CN102427456A - Information secrecy calling control method - Google Patents
Information secrecy calling control method Download PDFInfo
- Publication number
- CN102427456A CN102427456A CN2011104098857A CN201110409885A CN102427456A CN 102427456 A CN102427456 A CN 102427456A CN 2011104098857 A CN2011104098857 A CN 2011104098857A CN 201110409885 A CN201110409885 A CN 201110409885A CN 102427456 A CN102427456 A CN 102427456A
- Authority
- CN
- China
- Prior art keywords
- information
- dialing
- instruction
- equipment
- control method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention, which belongs to the communication technology field, discloses an information secrecy calling control method. When a checking instruction is emitted to a system, the system determines whether the checking instruction has an authority. When the checking instruction has the authority, the system displays all the information. When the checking instruction does not have the authority, the system does not display all the information and the system generates the dialing information. The dialing information is the information of a number to be dialed. When a dialing instruction is emitted to the system, the system acquires the information of the number to be dialed. The system sends the instruction to dailing equipment so that the dailing equipment is controlled to send the signal to a remote exchange system in a PSTN network. Dialing and communicating can be performed under the condition of not displaying all the called party number information. User privacies can be protected maximumly so as to avoid invasion. The method makes great contribution to network safety.
Description
Technical field
The invention belongs to communication technical field, particularly relate to a kind of information privacy calling-control method.
Background technology
Continuous development along with IT application in enterprises; Core resource customer information, particularly telephone number information as many service-type firms are easy to revealed in batches by the company personnel; Cause great privacy of user problem and trade secret leakage problem; Current information management system is difficult to accomplish to let the employee can call the client in the contact business information management system, relates to privacy of user and the core trade secret is protected to telephone number in the system is this again.
Therefore those skilled in the art are devoted to develop a kind of information privacy calling-control method that can under the situation of incomplete explicit user telephone number, be dialled by computer control.
Summary of the invention
Because the above-mentioned defective of prior art, technical problem to be solved by this invention provides a kind of information privacy calling-control method that under the situation of incomplete explicit user telephone number, is dialled by computer control.
For realizing above-mentioned purpose, the invention provides a kind of information privacy calling-control method, may further comprise the steps:
S1, system obtain information;
S2, system deposit information in database;
S3, check that when instruction, system are judged and saidly check whether instruction has authority, check that when said instruction has the right in limited time system's demonstration full detail when sending to system; Check instruction when not having authority when said, the incomplete display message of system, the information that shows is replaced showing by code;
S4, system generate dialing information, and said dialing information is a number information to be dialed; When sending the dialing instruction to system, system obtains number information to be dialed; System sends instruction to dialing equipment and controls dialing equipment transmission signal to the remote switch system in the PSTN net;
After obtaining information, said system control computer deposits in the database; Said computer is connected with said dialing equipment; Said dialing equipment inserts in the PSTN net; Said system sends to dialing equipment and dials instruction; Said dialing equipment sends parameter and gives said computer; Said dialing equipment transmits a signal to the remote switch system in the PSTN net.
Preferable, system adopts the DES algorithm to generate dialing information from the information encryption that database reads; System adopts the DES algorithm, and deciphering obtains number information to be dialed to dialing information.
Preferable, said system receives the dialing instruction, and system judges whether dialing information is number information, and system deciphers dialing information and obtains number information to be dialed after being judged as number information.
Preferable, said system is equipped with the activeX control; Dialing information directly calls through the activeX control in system, dialing information is deciphered obtained number information to be dialed then.
Preferable, system generates dialing information, and said dialing information has database number information corresponding address; When sending the dialing instruction to system, system reads number information through said address to database.
Preferable, system deposits information in database and also comprises the step with the DES algorithm for encryption; , database read also comprises step when winning the confidence breath with the deciphering of DES algorithm.
Preferable, the modem of said dialing equipment for carrying out dialing, said modem is connected to earphone and microphone.
The invention has the beneficial effects as follows: the invention provides a kind of information privacy calling-control method; Can under the situation that not exclusively shows the other side's number information, dial, converse; Can protect user's privacy to be inviolable to greatest extent, network security has been made huge contribution.
