[go: up one dir, main page]

HK1169891B - Method, system and device for transmitting instant communicating message - Google Patents

Method, system and device for transmitting instant communicating message Download PDF

Info

Publication number
HK1169891B
HK1169891B HK12110495.5A HK12110495A HK1169891B HK 1169891 B HK1169891 B HK 1169891B HK 12110495 A HK12110495 A HK 12110495A HK 1169891 B HK1169891 B HK 1169891B
Authority
HK
Hong Kong
Prior art keywords
client
message
user
operation information
user identifier
Prior art date
Application number
HK12110495.5A
Other languages
Chinese (zh)
Other versions
HK1169891A1 (en
Inventor
孙雪勤
Original Assignee
阿里巴巴集团控股有限公司
Filing date
Publication date
Priority claimed from CN201110009879.2A external-priority patent/CN102594716B/en
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of HK1169891A1 publication Critical patent/HK1169891A1/en
Publication of HK1169891B publication Critical patent/HK1169891B/en

Links

Description

Method, system and equipment for transmitting instant communication message
Technical Field
The present application relates to the field of communications, and in particular, to a method, a system, and a device for transmitting an instant messaging message.
Background
As the number of users of instant messaging services increases, the security of instant messaging services is generally regarded by the industry, and insecure factors such as spam messages (including advertisement messages, winning messages, and malicious fraud messages) in instant messaging messages need to be cleared in time.
In order to block spam messages in instant messaging messages sent to users, the industry generally adopts a mode of discarding all temporary session messages at present, that is, a server in instant messaging service stores the priority of other clients defined by each instant messaging client in advance, after the server receives an instant messaging message, whether a message sender is a message receiver definition high-priority user (the high-priority user comprises a legal user defined as a friend) is judged according to information of the sender and the receiver in the message, if the message sender is the high-priority user of the message receiver, the server sends the instant messaging message to the receiver to request the receiver to display the instant messaging message, otherwise (for example, the sender is a low-priority user of stranger defined by the receiver), the server considers the instant messaging message as spam message, the instant message is denied delivery to the recipient.
Although the above-mentioned method for shielding spam in instant messaging service can effectively shield spam, the server shields all instant messaging messages initiated by other users except the high-priority user defined by the receiver, and some message senders may have some connection relation with the receiver although not the high-priority user defined by the message receiver, and the above-mentioned method can also shield valid messages. For example, in a scenario of performing an e-commerce transaction with the assistance of an instant messaging service, although a buyer user does not define a seller user as a high-priority user, when there is a transaction between the buyer user and a seller user, an instant messaging message sent from the seller user to the buyer user is not necessarily a spam message, but an instant messaging message sent from the seller user to the buyer user having a transaction is also masked by using a current method of masking a spam message, so that normal communication between the buyer user and the seller user and the transaction cannot be completed.
Therefore, in order to solve the problem of the current transmission process of instant messaging messages, a scheme is needed to be found in which a message receiver can correctly receive an effective message sent by a sender and shield a spam message sent by the sender under the condition that the message receiver does not define that a message sender is a high-priority user.
Disclosure of Invention
The present application aims to provide a method, a system and a device for transmitting an instant messaging message, so as to solve the problem in the prior art that an effective message is mistakenly shielded while a spam message is shielded.
A method for transmitting instant communication messages comprises the following steps:
receiving an instant communication message comprising a first user identification of a sender and a second user identification of a receiver;
a first judgment step of judging whether the first user identifier is a high-priority user identifier of a second user identifier; when the first judgment step is negative, executing a second judgment step;
a second judgment step of judging whether operation information corresponding to the first user identifier is stored or not;
and determining whether to filter the instant communication message or not according to the judgment result of the second judgment step.
A transmission server of instant messaging messages, comprising:
the receiving module is used for receiving the instant communication message comprising the first user identification of the sender and the second user identification of the receiver;
the first judging module is used for judging whether the first user identifier is a high-priority user identifier of the second user identifier or not, and if not, the second judging module is triggered;
the second judging module is used for judging whether the operation information of the second user identification corresponding to the first user identification is stored or not;
and the execution module is used for determining whether to filter the instant communication message or not according to the judgment result of the second judgment module.
A system for instant messaging message delivery, comprising:
the client logged by the sender is used for sending the instant communication message;
the server is used for receiving the instant communication message comprising a first user identifier of a sender and a second user identifier of a receiver, judging whether the first user identifier is a high-priority user identifier of the second user identifier, if not, further judging whether operation information corresponding to the first user identifier by the second user identifier is stored, and determining whether the instant communication message is filtered according to a judgment result;
and the client logged by the receiver is used for displaying or filtering the instant communication message after receiving the instant communication message.
