CN105376733A - Information processing method and electronic apparatus - Google Patents

Information processing method and electronic apparatus Download PDF

Info

Publication number
CN105376733A
CN105376733A CN201510641017.XA CN201510641017A CN105376733A CN 105376733 A CN105376733 A CN 105376733A CN 201510641017 A CN201510641017 A CN 201510641017A CN 105376733 A CN105376733 A CN 105376733A
Authority
CN
China
Prior art keywords
user
messaging parameter
electronic equipment
mark
communication network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510641017.XA
Other languages
Chinese (zh)
Inventor
刘麟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510641017.XA priority Critical patent/CN105376733A/en
Publication of CN105376733A publication Critical patent/CN105376733A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an information processing method and an electronic apparatus. The method comprises the steps of obtaining a command that a first application invokes user identification information of an electronic apparatus; obtaining a first user identifier representing the user identification information from the electronic apparatus; performing encryption treatment on the first user identifier and obtaining a second user identifier; responding to the command that the first application invokes the user identification information based on the second user identifier, wherein the electronic apparatus can communicate with the communication network through the second user identifier. According to the invention, the privacy of user identifiers of users can be guaranteed and normal communication of electronic apparatuses cannot be influenced.

Description

Information processing method and electronic equipment
Technical field
The present invention relates to the communication technology, particularly relate to a kind of information processing method and electronic equipment.
Background technology
At present, user generally uses electronic equipment (smart mobile phone, panel computer etc.) and user ID (as phone number, E-mail address) based on user communicates, such as, user not only can be undertaken conversing, receiving and dispatching note by cell-phone number, cell-phone number can also be utilized to register at third-party application platform, even cell-phone number is associated with the bank card of user, realize paying efficiently.But, while bringing advantage to the user, if leakage of personal information such as cell-phone numbers, beyond thought loss may be caused to user.Therefore, do not wish to reveal that oneself real user ID is to protect privacy, avoids receiving interfere information or causing unknown losses many occasion users.But how to ensure the privacy of user ID, can not impact based on the normal use of user ID user again, there is no effective solution.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and electronic equipment, can guarantee the privacy of the user ID of user, and can not affect the proper communication of electronic equipment.
First aspect, the invention provides a kind of information processing method, comprising:
Obtain the instruction of the first application call electronic device user identifying information;
The first user obtained for characterizing consumer identifying information from described electronic equipment identifies;
Described first user mark is encrypted, obtains the second user ID;
Based on the instruction of customer identification information described in described first application call of described second user ID response;
Wherein, described second user ID is for supporting that described electronic equipment is communicated with communication network by described second user ID.
Second aspect, the invention provides a kind of electronic equipment, comprising: processor and memory; Store instruction in described memory, described processor is for performing the instruction of described memory storage to complete following operation:
Obtain the instruction of the first application call electronic device user identifying information;
The first user obtained for characterizing consumer identifying information identifies;
Described first user mark is encrypted, obtains the second user ID;
Utilize described second user ID to respond described instruction, wherein said second user ID supports that described electronic equipment communicates with communication network based on described second user ID.
In the embodiment of the present invention; use the instruction of the second user ID response invoke user identifying information after to first user mark (also namely original user ID) encryption; and the second user ID can by communication network identification; therefore the communication of electronic equipment and communication network can not be affected; both original to user user ID (first user mark) has carried out secret protection, can not affect again the proper communication of electronic equipment.
Accompanying drawing explanation
Fig. 1 is the realization flow schematic diagram one of information processing method in the embodiment of the present invention;
Fig. 2 is the realization flow schematic diagram two of information processing method in the embodiment of the present invention;
Fig. 3 is the realization flow schematic diagram three of information processing method in the embodiment of the present invention;
Fig. 4 is the realization flow schematic diagram four of information processing method in the embodiment of the present invention;
Fig. 5 is the realization flow schematic diagram five of information processing method in the embodiment of the present invention;
Fig. 6 is the structural representation of electronic equipment in the embodiment of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The electronic equipment recorded in the embodiment of the present invention can be implemented in a variety of manners, such as, above-mentioned electronic equipment can be smart mobile phone, panel computer, notebook computer or Wearable (as intelligent glasses, intelligent watch etc.), and the operating system of electronic equipment can be Android operation system, the operating system (as mobile edition linux system, blackberry, blueberry QNX operating system etc.) that can run on micro-computer architecture (at least comprising processor and internal memory) of IOS or other any third parties exploitation.
Based on the electronic equipment of above-mentioned record, see Fig. 1, when obtaining the instruction of the first application call electronic device user identifying information (step 101), obtain first user mark (step 102) being used for characterizing consumer identifying information from electronic equipment; First user mark is encrypted, obtains the second user ID (step 103); The second user ID is utilized to respond the instruction (step 104) of the first application call customer identification information, to make electronic equipment based on the second user ID and communication.
Based on the above electronic equipment of record and the information processing method of enforcement thereof, the following specific embodiment of the present invention is proposed.
Embodiment one
The present embodiment records a kind of information processing method, see Fig. 2, comprises the following steps:
Step 201, obtains the instruction of the first application call electronic device user identifying information.
Here the some application run in electronic equipment are not refered in particular in the first application, and refer to the application with the customer identification information demand obtaining electronic device user, first is applied in multiple use scenes the demand having the identifying information obtaining user, illustrates below:
