CN109525983B - Information processing method and device, and storage medium - Google Patents

Information processing method and device, and storage medium Download PDF

Info

Publication number
CN109525983B
CN109525983B CN201910006206.8A CN201910006206A CN109525983B CN 109525983 B CN109525983 B CN 109525983B CN 201910006206 A CN201910006206 A CN 201910006206A CN 109525983 B CN109525983 B CN 109525983B
Authority
CN
China
Prior art keywords
information
node
block chain
broadcast message
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910006206.8A
Other languages
Chinese (zh)
Other versions
CN109525983A (en
Inventor
田新雪
马书惠
肖征荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910006206.8A priority Critical patent/CN109525983B/en
Publication of CN109525983A publication Critical patent/CN109525983A/en
Application granted granted Critical
Publication of CN109525983B publication Critical patent/CN109525983B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/28Number portability ; Network address portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention provides an information processing method and device and a storage medium. The method comprises the following steps: a user node acquires first information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to a target operation node; the user node utilizes a self private key and the block chain parameter to carry out identity-based encryption IBE processing on the first information to obtain second information; the user node sends a first broadcast message on the block chain, wherein the first broadcast message at least carries the following messages: the identification information of the user node, the first information and the second information. The method of the invention can improve the security of the number portability process to a certain extent.

Description

Information processing method and device, and storage medium
Technical Field
The present invention relates to communications technologies, and in particular, to an information processing method and apparatus, and a storage medium.
Background
The portable number transfer network, also called number portability, mobile number non-change, is essentially that a user node is transferred from an original communication operator network to another communication operator network, and the transferred operator network provides communication service support for the user node, and in the process, the number of the user node for communication is not changed. The number portability is beneficial to optimizing the market structure, and the network portability cost of the user can be reduced. This can reduce the network forwarding cost of the communication user and can save number resources.
The number portability is generally proposed by the user on his own initiative for the target number, and the operator carries out the number portability on the target number based on the request of the user. In the process, the operator generally performs simple verification on the identity of the user who makes the number portability request on line, for example, checking the identity document of the user, so that the number portability of the target number is performed after the identity of the user is determined.
However, the existing number portability process adopts an offline authentication method to authenticate the identity of the user, and the authentication method has rough or no record, and is easily utilized by lawless persons to pretend to be others for carrying out number portability, so that the property loss of the actual user corresponding to the number is caused, and the actual user is difficult to be traced.
Disclosure of Invention
The invention provides an information processing method and device and a storage medium, aiming at solving the problem of potential safety hazard in an identity verification mode in a number portability process to a certain extent.
In a first aspect, the present invention provides an information processing method, including:
a user node acquires first information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to a target operation node;
the user node utilizes a self private key and the block chain parameter to carry out identity-based encryption IBE processing on the first information to obtain second information;
the user node sends a first broadcast message on the block chain, wherein the first broadcast message at least carries the following messages: the identification information of the user node, the first information and the second information.
In a second aspect, the present invention provides an information processing method, including:
an operation node receives a first broadcast message sent by a user node on a block chain, wherein the first broadcast message at least carries the following messages: the system comprises identification information of a user node, first information and second information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to a target operation node, and the second information is obtained by carrying out identity-based encryption IBE processing on the first information by using a private key and block chain parameters of the user node;
the operation node verifies the identity of the user node by using the first information and the second information;
and if the verification is passed, the operation node performs subscription or contract-release processing on the target number according to the first broadcast message.
In a third aspect, the present invention provides an information processing apparatus comprising:
an obtaining module, configured to obtain first information, where the first information is used to request that a communication service of a target number is transferred from a current operation node to a target operation node;
the processing module is used for carrying out identity-based encryption IBE processing on the first information by utilizing a private key of the processing module and the block chain parameters to obtain second information;
a sending module, configured to send a first broadcast message on the block chain, where the first broadcast message at least carries the following messages: the identification information of the user node, the first information and the second information.
In a fourth aspect, the present invention provides an information processing apparatus comprising:
a memory for storing a computer program;
a processor for executing the computer program;
the transceiver is used for carrying out information transmission with other nodes;
the processor is configured to acquire first information, where the first information is used to request that a communication service of a target number is transferred from a current operation node to a target operation node;
the processor is further configured to perform identity-based encryption IBE processing on the first information by using a private key of the processor and a block chain parameter to obtain second information;
the transceiver is configured to send a first broadcast message on the block chain, where the first broadcast message at least carries the following messages: identification information of the user, the first information and the second information.
In a fifth aspect, the present invention provides an information processing method, including:
a receiving module, configured to receive a first broadcast message sent by a user node on a block chain, where the first broadcast message at least carries the following messages: the system comprises identification information of a user node, first information and second information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to a target operation node, and the second information is obtained by carrying out identity-based encryption IBE processing on the first information by using a private key and block chain parameters of the user node;
the verification module is used for verifying the identity of the user node by utilizing the first information and the second information;
and the processing module is used for signing or contracting the target number according to the first broadcast message if the verification is passed.
In a sixth aspect, the present invention provides an information processing apparatus comprising:
a memory for storing a computer program;
a processor for executing the computer program;
the transceiver is used for carrying out information transmission with other nodes;
the transceiver is configured to receive a first broadcast message sent by a user node on a block chain, where the first broadcast message at least carries the following messages: the system comprises identification information of a user node, first information and second information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to a target operation node, and the second information is obtained by carrying out identity-based encryption IBE processing on the first information by using a private key and block chain parameters of the user node;
the processor is configured to verify an identity of the user node by using the first information and the second information;
and the processor is further configured to perform subscription or contract release processing on the target number according to the first broadcast message if the verification is passed.
In a seventh aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program,
the computer program is executed by a processor to implement the method of any one of the first and/or second aspects.