The beneficial effect of this application is as follows:
in the scheme of the application, whether a first user identifier of an instant communication message sender is a high-priority user identifier of a second user identifier of a receiver and whether operation information corresponding to the first user identifier of the second user identifier is stored are taken as a basis for judging whether the instant communication message is a junk message, when the first user identifier is not the high-priority user identifier of the second user identifier, the instant communication message sent by the sender is not directly judged as the junk message, but is judged for the second time according to the operation information, and whether the instant communication message is the junk message is determined according to a secondary judgment result. By the scheme, the possibility that the effective message is misjudged as the junk message can be reduced when the purpose of shielding the junk message is achieved, and the accuracy of filtering the junk message is improved.
Drawings
Fig. 1(a) and fig. 1(b) are schematic diagrams illustrating a method for transmitting an instant messaging message according to an embodiment of the present application;
fig. 2 is a schematic diagram of instant messaging messages transmitted between an instant messaging client a and an instant messaging client B according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating an instant messaging message transmitted between an instant messaging client a and an instant messaging client C according to an embodiment of the present application;
fig. 4 is a schematic diagram illustrating an instant messaging message transmitted between an instant messaging client a and an instant messaging client D according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a transmission system of a third instant messaging message according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a transmission server for four instant messaging messages according to an embodiment of the present application.
Detailed Description
In order to shield the spam message in the instant messaging service and avoid the situation that the effective instant messaging message is mistakenly shielded, the embodiment of the application does not simply judge whether the instant messaging message is the spam message according to the priority level of the sender defined by the receiver, but judges whether the operation information of the second user identification of the receiver corresponding to the first user identification of the sender is stored or not as the basis for judging the spam message, and can be regarded as the authentication of the receiver on the sender to a certain degree when the operation information of the second user identification corresponding to the first user identification is stored, so that the instant messaging message sent by the sender is not directly identified as the spam message, but is received and displayed by the receiver, and the effective message is prevented from being mistakenly judged as the spam message; when the operation information of the second user identification corresponding to the first user identification is not stored, the instant communication message sent by the sender can be regarded as a junk message, and the message can be filtered by the receiver.
The embodiments of the present application will be described in detail below with reference to the drawings of the detailed description.
The client that the receiver logs in related to in the embodiments of the present application is: as the instant communication client of the instant communication message receiver, the client that the sender logs on is: an instant messaging client that is a sender of instant messaging messages. After the instant communication user logs in the instant communication client, when the instant communication user receives the instant communication message, the instant communication client is the client logged in by the receiver; when it sends instant communication message, the instant communication client is the client logged in by the sender.
The first user identification may represent the sender, that is, the sender may log in the instant messaging client at a different terminal, and the sender may be determined according to the first user identification no matter on which terminal the sender logs in the instant messaging client.
The second user id may represent the receiving party, that is, the receiving party may log in the instant messaging client at a different terminal, and the receiving party may be determined according to the second user id no matter which terminal the receiving party logs in the instant messaging client.
The operation information includes information indirectly operated from the second user identifier to the first user identifier, including but not limited to the following information:
1. and the second user identifier records the access record information of the page corresponding to the first user identifier, namely, after the receiver logs in the client, the second user identifier performs the access operation on the page corresponding to the client logged in by the sender.
2. And the second user identification and the first user identification are used for recording the transaction, namely the online shopping transaction is carried out between the receiver and the sender.
The operation information may be represented in a simple manner, for example, it may be represented by only one flag bit, where a flag bit is non-zero to indicate that corresponding operation information exists, and a flag bit is zero or does not exist to indicate that corresponding operation information does not exist.
Preferably, the operation information may further include operation time and validity period information, where the operation time indicates a time point when the client that the receiver logs in operates the client that the sender logs in, the validity period indicates a valid duration of the operation information, the validity period takes the operation time as a starting time, and after the validity period elapses, the operation information is in a disabled state or the operation information is deleted.
The operation information does not include operation information of instant messaging message transmission directly performed by the receiver after logging in the client and the sender logging in the client, such as: and the receiver logs in the client and then sends the record of the instant communication message to the sender logging in client.
The operation information related in the application can be stored in the server, and after the user logs in the client, various operations (such as page access and transaction) performed to other clients through the logged-in client are recorded and updated in real time by the server.
Preferably, each time a user logs in the client, the operation information generated after the user logs in the client before can be downloaded from the server according to the unique identifier, or the operation information generated after the user logs in the client every time can be stored locally.