Such as, first is applied as social application, the object that user obtains the identifying information of user is that the identifying information of transmission user is to contact person on the line of user (as micro-letter contact person, QQ contact person etc.), user is when using the social application such as micro-letter, the user ID (as mobile phone, E-mail address) of individual is revealed to the use scenes of contact person on line by frequent existence, the customer identification information of correspondingly first application call electronic equipment this locality storage;
Again such as, the object that first application obtains the identifying information of user is the identifying information of user is registered the voucher of third party's service as user, third party's service comprises cloud storage, the Internet finance, social activity, shopping, traffic, multimedia etc., the identifying information of client (the first application) the meeting invoke user run in electronic equipment when user registers, the client run in electronic equipment when user's subsequent login can call the identifying information of electronic device user equally.
Subsequent step is that the customer identification information of acquisition electronic device user is to respond the process of the first application call customer identification information instruction.
Step 202, the first user obtained for characterizing consumer identifying information from electronic equipment identifies.
The type of first user mark can be MSISDN (phone number); When client identification module (SIM) card of inbound information, subscriber identify module card (UIM) are set in electronic equipment, the user that transmits on the MAP interface unique identification also i.e. phone number at communication network (cellular network, PSTN etc. of standard as various in 2G/3G/4G) is got at signing communication network registration, first user mark is the original user ID of user, namely not to user ID through any encryption, such as the phone number (not comprising national code) of 11 is within Chinese territory as 13522223333.
Step 203, obtains the messaging parameter of corresponding first user mark.
The type of messaging parameter comprises: area code; IP phone prefix; Networking telephone prefix (networking telephone prefix such as do not opened); Invalid code (being such as undefined area number).
During actual enforcement, messaging parameter may be distinguished to some extent because of communication network, correspondingly, electronic equipment can (server can be querying server ad hoc in a communication network at server, also can be the network element server of any function in communication network) inquire about the communication network that first user identifies ownership, and continue messaging parameter available in the communication network belonged in server lookup first user mark based on the network of first user ownership;
Certainly, the messaging parameter data of server also can be issued in electronic equipment in advance, by electronic equipment local search first user identify ownership communication network can messaging parameter.
Step 204, forms the second user ID by messaging parameter and first user identifier combination.
Exemplarily, messaging parameter is identified as prefix and first user the mode carrying out combining to identify first user and be encrypted; If messaging parameter is networking telephone prefix 118061, when first user is designated 1352222333, the second user ID that encryption is formed is 1180611352222333.
Step 205, utilizes the second user ID to respond the instruction of the first application call electronic device user identifying information.
As previously mentioned, based on the different use scenes of the first application, contact person on the line that the second user ID obtained can be sent to user by the first application, communicates with electronic equipment via communication network based on the second user ID for contact person's (electronic equipment that contact person holds); Or, the second user ID obtained is submitted to third party's service platform (third party's service platform provides third party to serve by the first application to user), to make third party's service platform based on the second user ID and to communicate with electronic equipment via communication network.
Inventor finds in the practice of the invention, and electronic equipment can based on the second user ID and communication, and then realizes and the communication of equipment electronic equipment, third party's service platform of contact person (on the line described above) of network side.
Take messaging parameter as IP phone prefix be example, when the equipment use first user mark 1352222333 of network side communicates as sent short messages with electronic equipment, second user ID is committed to PSTN by the equipment of network side, PSTN can use plain old telephone network to come to transmit note to electronic equipment, be designated 1352222333 interpolation prefixes at first user and such as after 118061, obtain the second user ID 1180611352222333, if the equipment use of network side 1180611352222333 transmits note to electronic equipment, corresponding IP network can be triggered to send information, plain old telephone network and IP network all belong to the PSTN of broad sense, therefore equipment use second user ID of network side still can with electronic equipment proper communication, the communication link between electronic equipment and communication network still can be set up.
Be invalid code again with messaging parameter be example, when the second user ID that equipment use invalid code and the first user identified group of network side are combined into communicates with electronic equipment, second user ID is committed to communication network by the equipment of network side, communication network can identify this invalid code (such as identifying this prefix is expired IP phone prefix etc.), therefore this prefix is removed and restore first user mark, communicate with electronic equipment based on first user mark, the communication link between electronic equipment and communication network still can be set up.
Combine the actual enforcement of use scenes to above-mentioned steps to be again described.
Registration third party service platform third party's service (cloudlike services such as storage, the Internet finance, social activity, shopping, traffic, multimedias) provided Network Based becomes trend, user often needs to use the mark of oneself as E-mail address, mobile subscriber's International Integrated Services digital network number (MSISDN, MobileSubscriberInternationalISDN/PSTNnumber) namely the phone number of ordinary meaning registers the account using third party's service, and this just makes the personal information of user there is the risk revealed.
Such as, after the phone number of user is changed (or after E-mail address cancellation), account such as the phone number (or E-mail address) of third party's service that user registers may use in signing by other users (or registration), this account just causing the third party of original subscriber to serve may be cracked by new user, causes the information leakage of original subscriber.
