WO2020134692A1 - 会话信息提取方法、装置、设备和介质 - Google Patents

会话信息提取方法、装置、设备和介质 Download PDF

Info

Publication number
WO2020134692A1
WO2020134692A1 PCT/CN2019/118985 CN2019118985W WO2020134692A1 WO 2020134692 A1 WO2020134692 A1 WO 2020134692A1 CN 2019118985 W CN2019118985 W CN 2019118985W WO 2020134692 A1 WO2020134692 A1 WO 2020134692A1
Authority
WO
WIPO (PCT)
Prior art keywords
backup
historical
session
file
key
Prior art date
Application number
PCT/CN2019/118985
Other languages
English (en)
French (fr)
Inventor
王春浩
蒋永伟
马成龙
周炬
Original Assignee
苏州开心盒子软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州开心盒子软件有限公司 filed Critical 苏州开心盒子软件有限公司
Publication of WO2020134692A1 publication Critical patent/WO2020134692A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/216Handling conversation history, e.g. grouping of messages in sessions or threads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the embodiments of the present invention relate to the technical field of computer applications, for example, to a method, device, device, and medium for extracting session information.
  • Instant messaging service software that supports cross-communication service operators and cross-operating platforms to send voice messages, videos, pictures and texts has been widely used in people's work, study and life.
  • Instant messaging service software often includes a mobile version client that can be installed on a smart terminal and a PC version client that can be installed on a computer.
  • the present application provides a method, device, device and medium for extracting session information to realize the extraction of historical session information and improve the user experience.
  • an embodiment of the present invention provides a method for extracting session information.
  • the method includes:
  • an embodiment of the present invention further provides an apparatus for extracting session information.
  • the apparatus includes:
  • the backup key obtaining module is configured to obtain a backup key associated with a historical backup folder, wherein the backup key is determined by a third-party terminal and forwarded to the terminal through an authorization server;
  • a backup file obtaining module configured to decrypt the historical backup folder according to the backup key to obtain a historical backup file
  • the session message acquisition module is configured to extract historical session messages from the historical backup file according to preset rules.
  • an embodiment of the present invention further provides a device, the device including:
  • One or more processors are One or more processors;
  • the memory is used to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the session according to any one of the embodiments of the present invention Information extraction method.
  • an embodiment of the present invention further provides a computer-readable storage medium.
  • the program is executed by a processor, the method for extracting session information according to any one of the embodiments of the present invention is implemented.
  • the embodiment of the present invention solves the instant messaging software by obtaining the backup key of the historical backup file, using the backup key to decrypt the corresponding historical folder, obtaining the historical backup file in the folder, and then extracting the historical session message stored therein.
  • FIG. 1 is a flowchart of a method for extracting session information according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for extracting session information according to Embodiment 2 of the present invention
  • Embodiment 3 is a flowchart of obtaining a historical backup file provided by Embodiment 2 of the present invention.
  • Embodiment 4 is a schematic diagram of a historical session message provided by Embodiment 2 of the present invention.
  • FIG. 5 is a schematic structural diagram of an apparatus for extracting session information according to Embodiment 3 of the present invention.
  • FIG. 6 is a schematic structural diagram of a third-party terminal according to Embodiment 3 of the present invention.
  • FIG. 7 is a schematic structural diagram of a device according to Embodiment 4 of the present invention.
  • FIG. 1 is a flowchart of a method for extracting session information according to Embodiment 1 of the present invention.
  • This embodiment can be applied to the case of acquiring historical session information of instant messaging software on a computer.
  • This method can be performed by a device for extracting session information.
  • the device can be realized by hardware and/or software, and is generally integrated as a plug-in in the computer-side instant messaging software, and the computer device integrated with the computer-side instant messaging software can be used as the execution subject of this embodiment.
  • the executive subject is the terminal.
  • the user needs to initiate a login request to the authorization server through the terminal installed with the computer-side instant messaging software, and the authorization server forwards the login request to the third-party terminal.
  • the three-party terminal generates login information according to the login request and forwards it to the authorization server.
  • the authorization server returns the generated login information to the terminal.
  • the user performs a login operation based on the login information on the terminal.
  • the login operation can be finally obtained by the server of the instant messaging software. , And realize the login operation of the instant messaging software on the third-party terminal.
  • the third-party terminal can provide session information to the terminal to extract relevant data information.
  • the login information generated by the third terminal may be a login two-dimensional code
  • the login operation performed by the user on the terminal according to the login information may be that the user uses a mobile terminal instant messaging software to scan the code.
  • Step 101 Obtain a backup key associated with a historical backup folder, where the backup key is determined by a third-party terminal and forwarded to the terminal through an authorization server.
  • the historical backup folder may be a storage area where instant messaging software stores session messages, and the form may be folders, files, tables, databases, etc.; the backup key may be a key used to encrypt the backup historical folder
  • the third-party terminal may be a terminal for obtaining a backup key, may be a MAC terminal installed with instant messaging software, a Windows terminal, or a server.
  • the backup key sent by the authorization server can be obtained, and then the corresponding historical backup folder can be found in the terminal used by the user to determine the obtained backup key corresponding to the historical folder.
  • the authorization server may be a server for information exchange between the third-party terminal and the terminal, and the login information is transmitted between the third-party terminal and the terminal, including sending the login request of the terminal to the third-party terminal and determining The backup key is sent to the terminal and so on.
  • the user may obtain the backup key sent by the authorization server.
  • the key form may be an AES key, and then obtain the path in the Windows terminal used by the user All historical backup files in C: ⁇ Users ⁇ Chuck ⁇ Documents ⁇ WeChat Files ⁇ WeChat ⁇ BackupFiles, determine the backup key corresponding to the historical backup file according to the WeChat in the path.
  • Step 102 Decrypt the historical backup folder according to the backup key to obtain a historical backup file.
  • the historical backup file may be a file storing user session information, which may be obtained by decrypting the historical backup folder, and may include a session text file, a session attachment file, and a session association table, etc.
  • the historical backup file Can be Backup.db, BAK_N_TEXT, BAK_N_MEDIA and other files.
  • the historical backup folder can be decrypted according to the corresponding encryption algorithm using the corresponding backup key to obtain the decrypted historical backup file, for example, the historical backup file of WeChat can be based on the obtained WeChat backup key
  • the Backup.db file in the folder is decrypted to obtain the unencrypted Backup.db file.
  • Step 103 Extract historical session messages from the historical backup file according to preset rules.
  • the preset rule may be a filter condition for extracting historical session messages from a historical backup file, which may include session time, session date, and session object.
  • historical session information can be obtained in the historical backup file according to preset filter conditions. For example, regular expressions or SQL statements can be used to query the historical backup file for a certain date of the session data. Session data as historical session messages.
  • the backup key determined by the third-party terminal is obtained, the backup folder is decrypted using the obtained backup key to obtain a historical backup file, and the historical session stored in the historical backup file is extracted according to a preset rule The message enables the user to view the historical session message after logging in to the computer-side instant messaging software again, which improves the user experience of using the computer version of the instant messaging software.