The instant messaging messages related to the embodiments of the present application may be messages containing words and pictures, messages carrying files, or request messages requesting voice and video communication with a receiving party.
The server related in the embodiments of the present application may be a network device capable of providing a service for an instant messaging service, and has a function of receiving and forwarding an instant messaging message between clients, and a function of recording and updating operation information.
Example one
As shown in fig. 1(a), a schematic diagram of a transmission method of an instant messaging message according to an embodiment of the present application is shown, where the method includes the following steps:
step 101: the server receives an instant communication message.
In this step, the sender user logs in the instant messaging client, and sends an instant messaging message to the instant messaging client logged in by the receiver user, and the instant messaging message can be transmitted to the server before reaching the receiver client.
The instant communication message comprises a first user identification of a sender and a second user identification of a receiver.
The first user identification is information that can represent the sender, such as a client user name, and the second user identification is also information that can represent the recipient, such as a client user name.
The client logged in by the sender is the client corresponding to the first user identifier of the sender, and the client logged in by the receiver is the client corresponding to the second user identifier of the receiver.
Step 102: the server judges whether the first user identification is a high-priority user identification of the second user identification; if so, sending the instant communication message to the client of the receiver and displaying the instant communication message; otherwise, step 103 is performed.
This step is a first judgment step executed by the server, and is used to judge whether the sender user is a legitimate user relative to the receiver user. For example: after the receiving party logs in the client, the client where the sending party logs in is defined as a high-priority user (for example, a friend is defined), then events of defining the friend this time are recorded in the server and the client where the receiving party logs in, that is, a first user identifier is recorded in a high-priority user identifier group (for example, a contact list) corresponding to a second user identifier, which indicates that the sending party corresponding to the first user identifier is a legal user of the receiving party corresponding to the second user identifier.
In this step, after receiving the instant messaging message, the server searches whether a first user identifier exists in a high-priority user identifier group corresponding to a second user identifier, if so, the server determines that the sender is a legal user defined by the receiver, and the instant messaging message sent by the sender is a legal message; otherwise, the sender may be deemed to treat the recipient as a low-priority user (e.g., as a stranger), and the validity of the sender-issued instant message is pending.
In addition to determining whether the sender user is a valid user by determining whether the sender user is a friend or not, the first determining step may be performed in combination with other manners, for example, determining whether the sender user is a valid user relative to the receiver user according to whether the receiver login client performs a direct operation on the sender login client. The specific method comprises the following steps:
assume that the client of the receiving party in this step is the client 2, the client of the sending party in this step is the client 1, no friend relationship is defined between the client 1 and the client 2, and when the client 2 initiates communication (for example, sends an instant communication message) to the client 1, the server stores the event message that the client 2 initiates communication to the client 1. Thereafter, when the client 1 performs the operation of step 101 in this embodiment to the client 2, since the client 2 has actively initiated communication to the client 1, the server may determine that the first user identifier is a high-priority user identifier of the second user identifier, that is, the sender user is a valid user relative to the receiver user.
Step 103: and the server judges whether the operation information of the second user identification corresponding to the first user identification is stored or not.
The step is a second judgment step executed by the server, and is used for further judging the legality of the sender when the sender is determined not to be a legal user defined by the receiver.
In the solution of this embodiment, when a certain user login client performs indirect operation on a client logged in by another user, corresponding operation information may be recorded in the server. Taking the indirect operation of the user identifier 1 of the user 1 logging in the client 1 to the client 2 of the user 2 logging in the user identifier 2 as an example, the process of the server recording the operation information is as follows:
example 1: when the client 2 accesses the page provided by the client 1 at time T1, the server stores the corresponding operation information, that is, the record that the user identifier 2 accessed the page corresponding to the user identifier 1, and also records the operation time T1 of the client 2 operating the client 1.
Example 2: the client 1 and the client 2 have performed the online shopping transaction at time T2, and the server stores the corresponding operation information, i.e. the record of the transaction performed between the user id 2 and the user id 1, and also records the operation time T2 of the transaction performed between the user id 2 and the user id 1.
The server may store the operation information in a list, each item in the list represents one piece of operation information, and the server may set the operation information generated by operating the same user identifier on other user identifiers together in order to facilitate the server to read each item in the operation information.
In this step, the server may query the operation information list according to the first user identifier and the second user identifier in the received instant messaging message, and determine whether the list stores the operation information of the second user identifier corresponding to the first user identifier, that is, whether there is an operation record of the second user identifier for the first user identifier, if so, it indicates that the receiver has performed an operation on the sender; otherwise, it indicates that the receiver has not performed any operation on the sender.