According to the information processing scheme provided by the invention, the number portability and the network forwarding are realized by using the block chain, so that the broadcast data in the whole number portability process can be recorded in the block chain account book, the traceability of the whole number portability process is ensured, and the characteristics of non-tampering and non-delectable data in the block chain account book can be used as the basis for division of responsibility attribution when an abnormal condition occurs; and the embodiment of the invention further verifies the Identity of the user node by using an Identity Based Encryption (IBE) mechanism, and executes number portability aiming at the target number after the Identity passes the verification, thus avoiding the situation that the number portability is falsely generated by other people due to being used by lawless persons to a certain extent, and improving the safety and the stability of the number portability process.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is an interaction flow diagram of an information processing method according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating another information processing method according to an embodiment of the present invention;
FIG. 3 is a block diagram of an information processing apparatus according to an embodiment of the present invention;
fig. 4 is a schematic physical structure diagram of an information processing apparatus according to an embodiment of the present invention;
FIG. 5 is a block diagram of another information processing apparatus according to an embodiment of the present invention;
fig. 6 is a schematic physical structure diagram of another information processing apparatus according to an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
First, an application scenario according to the present invention will be specifically described.
The specific application scene of the invention is a number portability scene in the telecommunication industry. Wherein, number portability: it is also called number portability, mobile phone number not changing, which is essentially that the user node is transferred from the original communication operator network to another communication operator network, and the transferred operator network provides communication service support for the user node, and in the process, the number used for communication of the user node is not changed. For example, a mobile phone subscriber holding an a carrier number that enjoys communication services provided by a B carrier transfers to the B carrier network.
The number portability network mainly comprises two types of fixed number portability and mobile number portability. The number portability is helpful for supporting new operators, promoting the new operators to rapidly enter the market, and is beneficial to three aspects of consumers, countries and telecommunication industries. The number portability is beneficial to optimizing the market structure, effective competition is realized through the control measures of the market, and the welfare of consumers is improved. For consumers, the number portability can reduce the user's cost of network portability. For the country, the number portability can save number resources and break the dominant position of the existing telecom operators, thereby promoting market competition and optimizing market structure. In addition, after the number portability is implemented, number resources can be managed by a third party in a centralized way, and social resources can be saved.
The number portability is implemented, the database of the user needs to be adjusted, the requirement on maintenance work is high, and the data modification and updating requirements of the user nodes have high timeliness and uniformity. According to the selection of the user changing the network access provider, the data record of the user needs to be modified, and a new access path is provided. Therefore, an operator needs to perform technical preparation, database construction and network transformation when implementing the number portability policy, needs to add corresponding equipment and perform capacity expansion and transformation on the existing equipment, and also needs to solve the problems in the aspects of charging, number inquiry and management, and the implementation of the technical aspects needs huge investment and needs certain time. Given the large number of telephone subscribers, implementing number portability imposes higher demands on the performance of subscriber information databases.
The number portability is generally proposed by the user on his own initiative for the target number, and the operator carries out the number portability on the target number based on the request of the user. In the process, the operator generally performs simple verification on the identity of the user who makes the number portability request on line, for example, checking the identity document of the user, so that the number portability of the target number is performed after the identity of the user is determined.
However, the existing number portability process adopts an offline authentication method to authenticate the identity of the user, and the authentication method has rough or no record, and is easily utilized by lawless persons to pretend to be others for carrying out number portability, so that the property loss of the actual user corresponding to the number is caused, and the actual user is difficult to be traced.
The information processing method provided by the invention aims to solve the technical problems in the prior art and provides the following solving ideas: the characteristics that a block chain cannot be tampered and deleted are utilized, number portability is realized through the block chain, the Identity of a user node is verified through an Identity Based Encryption (IBE) mechanism, and number portability aiming at a target number is executed after the Identity verification is passed, so that the safety and the stability of the number portability are further improved.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Example one
The embodiment of the invention provides an information processing method. For the convenience of understanding, the embodiment of the present invention will be described in terms of an information interaction process between a user node (number portability requestor) and an operation node (number portability processor). Specifically, referring to fig. 1, the method includes the following steps:
s102, a user node acquires first information, and the first information is used for requesting to transfer a communication service of a target number from a current operation node to a target operation node.
The user node refers to a data processing node of a user on the blockchain, and the representation form of the user node can be as follows: a user-side client of the blockchain.
S104, the user node uses the private key and the block chain parameter to encrypt the first information based on the identity to obtain second information.
S106, the user node sends a first broadcast message on the block chain, wherein the first broadcast message at least carries the following messages: the identification information of the user node, the first information and the second information.
S108, the operation node receives a first broadcast message sent by the user node on the block chain.
It can be known that, at this time, the first broadcast message at least carries: the identification information of the user node, the first information and the second information.
The operation node refers to a data processing node of a telecom operator on a block chain, and the representation form of the operation node can be as follows: an operator side client of the blockchain.
Furthermore, at least two operator nodes may be included in the blockchain, wherein at least: the current operation node currently providing telecommunication service for the target number and the target operation node on the block chain of the target telecommunication operator which the user node wants the target number to join.
S110, the operation node verifies the identity of the user node by using the first information and the second information.
And S112, if the verification is passed, the operation node performs subscription or contract-release processing on the target number according to the first broadcast message.
Otherwise, if the verification fails, the operation node does not execute the number portability processing, and at this time, the method includes: the current operation node does not execute the contract-resolving process with the target number, and the target operation node does not execute the contract-signing process with the target number. In some feasible implementation scenarios, the operation node may further send a broadcast message for notifying that the identity authentication of the user node fails, besides not performing the reduction processing, so that other operation nodes do not need to repeatedly authenticate their identities, thereby saving resources.
Hereinafter, each step shown in fig. 1 will be specifically described.
The embodiment of the invention has no special requirements on the number of user nodes and the number of operation nodes contained in the block chain, and can be one or more. Furthermore, depending on the telecommunication service, the user node and the operator node may have different rights, and the rights on the blockchain may be the same or different for different two user nodes or for different two operator nodes, depending on the service agreement between the user node and the operator node.
In the embodiment of the invention, the request for number portability is still initiated by the user node, and each operation node executes the contracting or contracting treatment based on the number portability request of the user node. The target operation node is a processing node of a target operator on a block chain, which the user node wants to transfer to, and is used for executing subscription processing according to the number portability request; and the current operation node is a processing node of the current operator which belongs to the current communication service of the user node and wants to transfer, and is used for executing the reduction processing according to the number portability request.
