically process the first information and the camouflage carrier, and after the steganography success, hiding the first information in the camouflage carrier to obtain second information; and sending the second information to a receiving terminal, and displaying the currently sent information as the disguised carrier in a communication interface, wherein the communication interface is an interface for communicating with the receiving terminal to display the communication information.
According to the instant messaging sending method provided by the embodiment of the invention, first information to be sent and a camouflage carrier are obtained, then the first information is hidden in the camouflage carrier to obtain second information, finally the second information is sent to a receiving terminal, and the currently sent information is displayed as the camouflage carrier in a communication interface with the receiving terminal. Therefore, the instant messaging sending method can hide the first information in the camouflage carrier, avoid the first information from being stolen and seen, enhance the concealment of the information and ensure the safety of the information.
In addition, the instant messaging method according to the above embodiment of the present invention may further have the following additional technical features:
according to an embodiment of the present invention, a visible and invisible control is disposed in the communication interface, and the obtaining step of the disguised carrier may include: when an information hiding instruction input by a user for the display and hidden control is received, displaying a carrier adding control in the communication interface; judging whether a carrier exists in a carrier library or not; and if the carrier exists in the carrier library, displaying at least one camouflage carrier in a preset display area corresponding to the carrier adding control.
According to an embodiment of the present invention, the obtaining step of the camouflage carrier may further include: when a carrier adding instruction input by the user for the carrier adding control is received, switching the communication interface to a carrier library management interface; and after receiving a selection instruction input by the user for the carrier in the carrier library interface, switching the carrier library interface to the communication interface, and displaying the selected disguised carrier in the carrier adding control.
According to an embodiment of the present invention, if no carrier exists in the carrier library, a carrier addition icon is displayed in a preset display area corresponding to the carrier addition control.
According to an embodiment of the invention, an information input area is further arranged in the communication interface, and the information input area is provided with at least one information type selection control so that a user can input different types of the first information.
According to an embodiment of the present invention, the instant messaging method may further include: and if the steganography fails, generating abnormal information, and displaying the abnormal information on the communication interface to remind a user that the current message transmission fails.
In order to achieve the above object, a second embodiment of the present invention provides an instant messaging transmitting device, including: the acquisition module is used for acquiring first information to be transmitted and a camouflage carrier; the steganography module is used for calling a steganography program to perform steganography processing on the first information and the camouflage carrier when receiving an information sending instruction input by a user, and hiding the first information in the camouflage carrier after the steganography success to obtain second information; the sending module is used for sending the second information to a receiving terminal; and the display module is used for displaying the currently sent information as the disguised carrier in a communication interface, wherein the communication interface is an interface for communicating with the receiving terminal to display the communication information.
According to the instant messaging sending device provided by the embodiment of the invention, the first information can be hidden in the camouflage carrier through the steganographic module, so that the first information is prevented from being stolen and seen, the concealment of the information can be enhanced, and the safety of the information is ensured.
In addition, the instant messaging transmitting device according to the above embodiment of the present invention may further have the following additional technical features:
according to an embodiment of the present invention, a display and hidden control is disposed in the communication interface, and when the obtaining module obtains the disguised carrier, the obtaining module may be specifically configured to: when an information hiding instruction input by a user for the display and hidden control is received, displaying a carrier adding control in the communication interface; judging whether a carrier exists in a carrier library or not; and if the carrier exists in the carrier library, displaying at least one camouflage carrier in a preset display area corresponding to the carrier adding control.
According to an embodiment of the present invention, the obtaining step of the camouflage carrier may further include: when a carrier adding instruction input by the user for the carrier adding control is received, switching the communication interface to a carrier library management interface; and after receiving a selection instruction input by the user for the carrier in the carrier library interface, switching the carrier library interface to the communication interface, and displaying the selected disguised carrier in the carrier adding control.
According to an embodiment of the present invention, if no carrier exists in the carrier library, a carrier addition icon is displayed in a preset display area corresponding to the carrier addition control.
According to an embodiment of the present invention, the apparatus may further include: and the prompting module is used for generating abnormal information when steganography fails and displaying the abnormal information on the communication interface so as to remind a user of current message sending failure.