Description of drawings
Fig. 1 is a schematic flow sheet of the present invention.
Fig. 2 is the structural representation of the embodiment of the invention one.
Fig. 3 is the structural representation of the embodiment of the invention five.
Fig. 4 is the structural representation of the embodiment of the invention six.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described further:
Embodiment one: like Fig. 1, shown in Figure 2, a kind of information privacy calling-control method may further comprise the steps:
S1, system obtain information;
S2, system deposit information in database;
S3, check that when instruction, system are judged and saidly check whether instruction has authority, check that when said instruction has the right in limited time system's demonstration full detail when sending to system; Check instruction when not having authority when said, the incomplete display message of system, the information that shows is replaced showing by code;
S4, system generate dialing information, and said dialing information is a number information to be dialed; When sending the dialing instruction to system, system obtains number information to be dialed; System sends instruction to dialing equipment 2 and controls dialing equipment 2 transmission signals to the remote switch system 3 in the PSTN net;
After obtaining information, said system control computer 1 deposits in the database; Said computer 1 is connected with said dialing equipment 2; Said dialing equipment 2 inserts in the PSTN net; Said system sends to dialing equipment 2 and dials instruction; Said dialing equipment 2 sends parameter and gives said computer 1; Said dialing equipment 2 transmits a signal to the remote switch system 3 in the PSTN net.
System deposits information in database and also comprises the step with the DES algorithm for encryption; , database read also comprises step when winning the confidence breath with the deciphering of DES algorithm.
The modem of the said dialing equipment 2 of this instance for carrying out dialing, said modem is connected to earphone 5 and microphone 6, and certainly, said dialing equipment 2 also can be sound card, is connected to earphone 5 and microphone 6 on the said sound card.
The present embodiment system is the B/S structure, and when the phone dial-in system, the incoming information that dialing equipment 2 sends over can be received by system, and the incoming information the inside has comprised number information, and system adopts the DES algorithm that this incoming information is encrypted and deposits database then in.
When needs are checked number information, send one to system earlier and check instruction; System judges this and checks whether instruction checks authority; System shows complete number information when checking authority; System display part number information when this instruction does not have authority, numbers displayed information is not with " * " number replacement.
When checking instruction when not having authority, present embodiment shows preceding 7 item sign indicating number information, back 4 item sign indicating number information demonstrations " * " number; Certainly; Also can all show " * " number or show 3 item sign indicating number information that back 8 item sign indicating number information show " * " number also can be shown certainly by other symbols like " ".
System adopts the DES algorithm to generate dialing information from the information encryption that database reads, and said dialing information is a number argument to be dialed.
, needs send a dialing instruction to system earlier when dialling; After instruction is received by system; General link instruction or dialing instruction are opened in decision instruction, and after being judged as the dialing instruction, system adopts the DES algorithm that dialing information is deciphered; Obtain a number information to be dialed; System sends the instruction of dialing this telephone number and gives dialing equipment 2 then, and dialing equipment 2 sends signal to the remote switch system 3 in the PSTN net, and dialing equipment 2 just can carry out normal talking after connecting with the communication equipment of being dialed.
Embodiment two: the structure of present embodiment and embodiment one are basic identical; Different is: said system is equipped with the activeX control;, needs send a dialing instruction to ActiveX control earlier when dialling; The activeX control gets access to behind the dialing information and adopts the DES algorithm that it is deciphered and obtains number information to be dialed; ActiveX control sends the instruction of dialing this telephone number and gives dialing equipment 2 then, and dialing equipment 2 sends signal to the remote switch system 3 in the PSTN net, and dialing equipment 2 just can carry out normal talking after connecting with the communication equipment of being dialed.
Embodiment three: the structure of present embodiment and embodiment one are basic identical, and different is: system generates dialing information, and said dialing information has database number information corresponding address; When sending the dialing instruction to system; System reads number information through said address to database; System sends the instruction of dialing this telephone number and gives dialing equipment 2 then; Dialing equipment 2 sends signal to the remote switch system 3 in the PSTN net, and dialing equipment 2 just can carry out normal talking after connecting with the communication equipment of being dialed.