It should be noted that a certain user may log in a client on a different terminal, and as long as the user has access to a page or a transaction related operation corresponding to another user, the information that the user identifier of the user operates the user identifier of another user may be recorded regardless of the client on which the user logs in.
Step 104: and the server sends the instant communication message to the client logged by the receiver and determines whether to filter the instant communication message according to the judgment result.
The judgment result of step 103 has two types, one is that the server stores the operation information of the second user identifier corresponding to the first user identifier, and the other is that the server does not store the operation information.
According to the different judgment results, the operations of sending the instant messaging message to the receiver and determining whether the instant messaging message needs to be filtered according to the judgment results are different, specifically:
when the judgment result is that the server stores the operation information of the second user identification corresponding to the first user identification, the server indicates the client of the receiving party to display the instant communication message; otherwise, the client end of the receiving party is instructed to filter the instant communication message.
In the solution of this embodiment, in order to avoid that the valid message is mistakenly shielded, when it is determined that the operation information corresponding to the first user identifier is not stored in the second user identifier, the server considers that the message sent by the sender may be a spam message, but does not directly filter the instant messaging message, but sends the instant messaging message to the receiver client, and simultaneously sends the determination result of step 103 to the receiver client, and instructs the receiver client to perform an operation of displaying or filtering the instant messaging message according to the determination result.
According to the scheme from step 101 to step 104 in the first embodiment of the application, because the level of the priority defined by the client logged in by the receiver to the client logged in by the sender is not directly used as the only standard for judging the spam message, but the operation information between corresponding users is used as the judgment basis, when the operation information of the user identifier of the sender to the user identifier of the receiver does not exist, the instant communication message sent by the sender is regarded as the spam message, and the server can send the instant communication message to the receiver and then simultaneously instruct the client currently logged in by the receiver to filter the message, so that the harassment of the spam message is avoided; when the operation information of the user identification of the sender to the user identification of the receiver exists, the client logged in by the receiver is considered to be the instant communication message sent by the client logged in by the sender, and the server can send the instant communication message to the client of the receiver and then simultaneously indicate the client of the receiver to display the message, so that the problem that the effective message is shielded by mistake when the client logged in by the receiver does not define the client logged in by the sender as a high-priority user is solved.
The following describes each step in the first embodiment of the present application in detail.
In step 103, the server may use the operation information of the user identifier of the sending party to the user identifier of the receiving party as a judgment basis. On this basis, it is preferable that the method further includes a step of updating the operation information according to the validity period, that is, different validity periods may be set for different types of operation information, and when the validity period elapses, the operation information is invalidated, for example, the operation information may be specifically deleted or set to be in a disabled state, or when the sender sends a message to the receiver, it may be determined whether the operation information of the receiver stored before is valid. That is, the sender client is allowed to send the instant messaging message to the receiver client within the validity period of the operation information of the sender to the receiver, and after the validity period, the instant messaging message sent by the sender client to the receiver client is filtered.
Therefore, between step 103 and step 104, there are the following steps:
step 103': when the operation information of the second user identification corresponding to the first user identification is stored, the server judges whether the operation information is invalid or not, if so, the instant communication message is sent to the client corresponding to the second user identification, and then the client is instructed to filter the instant communication message; otherwise, after the instant communication message is sent to the client corresponding to the second user identifier, the client is indicated to display the instant communication message.
For example, when the scheme of this embodiment is applied to a scenario of performing online shopping with assistance of an instant messaging service, where the receiving party is a buyer user, the sending party is a seller user, and the client that the buyer user logs in accesses a webpage provided by a seller, operation information corresponding to the seller user identifier may be stored in both the server and the local client that the buyer user logs in. If the instant communication message sent by the client logged by the seller user to the client logged by the buyer user is received by the server within the validity period of the operation information, the instant communication message sent by the client logged by the seller user is not considered as a junk message, the server sends the instant communication message to the client logged by the buyer user, and instructs the client logged by the buyer user to display the instant communication message to the buyer user; if the client logged in by the buyer user does not access the webpage provided by the seller user, or the client logged in by the seller user sends an instant communication message to the client logged in by the buyer user after the validity period elapses although the client logged in by the seller user has accessed the webpage provided by the seller user, the message sent by the client logged in by the seller user is regarded as a spam message, and the server sends the instant communication message to the client logged in by the buyer user and instructs the client logged in by the buyer user to filter the instant communication message.