However, before the above-described subscription or contract-breaking process is performed, the identity of the user node needs to be verified. This is achieved based on the user node initiating the first information and the second information carried in the first broadcast message.
The essence of the first information is a number portability request, and the first information carries necessary information of number portability: identification information and a destination number of the destination operating node. The identification information of any node may be: the name of the node identifies the public key associated with the node.
In addition, the identification information of the current operation node can be carried.
And the second information is obtained by the user node through IBE processing on the first information by using the private key of the user node and the block connection parameter.
For ease of understanding, the blockchain parameters are specifically described below.
On the blockchain, each node synchronously stores a blockchain account book, that is, each node maintains a local blockchain account book which is synchronous with other nodes on the blockchain, so that when any node stores some information in the local blockchain account book maintained by itself, it is also shown that the information is synchronously stored in the blockchain account book maintained by each node on the blockchain.
The information in the blockchain ledger exists in a blockwise manner. The first block of the block chain account book is an established block of the block chain, which is substantially the first piece of recorded information in the block chain account book, and the established block is created by an initial person node of the block chain.
Specifically, the originator node in the block chain can create an created block of the block chain in the block chain by sending a broadcast message. The originator node may locally maintain identity information for each node on the blockchain, or may locally maintain identity information for only certain types of blockchain nodes.
Note that a node on the blockchain stores some information in a local storage location (unshared), which is different from storing some information in the local blockchain ledger. The information stored in the local blockchain account book is synchronous with the local blockchain account books stored in other blockchain nodes, and the information stored in the local nodes can be stored in the local storage position of the local nodes and can not be shared with other blockchain nodes.
For example, in a specific application scenario in which a number portability is implemented by a blockchain, an originator node may locally maintain operator information of the blockchain, which may be updated in real time. The operator information may exist in the form of a list. The founding block is used for recording the identification information of the founder node. In one possible implementation, the identification information of the originator node may include, but is not limited to: at least one of the name identification, public key and originator identity information of the originator node. Specifically, the originator node in this scenario may be a department of industry node.
In the embodiment of the present invention, the originator node further stores a block chain parameter of the block chain, which is also referred to as a common parameter Para 1. The originator node is provided with a trusted key generation center, which is capable of generating the blockchain parameters.
Specifically, in a possible implementation scenario, the originator node may broadcast the blockchain parameters generated by the trusted key generation center in the blockchain network, so that each node in the blockchain stores the blockchain parameters locally when receiving the broadcast message, so that each node in the blockchain can subsequently query or use the blockchain parameters based on the stored blockchain parameters.
At this time, as the user node, before executing S104, the following steps may be further included:
the user node receives a second broadcast message issued by an originator node of the block chain, wherein the second broadcast message carries the block chain parameters;
and the user node stores the block chain parameters in a local block chain account book.
Therefore, in this implementation scenario, when the user node executes the encryption step of S104, the local blockchain directory stored in the user node already stores the blockchain parameter, and therefore, the IBE processing may be performed by directly using the private key of the user node and the blockchain parameter.
In addition, in another possible implementation scenario, the user node does not store the blockchain parameters, and at this time, the user node may request the blockchain parameters from the originator node. Specifically, the user node encrypts the block chain parameter request message by using its own private key, and then sends the encrypted block chain parameter request message to the originator node, and then receives the block chain parameter fed back by the originator node, and stores the block chain parameter in the local.
In addition, in the embodiment of the present invention, it is considered that the user node may not determine which node is the originator node, and since the creation block is used to record the identification information of the originator node, the user node may first determine the creation block and determine the originator node according to the creation block. Specifically, the process of determining the created block may be: the user node generates a query request, the query request is used for querying a created block of the block chain, then the user node sends the query request to one or more nodes and receives block information fed back by the one or more nodes, therefore, if the user node receives the plurality of block information, the user node verifies whether the plurality of block information are consistent, and if so, the user node confirms the block indicated by the block information as the created block.
Otherwise, if the candidate blocks are inconsistent, determining the candidate blocks according to the received block information, and determining the created blocks according to the feedback times of each candidate block. For example, the candidate block with the largest number of feedbacks may be determined as the created block. Alternatively, for another example, the ratio of the feedback times of the candidate blocks to the sum of the feedback times of all the candidate blocks may be obtained, and a candidate block whose ratio of the total feedback times exceeds a preset threshold may be determined as the created block.
For example, if the ue receives 3 pieces of block information, the candidate blocks indicated by the 3 pieces of block information are: candidate block a, candidate block B and candidate block a, the feedback frequency of candidate block is 2, and the feedback frequency of candidate block B is 1. The user node may identify one candidate block a having the most number of feedbacks as a created block. Or, the user node may obtain the proportion of the feedback times of each candidate block in the total feedback times, which are: the candidate block a accounts for 2/3, and the candidate block B accounts for 1/3, wherein the ratio of the candidate block a in the total feedback times exceeds a preset threshold of 0.6, and the user node determines the candidate block a as a created block.
The node that the user node sends the query request may be all nodes on the local block chain, or may also be a part of nodes. In one possible implementation scenario, the node sending the query request may be a partial node within a preset range of the distance from the user node.
Through the above steps, the user node may obtain the blockchain parameter.
In addition, the private key of the user node itself is authentication information that the user node itself has. The private key of any blockchain node can be generated by a trusted key generation center in the originator node and is sent to the blockchain node after being encrypted by the private key of the originator node.
Each block chain node is provided with a pair of private key and public key, and when the public key is firstly accessed into the block chain along with the block chain link point and self identity information is broadcasted on the block chain, the public key is stored and recorded by each node on the block chain. Thus, after a certain blockchain node a encrypts certain information by its own private key, if the node B receiving the encrypted information can decrypt it by using its own stored public key of the node a, it is proved that the authentication of the node a passes, otherwise, the authentication does not pass.
Based on the above steps, the user' S point in executing step S104 can be expressed as the following equation:
M’=IBE(M,K,Para1)
wherein M' represents the second information, M represents the first information, K represents the private key of the user node, and Para1 represents the blockchain parameter.