In order to achieve the above object, a third embodiment of the present invention provides an instant messaging sending device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the instant messaging sending method according to the above embodiment of the present invention.
According to the instant messaging sending device provided by the embodiment of the invention, the first information can be hidden in the camouflage picture, the first information is prevented from being stolen and seen, the concealment of the information can be enhanced, and the safety of the information is guaranteed.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an instant messaging method according to an embodiment of the present invention;
FIG. 2 is a flow chart of obtaining a camouflage carrier according to one embodiment of the invention;
FIG. 3 is a schematic diagram of a communication interface according to an example of the present invention;
FIG. 4 is a schematic view of another exemplary communication interface of the present invention;
FIG. 5 is a schematic diagram of a carrier library management interface of one example of the invention;
FIG. 6 is a schematic diagram of a carrier library management interface in accordance with another example of the present invention;
fig. 7 is a block diagram of an instant messaging device according to an embodiment of the present invention;
fig. 8 is a block diagram of an instant messaging transmitting device according to another embodiment of the present invention;
fig. 9 is a block diagram of an instant messaging transmitting device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
An instant messaging method, an instant messaging device and an instant messaging apparatus according to an embodiment of the present invention are described below with reference to the accompanying drawings.
In the embodiment of the present invention, the instant messaging refers to communication between a sending terminal and a receiving terminal, wherein both the sending terminal and the receiving terminal can be smart devices with communication functions, such as a smart phone, a notebook computer, and a tablet computer.
Fig. 1 is a flowchart of an instant messaging method according to an embodiment of the present invention.
As shown in fig. 1, the instant messaging method according to the embodiment of the present invention includes the following steps:
and S1, acquiring the first information to be transmitted and the camouflage carrier.
Wherein the types of the first information and the camouflage carrier can comprise one or more of text, pictures, voice and video.
In an embodiment of the present invention, a display/hidden control is disposed in a communication interface (i.e., a chat interface) between the sending terminal and the receiving terminal, and a user can input an information hiding instruction for the display/hidden control to perform an encryption operation on the first information.
Optionally, as shown in fig. 2, an embodiment of the present invention provides a specific implementation manner for acquiring a masquerading carrier when a sending terminal sends information to a receiving terminal, and the implementation manner may include the following steps:
and S11, when an information hiding instruction input by a user for the visible and hidden controls is received, displaying the carrier adding controls in the communication interface.
Specifically, the visible and invisible control may be arranged on the right side of the bottom of the communication interface, and the appearance of the visible and invisible control may simulate the arrangement of human eyes, as shown in fig. 3, the visible and invisible control indicates that an information hiding instruction has been input for closed eyes, and indicates that no information hiding instruction has been input for open eyes, and at this time, the first information may be directly sent to the receiving terminal, where the open eyes and the closed eyes of the visible and invisible control may be switched by clicking the visible and invisible control.
As an example, when the carrier addition control is displayed in the communication interface, whether a carrier exists in the carrier library or not can also be judged; and if the carrier exists in the carrier library, displaying at least one camouflage carrier in a preset display area corresponding to the carrier adding control.
Specifically, if a carrier exists in a carrier library preset by the sending terminal, at least one carrier in the carrier library may be displayed in a preset display area corresponding to the carrier addition control. For example, at least one latest carrier (e.g., one, two, or three latest carriers) may be displayed in the preset display area corresponding to the carrier addition control according to the time when the carriers are stored in the carrier library; one or more carriers can be randomly selected from the carrier library and displayed in a preset display area corresponding to the carrier adding control; and at least one carrier which is not selected or is selected less frequently can be displayed in the preset display area corresponding to the carrier adding control. Optionally, the same picture may not be consecutive as the default selected disguised carrier.
As an example, if no carrier exists in the carrier library, a carrier addition icon is displayed in a preset display area corresponding to the carrier addition control.