  • the third-party terminal can determine the backup key by the following methods:
  • the backup key in the backup association function is determined according to the parameter interaction information.
  • the code file may be a code file obtained by a third-party terminal through reverse communication software
  • the backup association function may be a function using a backup key, for example, a function to generate a historical backup file
  • the parameter interaction information may be a backup association The function used to pass the backup key in the function.
  • reverse instant messaging software can be obtained at the third-party terminal to obtain its corresponding code file, and the backup associated function can be obtained from the code file.
  • a Hook method can be set in the backup associated function to monitor the backup management function
  • the incoming and outgoing parameter interaction information intercepts the parameter interaction information monitored in the Hook method during the instant messaging software login process, and obtains the backup key of the associated function in the parameter interaction information.
  • the instant messaging software WeChat as an example, you can reverse the WeChat client in the third-party terminal MAC computer to obtain the function in which the backup key has been processed.
  • Configure the Hook method in the function When the WeChat login process occurs, configure The function of the Hook method handles the parameter that contains the backup key.
  • the Hook method intercepts the parameter and obtains the backup key.
  • FIG. 2 is a flowchart of a method for extracting session information according to Embodiment 2 of the present invention; this embodiment is an optional solution provided on the basis of the foregoing embodiments.
  • Information extraction methods include:
  • Step 201 Obtain a backup key associated with a historical backup folder, where the backup key is determined by a third-party terminal and forwarded to the terminal through an authorization server.
  • Step 202 Determine the encryption format of the backup key and the historical backup folder, and determine the decryption rule corresponding to the encryption format.
  • the encryption format may be the data structure format used by the backup key and the historical backup folder storage, including a 32-byte length hexadecimal string or a hexadecimal character that is a multiple of 32-byte length
  • the encryption rule can be the algorithm used to encrypt the historical backup folder, including AES decryption algorithm, DES decryption algorithm and RSA decryption algorithm.
  • the encryption algorithm used for encrypting the backup key and the historical backup file may be determined according to the storage format of the obtained backup key. For example, the backup key is 16 bytes, and the ciphertext length of the historical backup folder is exactly an integer multiple of 16 bytes. It can be determined that the encryption algorithm used for the encryption of the backup key and the historical backup file is the AES encryption algorithm, then the corresponding The decryption algorithm is AES decryption algorithm.
  • Step 203 Based on the decryption rule and the backup key, decrypt the historical backup folder to obtain the historical backup file in the historical backup folder;
  • the historical backup file is: a session text file generated during historical instant messaging , Session attachment file, session association table.
  • the historical backup file may be a file in a historical backup folder, including a session text file, a session attachment file, and a session association table, etc.
  • the session text file may be a file that stores the user's historical session information text, session attachment file It can be a file that stores the attachments that appear in the user's historical session.
  • the attachment can include music, pictures, and links.
  • the session association table can be a file that stores the correspondence between the historical session messages in the session text file and the attachments in the historical session messages in the attachment file.
  • BAK_N_TEXT in WeChat can be a session text file
  • BAK_N_MEDIA can be a session attachment file
  • the MsgSegments table in Backup.db can be a session association table.
  • the backup key and decryption algorithm can be used to decrypt the historical backup folder according to the determined decryption algorithm of the historical backup folder, and the files in the decrypted backup folder can be obtained as the historical backup file, which is understandable It is also possible to use the backup key and the decryption algorithm to separately obtain the decrypted historical backup files for the historical backup files in the historical backup folder.
  • FIG. 3 the process of obtaining historical backup files through terminals such as this terminal, a third-party terminal, an authorization server, and a WeChat server is shown in FIG. 3.
  • the user initiates a request to obtain a WeChat login QR code on this terminal, and the authorization server receives After the request is received, the login QR code request is sent to the third-party terminal.
  • the third-party terminal obtains the request, open WeChat to obtain the login QR code.
  • the third-party terminal sends the QR code to the authorization server.
  • the authorization server sends the QR code to the authorization server.
  • the WeChat login of the three-party terminal is successful and the operation of obtaining the backup key is performed.
  • the backup key is sent to the authorization server, and the authorization server stores and sends the backup key to the terminal.
  • the terminal uses the backup The key is decrypted to obtain the historical backup file.
  • Step 204 Analyze and acquire at least one piece of association table entry information in the conversation association table, where the association table entry information includes: a conversation object group, an associated text storage address, and an associated accessory storage address.
  • the association table item information may be information stored in the session association table, including the session object identification number, session message time, session message identification number, session object group, associated text storage address, and associated accessory storage address, etc.
  • the conversation object group may be a set of conversation object identification numbers corresponding to both parties participating in the conversation
  • the associated text storage address may be the storage location of the user's conversation message in the conversation text file, which may include a physical storage address or a logical storage address, and an associated accessory storage
  • the address may be the storage location of the text appearing in the user session message in the session attachment file, and may include a physical storage address or a logical storage address.
  • all the association entry information stored in the conversation association table may be read to determine the storage location of the conversation text and the conversation attachment in the conversation text file and the conversation attachment file in the conversation message.
  • the form of the SQL statement can be as follows:
  • Step 205 Based on the associated text storage address, extract the conversation text corresponding to the conversation object group from the conversation text file.
  • the storage location of the conversation message in the conversation text file can be obtained, the content in the corresponding storage location of the conversation text file can be read according to the storage location, and the read content can be used as the conversation text of the conversation object group.
  • the SQL statement can be as follows:
  • Step 206 Based on the associated attachment storage address, extract attachment information corresponding to the conversation object group from the conversation attachment file.
  • the storage location of the attachment of the conversation message in the conversation attachment file may be obtained, the content of the storage location corresponding to the conversation attachment file is read according to the storage location, and the read content is used as attachment information of the conversation object.
  • the form of the SQL statement can be as follows:
  • MapKey InnerOffSet, Length, TotalLen, Offset, FileName, MsgSegmentId, talker, Media iIdStr
  • Step 207 Obtain a historical conversation message formed based on the conversation object group and corresponding conversation text and attachment information.
  • the historical conversation information may be based on the conversation text determined by the conversation group and the conversation message of the corresponding attachment.
  • the historical conversation message may be a chat record generated by the user and the chat object in chronological order or It is a chat history found based on keywords.