After obtaining the second information, the user node sends a first broadcast message on the block chain, where the first broadcast message includes: the first information, the second information and the identification information of the user node. Since the first information already carries the destination number, the destination number may not be carried in the first broadcast message.
However, in a preferred implementation, considering that the operating node confirms its identity according to the destination number (whether itself is the destination operating node and whether itself is the current operating node of the destination number), in order to enable the operating node receiving the first broadcast message to quickly determine its identity and avoid unnecessary resource waste caused by extracting the first information and then confirming its identity by each operating node, the operating node may also carry the destination number in the first broadcast message.
In the specific implementation S106, the first broadcast message may be encrypted by a private key of the user node and then broadcast on the blockchain.
It should be noted that, in the embodiment of the present invention, all broadcast messages sent on the blockchain are recorded in the blockchain ledger by the mining node.
Specifically, each node on the block chain can be used as an ore digging node for ore digging. When a broadcast message is issued on the block chain, the mining node on the block chain acquires the mining right through a mining system, the mining node acquiring the mining right generates a new block from the broadcast message, the new block is recorded in the block chain account book and is synchronously sent to other nodes on the block chain, and the other nodes update the local block chain account book of the other nodes based on the synchronous message, so that the synchronous storage of the link points of each block is realized. The user node may participate in mining as a mining node, but whether the mining right can be obtained is not limited. In this process, the user node only needs to store the first broadcast message in the local blockchain ledger.
In contrast, after receiving the first broadcast message sent by the user node, the operation node on the blockchain needs to authenticate the user node that sent the first broadcast message. Specifically, referring to fig. 2, the method may include the following steps:
and S1102, the operation node performs IBE processing on the second information by using the target number and the block chain parameter to obtain third information.
This step can be specifically expressed as:
C=IBE(M’,X,Para1)
where M' represents the second information, C represents the third information, X represents the destination number, and Para1 represents the blockchain parameter.
The implementation manner of the operation node obtaining the block chain parameter Para1 is the same as that of the user node, and details are not described here.
In addition, if the first broadcast message carries the target number, the step can be directly executed; if the first broadcast message does not carry the target number, the operation node needs to extract the target number from the first message and then execute the IBE encryption step.
S1104, the operation node judges whether the first information is consistent with the third information; if yes, go to S1106A; if not, go to S1106B.
S1106A, the operator node verifies the identity of the user node.
S1106B, the identity verification of the user node by the operating node is failed.
It is to be understood that if the determination in S1104 is substantially: and judging whether M is satisfied or not.
If M is equal to C, the two are identical, and the subsequent step S112 may be executed to ensure that the identity of the user node initiating the number portability request is correct.
Otherwise, if the M is not equal to the C, the identity of the user node initiating the number portability request is proved to be wrong, and the identity verification is not passed. At this time, the method shown in fig. 2 may further include the steps of:
S1108B, the operation node sends a third broadcast message on the block chain, where the third broadcast message is used to notify the user node sending the first broadcast message that the authentication has failed.
In the implementation manner, only the operation node which verifies the authentication failure of the user node firstly needs to initiate the third broadcast message, and other operation nodes can not execute the authentication aiming at the first broadcast message any more, so that the resource occupation and consumption are reduced to a certain extent.
Besides the manner of executing S1108B shown in fig. 2, when the identity of the user node is verified to be abnormal, the operator node may also feed back a verification result to the user node, and notify the user node to refuse to execute number portability for the target number based on the verification node.
Alternatively, in addition to the manner of executing S1108B shown in fig. 2, the operator node may also perform no other processing when verifying that the identity of the user node is abnormal. That is, no feedback is given to the first broadcast message, and no number portability is performed on the first broadcast message.
Through the aforementioned authentication process, if the authentication of the user node passes, the operation node may perform the contracting or contracting process as follows:
the operation node confirms the identity of the operation node according to the first broadcast message;
if the operation node is confirmed to be the current operation node, the operation node carries out reduction processing on the target number;
and if the operation node is confirmed to be the target operation node, the operation node performs subscription processing on the target number.
Or, if it is determined that the mobile terminal is neither the current operation node nor the target operation node, the subscription or the reduction process for the target number does not need to be executed.
Specifically, in the embodiment of the present invention, the process of the operating node confirming its own identity according to the first broadcast message may be implemented by using the target number carried in the first message and the identification information of the target operating node.
In the blockchain, each operation node can maintain its own user information list, which contains the communication numbers (mobile phone numbers) of its own service users. Therefore, after confirming the identity of the user node, the operable node can compare the target number with the communication numbers of the operable node, and if the target number is one of the communication numbers of the operable node, the operable node determines that the operable node is the current operating node of the target number. Otherwise, determining that the node is not the current operation node.
In addition, each node in the block chain has self identification information, so that each operation node can compare the identification information of the target operation node with the self identification information, and if the identification information of the target operation node is consistent with the self identification information, the operation node is determined to be the target operation node; and if not, determining that the node is not the target operation node.
Based on the identity confirmation of each operation node on the block chain, how to realize the number portability process is simply explained from two aspects of the current operation node and the target operation node.
On one hand, the operation node determines itself to be the current operation node of the target number.
At this time, the current operating node stores the first broadcast message in the local blockchain ledger. Furthermore, it is determined from the first broadcast message that the destination number requires a number portability, i.e. a removal from the own telecommunications network. At this time, the current operating node performs the reduction processing on the target number.
And after the contract-release is successful, broadcasting a fourth broadcast message. At this time, the information that can be carried in the fourth broadcast message includes at least:
a destination number;
identification information of the current operating node;
and the current operation node releases the notification message of the communication contract with the target number.
In a possible implementation scenario, the identification information of the current operation node may include: the name of the current operating node identifies the public key of the current operating node.
For convenience of understanding, the embodiment of the present invention provides a feasible implementation manner for the current operation node to perform a reduction operation on the destination number according to the first broadcast message:
the current operation node receives the first broadcast message, verifies the user identity, and if the verification is passed, according to the first broadcast message, the current service of the target number is all subjected to suspension processing, and the currently provided service is subjected to charging settlement, and the result of the charging settlement can include: and (4) collecting unpaid service fees or returning unpaid expenses to the user corresponding to the target number. In addition, the charging settlement step can be executed on a block chain, or can be realized under the online condition, such as the on-the-spot settlement, the settlement by an electronic payment mode and the like. When the charging settlement step is completed, the current operation node may delete the target number from the user information list maintained by itself, and broadcast a fourth broadcast message on the block chain.