For example, the disguised carrier is a picture, and only one picture can be displayed in the preset display area corresponding to the carrier adding control, when the displaying and hiding control is switched to be closed-eye, if a picture exists in a carrier library preset by the sending terminal, one preset disguised carrier is displayed in the preset display area corresponding to the carrier adding control at the lower right corner of the communication interface, as shown in fig. 4; and if the picture does not exist in the carrier library, displaying a carrier adding icon in a preset display area corresponding to the carrier adding control at the lower right corner of the communication interface, as shown in fig. 3. And the carrier adding control is displayed above the visible and invisible controls.
And S12, when a carrier adding instruction input by the user aiming at the carrier adding control is received, switching the communication interface to a carrier library management interface.
When the carrier is disguised as a picture, the carrier library management interface can display an album control and a photographing control, so that a user can select the picture from a local album to add to the carrier library, or the picture obtained by instant photographing is added to the carrier library.
Specifically, clicking a carrier adding control, switching a communication interface to a carrier library management interface, as shown in fig. 5, displaying an album control and a photographing control in the carrier library management interface, and clicking the album control by a user to select a carrier from a local album and add the carrier to a carrier library; and the user clicks the to-be-photographed control, and the carrier obtained by instant photographing can be added into the carrier library.
Optionally, in order to improve the utilization rate of the communication interface, the carrier addition control may be set in the corresponding preset display area, for example, as shown in fig. 3, a user may click the carrier addition control by clicking the carrier addition icon at the lower right corner; as shown in fig. 4, the user can click the carrier addition control by clicking the camouflage picture 3 at the lower right corner.
In an embodiment of the present invention, if the user is not satisfied with the preset disguised carrier, the user can click the carrier addition control, and the communication interface can be switched to the carrier library management interface shown in fig. 6. At this time, the user can select at least one carrier from the carriers as the required disguised carrier, and if none of the pictures in the carrier library is satisfactory to the user, the user can further click the "+" icon in the upper right corner in fig. 6 to input a carrier adding instruction to obtain the disguised carrier from the local album of the sending terminal or through the photographing function.
And S13, after receiving a selection instruction input by a user aiming at the pictures in the carrier library, switching the carrier library management interface to a communication interface, and displaying the selected camouflage carrier in a preset display area corresponding to the carrier adding control.
Specifically, after the pictures exist in the carrier library, the user can directly click on a selection icon (such as a number matching icon on each picture shown in fig. 6) on each picture to select the disguised carrier. After the selection is completed, the carrier library management interface is switched to the communication interface, and at this time, the selected disguised carrier can be displayed in a preset display area corresponding to the carrier addition control in the communication interface, as shown in fig. 4.
Furthermore, an information input area is also arranged in the communication interface, the information input area is provided with at least one information type selection control, for example, one information type selection control can be directly arranged, if text information can be input currently, the information type selection control can be clicked once, the information type selection control can be switched to input of voice information, the information can be switched to input of picture information once again, the information can be switched to input of video information once again, and the information can be switched to input of text information once again; one of the two information type selection controls can be used for selecting text information or voice information input, namely if the text information can be input currently, the information type selection control is clicked once and can be switched to input voice information, the text information can be switched to input again after clicking once, and the picture information and the video information can be selected by the other one of the two information type selection controls.
And S2, when receiving an information sending instruction input by a user, calling a steganographic program to steganographically process the first information and the camouflage carrier, and after the steganography succeeds, hiding the first information in the camouflage carrier to obtain second information.
And S3, sending the second information to the receiving terminal, and displaying the currently sent information as a camouflage carrier in a communication interface, wherein the communication interface is an interface for communicating with the receiving terminal to display the communication information.
Specifically, when the user has selected the disguised carrier, if the first information is text information, after the text information is completed, a sending control can be displayed in the communication interface, and after the user clicks the sending control, the sending terminal can receive an information sending instruction, at this time, a steganographic program is called to steganographically process the first information and the disguised carrier, and after the steganographic success, second information is generated, and then the second information is sent to the receiving terminal. After the second information is successfully transmitted, the communication interface of the transmitting terminal can display the currently transmitted information as a camouflage carrier, and the communication interface of the receiving terminal can display the currently received information as a camouflage carrier. For this purpose, a switching control (e.g., a key in fig. 3 and 4) is further provided in the communication interface, and the switching control can invoke a decryption program to switch the disguised carrier displayed in the communication interface to the first information, i.e., the hidden real information, for example, switch the disguised carrier in fig. 3 to the real information shown in fig. 4.