User uses the first application (client of third party's service) based on the second user ID in the registration of third party's service platform or login, (identifying code is sent as utilized user during the second user ID registration when third party's service platform needs to communicate with electronic equipment, or user based on the second user ID registration Push Service information) time, (be phone number with user ID in the present embodiment will be example via communication network based on the second user ID, corresponding communication network is cellular communications networks, as GSM/CDMA/WCDMA network) send information to electronic equipment, as previously mentioned, the second user ID that messaging parameter and first user identifier combination are formed still correctly can be identified by communication network, information is sent based on the second user ID to electronic equipment to make communication network, electronic equipment is enable normally to receive information from third party's service platform, therefore can not the service that user registers third-party platform be impacted,
Because the original user ID (first user mark) of user does not pass to the first application; but pass to the user ID after the first application encipher (the second user ID); therefore to register user to cause the original user ID of user to be revealed when third party serves, the available protecting privacy of user ID.
Embodiment two
The present embodiment records a kind of information processing method, see Fig. 3, comprises the following steps:
Step 301, obtains the instruction of the first application call electronic device user identifying information.
Here the some application run in electronic equipment are not refered in particular in the first application, and refer to the application with the customer identification information demand obtaining electronic device user, first is applied in multiple use scenes the demand having the identifying information obtaining user, illustrates below:
Such as, first is applied as social application, the object that user obtains the identifying information of user is that the identifying information of transmission user is to contact person on the line of user (as micro-letter contact person, QQ contact person etc.), user is when using the social application such as micro-letter, the user ID (as mobile phone, E-mail address) of individual is revealed to the use scenes of contact person on line by frequent existence, the customer identification information of correspondingly first application call electronic equipment this locality storage;
Again such as, the object that first application obtains the identifying information of user is the identifying information of user is registered the voucher of third party's service as user, third party's service comprises cloud storage, the Internet finance, social activity, shopping, traffic, multimedia etc., the identifying information of client (the first application) the meeting invoke user run in electronic equipment when user registers, the client run in electronic equipment when user's subsequent login can call the identifying information of electronic device user equally.
Subsequent step is that the customer identification information of acquisition electronic device user is to respond the process of the first application call customer identification information instruction.
Step 302, from electronic equipment this locality or the set of reading the messaging parameter that corresponding first user identifies from server.
The type of messaging parameter comprises: area code; IP phone prefix; Networking telephone prefix (networking telephone prefix such as do not opened); Invalid code (being such as undefined area number).
During actual enforcement, passable communication network is distinguished to some extent because of communication network, correspondingly, electronic equipment can (server can be querying server ad hoc in a communication network at server, also can be the network element server of any function in communication network) inquire about the communication network that first user identifies ownership, and continue messaging parameter available in the communication network belonged in server lookup first user mark based on the network of first user ownership;
Certainly, the messaging parameter data of server also can be issued in electronic equipment in advance, by electronic equipment local search first user identify ownership communication network can messaging parameter.
The type of first user mark can be MSISDN (phone number); When client identification module (SIM) card of inbound information, subscriber identify module card (UIM) are set in electronic equipment, the user that transmits on the MAP interface unique identification also i.e. phone number at communication network (cellular network, PSTN etc. of standard as various in 2G/3G/4G) is got at signing communication network registration, first user mark is the original user ID of user, namely not to user ID through any encryption, such as the phone number (not comprising national code) of 11 is within Chinese territory as 13522223333.
Step 303, chooses messaging parameter the set of the messaging parameter identified from corresponding first user.
Step 304, forms the second user ID by the messaging parameter chosen and first user identifier combination.
Messaging parameter selected in step 303 and first user identify that to carry out combining the second user ID obtained be the user ID with uniqueness, avoid because of the second user ID repeat cause communication network cannot determine the problem of the target electronic device of communication.
Exemplarily, messaging parameter is identified as prefix and first user the mode carrying out combining to identify first user and be encrypted; If messaging parameter is networking telephone prefix 118061, when first user is designated 1352222333, the second user ID that encryption is formed is 1180611352222333.
Step 305, utilizes the second user ID to respond the instruction of the first application call electronic device user identifying information.
As previously mentioned, based on the different use scenes of the first application, contact person on the line that the second user ID obtained can be sent to user by the first application, communicates with electronic equipment via communication network based on the second user ID for contact person's (electronic equipment that contact person holds); Or, the second user ID obtained is submitted to third party's service platform (third party's service platform provides third party to serve by the first application to user), to make third party's service platform based on the second user ID and to communicate with electronic equipment via communication network.
Inventor finds in the practice of the invention, and electronic equipment can based on the second user ID and communication, and then realizes and the communication of equipment electronic equipment, third party's service platform of contact person (on the line described above) of network side.
Take messaging parameter as IP phone prefix be example, when the equipment use first user mark 1352222333 of network side communicates as sent short messages with electronic equipment, second user ID is committed to PSTN by the equipment of network side, PSTN can use plain old telephone network to come to transmit note to electronic equipment, be designated 1352222333 interpolation prefixes at first user and such as after 118061, obtain the second user ID 1180611352222333, if the equipment use of network side 1180611352222333 transmits note to electronic equipment, corresponding IP network can be triggered to send information, plain old telephone network and IP network all belong to the PSTN of broad sense, therefore equipment use second user ID of network side still can with electronic equipment proper communication, the communication link between electronic equipment and communication network still can be set up.