As shown in fig. 1(b), after step 104, after the client that the receiving party logs in receives the instant messaging message sent by the server and the indication according to the judgment result, the instant messaging message can be displayed or filtered according to the indication of the server. Specifically, before displaying or filtering the instant messaging message, the client logged in by the receiver may further determine whether the instant messaging message is a spam message, and therefore, after step 104, the method further includes the following steps:
step 105: and when the server stores the operation information and the operation information is valid, the client logged by the receiver displays the instant communication message.
In step 103, the server can already confirm that the client logged in by the receiver has accessed the webpage provided by the sender or has performed operations such as transaction between the receiver and the sender, and in a preferred scheme, the server further determines that the operation information has not expired, so that the client logged in by the receiver trusts that the instant message is not a spam message and is normally displayed after receiving the indication sent by the server to display the instant message.
Step 106: when the server does not store the operation information or the operation information is invalid, the client logged by the receiver continuously judges whether the operation information of the second user identifier corresponding to the first user identifier is stored locally, and if so, the instant communication message is displayed; otherwise, filtering the instant communication message.
The client further judges the instant communication message through the step, thereby avoiding the occurrence of error shielding.
If the client logged in by the receiver does not operate the instant messaging message according to the indication of the server, if the server considers that the instant messaging message is a junk message, the client logged in by the receiver is indicated to filter the message, but the client logged in by the receiver trusts the message and displays the instant messaging message, the server can update the operation information stored in the server according to the display operation of the client logged in by the receiver on the instant messaging message, update the operation time in the operation information to the current time and recalculate the validity period of the operation information.
If, in the preferred embodiment of step 103, the server determines that the receiver has not performed an operation on the client that the sender has logged in within the validity period, and then sends a filtering instruction to the client that the receiver has logged in, there may be two cases:
in the first case, after the validity period is exceeded, the operation information corresponding to the first user identifier is actually generated, and therefore, the client logged in by the receiver may display the instant communication message instead of operating according to the filtering instruction.
In the second case, the operation information corresponding to the first user identifier is never generated before, and therefore, the client logged in by the receiver regards the instant messaging message as a spam message and filters the spam message.
Through the above detailed description of each step in the first embodiment of the present application, on the basis of the scheme in the first embodiment, the server and the client logged in by the receiver can make a double determination as to whether the instant messaging message is a spam message. Preferably, the determination condition at the server is set to be stricter than that of the client logged by the receiver, so that the server makes further determination by the client logged by the receiver under the condition that the instant messaging message is determined to be the spam message, thereby effectively avoiding the condition of error shielding.
The scheme of the first embodiment of the present application can be applied to a plurality of scenarios of instant messaging services, and the second embodiment of the present application takes an application to a scenario of performing online shopping assisted by an instant messaging service as an example, so as to exemplify the scheme of the first embodiment of the present application.
Example two
Assuming that the second embodiment includes an instant messaging client a, an instant messaging client B, an instant messaging client C and an instant messaging client D, when performing the online shopping service, a certain buyer user logs in the instant messaging client a, and seller users 1, 2 and 3 respectively log in the instant messaging client B, C, D.
The buyer user has visited the page provided by the seller user 1 through the logged-in instant messaging client a, the buyer user defines a friend with the logged-in instant messaging client C of the seller user 2 through the logged-in instant messaging client a, and the buyer user has performed any operation from the logged-in instant messaging client D of the seller user 3 through the logged-in instant messaging client a.
I.e. the operation information of the buyer user identity to each seller user identity 1, 2, 3, the operation time, and the validity period of each operation information may be recorded in the instant communication client a locally and/or in the server.
If the user identifier of the seller also has a sub-account identifier associated with the user identifier, the sub-account identifier may also be set to adopt the same instant messaging message determination processing mode as the user identifier.
In the above scenario, the communication process between the instant communication client a and the instant communication client B, C, D is described as follows:
as shown in fig. 2, a schematic diagram of instant messaging message transmission between an instant messaging client a and an instant messaging client B includes the following steps:
step 1 a: the server receives the instant communication message sent by the instant communication client B logged in by the user 1 of the seller to the instant communication client A logged in by the user of the buyer.
Step 1 b: the server determines that the seller user 1 is not a buyer user-defined contact.
Step 1 c: the server queries the operation information, determines that there is operation information of the buyer user identifier on the seller user identifier 1, that is, the buyer user identifier accesses the page provided by the seller user identifier 1 (that is, the operation information of the buyer user identifier corresponding to the seller user identifier 1 is stored), and further determines whether the operation information is invalid.
Step 1 d: the server judges whether the operation information is invalid, if not, the server sends an instant communication message to the instant communication client A and can also send a display instruction; otherwise, sending the instant communication message to the instant communication client A and sending a filtering instruction.