  • the session text information and session attachments sent between the two parties involved in the session it is possible to obtain the session text information and session attachments sent between the two parties involved in the session, and form a complete session message record according to the sending time and the sending object in the sent text information and session attachments.
  • the corresponding confidential rule is determined according to the encryption format of the historical backup folder and the backup key, and the historical backup folder is decrypted according to the decryption rule and the backup key , Obtain the session association table, session text file and session attachment file, and form the session text file and the session file into the historical session message according to the session association table; solved the problem that the instant messaging software cannot view the historical session message after logging on the computer side, which is convenient for the user to view And management of historical conversation messages improves user experience.
  • the method further includes:
  • the preset presentation style may be the form of displaying the conversation message may be a chat record form or a table form.
  • the chat session record can be generated in the order of the generation time of the session message or in the form of a table.
  • the historical session message format can be displayed as shown in FIG. 4, according to the generation of the session message The time determines the text content and corresponding attachments of the conversation message.
  • the apparatus for extracting session information includes: a backup key acquisition module 301 , A backup file acquisition module 302 and a session message acquisition module 303.
  • the backup key obtaining module 301 is configured to obtain the backup key associated with the historical backup folder, wherein the backup key is determined by the third-party terminal and forwarded to the terminal through the authorization server.
  • the backup file obtaining module 302 is configured to decrypt the historical backup folder according to the backup key to obtain a historical backup file.
  • the session message acquisition module 303 is configured to extract historical session messages from the historical backup file according to preset rules.
  • the backup key obtaining module obtains the backup key determined by the third-party terminal
  • the backup file obtaining module uses the obtained backup key to decrypt the backup folder to obtain the historical backup file
  • the session message obtaining module According to the preset rules, the historical session messages stored in the historical file are extracted, so that the user can view the historical session messages after logging in to the computer-side instant messaging software again, which improves the user experience of using the computer version of the instant messaging software.
  • the session information extraction device determines the backup key through the following module of the third-party terminal.
  • FIG. 6 is a schematic structural diagram of a third-party terminal according to Embodiment 3 of the present invention. See FIG. 6.
  • the third-party terminal includes a listening module 311, an interception module 312, and a key interception module 313.
  • the monitoring module 311 is configured to monitor the backup correlation function in the code file corresponding to the instant messaging software.
  • the interception module 312 is configured to intercept the parameter interaction information of the backup correlation function during the login process of the instant messaging software.
  • the key obtaining module 313 is configured to determine the backup key in the backup association function according to the parameter interaction information.
  • the backup file obtaining module includes:
  • the decryption rule determination unit is configured to determine the encryption format of the backup key and the historical backup folder, and determine the decryption rule corresponding to the encryption format.
  • the decryption unit is set to decrypt the historical backup folder based on the decryption rule in combination with the backup key to obtain the historical backup file in the historical backup folder;
  • the historical backup file is: generated during historical instant messaging Conversation text file, conversation attachment file, conversation association table.
  • the session message acquisition module includes:
  • the parsing unit is configured to parse and acquire at least one piece of association table entry information in the session association table, where the association table entry information includes: a conversation object group, an associated text storage address, and an associated accessory storage address.
  • the text address acquisition unit is configured to extract the conversation text corresponding to the conversation object group in the conversation text file based on the associated text storage address.
  • the attachment address acquisition unit is configured to extract attachment information corresponding to the conversation object group in the conversation attachment file based on the associated attachment storage address.
  • the conversation message obtaining unit is configured to obtain historical conversation elimination information formed based on the conversation object group and corresponding conversation text and attachment information.
  • the device further includes: a display module configured to display the historical conversation message in a set display style.
  • the session information extraction device provided by the embodiment of the present invention can execute the session information extraction method provided by any embodiment of the present application, and has the corresponding functional modules and beneficial effects of the execution method.
  • FIG. 7 is a schematic structural diagram of a device according to Embodiment 4 of the present invention.
  • the device includes a processor 70, a memory 71, an input device 72, and an output device 73; the number of processors 70 in the device may be One or more, one processor 70 is taken as an example in FIG. 6; the processor 70, the memory 71, the input device 72, and the output device 73 in the device may be connected through a bus or other means, and FIG. 6 takes the connection through a bus as an example.
  • the memory 71 as a computer-readable storage medium can be used to store software programs, computer executable programs, and modules, such as program modules corresponding to the session information extraction method in the embodiment of the present invention (for example, the backup password in the session information extraction device Key acquisition module 301, backup file acquisition module 302, and session message acquisition module 303).
  • the processor 70 executes various functional applications and data processing of the device by running software programs, instructions, and modules stored in the memory 71, that is, implementing the above-mentioned session information extraction method.
  • the memory 71 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of the terminal, and the like.
  • the memory 71 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the memory 71 may include memories remotely provided with respect to the processor 70, and these remote memories may be connected to the device through a network. Examples of the aforementioned network may include the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the input device 72 can be used to receive input digital or character information, and generate key signal input related to user settings and function control of the device.
  • the output device 73 may include a display device such as a display screen.
  • Embodiment 5 of the present invention also provides a storage medium containing computer-executable instructions, which when executed by a computer processor are used to perform a session information extraction method, the method includes:
  • a storage medium containing computer-executable instructions provided by an embodiment of the present invention can also perform related operations in the session information extraction method provided by any embodiment of the present application.
  • the present application can be implemented by software and necessary general hardware, and of course can also be implemented by hardware, but in many cases the former is a better embodiment .
  • the technical solutions of the present application can essentially be embodied in the form of software products, and the computer software products can be stored in computer-readable storage media, such as computer floppy disks, Read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (FLASH), hard disk or optical disc, etc., including several instructions to make a computer device (which can be a personal computer, Server, or network equipment, etc.) to execute the method described in each embodiment of the present application.
  • a computer device which can be a personal computer, Server, or network equipment, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请公开了一种会话信息提取方法、装置、设备和介质。所述方法包括:获取历史备份文件夹关联的备份密钥;根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件;根据预设规则从所述历史备份文件中提取历史会话消息。