The fourth broadcast message sent by the current operation node may also be a message encrypted by the current operation node, and thus, the implementation manner of the user node receiving the fourth broadcast message may specifically be: and the user node receives the fourth broadcast message, decrypts the fourth broadcast message by using the public key of the current operation node, if the decryption is successful, the identity verification of the current operation node is passed, the user node obtains the decrypted fourth broadcast message, and the subsequent step of writing the fourth broadcast message into the local block chain account book is continuously executed. And if the decryption fails, the identity authentication of the sender of the fourth broadcast message fails, and the subsequent processing is not carried out on the fourth broadcast message.
And the mining node on the block chain excavates the fourth broadcast message and writes the fourth broadcast message into the block chain account book, so that the user node and other nodes on the block chain also write the fourth broadcast message into the local block chain account book.
On the other hand, the operation node determines itself as the target operation node of the target number.
At this time, the target operating node stores the first broadcast message in the local blockchain ledger. Furthermore, it is determined from the first broadcast message that the destination number requires a number portability, i.e. a subscription to the own telecommunications network.
In a practical application scenario, a target operation node may have multiple services, and therefore, when a number portability service is handled for a target number, the number portability service type of the target operation node needs to be further considered.
Thus, if the first broadcast message carries the target service type, the target operation node can directly sign the service agreement with the user to which the target number belongs according to the first broadcast message.
The signing process can be done online on the blockchain, i.e., information interaction is done on the blockchain. For example, in a possible implementation scenario, a target operation node obtains an unsigned number portability contract according to a first broadcast message, and sends the number portability contract determined without signing to a user node, the user node sends the signed number portability contract (electronic part) to the first operation node, and the first operation node adds a target number corresponding to the network-forwarding user to a user information list maintained by the first operation node according to the number portability contract, and broadcasts the target number on a block chain. Alternatively, the subscription may be performed online. Such as at least one of signing a number portability contract and signing an electronic number portability contract. On one hand, the on-the-spot signing is that the network switching user goes to any business hall of the first operator, and the on-the-spot signing and network switching contract is proposed and signed. On the other hand, the manner of signing an electronic number portability contract may include, but is not limited to: at least one of e-mail signing, short message signing and official network signing.
Or, if the first broadcast message does not carry the target service type to be handled, the user node may send a contract signing request to the target operation node in addition to sending the first broadcast message. The contract signing request may be sent to the target operator node separately or may be distributed over the blockchain in a broadcast message.
In this implementation scenario, if the user node knows the target service type that the user node needs to handle, the user node may directly send a contract signing request. Conversely, if the user node wants to select from the services currently supported by the target operation node to determine the target service type, the following steps may be performed:
a user node receives at least one candidate service sent by a target operation node according to a first broadcast message;
the user node determines a target service in at least one candidate service;
a user node generates a contract signing request aiming at a target service;
the user node encrypts the contract signing request and sends the encrypted contract signing request to the target operation node; alternatively, the user node sends a contract signing request to the target operation node.
That is, the target operation node feeds back at least one candidate service supported by the target operation node to the user node after receiving the first broadcast message, that is, the selection right of the target service type is given to the user node, which provides a larger selection space for the user node, and the user node can select from the service types currently supported by the target operation node, thereby avoiding the trouble that the service type selected by the user node subjectively does not exist and the target service type needs to be confirmed repeatedly, and improving the service quality to a certain extent.
After the subscription is finished, the target operation node issues a fifth broadcast message on the block chain, where the fifth broadcast message may be issued after being encrypted by the private key of the target operation node.
In this embodiment of the present invention, the portable information in the fifth broadcast message at least includes:
a destination number;
the target number and the signed number portability contract of the target operation node;
identification information of the target operational node.
As mentioned above, in one implementation scenario, the identification information of the target operator node may include, but is not limited to: and the name identification and the public key of the first operation node.
In addition, as described above, the mining node on the blockchain mines the fifth broadcast message, and the mining node writes the fifth broadcast message into the blockchain ledger, so that the user node and other nodes on the blockchain also write the fifth broadcast message into the local blockchain ledger.
It should be noted that, in the embodiment of the present invention, the step of performing the contract-release for the current operation node and the step of performing the contract-signing for the target operation node are not particularly limited, and the execution order of the two steps depends on the processing time limit of the current operation node and the target operation node.
In a preferred implementation process, the precondition for the target operation node to sign a subscription with the user to which the target number belongs may be: the first broadcast message and the fourth broadcast message are received. That is, after the target number releases the contract with its current operation node, a new contract signing step is executed to avoid the situation that one target number exists in the user information lists of two operation nodes at the same time.
Through the number portability and network forwarding process, the number portability and network forwarding process of the target number can be recorded in a block chain account book, and a user node can actively contact a target operation node to take a card offline in specific implementation; or, the user node may take the card offline when receiving the notification of the target operation node. Wherein, the offline card-taking mode at least comprises: and taking in the same place or taking in the mail.
In a scenario where the target operation node notifies the user node to take the card, the notification may be sent by the target operation node, or may be sent by any business hall under the target operation node, or may be notified by a staff in the business hall.
In addition, in a possible implementation scenario, the mobile phone card obtained by the user node may be an Integrated Management Information System (IMIS) card, and its representation form may include but is not limited to: a soft Subscriber Identity Module (SIM) or a Universal Subscriber Identity Module (USIM). Since the service is a number portability service, the communication number (destination number) of the IMIS card is not changed.
During or after the card is taken, the target operator can activate or activate the mobile phone card, and the user node can utilize the original mobile phone card to enjoy the telecommunication service provided by the target operator.
In addition, in one possible implementation scenario, any user node in the blockchain may also apply for becoming an operation node, that is, for acquiring operation qualification on the blockchain. At this time, the originator node in the blockchain may serve as a reviewer of the operation qualification to review the operation qualification of the user node.