In the scheme of the embodiment of the application, even if the instant messaging client A logged in by the buyer user does not add the instant messaging client B logged in by the seller user 1 as a friend, the message sent by the instant messaging client B is not directly regarded as a spam message, but a validity period with a certain length is given, so that the seller user 1 is allowed to send the message to the instant messaging client A within the validity period through the instant messaging client B, and the situation that the effective message sent by the seller user 1 to the buyer user is mistakenly judged as a spam message to influence the user experience is avoided.
Step 1 f: the method comprises the steps that when an instant messaging client A receives a display instruction, an instant messaging message is displayed; when receiving the filtering instruction, the buyer user is judged to have accessed the page provided by the user 1 of the seller according to the stored operation information of the user identifier of the buyer to the user identifier of the seller, so that the instant communication message can be displayed without filtering the instant communication message.
If the instant messaging client a filters the instant messaging message in step 1f, the instant messaging client a may feed back information of the filtering event to the server, and the server may notify the instant messaging client B according to the information of the filtering event, and the user identifier of the instant messaging client B may request the user identifier corresponding to the instant messaging client a to add itself as a friend and then send the message.
Of course, in step 1f, after receiving the filtering instruction, the instant messaging client a may also directly filter the instant messaging message according to the filtering instruction.
As shown in fig. 3, a schematic diagram of instant messaging message transmission between an instant messaging client a and an instant messaging client C includes the following steps:
step 2 a: the server receives the instant messaging message sent by the instant messaging client C logged in by the user 2 of the seller to the instant messaging client A.
And step 2 b: the server determines that the seller user 2 is a buyer user-defined contact by querying the contact information.
And step 2 c: the server sends the instant message to instant messaging client a and may also send a display indication.
Step 2 d: and when receiving the display instruction, the instant communication client A displays the instant communication message.
As shown in fig. 4, a schematic diagram of instant messaging message transmission between an instant messaging client a and an instant messaging client D includes the following steps:
step 3 a: the server receives the instant messaging message sent by the instant messaging client D logged in by the user 3 of the seller to the instant messaging client A.
And step 3 b: the server determines that the seller user 3 is not a buyer user defined contact.
And step 3 c: the server inquires the operation information, finds the operation information of the user identifier of the seller user 3 corresponding to the identifier of the buyer user, and determines that the instant messaging client a logged in by the buyer user is operated from the instant messaging client D not logged in by the seller user 3.
And step 3 d: the server sends the instant messaging message to the instant messaging client a and sends a filtering indication.
And step 3 f: when receiving the filtering instruction, the instant communication client a further determines whether the client a stores the operation information corresponding to the identifier of the user 3 of the seller and the client a filters the instant communication message because the operation information is not stored.
Through the transmission description of the two pairs of instant messaging messages under three conditions in the embodiment of the application, the scheme of the embodiment of the application can be well applied to the scene of assisting in online shopping, and the buyer user can effectively avoid filtering the instant messaging messages sent by the seller user related to the buyer user while well shielding the spam messages from the seller user; the instant messaging clients logged on by the seller user and the buyer user can freely select whether to transmit the instant messaging message according to the scheme of the first embodiment or the second embodiment, for example: due to the characteristic that the seller user needs to passively receive the instant messaging message when selling the commodity, the seller user can receive the instant messaging message comprehensively without adopting the scheme of the application.
EXAMPLE III
A third embodiment of the present application further provides a system for transmitting an instant messaging message, as shown in fig. 5, where a sender logs in a client 11, a receiver logs in a client 12, and a server 13, where: the client 11 logged by the sender is used for sending instant communication messages; the server 13 is configured to receive an instant messaging message including a first user identifier of a sender and a second user identifier of a receiver, determine whether the first user identifier is a high-priority user identifier of the second user identifier, further determine whether operation information corresponding to the first user identifier is stored in the second user identifier if the first user identifier is not the high-priority user identifier, and determine whether to filter the instant messaging message according to a determination result; the client 12 logged on by the recipient is used to display or filter the instant message after receiving the instant message.
The client 12 logged in by the receiver is specifically configured to display the instant messaging message after receiving an instruction to display the instant messaging message, determine whether the client itself stores operation information of a second user identifier corresponding to the first user identifier after receiving an instruction to filter the instant messaging message, and display the instant messaging message if the client itself stores the operation information of the second user identifier corresponding to the first user identifier; otherwise, filtering the instant communication message
The client on which the sender logs in and the client on which the receiver logs in the third embodiment may be the client on which the sender logs in and the client on which the receiver logs in the first embodiment and the second embodiment. The server involved is a network device capable of performing the steps of embodiment one and embodiment two.