Be invalid code again with messaging parameter be example, the equipment use of network side has invalid code when communicating with electronic equipment with the second user ID that first user identified group is combined into, second user ID is committed to communication network by the equipment of network side, communication network can identify this invalid code (such as identifying this prefix is expired IP phone prefix etc.), therefore this prefix is removed and restore first user mark, communicate with electronic equipment based on first user mark, the communication link between electronic equipment and communication network still can be set up.
Combine actual use scenes to be again described above-mentioned steps.
When user uses the first application (client of third party's service) in the registration of third party's service platform or logs in, first application call electronic device user identifying information, messaging parameter is chosen the set of the messaging parameter that electronic equipment identifies from corresponding first user, the messaging parameter chosen and first user identifier combination are formed the second user ID, the second user ID is utilized to respond the instruction of the first application call electronic device user identifying information, third party's service platform is registered/logged in second user ID as voucher by the first application, (identifying code is sent as utilized user during the second user ID registration when third party's service platform needs to communicate with electronic equipment, or user based on the second user ID registration Push Service information) time, to (be phone number with user ID in the present embodiment be example based on the second user ID and via communication network, corresponding communication network is cellular communications networks, as GSM/CDMA/WCDMA network) send information to electronic equipment, as previously mentioned, the second user ID that messaging parameter and first user identifier combination are formed still correctly can be identified by communication network, communication network is enable to send information based on the second user ID to electronic equipment, thus electronic equipment normally can receive the information from third party's service platform, therefore can not the service that user registers third-party platform be impacted,
Because the original user ID (first user mark) of user does not pass to the first application; but pass to the user ID after the first application encipher (the second user ID); therefore to register user to cause the original user ID of user to be revealed when third party serves, the available protecting privacy of user ID.
Embodiment three
The present embodiment records a kind of information processing method, see Fig. 4, comprises the following steps:
Step 401, obtains the instruction of the first application call electronic device user identifying information.
Here the some application run in electronic equipment are not refered in particular in the first application, and refer to the application with the customer identification information demand obtaining electronic device user, first is applied in multiple use scenes the demand having the identifying information obtaining user, illustrates below:
Such as, first is applied as social application, the object that user obtains the identifying information of user is that the identifying information of transmission user is to contact person on the line of user (as micro-letter contact person, QQ contact person etc.), user is when using the social application such as micro-letter, the user ID (as mobile phone, E-mail address) of individual is revealed to the use scenes of contact person on line by frequent existence, the customer identification information of correspondingly first application call electronic equipment this locality storage;
Again such as, the object that first application obtains the identifying information of user is the identifying information of user is registered the voucher of third party's service as user, third party's service comprises cloud storage, the Internet finance, social activity, shopping, traffic, multimedia etc., the identifying information of client (the first application) the meeting invoke user run in electronic equipment when user registers, the client run in electronic equipment when user's subsequent login can call the identifying information of electronic device user equally.
Subsequent step is that the customer identification information of acquisition electronic device user is to respond the process of the first application call customer identification information instruction.
Step 402, from electronic equipment this locality or the set of reading the messaging parameter that corresponding first user identifies from server.
The type of messaging parameter comprises: area code; IP phone prefix; Networking telephone prefix (networking telephone prefix such as do not opened); Invalid code (being such as undefined area number).
During actual enforcement, passable communication network is distinguished to some extent because of communication network, correspondingly, electronic equipment can (server can be querying server ad hoc in a communication network at server, also can be the network element server of any function in communication network) inquire about the communication network that first user identifies ownership, and continue messaging parameter available in the communication network belonged in server lookup first user mark based on the network of first user ownership;
Certainly, the messaging parameter data of server also can be issued in electronic equipment in advance, by electronic equipment local search first user identify ownership communication network can messaging parameter.
The type of first user mark can be MSISDN (phone number); When client identification module (SIM) card of inbound information, subscriber identify module card (UIM) are set in electronic equipment, the user that transmits on the MAP interface unique identification also i.e. phone number at communication network (cellular network, PSTN etc. of standard as various in 2G/3G/4G) is got at signing communication network registration, first user mark is the original user ID of user, namely not to user ID through any encryption, such as the phone number (not comprising national code) of 11 is within Chinese territory as 13522223333.
Step 403, detects in the set of the messaging parameter whether once identified at corresponding first user and chose messaging parameter, if so, then perform step 404; Otherwise, perform step 405.
Step 404, the messaging parameter different from once selected messaging parameter is chosen in the set of the messaging parameter identified at corresponding first user.
Step 405, chooses messaging parameter arbitrarily in the set of the messaging parameter identified at corresponding first user.
Step 406, forms the second user ID by the messaging parameter chosen and first user identifier combination.