At this time, the method may further include the steps of:
the user node confirms the created blocks of the block chain;
the user node acquires identification information of the founder node recorded in the founding block;
the user node sends an operation application request to the originator node according to the identification information of the originator node, wherein the operation application request at least comprises: the block chain identification of the user node and the operation registration information of the user node;
the user node receives a sixth broadcast message sent by the originator node, wherein the sixth broadcast message is used for indicating that the user node has operation qualification;
and the user node writes the sixth broadcast message into the local block chain account book.
The method for the user node to confirm the created block and the method for the user node to confirm the originator node by the identification information recorded in the created block are the same as the above, and are not repeated.
The examination and verification of the originator node on the user node are generally executed based on the active application of the user node, and the user node needs to carry identification information of the user node and operation registration information when carrying out an operation application request. The operation registration information may include the following information: the company name of the user node, the legal representative of the company (name + identification number), the registration capital, the registration address, the enterprise registration number, the establishment time and other information.
The embodiment of the invention has no special limitation on the mode and process of auditing the operation qualification of the user node by the originator node.
And when the result of the verification performed by the originator node according to the operation application request is that the verification is passed, the originator node broadcasts a sixth broadcast message on the block chain and records the sixth broadcast message in a local block chain account book. In addition, the originator node adds the identification information of the user node into the operator information of the local block chain maintained by the originator node.
In contrast, the user node and other nodes on the blockchain receive the sixth broadcast message and record the sixth broadcast message in the local blockchain account book.
In a possible implementation scenario, the information carried in the sixth broadcast message at least includes:
identification information of the user node;
a notification message that the user node has operation qualification;
identification information of the originator node.
And, as previously mentioned, in one possible implementation scenario, the identification information of the node includes: name identification and public key of the node.
In addition, the sending and receiving of the sixth broadcast message may be implemented according to an asymmetric encryption algorithm, which is not described in detail.
Or, if the result of the originator node performing the audit according to the operation application request is that the audit is not passed, the originator node may feed back a notification message that the audit is not passed to the user node. The notification message may be sent to the user node separately, or may be sent in a broadcast message and recorded in the blockchain ledger. In addition, the private key of the user can be encrypted and then transmitted during transmission.
The technical scheme provided by the embodiment of the invention at least has the following technical effects:
according to the information processing scheme provided by the invention, the number portability and the network forwarding are realized by using the block chain, so that the broadcast data in the whole number portability process can be recorded in the block chain account book, the traceability of the whole number portability process is ensured, and the characteristics of non-tampering and non-delectable data in the block chain account book can be used as the basis for division of responsibility attribution when an abnormal condition occurs; and the embodiment of the invention further utilizes an IBE mechanism to verify the identity of the user node, and only executes number portability aiming at the target number after the identity passes the verification, thus avoiding the situation that the identity is falsely used as others to carry out number portability to a certain extent due to utilization by lawless persons, and improving the safety and stability of the number portability process.
Example two
Based on the information processing method provided in the first embodiment, the embodiment of the present invention further provides an embodiment of an apparatus for implementing each step and method in the above method embodiment.
In one aspect, an embodiment of the present invention provides an information processing apparatus, referring to fig. 3, the information processing apparatus 300 includes:
an obtaining module 31, configured to obtain first information, where the first information is used to request that a communication service of a target number is transferred from a current operation node to a target operation node;
the processing module 32 is configured to perform identity-based encryption IBE processing on the first information by using a private key of the processing module and a block chain parameter to obtain second information;
a sending module 33, configured to send a first broadcast message on the block chain, where the first broadcast message at least carries the following messages: the identification information of the user node, the first information and the second information.
Further, the information processing apparatus 300 (not shown in fig. 3) may further include:
the receiving module is used for receiving a second broadcast message issued by an originator node of the block chain, and the second broadcast message carries the block chain parameters;
and the storage module is used for storing the block chain parameters in a local block chain account book.
Also, an embodiment of the present invention provides an information processing apparatus, and referring to fig. 4, the message processing apparatus 400 includes:
a memory 410 for storing a computer program;
a processor 420 for executing a computer program;
a transceiver 430 for information transmission with other nodes;
the processor 420 is configured to obtain first information, where the first information is used to request that a communication service of a target number is transferred from a current operation node to a target operation node;
the processor 420 is further configured to perform identity-based encryption IBE processing on the first information by using a private key of the processor and the block chain parameter to obtain second information;
a transceiver 430, configured to send a first broadcast message on a block chain, where the first broadcast message at least carries the following messages: identification information of the user, the first information and the second information.
In a specific implementation scenario, the transceiver 430 is further configured to receive a second broadcast message issued by an originator node of the blockchain, where the second broadcast message carries blockchain parameters;
the processor 420 is further configured to save the blockchain parameters in a local blockchain ledger.
On the other hand, an embodiment of the present invention provides another information processing apparatus, please refer to fig. 5, where the message processing apparatus 500 includes:
a receiving module 51, configured to receive a first broadcast message sent by a user node on a block chain, where the first broadcast message at least carries the following messages: the system comprises identification information of a user node, first information and second information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to the target operation node, and the second information is obtained by carrying out identity-based encryption IBE (identity-based encryption) processing on the first information by using a private key and a block chain parameter of the user node;
the verification module 52 is configured to verify the identity of the user node by using the first information and the second information;
and the processing module 53 is configured to perform a subscription or contract-clearing process on the target number according to the first broadcast message if the verification is passed.
In a specific implementation scenario, the verification module 52 is specifically configured to:
IBE processing is carried out on the second information by using the target number and the block chain parameter to obtain third information;
judging whether the first information is consistent with the third information;
and if the identity of the user node is consistent with the identity of the user node, the identity authentication of the user node is passed.
In another specific implementation scenario, the processing module 53 is specifically configured to:
according to the first broadcast message, self identity is confirmed;
if the mobile terminal is confirmed to be the current operation node, the target number is subjected to contracting resolving processing;
and if the self is confirmed to be the target operation node, performing subscription processing on the target number.