Example four
A fourth embodiment of the present application provides a transmission server for instant messaging, as shown in fig. 6, including a receiving module 21, a first determining module 22, a second determining module 23, and an executing module 24, where: the receiving module 21 is configured to receive an instant messaging message that includes a first subscriber identity of a sender and a second subscriber identity of a receiver; the first judging module 22 is configured to judge whether the first subscriber identity is a high-priority subscriber identity of the second subscriber identity, and if not, trigger the second judging module 23; the second judging module 23 is configured to judge whether operation information corresponding to the first user identifier is stored in the second user identifier; the execution module 24 is configured to determine whether to filter the instant messaging message according to the judgment result of the second judgment module.
The execution module 24 is specifically configured to, when the determination result is that the operation information is stored, send the instant messaging message to the client corresponding to the second user identifier, and then instruct the client to display the instant messaging message; otherwise, after the instant communication message is sent to the client corresponding to the second user identifier, the client is instructed to filter the instant communication message.
The transmission server of the instant messaging message further comprises an updating module 25, which is used for setting the operation information into a failure state when the operation information comprises the operation time and the validity period information and after the validity period elapses from the operation time.
The second judging module 23 is further configured to judge whether the operation information is invalid when the operation information is stored; the execution module 24 is specifically configured to, when the operation information is invalid, send the instant messaging message to the client corresponding to the second user identifier, and then instruct the client to filter the instant messaging message; otherwise, after the instant communication message is sent to the client corresponding to the second user identifier, the client is indicated to display the instant communication message.
The server in the fourth embodiment further has a functional module capable of executing the steps of the first embodiment and the second embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (11)

1. A method for transmitting an instant messaging message, wherein the method is applied to a case that a message receiver does not define that a message sender is a high-priority user, and comprises the following steps:
receiving an instant communication message comprising a first user identification of a sender and a second user identification of a receiver;
a first judgment step of judging whether the first user identifier is a high-priority user identifier of a second user identifier; when the first judgment step is negative, executing a second judgment step;
a second determination step, which is to determine whether operation information corresponding to the first user identifier is stored, where the operation information includes at least one of the following information indirectly operated by the second user identifier to the first user identifier, but does not include operation information of instant messaging message transmission directly performed with a sender login client after a receiver logs in the client:
the second user identification is used for identifying the information of the access record of the online shopping page corresponding to the first user identification;
the second user identification and the first user identification are used for recording the online shopping transaction;
and determining whether to filter the instant communication message or not according to the judgment result of the second judgment step.
2. The method of claim 1, wherein the operation information further includes operation time and validity period information;
the method further comprises the following steps:
an operation information updating step of setting the operation information to a failure state or deleting the operation information when the validity period elapses from the operation time.
3. The method of claim 1, wherein determining whether to filter the instant message according to the determination result of the second determining step specifically comprises:
when the operation information of the second user identification corresponding to the first user identification is stored, the instant communication message is sent to a client corresponding to the second user identification, and then the client is instructed to display the instant communication message; otherwise, after the instant communication message is sent to the client corresponding to the second user identification, the client is indicated to filter the instant communication message.
4. The method of claim 2, wherein determining whether to filter the instant message according to the determination result of the second determining step specifically comprises:
when the operation information of the second user identification corresponding to the first user identification is stored, judging whether the operation information is invalid or not, if so, sending the instant communication message to a client corresponding to the second user identification, and then instructing the client to filter the instant communication message; otherwise, after the instant communication message is sent to the client corresponding to the second user identifier, the client is indicated to display the instant communication message.
5. The method of claim 4, wherein after sending the instant messaging message to the client corresponding to the second subscriber identity, the method further comprises:
the client judges whether the operation information of the second user identification corresponding to the first user identification is stored or not; if yes, the client displays the instant communication message; otherwise, the client filters the instant communication message.
6. A transmission server for instant messaging, wherein in case that a message receiver does not define that a message sender is a high priority user, the transmission server comprises:
the receiving module is used for receiving the instant communication message comprising the first user identification of the sender and the second user identification of the receiver;
the first judging module is used for judging whether the first user identifier is a high-priority user identifier of the second user identifier or not, and if not, the second judging module is triggered;
a second determining module, configured to determine whether operation information corresponding to the first user identifier is stored, where the operation information includes at least one of the following information that is indirectly operated by the second user identifier to the first user identifier, but does not include operation information of instant messaging message transmission directly performed with a sender login client after a receiver logs in the client:
the second user identification is used for identifying the information of the access record of the online shopping page corresponding to the first user identification;
the second user identification and the first user identification are used for recording the online shopping transaction;
and the execution module is used for determining whether to filter the instant communication message or not according to the judgment result of the second judgment module.