Embodiment four: the structure of present embodiment and embodiment three are basic identical, and different is: said system is the C/S structure, and system generates dialing information, and said dialing information has database number information corresponding address; When sending the dialing instruction to system; System reads number information through said address to database; System sends the instruction of dialing this telephone number and gives dialing equipment 2 then; Dialing equipment 2 sends signal to the remote switch system 3 in the PSTN net, and dialing equipment 2 just can carry out normal talking after connecting with the communication equipment of being dialed.
Embodiment five: as shown in Figure 3; The structure of present embodiment and embodiment one are basic identical; Different is: the said dialing equipment 2 of this instance inserts the PSTN net through deconcentrator 7; Said deconcentrator 7 is connected to telephone set 4, system and directly use telephone set to carry out communication with the telecommunication device back that connects.
Embodiment six: as shown in Figure 4; The structure of present embodiment and embodiment one are basic identical; Different is: the said dialing equipment 2 of this instance inserts the PSTN net through telephone set 4; Said dialing equipment 2 is connected with telephone set, system and directly use telephone set 4 to carry out communication with the telecommunication device back that connects.
More than describe preferred embodiment of the present invention in detail.Should be appreciated that those of ordinary skill in the art need not creative work and just can design according to the present invention make many modifications and variation.Therefore, all technical staff in the art all should be in the determined protection range by claims under this invention's idea on the basis of existing technology through the available technical scheme of logical analysis, reasoning, or a limited experiment.
Claims (7)
1. information privacy calling-control method is characterized in that may further comprise the steps:
S1, system obtain information;
S2, system deposit information in database;
S3, check that when instruction, system are judged and saidly check whether instruction has authority, check that when said instruction has the right in limited time system's demonstration full detail when sending to system; Check instruction when not having authority when said, the incomplete display message of system, the information that shows is replaced showing by code;
S4, system generate dialing information, and said dialing information is a number information to be dialed; When sending the dialing instruction to system, system obtains number information to be dialed; System sends instruction to dialing equipment (2) and controls dialing equipment (2) transmission signal to the remote switch system (3) in the PSTN net;
After obtaining information, said system's control computer (1) deposits in the database; Said computer (1) is connected with said dialing equipment (2); Said dialing equipment (2) inserts in the PSTN net; Said system sends to dialing equipment (2) and dials instruction; Said dialing equipment (2) sends parameter and gives said computer (1); Said dialing equipment (2) transmits a signal to the remote switch system (3) in the PSTN net.
2. information privacy calling-control method as claimed in claim 1 is characterized in that: system adopts the DES algorithm to generate dialing information from the information encryption that database reads; System adopts the DES algorithm, and deciphering obtains number information to be dialed to dialing information.
3. information privacy calling-control method as claimed in claim 2; It is characterized in that: said system receives the dialing instruction; System judges whether dialing information is number information, and system deciphers dialing information and obtains number information to be dialed after being judged as number information.
4. information privacy calling-control method as claimed in claim 1 is characterized in that: said system is equipped with the activeX control; Dialing information directly calls through the activeX control in system, dialing information is deciphered obtained number information to be dialed then.
5. information privacy calling-control method as claimed in claim 1 is characterized in that: system generates dialing information, and said dialing information has database number information corresponding address; When sending the dialing instruction to system, system reads number information through said address to database.
6. information privacy calling-control method as claimed in claim 1 is characterized in that: system deposits information in database and also comprises the step with the DES algorithm for encryption; , database read also comprises step when winning the confidence breath with the deciphering of DES algorithm.