It should be noted that the Vokey in fig. 3 and 4 may be a fixed control name, that is, the Vokey is displayed on both the communication interfaces of the receiving terminal and the sending terminal; or the user name of the receiving terminal/the sending terminal can be used, namely the user of the sending terminal is displayed on the communication interface of the receiving terminal, and the user of the receiving terminal is displayed on the interface of the sending terminal, so that the communication interface is more attractive.
Alternatively, the depainting control may act only on the received information, in other words, when the communication interface of the transmitting terminal displays the disguised carrier, the disguised carrier is not switched to the first information even if the depainting control is pressed, and for the disguised carrier received by the transmitting terminal, the disguised carrier may be switched to the corresponding first information when the depainting control is pressed. Therefore, the information reading of the sending terminal and the receiving terminal is not hindered, but the third person can not obtain the communication information completely, so that the information safety can be better guaranteed.
In an embodiment of the invention, when steganographic processing is performed on the first information and the carrier, the type of the first information is also obtained; after the steganography succeeds, an identification code of second information is also generated; and naming the second information by using the identification code, and storing the second information in a local corresponding folder according to the type of the first information.
Specifically, if the first information is picture information, after the steganography success, the first information is hidden in a camouflage carrier to generate second information, and meanwhile, an identification code, such as an ID, of the second information can be generated, and the second information is stored locally in the communication picture folder and is named as the ID.
It should be noted that the sending of the second information may be performed after the second information is completely saved.
In one embodiment of the invention, if steganography fails, abnormal information is generated and displayed on the communication interface to remind a user that the current message transmission fails. At this time, the receiving terminal does not receive any content related to the information, that is, only the communication interface of the sending terminal displays abnormal information, such as a picture of a messy code, and the user can cancel, delete, resend and the like the information.
Of course, if the information transmission fails, the transmitting terminal may also retransmit the information at regular intervals (e.g., 0.5s), and when the number of retransmissions reaches a preset number (e.g., 3), stop transmitting and generate abnormal information to inform the user, so that the user may intervene in the processing.
It is understood that the receiving terminal may be an information receiving side or an information transmitting side, and when the receiving terminal is the information transmitting side, the transmitting terminal is the information receiving side. That is, the receiving terminal and the transmitting terminal have the same communication information processing function.
The instant messaging sending method provided by the embodiment of the invention can hide the first information in the camouflage carrier during instant messaging, so that the first information is prevented from being stolen and seen, the concealment of the information can be enhanced, and the safety of the information is guaranteed.
Fig. 7 is a block diagram of an instant messaging transmitting device according to an embodiment of the present invention.
As shown in fig. 7, the instant communication sending apparatus 10 includes: the device comprises an acquisition module 11, a steganography module 12, a sending module 13 and a display module 14.
The acquiring module 11 is configured to acquire first information to be transmitted and a camouflage carrier; the steganography module 12 is configured to, when receiving an information sending instruction input by a user, invoke a steganography program to perform steganography processing on the first information and the camouflage carrier, and hide the first information in the camouflage carrier after the steganography success to obtain second information; the sending module 13 is configured to send the second information to the receiving terminal; the display module 14 is configured to display the currently sent information as a disguised carrier in a communication interface, where the communication interface is an interface for communicating with the receiving terminal to display the communication information.
Wherein the types of the first information and the camouflage carrier can comprise one or more of text, pictures, voice and video.
In an embodiment of the present invention, a display/hidden control is disposed in a communication interface (i.e. a chat interface) between a sending terminal and a receiving terminal, as shown in fig. 2, when the sending terminal sends information to the receiving terminal, and when the obtaining module 11 obtains a disguised carrier, the obtaining module is specifically configured to execute the following steps:
and S11, when an information hiding instruction input by a user for the visible and hidden controls is received, displaying the carrier adding controls in the communication interface.