Description

会话信息提取方法、装置、设备和介质
本公开要求在2018年12月28日提交中国专利局、申请号为201811622193.9的中国专利申请的优先权,以上申请的全部内容通过引用结合在本公开中。
技术领域
本发明实施例涉及计算机应用技术领域,例如涉及一种会话信息提取方法、装置、设备和介质。
背景技术
目前,支持跨通信服务运营商、跨操作平台发送语音短信、视频、图片和文字的即时通讯服务软件已广泛应用于人们的工作、学习及生活中。即时通讯服务软件往往包括可安装在智能终端上的移动版客户端以及可安装在电脑上的PC版客户端。
对于一些即时通讯服务软件而言,用户通过其PC版客户端完成与他人的即时通讯并退出后,再次登录时,无法查看到与他人通讯的历史会话消息,由此降低了电脑版即时通讯软件的用户体验。
发明内容
本申请提供一种会话信息提取方法、装置、设备和介质,以实现历史会话信息提取,提高用户体验。
第一方面,本发明实施例提供了一种会话信息提取方法,该方法包括:
获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端;
根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件;
根据预设规则从所述历史备份文件中提取历史会话消息。
第二方面,本发明实施例还提供了一种会话信息提取装置,该装置包括:
备份密钥获取模块,被设置为获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端;
备份文件获取模块,被设置为根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件;
会话消息获取模块,被设置为根据预设规则从所述历史备份文件中提取历 史会话消息。
第三方面,本发明实施例还提供了一种设备,所述设备包括:
一个或多个处理器;
存储器,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行,使得一个或多个处理器实现如本发明实施例中任一所述的会话信息提取方法。
第四方面,本发明实施例还提供了一种计算机可读存储介质,该程序被处理器执行时实现如本发明实施例中任一所述的会话信息提取方法。
本发明实施例通过获取历史备份文件的备份密钥,使用备份密钥将对应的历史文件夹解密,获取文件夹中的历史备份文件,然后提取出其中存储的历史会话消息,解决了即时通信软件软件在重新登录电脑端后无法查看与他人通讯历史会话消息的问题,提高了用户使用电脑版即时通信软件的用户体验。
附图说明
图1是本发明实施例一提供的一种会话信息提取方法的流程图;
图2是本发明实施例二提供的一种会话信息提取方法的流程图;
图3是本发明实施例二提供的一种历史备份文件获取流程图;
图4是本发明实施例二提供的一种历史会话消息示意图;
图5是本发明实施例三提供的一种会话信息提取装置的结构示意图;
图6是本发明实施例三提供的一种第三方终端的结构示意图;
图7是本发明实施例四提供的一种设备的结构示意图。
具体实施方式
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。
实施例一
图1是本发明实施例一提供的一种会话信息提取方法的流程图,本实施例可适用于获取电脑端即时通讯软件历史会话信息的情况,该方法可以由会话信息提取装置来执行,该装置可以由硬件和/或软件实现,并一般作为插件集成在 电脑端即时通讯软件中,且可将集成了电脑端即时通讯软件的计算机设备作为本实施例的执行主体,为便于表述,记该执行主体为本终端。
需要说明的是,本实施例在实现会话信息提取之前,用户需要通过安装了电脑端即时通讯软件的本终端向授权服务器发起登录请求,授权服务器则将该登陆请求转发至第三方终端,由第三方终端根据登录请求生成登录信息并转发至授权服务器,授权服务器将生成的登录信息返回给本终端,用户在本终端上根据登录信息进行登录操作,该登录操作最终可以由即时通讯软件的服务器获取,并实现即时通讯软件在第三方终端的登录操作,在第三方终端登录即时通讯软件后,第三方终端则可以向本终端提供会话信息提取相关的数据信息。
可选地,上述第三终端生成的登录信息可以是登录二维码,用户在本终端上根据登录信息进行的登陆操作可以是,用户采用移动端即时通讯软件进行扫码操作。
本实施例一提供的由本终端执行的会话信息提取方法,可以包括如下步骤:
步骤101、获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端。
在一些实施例中,历史备份文件夹可以是即时通讯软件存储会话消息的存储区域,其形式可以是文件夹、文件、表格和数据库等;备份密钥可以是加密备份历史文件夹使用的密钥,例如AES加密密钥、DES加密密钥等,第三方终端可以是用于获取备份密钥的终端,可以是安装有即时通信软件的MAC终端、Windows终端或者服务器等。
在一些实施例中,可以获取由授权服务器发送的备份密钥,然后可以在用户使用的终端内查找到对应的历史备份文件夹,确定该历史文件夹对应的获取到的备份密钥,在一些实施例中,授权服务器可以是第三方终端和本终端信息交互的服务器,在第三方终端和本终端之间传输登录信息,包括将本终端的登录请求发送给第三方终端和将第三方确定的备份密钥发送到本终端等。
示例性的,以即时通信软件软件是微信为例,用户可以获取授权服务器发送的备份密钥,在一些实施例中,密钥形式可以是AES密钥,然后在用户使用的Windows终端中获取路径C:\Users\Chuck\Documents\WeChat Files\微信号\BackupFiles中的所有历史备份文件,根据路径中的微信号确定历史备份文件对应的备份密钥。
步骤102、根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件。
在一些实施例中,历史备份文件可以是存储用户会话信息的文件,可以由历史备份文件夹解密获得,可以包括会话文本文件、会话附件文件和会话关联表等,以微信为例,历史备份文件可以是Backup.db、BAK_N_TEXT和BAK_N_MEDIA等文件。
在一些实施例中,历史备份文件夹可以使用对应的备份密钥进行根据对应加密算法进行解密,获取解密后的历史备份文件,例如,可以根据获取到的微信备份密钥对微信的历史备份文件夹中的Backup.db文件进行解密,获取未加密的Backup.db文件。
步骤103、根据预设规则从所述历史备份文件中提取历史会话消息。
在一些实施例中,预设规则可以是在历史备份文件中提取历史会话消息的筛选条件,可以包括会话时间、会话日期和会话对象等。
在一些实施例中,可以根据预设的筛选条件在历史备份文件中获取历史会话消息,例如,可以使用正则表达式或者SQL语句在历史备份文件中查询某个固定日期的会话数据将查询到的会话数据作为历史会话消息。
本发明实施例的技术方案,通过获取第三方终端确定的备份密钥,使用获取到的备份密钥对备份文件夹进行解密得到历史备份文件,根据预设规则提取历史备份文件中存储的历史会话消息,使得用户在重新登录电脑端即时通讯软件后查看到历史会话消息,提高了用户使用电脑版即时通讯软件的用户体验度。