The messaging parameter chosen and first user identify that to carry out combining the second user ID obtained be the user ID with uniqueness, avoid because of the second user ID repeat cause communication network cannot determine the problem of the target electronic device communicated.
Exemplarily, messaging parameter is identified as prefix and first user the mode carrying out combining to identify first user and be encrypted; If detect and once identify 1352222333 messaging parameters 118061 for first user, then choosing the messaging parameter of be different from 118061 as 10086, utilizing messaging parameter 10086 to form second user ID 1180611352222333 to first for identifying 1352222333 encryptions for networking telephone prefix.
Step 403 to step 406 achieves following technique effect, time repeatedly to same first user mark encryption, encrypts the second user ID difference obtained, such as, when, 1) electronic device user identifying information is called in multiple the first different application (micro-letter, QQ) in electronic equipment, utilize different multiple first application of the second user ID correspondence response obtained based on same first user mark encryption, 2) when in electronic equipment, electronic device user identifying information is called in same first application (micro-letter) for twice, utilize the second different user ID obtained based on same first user mark encryption, a typical scene is: when micro-letter that electronic equipment 1 runs calls electronic equipment 1 customer identification information, the second user ID 1 is formed based on messaging parameter 1 and first user identifier combination, when electronic equipment 1 user log off first user mark 1, follow-up first user mark 1 again by electronic equipment 2 user is signing use time, when micro-letter that electronic equipment 2 runs calls electronic equipment 2 customer identification information, detect that messaging parameter 1 once identifies 1 with first user and combinationally uses, therefore choose messaging parameter 2 (different from messaging parameter 1) and first user to identify 1 and combine and obtain the second user ID 2 (different with the second user ID 1).
Step 407, utilizes the second user ID to respond the instruction of the first application call electronic device user identifying information.
As previously mentioned, based on the different use scenes of the first application, contact person on the line that the second user ID obtained can be sent to user by the first application, communicates with electronic equipment via communication network based on the second user ID for contact person's (electronic equipment that contact person holds); Or, the second user ID obtained is submitted to third party's service platform (third party's service platform provides third party to serve by the first application to user), to make third party's service platform based on the second user ID and to communicate with electronic equipment via communication network.
Inventor finds in the practice of the invention, and electronic equipment can based on the second user ID and communication, and then realizes and the communication of equipment electronic equipment, third party's service platform of contact person (on the line described above) of network side.
Take messaging parameter as IP phone prefix be example, when the equipment use first user mark 1352222333 of network side communicates as sent short messages with electronic equipment, second user ID is committed to PSTN by the equipment of network side, PSTN can use plain old telephone network to come to transmit note to electronic equipment, be designated 1352222333 interpolation prefixes at first user and such as after 118061, obtain the second user ID 1180611352222333, if the equipment use of network side 1180611352222333 transmits note to electronic equipment, corresponding IP network can be triggered to send information, plain old telephone network and IP network all belong to the PSTN of broad sense, therefore equipment use second user ID of network side still can with electronic equipment proper communication, the communication link between electronic equipment and communication network still can be set up.
Be invalid code again with messaging parameter be example, the equipment use of network side has invalid code when communicating with electronic equipment with the second user ID that first user identified group is combined into, second user ID is committed to communication network by the equipment of network side, communication network can identify this invalid code (such as identifying this prefix is expired IP phone prefix etc.), therefore this prefix is removed and restore first user mark, communicate with electronic equipment based on first user mark, the communication link between electronic equipment and communication network still can be set up.
Combine actual use scenes to be again described above-mentioned steps.
When user 1 uses the first application (client of third party's service) in the registration of third party's service platform or logs in, first application call electronic equipment 1 customer identification information, messaging parameter 1 is chosen the set of the messaging parameter that electronic equipment 1 identifies from corresponding first user, the messaging parameter 1 chosen is formed the second user ID 1 with first user identifier combination, the second user ID 1 is utilized to respond the instruction of the first application call electronic equipment 1 customer identification information, third party's service platform is registered/logged in second user ID 1 as voucher by the first application, third party's service platform needs (to send identifying code when registering as utilized the second user ID 1 user when communicating with electronic equipment 1, or user 1 based on the second user ID registration Push Service information) time, to (be phone number with user ID in the present embodiment be example based on the second user ID 1 and via communication network, corresponding communication network is cellular communications networks, as GSM/CDMA/WCDMA network) send information to electronic equipment 1, as previously mentioned, the second user ID 1 that messaging parameter 1 and first user identifier combination are formed still correctly can be identified by communication network, communication network is enable to send information based on the second user ID 1 to electronic equipment, thus electronic equipment 1 normally can receive the information from third party's service platform, therefore can not have an impact to the communication of user,
Follow-up, when user 1 nullifies the first user mark used, and first user mark is by the signing use of user 2, during the first application call electronic equipment 2 customer identification information in the electronic equipment 2 that user 2 holds, messaging parameter 2 (different from messaging parameter 1) is chosen the set of the messaging parameter that electronic equipment 2 identifies from corresponding first user, the messaging parameter 2 chosen and first user identifier combination are formed the second user ID 2 (different with the second user ID 1), the second user ID 2 is utilized to respond the instruction of the first application call electronic equipment 2 customer identification information, third party's service platform is registered/logged in second user ID 2 as voucher by the first application, such user 1 is different with the voucher that user 2 uses third party to serve, avoid the risk that user 1 reveals in the account of third party's service platform, ensure that information security.
Because the original user ID (first user mark) of user does not pass to the first application, but pass to the user ID after the first application encipher (the second user ID), therefore register when third party serves user and the original user ID of user can not be caused to reveal; And, even if user log off the original user ID (first user mark) of contracting, the account of serving owing to registering use at third party's service platform is user ID (the second user ID after encryption, identify different from first user), even if this original user ID, by the signing use of other user, also can not have an impact at the account number safety of the registration of third party's service platform to original subscriber.
The technical scheme that previous embodiment is recorded is applicable to the situation that user ID is phone number, and the technical approach that embodiment five is recorded is applicable to the situation that user ID is phone number or E-mail address.
Embodiment five
The present embodiment records a kind of information processing method, see Fig. 5, comprises the following steps:
Step 501, obtains the instruction of the first application call electronic device user identifying information.
Subsequent step is that the customer identification information of acquisition electronic device user is with the process of response instruction.
Step 502, the first user obtained for characterizing consumer identifying information from electronic equipment identifies.
Customer identification information can be phone number and E-mail address etc.
Step 503, replaces extracted specific character based on the Substitution Rules preset, obtains the second user ID.
The communication network base that second user ID support makes first user identify ownership is stated Substitution Rules and is restored first user mark, communicates based on first user mark to make electronic equipment with communication network.
Substitution Rules can be made an appointment between electronic equipment and communication network, are designated E-mail address for first user, and E-mail address abc@gmail.com is replaced abc#gmail.com; Above-mentioned character substitute mode is only example, during actual enforcement, character substitute mode can have a lot of mode, such as the character in E-mail address is carried out encoding (such as dividing into groups to encode in units of 2 or 3 sub-characters) obtain the second user ID
Step 504, responds the instruction of the first application call customer identification information based on the second user ID.
Exemplarily, first application is registered at third party's service platform based on the second user ID, (identifying code is sent as utilized user during the second user ID registration when third party's service platform needs to communicate with electronic equipment, or user based on the second user ID registration Push Service information) time, information will be sent to electronic equipment via communication network, electronic equipment replaces to the first user of user mark the second user ID of obtaining can be reduced to first user mark by the identification of third party's service platform, thus information can be sent via communication network to electronic equipment based on first user mark, the service that user registered/used third-party platform can not be impacted, because the original user ID (first user mark) of user does not pass to the first application, but pass to the user ID after the first application encipher (the second user ID), therefore register/use the original user ID leakage that can not cause user when third party serves user.
Embodiment six
The present embodiment records a kind of electronic equipment, see Fig. 6, comprising: processor 100 and memory 200; Store instruction in memory 200, the instruction that processor 100 stores for execute store 200 is to complete following operation:
Obtain the instruction of the first application call electronic device user identifying information;
The first user obtained for characterizing consumer identifying information identifies;
First user mark is encrypted, obtains the second user ID;
Utilize the second user ID response instruction, wherein the second user ID support receives information from communication network.
Exemplarily, processor 100 also for execute store 200 store instruction to complete following operation:
Obtain the messaging parameter of corresponding first user mark;
Messaging parameter and first user are identified and combines, obtain the second user ID; Wherein,
The messaging parameter of messaging parameter corresponding to the communication network of first user mark ownership.
Exemplarily, processor 100 also for execute store 200 store instruction to complete following operation:
From electronic equipment this locality or the set of reading the messaging parameter that corresponding first user identifies from server;
Choose messaging parameter the set of the messaging parameter identified from corresponding first user, wherein, selected messaging parameter and first user identify that to carry out combining the second user ID obtained be the user ID with uniqueness.
Exemplarily, processor 100 also for execute store 200 store instruction to complete following operation:
Detect in the set of the messaging parameter whether once identified at corresponding first user and chose messaging parameter;
If so, then the messaging parameter different from once selected messaging parameter is chosen in the set of the messaging parameter identified at corresponding first user;
If not, then messaging parameter is chosen arbitrarily in the set of the messaging parameter identified at corresponding first user.
Exemplarily, processor 100 also for execute store 200 store instruction to complete following operation:
Extract the specific character in first user mark;
Based on the Substitution Rules preset, extracted specific character is replaced, obtain the second user ID; Wherein,
The communication network that second user ID support makes first user identify ownership restores first user mark based on Substitution Rules, communicates based on first user mark to make electronic equipment with communication network.
In the embodiment of the present invention; use the instruction of the second user ID response invoke user identifying information after to first user mark (also namely original user ID) encryption; and the second user ID can by communication network identification; therefore the communication of electronic equipment and communication network can not be affected; both original to user user ID (first user mark) has carried out secret protection, can not affect again the proper communication of electronic equipment.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that program command is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: movable storage device, read-only memory (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
Or, if the above-mentioned integrated unit of the present invention using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.Based on such understanding, the technical scheme of the embodiment of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium, comprises some instructions and performs all or part of of method described in each embodiment of the present invention in order to make a computer equipment (can be personal computer, server or the network equipment etc.).And aforesaid storage medium comprises: movable storage device, ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of described claim.

Claims (11)

1. an information processing method, is characterized in that, described method comprises:
Obtain the instruction of the first application call electronic device user identifying information;
The first user obtained for characterizing consumer identifying information from described electronic equipment identifies;
Described first user mark is encrypted, obtains the second user ID;
Based on the instruction of customer identification information described in described first application call of described second user ID response;
Wherein, described second user ID is for supporting that described electronic equipment is communicated with communication network by described second user ID.
2. the method for claim 1, is characterized in that, described mark first user is encrypted, and obtains the second user ID, comprising:
Obtain the messaging parameter of corresponding described first user mark;
Described messaging parameter and described first user are identified and combines, obtain described second user ID; Wherein,
The messaging parameter of described messaging parameter corresponding to the communication network of described first user mark ownership.
3. method as claimed in claim 2, is characterized in that, the messaging parameter of the corresponding described first user mark of described acquisition, comprising:
From described electronic equipment this locality or the set of reading the messaging parameter that corresponding described first user identifies from server;
From the set of the messaging parameter of correspondence described first user mark, choose messaging parameter, wherein, selected messaging parameter and described first user identify that to carry out combining described second user ID obtained be the user ID with uniqueness.
4. method as claimed in claim 3, is characterized in that, chooses messaging parameter, comprising the set of the described messaging parameter identified from corresponding first user:
Detect and whether once in the set of the messaging parameter of the described first user mark of correspondence, chose messaging parameter;
If so, then the messaging parameter different from once selected messaging parameter is chosen in the set of the messaging parameter of correspondence described first user mark;
If not, then in the set of the messaging parameter of the described first user mark of correspondence, messaging parameter is chosen arbitrarily.
5. the method for claim 1, is characterized in that, described mark first user is encrypted, and obtains the second user ID, comprising:
Extract the specific character in described first user mark;
Based on the Substitution Rules preset, extracted specific character is replaced, obtain described second user ID; Wherein,
The communication network that described second user ID support makes described first user identify ownership restores described first user mark based on described Substitution Rules, communicates based on described first user mark to make described electronic equipment with described communication network.
6. the method as described in any one of claim 1 to 5, is characterized in that, the type of described messaging parameter comprises:
Area code; IP phone prefix; Networking telephone prefix; Invalid code.
7. an electronic equipment, is characterized in that, comprising: processor and memory; Store instruction in described memory, described processor is for performing the instruction of described memory storage to complete following operation:
Obtain the instruction of the first application call electronic device user identifying information;
The first user obtained for characterizing consumer identifying information identifies;
Described first user mark is encrypted, obtains the second user ID;
Utilize described second user ID to respond described instruction, wherein said second user ID supports that described electronic equipment communicates with communication network based on described second user ID.
8. electronic equipment as claimed in claim 7, is characterized in that, described processor is also for performing the instruction of described memory storage to complete following operation:
Obtain the messaging parameter of corresponding described first user mark;
Described messaging parameter and described first user are identified and combines, obtain described second user ID; Wherein,
The messaging parameter of described messaging parameter corresponding to the communication network of described first user mark ownership.
9. electronic equipment as claimed in claim 8, is characterized in that, described processor is also for performing the instruction of described memory storage to complete following operation:
From described electronic equipment this locality or the set of reading the messaging parameter that corresponding described first user identifies from server;
From the set of the messaging parameter of correspondence described first user mark, choose messaging parameter, wherein, selected messaging parameter and described first user identify that to carry out combining described second user ID obtained be the user ID with uniqueness.
10. electronic equipment as claimed in claim 9, is characterized in that, described processor is also for performing the instruction of described memory storage to complete following operation:
Detect and whether once in the set of the messaging parameter of the described first user mark of correspondence, chose messaging parameter;
If so, then the messaging parameter different from once selected messaging parameter is chosen in the set of the messaging parameter of correspondence described first user mark;
If not, then in the set of the messaging parameter of the described first user mark of correspondence, messaging parameter is chosen arbitrarily.
11. electronic equipments as described in any one of claim 7 to 10, is characterized in that, described processor is also for performing instruction that described memory stores to complete following operation:
Extract the specific character in described first user mark;
Based on the Substitution Rules preset, extracted specific character is replaced, obtain described second user ID; Wherein,
The communication network that described second user ID support makes described first user identify ownership restores described first user mark based on described Substitution Rules, communicates based on described first user mark to make described electronic equipment with described communication network.
CN201510641017.XA 2015-09-30 2015-09-30 Information processing method and electronic apparatus Pending CN105376733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510641017.XA CN105376733A (en) 2015-09-30 2015-09-30 Information processing method and electronic apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510641017.XA CN105376733A (en) 2015-09-30 2015-09-30 Information processing method and electronic apparatus

Publications (1)

Publication Number Publication Date
CN105376733A true CN105376733A (en) 2016-03-02

Family

ID=55378448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510641017.XA Pending CN105376733A (en) 2015-09-30 2015-09-30 Information processing method and electronic apparatus

Country Status (1)

Country Link
CN (1) CN105376733A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317680A (en) * 2017-06-28 2017-11-03 努比亚技术有限公司 Labeling method, system and the computer-readable recording medium of secured account numbers
CN108718337A (en) * 2018-05-22 2018-10-30 国政通科技股份有限公司 Website account login, verification, verification information processing method, apparatus and system
CN112203279A (en) * 2020-09-02 2021-01-08 中国人民解放军战略支援部队信息工程大学 5G network boundary network element address protection method and device based on discrete address change
CN112217861A (en) * 2020-09-02 2021-01-12 中国人民解放军战略支援部队信息工程大学 5G network boundary network element identification protection method and device based on identification jump

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694452A (en) * 2003-12-26 2005-11-09 奥林奇法国公司 Communication method and system between a terminal and at least a communication device
CN101030858A (en) * 2007-02-09 2007-09-05 华中科技大学 Trust protocol based on hidden certificate
CN102523563A (en) * 2011-12-26 2012-06-27 深圳市华信安创科技有限公司 Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN104219204A (en) * 2013-06-01 2014-12-17 姚爱军 Generation method and device of network account
CN104283853A (en) * 2013-07-08 2015-01-14 华为技术有限公司 Method, terminal device and network device for improving information safety

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694452A (en) * 2003-12-26 2005-11-09 奥林奇法国公司 Communication method and system between a terminal and at least a communication device
CN101030858A (en) * 2007-02-09 2007-09-05 华中科技大学 Trust protocol based on hidden certificate
CN102523563A (en) * 2011-12-26 2012-06-27 深圳市华信安创科技有限公司 Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN104219204A (en) * 2013-06-01 2014-12-17 姚爱军 Generation method and device of network account
CN104283853A (en) * 2013-07-08 2015-01-14 华为技术有限公司 Method, terminal device and network device for improving information safety

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317680A (en) * 2017-06-28 2017-11-03 努比亚技术有限公司 Labeling method, system and the computer-readable recording medium of secured account numbers
CN107317680B (en) * 2017-06-28 2021-06-15 努比亚技术有限公司 Method and system for marking safety account and computer readable storage medium
CN108718337A (en) * 2018-05-22 2018-10-30 国政通科技股份有限公司 Website account login, verification, verification information processing method, apparatus and system
CN108718337B (en) * 2018-05-22 2021-09-24 国政通科技股份有限公司 Website account login, verification and verification information processing method, device and system
CN112203279A (en) * 2020-09-02 2021-01-08 中国人民解放军战略支援部队信息工程大学 5G network boundary network element address protection method and device based on discrete address change
CN112217861A (en) * 2020-09-02 2021-01-12 中国人民解放军战略支援部队信息工程大学 5G network boundary network element identification protection method and device based on identification jump

Similar Documents

Publication Publication Date Title
US10778837B2 (en) System and method for tracking and archiving mobile communications
EP2826004B1 (en) Mobile phone takeover protection system and method
US20060141987A1 (en) Identification of a terminal with a server
CN104113534B (en) The login system and method for application APP
US8756657B2 (en) Mobile or user device authentication and tracking
CN101563944A (en) IMSI handling system
PH12015502384B1 (en) System and method for tracking sms messages
CN101217374B (en) A protection method on user privacy in three-party conversation
US20160021532A1 (en) Method for preventing fraud or misuse based on a risk scoring approach when using a service of a service provider, system for preventing fraud or misuse, and mobile communication network for preventing fraud or misuse
CN108777750A (en) A kind of user mobile phone security privacy guard method based on Quick Response Code
US11451660B2 (en) System and method for tracking and archiving mobile communications
CN105376733A (en) Information processing method and electronic apparatus
CN103686688B (en) The protection processing method of mobile terminal user's address list and device, mobile terminal
CN101252596A (en) Method and system for protecting number information privacy
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
US20150105064A1 (en) Communication system, mobile communication apparatus and switching method of subscriber identification information
CN105933339B (en) A kind of application login method and mobile terminal
CN102469457A (en) Communication system and synchronization and maintenance method of address list information
CN102204298A (en) Method for interlocking between machine and card, user identification module card and terminal
CN106156650A (en) Data protection system and method
US8380165B1 (en) Identifying a cloned mobile device in a communications network
CN108769436A (en) It is a kind of that guard method is customized based on the user mobile phone security privacy of USSD and Quick Response Code
CN111372237B (en) eSIM card operator file management method and device
CN107276874A (en) Network connection method, device, electronic equipment and storage medium
CN104284327A (en) Method, system and device for changing user card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160302