Specifically, the visible and invisible control may be arranged on the right side of the bottom of the communication interface, and the appearance of the visible and invisible control may simulate the arrangement of human eyes, as shown in fig. 3, the visible and invisible control indicates that an information hiding instruction has been input for closed eyes, and indicates that no information hiding instruction has been input for open eyes, and at this time, the first information may be directly sent to the receiving terminal, where the open eyes and the closed eyes of the visible and invisible control may be switched by clicking the visible and invisible control.
As an example, when the carrier addition control is displayed in the communication interface, the obtaining module 11 may further determine whether a carrier exists in the carrier library; and if the carrier exists in the carrier library, displaying at least one camouflage carrier in a preset display area corresponding to the carrier adding control.
Specifically, if a carrier exists in a carrier library preset by the sending terminal, at least one carrier in the carrier library may be displayed in a preset display area corresponding to the carrier addition control. For example, at least one latest carrier (e.g., one, two, or three latest carriers) may be displayed in the preset display area corresponding to the carrier addition control according to the time when the carriers are stored in the carrier library; one or more carriers can be randomly selected from the carrier library and displayed in a preset display area corresponding to the carrier adding control; and at least one carrier which is not selected or is selected less frequently can be displayed in the preset display area corresponding to the carrier adding control. Optionally, the same picture may not be consecutive as the default selected disguised carrier.
As an example, if no carrier exists in the carrier library, a carrier addition icon is displayed in a preset display area corresponding to the carrier addition control.
For example, the disguised carrier is a picture, and only one picture can be displayed in the preset display region corresponding to the carrier adding control, when the displaying and hiding control is switched to be closed, if a picture exists in a carrier library preset by the sending terminal, a preset disguised carrier is displayed in the preset display region corresponding to the carrier adding control at the lower right corner of the communication interface, as shown in fig. 4; and if the picture does not exist in the carrier library, displaying a carrier adding icon in a preset display area corresponding to the carrier adding control at the lower right corner of the communication interface, as shown in fig. 3. And the carrier adding control is displayed above the visible and invisible controls.
And S12, when a carrier adding instruction input by the user aiming at the carrier adding control is received, switching the communication interface to a carrier library management interface.
When the carrier is disguised as a picture, the carrier library management interface can display an album control and a photographing control, so that a user can select the picture from a local album to add to the carrier library, or the picture obtained by instant photographing is added to the carrier library.
Specifically, clicking a carrier adding control, switching a communication interface to a carrier library management interface, as shown in fig. 5, displaying an album control and a photographing control in the carrier library management interface, and clicking the album control by a user to select a carrier from a local album and add the carrier to a carrier library; and the user clicks the to-be-photographed control, and the carrier obtained by instant photographing can be added into the carrier library.
Optionally, in order to improve the utilization rate of the communication interface, the carrier addition control may be set in the corresponding preset display area, for example, as shown in fig. 3, a user may click the carrier addition control by clicking the carrier addition icon at the lower right corner; as shown in fig. 4, the user can click the carrier addition control by clicking the camouflage picture 3 at the lower right corner.
In an embodiment of the present invention, if the user is not satisfied with the preset disguised carrier, the user can click the carrier addition control, and the communication interface can be switched to the carrier library management interface shown in fig. 6. At this time, the user can select one of the carriers as the needed camouflage carrier, and if the user is satisfied when none of the pictures in the carrier library are available, the user can further click the "+" icon at the upper right corner in fig. 6 to input a carrier adding instruction so as to obtain the camouflage carrier from the local album of the sending terminal or through the photographing function.
And S13, after receiving a selection instruction input by a user aiming at the pictures in the carrier library, switching the carrier library management interface to a communication interface, and displaying the selected camouflage carrier in a preset display area corresponding to the carrier adding control.
Specifically, after the pictures exist in the carrier library, the user can directly click on a selection icon (such as a number matching icon on each picture shown in fig. 6) on each picture to select the disguised carrier. After the selection is completed, the carrier library management interface is switched to the communication interface, and at this time, the communication interface can display the selected disguised carrier, as shown in fig. 4.