7. The server of claim 6, further comprising:
and the updating module is used for setting the operation information into a failure state or deleting the operation information when the operation information further comprises operation time and valid period information after the valid period from the operation time.
8. The server according to claim 6,
the execution module is specifically configured to, when the determination result is that the operation information is stored, instruct the client to display the instant messaging message after sending the instant messaging message to the client corresponding to the second user identifier; otherwise, after the instant communication message is sent to the client corresponding to the second user identifier, the client is instructed to filter the instant communication message.
9. The server according to claim 7,
the second judging module is further configured to judge whether the operation information is invalid or not when the operation information is stored;
the execution module is specifically configured to, when the operation information is invalid, send the instant messaging message to a client corresponding to the second user identifier, and then instruct the client to filter the instant messaging message; otherwise, after the instant communication message is sent to the client corresponding to the second user identifier, the client is indicated to display the instant communication message.
10. A system for transmitting instant messaging messages, wherein the system is used in a situation where a message recipient does not define that a message sender is a high priority user, comprising:
the client logged by the sender is used for sending the instant communication message;
a server, configured to receive an instant messaging message including a first user identifier of a sender and a second user identifier of a receiver, determine whether the first user identifier is a high-priority user identifier of the second user identifier, if not, further determine whether operation information corresponding to the first user identifier is stored in the second user identifier, and determine whether to filter the instant messaging message according to a determination result, where the operation information includes at least one of indirectly operated information of the following second user identifiers to the first user identifier, but does not include operation information of instant messaging message transmission directly performed by the receiver after logging in the client with the sender:
the second user identification is used for identifying the information of the access record of the online shopping page corresponding to the first user identification;
the second user identification and the first user identification are used for recording the online shopping transaction;
and the client logged by the receiver is used for displaying or filtering the instant communication message after receiving the instant communication message.
11. The system of claim 10,
the client logged by the receiver is specifically used for displaying the instant messaging message after receiving the instruction for displaying the instant messaging message, judging whether the client stores the operation information of the second user identifier corresponding to the first user identifier or not after receiving the instruction for filtering the instant messaging message, and displaying the instant messaging message if the client stores the operation information of the second user identifier corresponding to the first user identifier; otherwise, filtering the instant communication message.
HK12110495.5A 2012-10-22 Method, system and device for transmitting instant communicating message HK1169891B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110009879.2A CN102594716B (en) 2011-01-17 2011-01-17 A kind of transmission method, system and equipment of instant communication message

Publications (2)

Publication Number Publication Date
HK1169891A1 HK1169891A1 (en) 2013-02-08
HK1169891B true HK1169891B (en) 2017-04-28

Family

ID=

Similar Documents

Publication Publication Date Title
US20210058395A1 (en) Protection against phishing of two-factor authentication credentials
US7856477B2 (en) Method and system for image verification to prevent messaging abuse
TWI611359B (en) Instant messaging message transmission method, system and device
CN105939326B (en) Method and device for processing message
US20160164916A1 (en) Automated responses to security threats
US20170093917A1 (en) Centralized management and enforcement of online behavioral tracking policies
CN103905399B (en) A kind of method and apparatus that account number logs in management
WO2020248658A1 (en) Abnormal account detection method and apparatus
WO2014172956A1 (en) Login method,apparatus, and system
US10599873B2 (en) Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved
US10154052B1 (en) Tracer cookies to detect web session compromise by insiders
CN105959313A (en) Method and device for preventing HTTP proxy attack
CN104796406A (en) Method and device for identifying application
US9197591B2 (en) Method and system for validating email from an internet application or website
US9338112B2 (en) Safety protocols for messaging service-enabled cloud services
CN102137082A (en) Method and device for filtering content
CN108881929B (en) Method and device for setting login prompt of live broadcast room
WO2016037489A1 (en) Method, device and system for monitoring rcs spam messages
HK1169891B (en) Method, system and device for transmitting instant communicating message
CN109104280B (en) Method and device for forwarding message
CN113645205B (en) Safety control method, client and system for adding contact person for preventing phishing
EP3357265B1 (en) Delivering anonymous communication between customers at customer care site
US12052283B1 (en) Method and system for securing access to user data during phishing detection
US20170063784A1 (en) Information management apparatus, communication management system, information communication apparatus, information management method, and storing medium storing information management program
KR102148189B1 (en) Apparatus and method for protecting malicious site