在上述技术方案的基础上,第三方终端可以通过下述方法确定备份密钥:
监听即时通讯软件所对应代码文件中的备份关联函数;
截取所述即时通讯软件登录过程中所述备份关联函数的参数交互信息;
根据所述参数交互信息确定所述备份关联函数中的备份密钥。
在一些实施例中,代码文件可以是在第三方终端通过逆向通讯软件得到的代码文件,备份关联函数可以是使用备份密钥的函数,例如生成历史备份文件的函数,参数交互信息可以是备份关联函数中用于传递备份密钥的函数。
在一些实施例中,可以在第三方终端处逆向即时通讯软件获得其对应的代码文件,在代码文件中获取确定备份关联函数,可以在备份关联函数中设置Hook方法,用于监听该备份管理函数传入传出的参数交互信息,在即时通讯软件登录过程中截取Hook方法中监听到的参数交互信息,在该参数交互信息中获取关联函数的备份密钥。示例性的,以即时通讯软件是微信为例,可以在第三方终端MAC电脑中逆向微信客户端,获取其中处理过备份密钥的函数,在函数配置 Hook方法,当微信发生登录过程时,配置Hook方法的函数会处理包含备份密钥的参数,Hook方法截取到该参数并将获取其中的备份密钥。
实施例二
图2是本发明实施例二提供的一种会话信息提取方法的流程图;本实施例是在上述实施例的基础上,提供的一种可选方案,参见图2,本实施例提供的会话信息提取方法包括:
步骤201、获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端。
步骤202、确定所述备份密钥及所述历史备份文件夹的加密格式,并确定所述加密格式对应的解密规则。
在一些实施例中,加密格式可以是备份密钥和历史备份文件夹存储使用的数据结构格式,包括32字节长度的十六进制字符串或为32字节长度倍数的十六进制字符串,加密规则可以是历史备份文件夹加密所使用的算法,包括AES解密算法、DES解密算法和RSA解密算法等。
在一些实施例中,可以根据获取的备份密钥的存储格式判断,备份密钥和历史备份文件加密所使用的加密算法。例如,备份密钥为16字节,历史备份文件夹的密文长度为恰好为16字节的整数倍,可以确定备份密钥和历史备份文件加密所使用的加密算法为AES加密算法,那么对应的解密算法为AES解密算法。
步骤203、基于所述解密规则结合所述备份密钥,解密所述历史备份文件夹,获取历史备份文件夹中的历史备份文件;所述历史备份文件为:历史即时通讯时产生的会话文本文件、会话附件文件、会话关联表。
在一些实施例中,历史备份文件可以是历史备份文件夹中的文件,包括会话文本文件、会话附件文件和会话关联表等,会话文本文件可以是存储用户历史会话信息文本的文件,会话附件文件可以是存储用户历史会话中出现的附件的文件,附件可以包括音乐、图片和链接等内容,会话关联表可以是存储会话文本文件中历史会话消息和附件文件中历史会话消息内附件对应关系的文件,例如,微信中BAK_N_TEXT可以是会话文本文件、BAK_N_MEDIA可以是会话附件文件、Backup.db中的MsgSegments表可以是会话关联表。
在一些实施例中,可以根据确定的历史备份文件夹的解密算法,使用备份密钥和解密算法对历史备份文件夹进行解密,获取解密后备份文件夹中的文件作为历史备份文件,可以理解的是也可以使用备份密钥和解密算法分别对历史 备份文件夹中的历史备份文件分别进行单独获取解密后的历史备份文件。
可选的,以微信为例,通过本终端、第三方终端、授权服务器和微信服务器等终端获取历史备份文件的过程参见图3,用户在本终端发起获取微信登录二维码请求,授权服务器接收到请求后,将登录二维码请求发送给第三方终端,第三方终端获取请求后,打开微信获取到登录二维码,第三方终端将二维码发送到授权服务器,授权服务器将该二维码发送给本终端,用户使用该二维码执行登录操作,本终端将该登录操作执行后生成的登录反馈信息发送给微信服务器,微信服务器根据该反馈信息使得第三方终端登录微信,此时第三方终端微信登录成功并执行备份密钥的获取操作,第三方获取到备份密钥后,将备份密钥发送给授权服务器,授权服务器将该备份密钥存储并发送给本终端,本终端使用备份密钥进行解密操作获取到历史备份文件。
步骤204、解析获取所述会话关联表中至少一条关联表项信息,所述关联表项信息包括:会话对象组、关联文本存储地址以及关联附件存储地址。
在一些实施例中,关联表项信息可以是会话关联表中存储的信息,包括会话对象标识号、会话消息时间、会话消息标识号、会话对象组、关联文本存储地址和关联附件存储地址等,会话对象组可以是参与会话的双方对应的会话对象标识号组成的集合,关联文本存储地址可以是用户会话消息在会话文本文件中的存储位置,可以包括物理存储地址或逻辑存储地址,关联附件存储地址可以是用户会话消息中出现的文本在会话附件文件中的存储位置,可以包括物理存储地址或逻辑存储地址。
在一些实施例中,可以读取会话关联表中存储的所有关联表项信息,确定会话消息中会话文本和会话附件在会话文本文件和会话附件文件中的存储位置。示例性的,可以使用SQL语句获取会话关联信息表中的所有关联表项信息,SQL语句的形式可以如下:
SELECT talker,nickname,strftime('%Y-%m-%d%H:%M:%S',endtime/1000,'unixepoch','localtime')
FROM Session
ORDER BY endtime DESC
步骤205、基于所述关联文本存储地址,在所述会话文本文件中提取对应所述会话对象组的会话文本。
在一些实施例中,可以获取到会话消息在会话文本文件中的存储位置,跟 据存储位置读取会话文本文件对应存储位置中的内容,将读取到的内容作为会话对象组的会话文本。示例性的,可以使用SQL语句获取关联文本存储地址,SQL语句可以如下:
SELECT UsrName,OffSet,Length,FilePath,
strftime('%Y-%m-%d%H:%M:%S',StartTime/1000,'unixepoch','localtime')
FROM MsgSegments
ORDER BY UsrName,StartTime DESC
步骤206、基于所述关联附件存储地址,在所述会话附件文件中提取对应所述会话对象组的附件信息。
在一些实施例中,可以获取会话消息的附件在会话附件文件中的存储位置,根据存储位置读取会话附件文件对应存储位置的内容,将读取到的内容作为会话对象的附件信息。示例性的,可以使用SQL语句获取附件的存储位置并将对应附件关联到对应的会话消息中,SQL语句的形式可以如下:
SELECT
MapKey,InnerOffSet,Length,TotalLen,Offset,FileName,MsgSegmentId,talker,Media IdStr
FROM MsgFileSegment
LEFT JOIN MsgMedia ON MsgFileSegment.[MapKey]=MsgMedia.[MediaId];
步骤207、获得基于所述会话对象组及相应会话文本和附件信息形成的历史会话消息。
在一些实施例中,历史会话信息可以根据会话组确定的会话文本和对应附件的会话消息,示例性的,以微信为例,历史会话消息可以是用户和聊天对象按照时间顺序产生的聊天记录或者是根据关键字查找出的聊天记录。