Furthermore, an information input area is also arranged in the communication interface, the information input area is provided with at least one information type selection control, for example, one information type selection control can be directly arranged, if text information can be input currently, the information type selection control can be clicked once, the information type selection control can be switched to input of voice information, the information can be switched to input of picture information once again, the information can be switched to input of video information once again, and the information can be switched to input of text information once again; one of the two information type selection controls can be used for selecting text information or voice information input, namely if the text information can be input currently, the information type selection control is clicked once and can be switched to input voice information, the text information can be switched to input again after clicking once, and the picture information and the video information can be selected by the other one of the two information type selection controls.
Specifically, when the user has selected the disguised carrier, if the first information is text information, after the text information is completed, a sending control can be displayed in the communication interface, and after the user clicks the sending control, the sending terminal can receive an information sending instruction, at this time, a steganographic program is called to steganographically process the first information and the disguised carrier, and after the steganographic success, second information is generated, and then the second information is sent to the receiving terminal. After the second information is successfully transmitted, the communication interface of the transmitting terminal can display the currently transmitted information as a camouflage carrier, and the communication interface of the receiving terminal can display the currently received information as a camouflage carrier. For this purpose, a switching control (e.g., a key in fig. 3 and 4) is further provided in the communication interface, and the switching control can invoke a decryption program to switch the disguised carrier displayed in the communication interface to the first information, i.e., the hidden real information, for example, switch the disguised carrier in fig. 3 to the real information shown in fig. 4.
It should be noted that the Vokey in fig. 3 and 4 may be a fixed control name, that is, the Vokey is displayed on both the communication interfaces of the receiving terminal and the sending terminal; or the user name of the receiving terminal/the sending terminal can be used, namely the user of the sending terminal is displayed on the communication interface of the receiving terminal, and the user of the receiving terminal is displayed on the interface of the sending terminal, so that the communication interface is more attractive.
Alternatively, the depainting control may act only on the received information, in other words, when the communication interface of the transmitting terminal displays the disguised carrier, the disguised carrier is not switched to the first information even if the depainting control is pressed, and for the disguised carrier received by the transmitting terminal, the disguised carrier may be switched to the corresponding first information when the depainting control is pressed. Therefore, the information reading of the sending terminal and the receiving terminal is not hindered, but the third person can not obtain the communication information completely, so that the information safety can be better guaranteed.
In an embodiment of the invention, when steganographic processing is performed on the first information and the carrier, the type of the first information is also obtained; after the steganography succeeds, an identification code of second information is also generated; and naming the second information by using the identification code, and storing the second information in a local corresponding folder according to the type of the first information.
Specifically, if the first information is picture information, after the steganography success, the first information is hidden in a camouflage carrier to generate second information, and meanwhile, an identification code, such as an ID, of the second information can be generated, and the second information is stored locally in the communication picture folder and is named as the ID.
It should be noted that the sending of the second information may be performed after the second information is completely saved.
In an embodiment of the present invention, as shown in fig. 8, the instant communication sending apparatus 10 further includes: and the prompting module 15 is configured to generate abnormal information when steganography fails, and display the abnormal information on a communication interface to prompt a user that current message sending fails. At this time, the receiving terminal does not receive any content related to the information, that is, only the communication interface of the sending terminal displays abnormal information, such as a picture of a messy code, and the user can cancel, delete, resend and the like the information.
Of course, if the information transmission fails, the transmitting terminal may also retransmit the information at regular intervals (e.g., 0.5s), and when the number of retransmissions reaches a preset number (e.g., 3), stop transmitting and generate abnormal information to inform the user, so that the user may intervene in the processing.
It is understood that the receiving terminal may be an information receiving side or an information transmitting side, and when the receiving terminal is the information transmitting side, the transmitting terminal is the information receiving side. That is, the receiving terminal and the transmitting terminal have the same communication information processing function.
The instant messaging sending device provided by the embodiment of the invention can hide the first information in the camouflage carrier, so that the first information is prevented from being stolen and seen, the concealment of the information can be enhanced, and the safety of the information is guaranteed.
Fig. 9 is a block diagram of an instant messenger transmitting apparatus according to an embodiment of the present invention.