7. information privacy calling-control method as claimed in claim 1 is characterized in that: the modem of said dialing equipment (2) for carrying out dialing, said modem is connected to earphone (5) and microphone (6).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104098857A CN102427456A (en) | 2011-12-12 | 2011-12-12 | Information secrecy calling control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104098857A CN102427456A (en) | 2011-12-12 | 2011-12-12 | Information secrecy calling control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102427456A true CN102427456A (en) | 2012-04-25 |
Family
ID=45961399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104098857A Pending CN102427456A (en) | 2011-12-12 | 2011-12-12 | Information secrecy calling control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102427456A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819669A (en) * | 2017-10-31 | 2018-03-20 | 平安科技(深圳)有限公司 | Feedback method, device, equipment and the readable storage medium storing program for executing of base missed call |
CN110610072A (en) * | 2019-09-06 | 2019-12-24 | 武汉达梦数据库有限公司 | Data authentication method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1760621A1 (en) * | 2005-08-30 | 2007-03-07 | Sap Ag | Information control in federated interaction |
CN101026844A (en) * | 2007-03-29 | 2007-08-29 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal with information secrecy function and secrecy method |
JP2008104103A (en) * | 2006-10-20 | 2008-05-01 | Softbank Mobile Corp | Portable terminal, program, and control method |
CN201869273U (en) * | 2010-06-14 | 2011-06-15 | 韩燕� | Connected line identification restriction terminal |
-
2011
- 2011-12-12 CN CN2011104098857A patent/CN102427456A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1760621A1 (en) * | 2005-08-30 | 2007-03-07 | Sap Ag | Information control in federated interaction |
JP2008104103A (en) * | 2006-10-20 | 2008-05-01 | Softbank Mobile Corp | Portable terminal, program, and control method |
CN101026844A (en) * | 2007-03-29 | 2007-08-29 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal with information secrecy function and secrecy method |
CN201869273U (en) * | 2010-06-14 | 2011-06-15 | 韩燕� | Connected line identification restriction terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819669A (en) * | 2017-10-31 | 2018-03-20 | 平安科技(深圳)有限公司 | Feedback method, device, equipment and the readable storage medium storing program for executing of base missed call |
WO2019085301A1 (en) * | 2017-10-31 | 2019-05-09 | 平安科技(深圳)有限公司 | Missed call feedback method, apparatus and device for fixed phone, and readable storage medium |
CN110610072A (en) * | 2019-09-06 | 2019-12-24 | 武汉达梦数据库有限公司 | Data authentication method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9871913B1 (en) | Systems and methods to identify ANI and caller ID manipulation for determining trustworthiness of incoming calling party and billing number information | |
CN103067918B (en) | Method, device and system of privacy data anonymization in communication network | |
CN101304453A (en) | Mobile terminal as well as method and system for data privacy | |
CN108650674B (en) | A kind of information security enciphering hiding coding system | |
CN101895605A (en) | Method and device for communication based on pseudo-contact information | |
CN102006358A (en) | Mobile phone private communication management system and method | |
CN104822139B (en) | A method of communicating number isolation and secret protection are realized based on intermediate number | |
CN101393434A (en) | Stamp control device and system | |
CN102654924A (en) | China mobile entrance guard security system and corresponding entrance guard system security method | |
KR101306074B1 (en) | Method and system to prevent phishing | |
CN107635016A (en) | A kind of call-information management method and system based on big data | |
CN205017393U (en) | Novel automatic identity authentication system sends a telegram here | |
CN106657538A (en) | Method of using flash short message to prevent phone fraud | |
CN102427456A (en) | Information secrecy calling control method | |
CN105049581B (en) | Telephonograph evidence processing system and processing method | |
CN103249036B (en) | The safety call method and mobile terminal of mobile terminal | |
US5978459A (en) | Encryption of telephone calling card codes | |
CN105681356A (en) | Resident identity card-base communication network system | |
CN105873029B (en) | A kind of conversation monitoring method and device | |
CN101729641B (en) | Machine card separated acoustic code encryption telephone set system | |
CN111510925A (en) | System and method for preventing telecommunication fraud, junk calls and junk information | |
CN105306753A (en) | System and method for disclosing mobile phone number and intercepting harassing calls and short messages | |
CN205160522U (en) | Bluetooth secret communication ware | |
CN204967863U (en) | Volume subdata terminal group network system based on PSTN public network | |
JP3684988B2 (en) | POSITION INFORMATION SERVICE SYSTEM, POSITION INFORMATION USING METHOD, POSITION TERMINAL, POSITION CENTER, AND TERMINAL TERMINAL IN POSITION INFORMATION SERVICE SYSTEM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120425 |