在一些实施例中,可以获取参与会话的双方和其之间发送的会话文本信息和会话附件,将发送的文本信息和会话附件按照发送时间和发送对象形成完整的会话消息记录,在一些实施例中,可以将生成的历史会话消息进行存储,方便用户管理和查看。
本发明实施例的技术方案,通过获取历史备份文件的备份密钥,根据历史备份文件夹和备份密钥的加密格式确定对应的机密规则,根据解密规则和备份密钥对历史备份文件夹进行解密,获取会话关联表、会话文本文件和会话附件文件,根据会话关联表将会话文本文件和会话文件形成历史会话消息;解决了 即时通讯软件电脑端登录后无法查看历史会话消息的问题,方便用户查看和管理历史会话消息提高了用户体验度。
在一些实施例中,在上述技术方案的基础上,所述方法还包括:
以设定展示样式对所述历史会话消息进行展示。
在一些实施例中,预设展示样式可以是对会话消息展示的形式可以是聊天记录的形式或表格形式。
在一些实施例中,可以按照会话消息的生成时间的顺序生成聊天会话记录的形式也可以是生成表格的形式,例如,历史会话消息形式展示方式可以如图4所示,可以根据会话消息的生成时间确定会话消息的文本内容和对应附件。
实施例三
图5是本发明实施例三提供的一种会话信息提取装置的结构示意图;该装置可以实现会话信息提取方法,参见图5,本实施例提供的会话信息提取装置包括:备份密钥获取模块301、备份文件获取模块302和会话消息获取模块303。
其中,备份密钥获取模块301,被设置为获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端。
备份文件获取模块302,被设置为根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件。
会话消息获取模块303,被设置为根据预设规则从所述历史备份文件中提取历史会话消息。
本发明实施例的技术方案,通过备份密钥获取模块获取第三方终端确定的备份密钥,备份文件获取模块使用获取到的备份密钥对备份文件夹进行解密得到历史备份文件,会话消息获取模块根据预设规则提取历史文件中存储的历史会话消息,使得用户在重新登录电脑端即时通讯软件后查看到历史会话消息,提高了用户使用电脑版即时通讯软件的用户体验度。
在一些实施例中,所述会话信息提取装置通过所述第三方终端的下述模块确定备份密钥,图6是本发明实施例三提供的一种第三方终端的结构示意图,参见图6,第三方终端包括监听模块311、截取模块312和密钥截取模块313。
监听模块311,被设置为监听即时通讯软件所对应代码文件中的备份关联函数。
截取模块312,被设置为截取所述即时通讯软件登录过程中所述备份关联函数的参数交互信息。
密钥获取模块313,被设置为根据所述参数交互信息确定所述备份关联函数中的备份密钥。
在一些实施例中,在上述实施例的基础上,所述备份文件获取模块包括:
解密规则确定单元,被设置为确定所述备份密钥及所述历史备份文件夹的加密格式,并确定所述加密格式对应的解密规则。
解密单元,被设置为基于所述解密规则结合所述备份密钥,解密所述历史备份文件夹,获取历史备份文件夹中的历史备份文件;所述历史备份文件为:历史即时通讯时产生的会话文本文件、会话附件文件、会话关联表。
在一些实施例中,在上述实施例的基础上,所述会话消息获取模块包括:
解析单元,被设置为解析获取所述会话关联表中至少一条关联表项信息,所述关联表项信息包括:会话对象组、关联文本存储地址以及关联附件存储地址。
文本地址获取单元,被设置为基于所述关联文本存储地址,在所述会话文本文件中提取对应所述会话对象组的会话文本。
附件地址获取单元,被设置为基于所述关联附件存储地址,在所述会话附件文件中提取对应所述会话对象组的附件信息。
会话消息获取单元,被设置为获得基于所述会话对象组及相应会话文本和附件信息形成的历史会话消信息。
在一些实施例中,所述装置还包括:展示模块,被设置为以设定展示样式对所述历史会话消息进行展示。
本发明实施例所提供的会话信息提取装置可执行本申请任意实施例所提供的会话信息提取方法,具备执行方法相应的功能模块和有益效果。
实施例四
图7为本发明实施例四提供的一种设备的结构示意图,如图7所示,该设备包括处理器70、存储器71、输入装置72和输出装置73;设备中处理器70的数量可以是一个或多个,图6中以一个处理器70为例;设备中的处理器70、存储器71、输入装置72和输出装置73可以通过总线或其他方式连接,图6以通过总线连接为例。
存储器71作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序以及模块,如本发明实施例中的会话信息提取方法对应的程序模块(例如,会话信息提取装置中的备份密钥获取模块301、备份文件获取模块302和会 话消息获取模块303)。处理器70通过运行存储在存储器71中的软件程序、指令以及模块,从而执行设备的各种功能应用以及数据处理,即实现上述的会话信息提取方法。
存储器71可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作***、至少一个功能所需的应用程序;存储数据区可存储根据终端的使用所创建的数据等。此外,存储器71可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器71可包括相对于处理器70远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例可以包括互联网、企业内部网、局域网、移动通信网及其组合。
输入装置72可用于接收输入的数字或字符信息,以及产生与设备的用户设置以及功能控制有关的键信号输入。输出装置73可包括显示屏等显示设备。
实施例五
本发明实施例五还提供一种包含计算机可执行指令的存储介质,所述计算机可执行指令在由计算机处理器执行时用于执行一种会话信息提取方法,该方法包括:
获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端;
根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件;
根据预设规则从所述历史备份文件中提取历史会话消息。
当然,本发明实施例所提供的一种包含计算机可执行指令的存储介质,其计算机可执行指令,还可以执行本申请任意实施例所提供的会话信息提取方法中的相关操作。
通过以上关于实施方式的描述,所属领域的技术人员可以清楚地了解到,本申请可借助软件及必需的通用硬件来实现,当然也可以通过硬件实现,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如计算机的软盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、闪存(FLASH)、硬盘或光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
值得注意的是,上述会话信息提取装置的实施例中,所包括的各个单元和模块只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的名称也只是为了便于相互区分,并不用于限制本申请的保护范围。