As shown in fig. 9, the instant messaging device 20 of the present embodiment of the invention includes: the memory 21, the processor 22 and the computer program 23 stored in the memory 21 and capable of running on the processor 22, when the processor 22 executes the program 23, the instant messaging method according to the above embodiment of the present invention is implemented.
The instant messaging sending device of the embodiment of the invention can hide the first information in the disguised picture, avoid the first information from being stolen and stolen, enhance the concealment of the information and guarantee the safety of the information when the processor executes the computer program, and can realize the switching between the first information and the disguised picture by the user through the switching control, thereby improving the user experience and being convenient and fast.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. An instant messaging method, characterized in that the method comprises the following steps:
acquiring first information to be sent and a camouflage carrier;
when an information sending instruction input by a user is received, calling a steganography program to steganographically process the first information and the camouflage carrier, and after the steganography success, hiding the first information in the camouflage carrier to obtain second information;
and sending the second information to a receiving terminal, and displaying the currently sent information as the disguised carrier in a communication interface, wherein the communication interface is an interface for communicating with the receiving terminal to display the communication information.
2. The instant messaging method according to claim 1, wherein a display and hidden control is provided in the communication interface, and the obtaining step of the disguised carrier includes:
when an information hiding instruction input by a user for the display and hidden control is received, displaying a carrier adding control in the communication interface;
judging whether a carrier exists in a carrier library or not;
and if the carrier exists in the carrier library, displaying at least one camouflage carrier in a preset display area corresponding to the carrier adding control.
3. The instant messaging method according to claim 2, wherein the step of acquiring the masquerading carrier further comprises:
when a carrier adding instruction input by the user for the carrier adding control is received, switching the communication interface to a carrier library management interface;
and after receiving a selection instruction input by the user for the carrier in the carrier library interface, switching the carrier library interface to the communication interface, and displaying the selected disguised carrier in a preset display area corresponding to the carrier adding control.
4. The method according to claim 3, wherein if no carrier exists in the carrier library, a carrier addition icon is displayed in a preset display area corresponding to the carrier addition control.
5. The method as claimed in claim 1, wherein an information input area is further provided in the communication interface, and the information input area is provided with at least one information type selection control for a user to input different types of the first information.
6. The method according to claim 1, wherein the method further comprises:
and if the steganography fails, generating abnormal information, and displaying the abnormal information on the communication interface to remind a user that the current message transmission fails.
7. An instant messaging delivery apparatus, the apparatus comprising:
the acquisition module is used for acquiring first information to be transmitted and a camouflage carrier;
the steganography module is used for calling a steganography program to perform steganography processing on the first information and the camouflage carrier when receiving an information sending instruction input by a user, and hiding the first information in the camouflage carrier after the steganography success to obtain second information;
the sending module is used for sending the second information to a receiving terminal;
and the display module is used for displaying the currently sent information as the disguised carrier in a communication interface, wherein the communication interface is an interface for communicating with the receiving terminal to display the communication information.
8. The instant messaging sending device according to claim 7, wherein a display and hidden control is provided in the communication interface, and the obtaining module is specifically configured to, when obtaining the disguised carrier:
when an information hiding instruction input by a user for the display and hidden control is received, displaying a carrier adding control in the communication interface;
judging whether a carrier exists in a carrier library or not;
and if the carrier exists in the carrier library, displaying at least one camouflage carrier in a preset display area corresponding to the carrier adding control.
9. The instant messaging transmission device according to claim 8, wherein the obtaining module, when obtaining the masquerading carrier, is further specifically configured to:
when a carrier adding instruction input by the user for the carrier adding control is received, switching the communication interface to a carrier library management interface;
and after receiving a selection instruction input by the user for the carrier in the carrier library interface, switching the carrier library interface to the communication interface, and displaying the selected disguised carrier in the carrier adding control.
10. An instant messaging delivery apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, effects the instant messaging delivery method of any one of claims 1 to 5.
CN202010067298.3A 2020-01-20 2020-01-20 Instant messaging sending method, device and equipment Pending CN111277489A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010067298.3A CN111277489A (en) 2020-01-20 2020-01-20 Instant messaging sending method, device and equipment
PCT/CN2021/071490 WO2021147727A1 (en) 2020-01-20 2021-01-13 Instant messaging sending method, apparatus and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010067298.3A CN111277489A (en) 2020-01-20 2020-01-20 Instant messaging sending method, device and equipment

Publications (1)

Publication Number Publication Date
CN111277489A true CN111277489A (en) 2020-06-12

Family

ID=71000939

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010067298.3A Pending CN111277489A (en) 2020-01-20 2020-01-20 Instant messaging sending method, device and equipment

Country Status (2)

Country Link
CN (1) CN111277489A (en)
WO (1) WO2021147727A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797372A (en) * 2020-06-30 2020-10-20 联想(北京)有限公司 Information processing method, device and equipment
WO2021147727A1 (en) * 2020-01-20 2021-07-29 合肥高维数据技术有限公司 Instant messaging sending method, apparatus and device
WO2021147728A1 (en) * 2020-01-20 2021-07-29 合肥高维数据技术有限公司 Instant communication receiving method, device and apparatus
CN114430470A (en) * 2020-10-29 2022-05-03 李庆成 Communication picture processing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
US20150007351A1 (en) * 2013-06-27 2015-01-01 Maher Janajri Mobile Messaging Enhanced with Concealable and Selectively Revealable Text, Image, and Video Messages
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277489A (en) * 2020-01-20 2020-06-12 合肥高维数据技术有限公司 Instant messaging sending method, device and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534311A (en) * 2009-04-14 2009-09-16 杨筑平 An information security method and procedure
US20150007351A1 (en) * 2013-06-27 2015-01-01 Maher Janajri Mobile Messaging Enhanced with Concealable and Selectively Revealable Text, Image, and Video Messages
CN106411719A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Method for processing instant messages and equipment thereof
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021147727A1 (en) * 2020-01-20 2021-07-29 合肥高维数据技术有限公司 Instant messaging sending method, apparatus and device
WO2021147728A1 (en) * 2020-01-20 2021-07-29 合肥高维数据技术有限公司 Instant communication receiving method, device and apparatus
CN111797372A (en) * 2020-06-30 2020-10-20 联想(北京)有限公司 Information processing method, device and equipment
CN114430470A (en) * 2020-10-29 2022-05-03 李庆成 Communication picture processing method

Also Published As

Publication number Publication date
WO2021147727A1 (en) 2021-07-29

Similar Documents

Publication Publication Date Title
CN111277489A (en) Instant messaging sending method, device and equipment
US9967245B2 (en) User authentication using unique hidden identifiers
EP2244430B1 (en) Mobile terminal and chat method in a mobile terminal using an instant messaging service
EP1966715A2 (en) Methods and apparatuses for dynamically sharing a portion of a display for application based screen sampling
CN110932967B (en) Seamless session realization method and system for instant messaging message
CN113364668B (en) Message reminding method and device and electronic equipment
WO2018018726A1 (en) Group file management method, user terminal, and group chat system
KR101270434B1 (en) Caller information supply system of smartphone
CN105320880A (en) Terminal control method and apparatus
JP2016533684A (en) Forgery prevention verification method, apparatus, program, and recording medium
CN111314207B (en) Instant communication receiving method, device and equipment
CN113360226A (en) Data content processing method, device, terminal and storage medium
EP1605330A1 (en) Secure operation indicator
EP3125587A1 (en) Information transmitting method and device and information receiving method and device
CN105635100A (en) Information encryption method, information decryption method and terminal
CN111448564B (en) Method for displaying content on screen of electronic processing equipment
WO2020263210A1 (en) System and method for alerting a plurality of persons in group chats in instant messaging applications
CN113268177A (en) Method and device for determining message state
US8896658B2 (en) Interface for voice communications
US11176021B2 (en) Messaging systems with improved reliability
KR100966724B1 (en) Method and apparatus for appointment conference using message in mobile communication terminal
CN113835809B (en) Hiding method and device
CN113452530B (en) Information transmission method and device
WO2018052856A1 (en) Method and system for private communication
CN118102281A (en) Synchronous display method, device, system, equipment and storage medium of information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200612

RJ01 Rejection of invention patent application after publication