Also, an embodiment of the present invention provides an information processing apparatus, and referring to fig. 6, the message processing apparatus 600 includes:
a memory 610 for storing a computer program;
a processor 620 for executing computer programs;
a transceiver 630, configured to perform information transmission with other nodes;
the transceiver 630 is configured to receive a first broadcast message sent by a user node on a block chain, where the first broadcast message at least carries the following messages: the system comprises identification information of a user node, first information and second information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to the target operation node, and the second information is obtained by carrying out identity-based encryption IBE (identity-based encryption) processing on the first information by using a private key and a block chain parameter of the user node;
a processor 620, configured to verify an identity of the user node by using the first information and the second information;
the processor 620 is further configured to perform a subscription or a contract-release process on the destination number according to the first broadcast message if the verification is passed.
In a specific implementation scenario, the processor 620 is specifically configured to:
IBE processing is carried out on the second information by using the target number and the block chain parameter to obtain third information;
judging whether the first information is consistent with the third information;
and if the identity of the user node is consistent with the identity of the user node, the identity authentication of the user node is passed.
In another specific implementation scenario, the processor 620 is specifically configured to:
according to the first broadcast message, self identity is confirmed;
if the mobile terminal is confirmed to be the current operation node, the target number is subjected to contracting resolving processing;
and if the self is confirmed to be the target operation node, performing subscription processing on the target number.
Furthermore, an embodiment of the present invention provides a readable storage medium, on which a computer program is stored,
the computer program is executed by a processor to implement the method according to any of the implementations performed by any of the blockchain nodes in embodiment one.
Since each module in this embodiment can execute the method shown in the first embodiment, reference may be made to the related description of the first embodiment for a part of this embodiment that is not described in detail.
The technical scheme provided by the embodiment of the invention at least has the following technical effects:
according to the information processing scheme provided by the invention, the number portability and the network forwarding are realized by using the block chain, so that the broadcast data in the whole number portability process can be recorded in the block chain account book, the traceability of the whole number portability process is ensured, and the characteristics of non-tampering and non-delectable data in the block chain account book can be used as the basis for division of responsibility attribution when an abnormal condition occurs; and the embodiment of the invention further utilizes an IBE mechanism to verify the identity of the user node, and only executes number portability aiming at the target number after the identity passes the verification, thus avoiding the situation that the identity is falsely used as others to carry out number portability to a certain extent due to utilization by lawless persons, and improving the safety and stability of the number portability process.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (11)

1. An information processing method characterized by comprising:
a user node acquires first information, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to the target operation node, and the first information carries identification information of the target operation node, the target number and the identification information of the current operation node;
the user node utilizes a self private key and the block chain parameter to carry out identity-based encryption IBE processing on the first information to obtain second information;
the user node sends a first broadcast message on the block chain, so that an operation node performs subscription or contract-release processing on the target number according to the first broadcast message, wherein the first broadcast message at least carries the following messages: the identifier information of the user node, the first information and the second information, and the block chain includes at least two operation nodes, where the block chain at least includes: a current operator node and a target operator node.
2. The method of claim 1, further comprising:
the user node receives a second broadcast message issued by an originator node of the block chain, wherein the second broadcast message carries the block chain parameters;
and the user node stores the block chain parameters in a local block chain account book.
3. An information processing method characterized by comprising:
an operation node receives a first broadcast message sent by a user node on a block chain, wherein the first broadcast message at least carries the following messages: the method includes the following steps that identification information of a user node, first information and second information are obtained, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to the target operation node, the second information is obtained after identity-based encryption IBE processing is carried out on the first information by using a private key of the user node and a block chain parameter, the first information carries the identification information of the target operation node, the target number and the identification information of the current operation node, and the block chain comprises at least two operation nodes, wherein the method at least comprises the following steps: a current operation node and a target operation node;
the operation node verifies the identity of the user node by using the first information and the second information;
and if the verification is passed, the operation node performs subscription or contract-release processing on the target number according to the first broadcast message.
4. The method of claim 3, wherein the operator node verifies the identity of the user node using the first information and the second information, comprising:
the operation node performs IBE processing on the second information by using the target number and the block chain parameter to obtain third information;
the operation node judges whether the first information is consistent with the third information;
and if the identity of the user node is consistent with the identity of the user node, the operating node passes the identity verification of the user node.
5. The method of claim 3 or 4, wherein the operating node performs a subscription or a release process on the target number according to the first broadcast message, and the subscription or release process comprises:
the operation node confirms the self identity according to the first broadcast message;
if the operation node is confirmed to be the current operation node, the operation node carries out reduction processing on the target number;
and if the operation node is confirmed to be the target operation node, the operation node performs subscription processing on the target number.
6. An information processing apparatus characterized by comprising:
a memory for storing a computer program;
a processor for executing the computer program;
the transceiver is used for carrying out information transmission with other nodes;
the processor is configured to acquire first information, where the first information is used to request that a communication service of a target number is transferred from a current operation node to a target operation node, and the first information carries identification information of the target operation node, the target number, and identification information of the current operation node;
the processor is further configured to perform identity-based encryption IBE processing on the first information by using a private key of the processor and a block chain parameter to obtain second information;
the transceiver is configured to send a first broadcast message on the block chain, so that an operation node performs subscription or contract release processing on the target number according to the first broadcast message, where the first broadcast message at least carries the following information: the block chain includes at least two operation nodes, wherein the block chain at least includes: a current operator node and a target operator node.
7. The apparatus of claim 6,
the transceiver is further configured to receive a second broadcast message issued by an originator node of the block chain, where the second broadcast message carries the block chain parameter;
the processor is further configured to store the blockchain parameter in a local blockchain ledger.
8. An information processing apparatus characterized by comprising:
a memory for storing a computer program;
a processor for executing the computer program;
the transceiver is used for carrying out information transmission with other nodes;
the transceiver is configured to receive a first broadcast message sent by a user node on a block chain, where the first broadcast message at least carries the following messages: the method includes the following steps that identification information of a user node, first information and second information are obtained, wherein the first information is used for requesting to transfer a communication service of a target number from a current operation node to the target operation node, the second information is obtained after identity-based encryption IBE processing is carried out on the first information by using a private key of the user node and a block chain parameter, the first information carries the identification information of the target operation node, the target number and the identification information of the current operation node, and the block chain comprises at least two operation nodes, wherein the method at least comprises the following steps: a current operation node and a target operation node;
the processor is configured to verify an identity of the user node by using the first information and the second information;
and the processor is further configured to perform subscription or contract release processing on the target number according to the first broadcast message if the verification is passed.