Claims (10)

  1. 一种会话信息提取方法,包括:
    获取历史备份文件夹关联的备份密钥,其中,所述备份密钥由第三方终端确定并通过授权服务器转发至本终端;
    根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件;
    根据预设规则从所述历史备份文件中提取历史会话消息。
  2. 根据权利要求1所述的方法,其中,所述第三方终端通过下述方式确定备份密钥:
    监听即时通讯软件所对应代码文件中的备份关联函数;
    截取所述即时通讯软件登录过程中所述备份关联函数的参数交互信息;
    根据所述参数交互信息确定所述备份关联函数中的备份密钥。
  3. 根据权利要求1所述的方法,其中,所述根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件,包括:
    确定所述备份密钥及所述历史备份文件夹的加密格式,并确定所述加密格式对应的解密规则;
    基于所述解密规则结合所述备份密钥,解密所述历史备份文件夹,获取历史备份文件夹中的历史备份文件;
    所述历史备份文件为:历史即时通讯时产生的会话文本文件、会话附件文件、会话关联表。
  4. 根据权利要求3所述的方法,其中,所述根据预设规则从所述历史备份文件中提取历史会话消息,包括:
    解析获取所述会话关联表中至少一条关联表项信息,所述关联表项信息包括:会话对象组、关联文本存储地址以及关联附件存储地址;
    基于所述关联文本存储地址,在所述会话文本文件中提取对应所述会话对象组的会话文本;
    基于所述关联附件存储地址,在所述会话附件文件中提取对应所述会话对象组的附件信息;
    获得基于所述会话对象组及相应会话文本和附件信息形成的历史会话消息。
  5. 根据权利要求1所述的方法,所述方法还包括:
    以设定展示样式对所述历史会话消息进行展示。
  6. 一种会话信息提取装置,包括:
    备份密钥获取模块,被设置为获取历史备份文件夹关联的备份密钥,其中, 所述备份密钥由第三方终端确定并通过授权服务器转发至本终端;
    备份文件获取模块,被设置为根据所述备份密钥解密所述历史备份文件夹,获得历史备份文件;
    会话消息获取模块,被设置为根据预设规则从所述历史备份文件中提取历史会话消息。
  7. 根据权利要求6所述的装置,其中,所述装置通过所述第三方终端的下述模块确定备份密钥:
    监听模块,被设置为监听即时通讯软件所对应代码文件中的备份关联函数;
    截取模块,被设置为截取所述即时通讯软件登录过程中所述备份关联函数的参数交互信息;
    密钥获取模块,被设置为根据所述参数交互信息确定所述备份关联函数中的备份密钥。
  8. 根据权利要求6所述的装置,其中,所述备份文件获取模块包括:
    解密规则确定单元,被设置为确定所述备份密钥及所述历史备份文件夹的加密格式,并确定所述加密格式对应的解密规则;
    解密单元,被设置为基于所述解密规则结合所述备份密钥,解密所述历史备份文件夹,获取历史备份文件夹中的历史备份文件;
    所述历史备份文件为:历史即时通讯时产生的会话文本文件、会话附件文件、会话关联表。
  9. 一种设备,所述设备包括:
    一个或者多个处理器;
    存储器,用于存储一个或者多个程序;
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-5中任一所述的会话信息提取方法。
  10. 一种计算机可读存储介质,其上存储有计算机程序,该程序备处理器执行时实现如权利要求1-5中任一所述的会话信息提取方法。
PCT/CN2019/118985 2018-12-28 2019-11-15 会话信息提取方法、装置、设备和介质 WO2020134692A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811622193.9A CN109450777B (zh) 2018-12-28 2018-12-28 会话信息提取方法、装置、设备和介质
CN201811622193.9 2018-12-28

Publications (1)

Publication Number Publication Date
WO2020134692A1 true WO2020134692A1 (zh) 2020-07-02

Family

ID=65542026

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/118985 WO2020134692A1 (zh) 2018-12-28 2019-11-15 会话信息提取方法、装置、设备和介质

Country Status (2)

Country Link
CN (1) CN109450777B (zh)
WO (1) WO2020134692A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450777B (zh) * 2018-12-28 2021-09-17 苏州开心盒子软件有限公司 会话信息提取方法、装置、设备和介质
CN110750388B (zh) * 2019-10-30 2022-06-17 苏州龙信信息科技有限公司 一种备份解析方法、装置、设备和介质
CN111162999A (zh) * 2019-12-30 2020-05-15 广东盈世计算机科技有限公司 一种基于即时聊天工具的消息处理方法及装置
CN113495657B (zh) * 2020-04-03 2024-07-12 腾讯科技(深圳)有限公司 会话消息筛选方法、装置、计算机设备和存储介质
CN111934987A (zh) * 2020-08-04 2020-11-13 公安部第三研究所 一种针对手机企业微信的数据提取方法,***以及存储介质
CN112714057B (zh) * 2020-12-22 2023-04-07 北京北信源软件股份有限公司 即时消息处理方法、装置、设备及存储介质
CN113489635B (zh) * 2021-06-18 2023-08-18 深圳软牛科技有限公司 基于微信的消息恢复方法和相关设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655481A (zh) * 2011-03-04 2012-09-05 腾讯科技(深圳)有限公司 一种基于网页的即时通信聊天内容查看方法及***
US20130047216A1 (en) * 2011-08-15 2013-02-21 Kabushiki Kaisha Toshiba Information processing apparatus, resource providing apparatus, and information processing system
CN105162675A (zh) * 2014-05-26 2015-12-16 杭州迪普科技有限公司 一种会话记录获取方法以及装置
CN105959205A (zh) * 2016-04-29 2016-09-21 杨夫春 聊天记录保存方法
CN109450777A (zh) * 2018-12-28 2019-03-08 苏州开心盒子软件有限公司 会话信息提取方法、装置、设备和介质

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8166114B2 (en) * 2006-02-21 2012-04-24 Strangeloop Networks, Inc. Asynchronous context data messaging
CN102123166B (zh) * 2010-12-31 2014-11-05 百度在线网络技术(北京)有限公司 基于即时通信客户端访问目标网络应用的设备及其方法
CN102739708B (zh) * 2011-04-07 2015-02-04 腾讯科技(深圳)有限公司 一种基于云平台访问第三方应用的***及方法
CN102882762B (zh) * 2011-07-11 2016-09-07 腾讯科技(深圳)有限公司 一种在多页面间同步聊天状态信息的方法及***
CN103631672A (zh) * 2012-08-20 2014-03-12 国基电子(上海)有限公司 具有数据备份和数据恢复功能的移动装置及方法
CN103812755A (zh) * 2012-11-12 2014-05-21 腾讯科技(深圳)有限公司 一种即时通讯应用中的消息同步方法及装置
CN104202185B (zh) * 2014-08-25 2015-10-28 腾讯科技(深圳)有限公司 一种通信数据备份方法及装置
CN104468592B (zh) * 2014-12-12 2017-10-31 北京百度网讯科技有限公司 登录方法和登录***
CN105281902B (zh) * 2015-12-03 2018-04-20 武汉理工大学 一种基于移动终端的Web***安全登录方法
CN107563215A (zh) * 2016-07-01 2018-01-09 四川秘无痕信息安全技术有限责任公司 一种安卓***微信聊天记录解密方法
CN107590025A (zh) * 2017-08-17 2018-01-16 深圳市优品壹电子有限公司 一种备份恢复方法及***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655481A (zh) * 2011-03-04 2012-09-05 腾讯科技(深圳)有限公司 一种基于网页的即时通信聊天内容查看方法及***
US20130047216A1 (en) * 2011-08-15 2013-02-21 Kabushiki Kaisha Toshiba Information processing apparatus, resource providing apparatus, and information processing system
CN105162675A (zh) * 2014-05-26 2015-12-16 杭州迪普科技有限公司 一种会话记录获取方法以及装置
CN105959205A (zh) * 2016-04-29 2016-09-21 杨夫春 聊天记录保存方法
CN109450777A (zh) * 2018-12-28 2019-03-08 苏州开心盒子软件有限公司 会话信息提取方法、装置、设备和介质

Also Published As

Publication number Publication date
CN109450777B (zh) 2021-09-17
CN109450777A (zh) 2019-03-08

Similar Documents

Publication Publication Date Title
WO2020134692A1 (zh) 会话信息提取方法、装置、设备和介质
WO2022252632A1 (zh) 一种数据加密处理方法、装置、计算机设备及存储介质
EP2924948B1 (en) External indexing and search for a secure cloud collaboration system
US10506428B2 (en) Wireless network connection method, apparatus, and system
Choi et al. Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
US20140281520A1 (en) Secure cloud data sharing
US11792204B2 (en) Dynamic level authentication/encryption
CN109472130A (zh) Linux密码管理方法、中控机、可读存储介质
CN106790037B (zh) 一种用户态加密的即时通讯方法与***
JP2014013582A (ja) データベース暗号化システムと方法及びプログラム
CN111460503B (zh) 数据分享方法、装置、设备和存储介质
JPWO2013069770A1 (ja) データベース装置と方法及びプログラム
AU2013224696A1 (en) An instant communication method and system
WO2016045464A1 (zh) 解密方法和移动终端
US10063655B2 (en) Information processing method, trusted server, and cloud server
CN113301431A (zh) 视频数据的加解密方法、装置、电子设备及***
WO2017080356A1 (zh) 一种安全输入方法、装置和***
WO2016065787A1 (zh) 一种rdp数据采集装置及方法
JP2015090993A (ja) 暗号制御装置、暗号制御方法、及びプログラム
US11695546B2 (en) Decoupled custom event system based on ephemeral tokens for enabling secure custom services on a digital audio stream
CN110912683B (zh) 密码存储方法及装置、密码验证方法及装置
CN103997730A (zh) 一种加密数据的解密复制粘贴方法
CN103685473A (zh) 客户端、代理服务器、检索方法及***
KR102319709B1 (ko) 데이터베이스 암호화 기반의 안티 포렌식 해제 장치 및 방법
CN103986640A (zh) 一种可保障用户通讯内容安全的即时通讯方法及其***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19905723

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19905723

Country of ref document: EP

Kind code of ref document: A1