9. The apparatus of claim 8, wherein the processor is specifically configured to:
the target number and the block chain parameter are used for carrying out IBE processing on the second information to obtain third information;
judging whether the first information is consistent with the third information;
and if the identity of the user node is consistent with the identity of the user node, the identity of the user node is verified.
10. The apparatus according to claim 8 or 9, wherein the processor is specifically configured to:
confirming the identity of the user according to the first broadcast message;
if the target number is confirmed to be the current operation node, carrying out reduction processing on the target number;
and if the target operation node is confirmed to be the target operation node, performing subscription processing on the target number.
11. A computer-readable storage medium, having stored thereon a computer program,
the computer program is executed by a processor to implement the method of any one of claims 1 to 5.
CN201910006206.8A 2019-01-04 2019-01-04 Information processing method and device, and storage medium Active CN109525983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910006206.8A CN109525983B (en) 2019-01-04 2019-01-04 Information processing method and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910006206.8A CN109525983B (en) 2019-01-04 2019-01-04 Information processing method and device, and storage medium

Publications (2)

Publication Number Publication Date
CN109525983A CN109525983A (en) 2019-03-26
CN109525983B true CN109525983B (en) 2021-09-28

Family

ID=65797574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910006206.8A Active CN109525983B (en) 2019-01-04 2019-01-04 Information processing method and device, and storage medium

Country Status (1)

Country Link
CN (1) CN109525983B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636037B (en) * 2019-07-02 2021-11-26 中国联合网络通信集团有限公司 One-number multi-card service application method, user node, operator system and block chain
CN110248351B (en) * 2019-07-02 2021-12-03 中国联合网络通信集团有限公司 Communication method based on block chain and number portability home location register
CN110430067A (en) * 2019-07-15 2019-11-08 杭州复杂美科技有限公司 For reducing method and system, equipment and the storage medium of block repeated broadcast
CN112449350B (en) * 2019-08-30 2022-11-18 华为技术有限公司 Method, device and system for providing service for terminal by using block chain
CN111612591A (en) * 2020-05-28 2020-09-01 中国联合网络通信集团有限公司 Network-switching user credit rating method and device, control equipment and storage medium
CN115296943B (en) * 2022-07-18 2024-04-16 杭州趣链科技有限公司 Message broadcasting method, device, server and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459909A (en) * 2007-12-12 2009-06-17 上海粱江通信系统有限公司 System and method for realizing number carryover service between mobile networks
CN101730096A (en) * 2008-10-10 2010-06-09 中国移动通信集团公司 Safety management method, device and equipment for number portability
CN102170635A (en) * 2011-04-20 2011-08-31 中国联合网络通信集团有限公司 Method and system for realizing mobile number portability of value-added service
CN103037362A (en) * 2012-12-25 2013-04-10 中国联合网络通信集团有限公司 Mobile network number carrying inquiring method and mobile network number carrying inquiring device
CN105813064A (en) * 2014-12-31 2016-07-27 华为技术有限公司 Service opening processing method and network element
CN108184233A (en) * 2017-12-01 2018-06-19 中国联合网络通信集团有限公司 A kind of number carrying method and system
CN108989048A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 Cryptographic key distribution method, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190268466A1 (en) * 2016-07-28 2019-08-29 Nec Corporation Number portability information management system
US10171992B1 (en) * 2018-06-22 2019-01-01 International Business Machines Corporation Switching mobile service provider using blockchain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459909A (en) * 2007-12-12 2009-06-17 上海粱江通信系统有限公司 System and method for realizing number carryover service between mobile networks
CN101730096A (en) * 2008-10-10 2010-06-09 中国移动通信集团公司 Safety management method, device and equipment for number portability
CN102170635A (en) * 2011-04-20 2011-08-31 中国联合网络通信集团有限公司 Method and system for realizing mobile number portability of value-added service
CN103037362A (en) * 2012-12-25 2013-04-10 中国联合网络通信集团有限公司 Mobile network number carrying inquiring method and mobile network number carrying inquiring device
CN105813064A (en) * 2014-12-31 2016-07-27 华为技术有限公司 Service opening processing method and network element
CN108184233A (en) * 2017-12-01 2018-06-19 中国联合网络通信集团有限公司 A kind of number carrying method and system
CN108989048A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 Cryptographic key distribution method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN109525983A (en) 2019-03-26

Similar Documents

Publication Publication Date Title
CN109525983B (en) Information processing method and device, and storage medium
CN109474926B (en) Block chain-based number portability method and device and storage medium
CN109451446B (en) Number portability method, device and equipment
CN109756889B (en) Block chain-based group number portability method and system
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN109673010B (en) Block chain-based number portability method and device and storage medium
US9781255B1 (en) Authentication of phone call origination
JPWO2018020943A1 (en) Number portability information management system
US9270700B2 (en) Security protocols for mobile operator networks
CN110324815B (en) One-number-multi-card opening method, server, terminal and block chain network system
JP2007535193A5 (en)
JP2007535193A (en) Peer-to-peer telephone system and method
CN101383698A (en) Session cipher key distributing method and system
CN103796151B (en) The method and system that ad content is pushed
CN109660984B (en) Number portability method, equipment and computer readable storage medium
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111866042B (en) Method and device for synchronizing telecommunication account number change
CN109743699B (en) Communication method and system based on block chain
CN102421098A (en) User authentication method, device and system
US11375065B2 (en) Control information for public switched telephone network (PSTN) using blockchain system
JP2005267433A (en) Network service system using user temporary identifier
CN109639715B (en) Method, device and equipment for avoiding double-flower attack and computer readable storage medium
CN102149079B (en) Method, device and system for obtaining user identity identifier
US10652746B2 (en) Secure device access token
CN110324824B (en) Auxiliary card adding method, user terminal and block chain network system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant