CN109788471A - A kind of information Anti-theft method, server and computer readable storage medium - Google Patents

A kind of information Anti-theft method, server and computer readable storage medium Download PDF

Info

Publication number
CN109788471A
CN109788471A CN201711105360.8A CN201711105360A CN109788471A CN 109788471 A CN109788471 A CN 109788471A CN 201711105360 A CN201711105360 A CN 201711105360A CN 109788471 A CN109788471 A CN 109788471A
Authority
CN
China
Prior art keywords
terminal
identity
voice messaging
information
obtains
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711105360.8A
Other languages
Chinese (zh)
Inventor
洪亮
王显光
邓思兵
牛犇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201711105360.8A priority Critical patent/CN109788471A/en
Priority to PCT/CN2018/107552 priority patent/WO2019091238A1/en
Publication of CN109788471A publication Critical patent/CN109788471A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The embodiment of the invention discloses a kind of information Anti-theft methods, which comprises receives the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, the first identity of the first terminal is carried in the acquisition request;Obtain the corresponding communication feature information of first identity;If the communication feature information is matched with presupposed information, corresponding first voice messaging of first identity is obtained;First voice messaging is sent to the first terminal.The embodiment of the present invention also discloses a kind of server and computer readable storage medium simultaneously.

Description

A kind of information Anti-theft method, server and computer readable storage medium
Technical field
The present invention relates to the technology of the voice mail Anti-theft in field of communication technology more particularly to a kind of information Anti-thefts Method, server and computer readable storage medium.
Background technique
With the development of telecommunication network, user generallys use the Voice Mail Service of operator's offer to guarantee that terminal is being come Voice messaging can also be received in the case that electricity is not smooth.But in existing voice mail service, criminal can be used The mode of calling number camouflage, trespasses other people voice mails, eavesdrops or steal the information content in voice mail, cause to use The privacy leakage at family or even biggish property loss.
The prior art generallys use the mode of setting user password, to prevent privacy of user from revealing and reduce the property of user Loss.But it is practical in the scheme of setting user password, operating process is more numerous;And most of user accesses language in terminal Be not provided with user password when message case, however it remains the problem of privacy of user is revealed, information in voice mail there are still Security risk.
Summary of the invention
In order to solve the above technical problems, an embodiment of the present invention is intended to provide a kind of information Anti-theft method, server and meters Calculation machine readable storage medium storing program for executing, there are security risks for the information for solving the problems, such as in voice mail in the prior art, realize base Voice messaging is sent in the identity of the communications status and terminal communication object of the terminal for obtaining voice messaging, is simplified Operating process, and improve the safety of the information in voice mail.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
A kind of information Anti-theft method, which comprises
Receive the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, it is carried in the acquisition request There is the first identity of the first terminal;
Obtain the corresponding communication feature information of first identity;
If the communication feature information is matched with presupposed information, the corresponding first voice letter of first identity is obtained Breath;
First voice messaging is sent to the first terminal.
It is optionally, described to obtain the corresponding communication feature information of first identity, comprising:
Based on first identity, the working condition of the first terminal is detected;
If the working condition of the first terminal is communications status, the second terminal communicated with the first terminal is obtained Second identity obtains the communication feature information.
Optionally, the method also includes:
If the communication feature information and the presupposed information mismatch, generates warning message and send the warning message To the first terminal.
Optionally, the method also includes:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to institute State first terminal.
Optionally, the generation warning message and after sending the warning message to the first terminal, further includes:
Based on the acquisition request, the address information of the acquisition request and storage are obtained.
Optionally, before the acquisition request for obtaining voice messaging for receiving first terminal transmission, comprising:
When the first terminal and third terminal not can be carried out communication, receives the third terminal and be sent to described first First voice messaging of terminal;
Generate encryption key and decruption key;
First voice messaging is encrypted using the encryption key, obtains the second voice messaging;
According to the corresponding relationship between second voice messaging and first identity, second voice is stored Information;
Default mark is generated based on the decruption key, and sends the default mark to the first terminal.
Optionally, the generation encryption key and decruption key, comprising:
Obtain key parameter;
Based on the key parameter, the encryption key and the decruption key are generated using preset algorithm.
It is optionally, described to obtain the corresponding communication feature information of first identity, comprising:
Obtain default mark corresponding with first identity;
It identifies the decruption key in the default mark, obtains the communication feature information.
Optionally, if the communication feature information is matched with presupposed information, it is corresponding to obtain first identity The first voice messaging, comprising:
Obtain the second voice messaging corresponding with first identity;
If the decruption key is matched with the encryption key of second voice messaging, using the decruption key to described Second voice messaging is decrypted, and obtains first voice messaging;Wherein, the presupposed information includes the second voice letter The encryption key of breath.
It is optionally, described to obtain default mark corresponding with first identity, comprising:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, second communicated with the first terminal is obtained eventually Second identity at end;
If second identity is identical as the default mark, the default mark is obtained.
A kind of server, the server include: the first receiving unit, first acquisition unit, first processing units and hair Send unit;Wherein:
First receiving unit is configured to receive the acquisition request for being used to obtain voice messaging that first terminal is sent; Wherein, the first identity of the first terminal is carried in the acquisition request;
The first acquisition unit is configured to obtain the corresponding communication feature information of first identity;
The first processing units match if being configured to the communication feature information with presupposed information, obtain described first Corresponding first voice messaging of identity;
The transmission unit is configured to send first voice messaging to the first terminal.
Optionally, the first acquisition unit includes: that detection module and first obtain module;Wherein:
The detection module is configured to first identity, detects the working condition of the first terminal;
It is described first obtain module, if be configured to the first terminal working condition be communications status, obtain with it is described Second identity of the second terminal of first terminal communication, obtains the communication feature information.
Optionally, the server further include: the second processing unit;Wherein:
Described the second processing unit generates police if being configured to the communication feature information and presupposed information mismatch It accuses information and sends the warning message to the first terminal.
Optionally, described the second processing unit, is additionally configured to:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to institute State first terminal.
Optionally, after described the second processing unit, further includes: third processing unit;Wherein:
The third processing unit, is configured to the acquisition request, obtains the address information of the acquisition request, deposits Store up the address information.
It optionally, include: the second receiving unit, generation unit, encryption unit, storage list before first receiving unit Member and fourth processing unit;Wherein:
Second receiving unit is configured to receive institute when the first terminal not can be carried out communication with third terminal State the first voice messaging that third terminal is sent to the first terminal;
The generation unit is configured to generate encryption key and decruption key;
The encryption unit is configured to encrypt first voice messaging using the encryption key, obtains the Two voice messagings;
The storage unit is configured to according to the corresponding pass between second voice messaging and first identity System stores second voice messaging;
The fourth processing unit is configured to the decruption key and generates default mark, and sends the pre- bidding Know to the first terminal.
Optionally, the generation unit includes: the second acquisition module and generation module;Wherein:
Described second obtains module, is configured to obtain key parameter;
The generation module is configured to the key parameter, generates the encryption key and institute using preset algorithm State decruption key.
Optionally, the first acquisition unit includes: that third obtains module and identification module;Wherein:
The third obtains module, is configured to obtain default mark corresponding with first identity;
The identification module is configured to identify the decruption key in the default mark, obtains the communication feature information.
Optionally, the first processing units include: the 4th acquisition module, first processing module and Second processing module; Wherein:
Described 4th obtains module, is configured to obtain the second voice messaging corresponding with first identity;
The first processing module, if being configured to the encryption key of the decruption key Yu second voice messaging Match, second voice messaging is decrypted using the decruption key, obtains first voice messaging;Wherein, described Presupposed information includes the encryption key of second voice messaging.
Optionally, the third obtains module concrete configuration are as follows:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, second communicated with the first terminal is obtained eventually Second identity at end;
If second identity is identical as the default mark, the default mark is obtained.
A kind of computer readable storage medium is stored with the thief-proof program fetch of information on the computer readable storage medium, The step of information thief-proof program fetch realizes information Anti-theft method as described in any one of the above embodiments when being executed by processor.
Information Anti-theft method, server and computer readable storage medium provided by the embodiment of the present invention receive After the acquisition request for obtaining voice messaging that first terminal is sent, the corresponding communication special reference of the first identity is obtained Breath obtains corresponding first voice messaging of the first identity, and send first if communication feature information is matched with presupposed information Voice messaging is to first terminal;In this way, server to the corresponding communication feature information of the first identity of first terminal into It is concurrent just to obtain corresponding first voice messaging of the first identity when the communication feature information meets presupposed information for row analysis It send to first terminal, solves the problems, such as the information in voice mail in the prior art there are security risk, realize and be based on obtaining It takes the identity of the communications status and terminal communication object of the terminal of voice messaging to send voice messaging, simplifies operation Process, and improve the safety of the information in voice mail.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of information Anti-theft method provided in an embodiment of the present invention;
Fig. 2 is a kind of information Anti-theft method application scenarios schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.
The embodiment of the present invention provides a kind of information Anti-theft method, shown referring to Fig.1, method includes the following steps:
Step 101 receives the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in acquisition request.
Specifically, the acquisition request for obtaining voice messaging that step 101 receives first terminal transmission can be by servicing Device is realized.The acquisition request for obtaining voice messaging that first terminal is sent can be first terminal and receive user's transmission Slave server in obtain voice messaging operational order after, respond the operational order and to server send;The acquisition refers to It enables for obtaining the corresponding voice messaging of the first identity with first terminal.Voice messaging can be voicemail message etc. Information.
Step 102 obtains the corresponding communication feature information of the first identity.
Specifically, step 102 obtains the corresponding communication feature information of the first identity can be realized by server.Its In, when the corresponding communication feature information of the first identity can be intended to indicate that the working condition of first terminal is communications status The key information that the identity of corresponding communication object either server is obtained based on the identity of the communication object.
If step 103, communication feature information are matched with presupposed information, the corresponding first voice letter of the first identity is obtained Breath.
If obtaining the first identity corresponding first specifically, step 103 communication feature information is matched with presupposed information Voice messaging can be realized by server.Wherein, when communication feature information is the identity of communication object, presupposed information For preset identification information, for making first terminal obtain the voice messaging stored in server according to the presupposed information;When logical When believing that characteristic information is the key information according to the identity of communication object, presupposed information is letter corresponding with the key information Breath, such as when the key information is encryption key, presupposed information is corresponding decruption key.
Step 104 sends the first voice messaging to first terminal.
Specifically, step 104 sends the first voice messaging to first terminal can be realized by server.First voice letter Breath is voice messaging corresponding with first terminal, is that server receives the voice messaging that other users are sent to first terminal, And stored based on the corresponding relationship between voice messaging and first terminal, when the corresponding voice of first terminal request When information, server carries out certification analysis to first terminal, and the first voice messaging is sent to the after certification analysis passes through One terminal.The mode specifically sent, which can be, is directly sent to terminal for voice messaging packet, or plays voice messaging to first Terminal.
Information Anti-theft method provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain language After the acquisition request of message breath, the corresponding communication feature information of the first identity is obtained, if communication feature information and default letter Breath matching obtains corresponding first voice messaging of the first identity, and sends the first voice messaging to first terminal;In this way, Server analyzes the corresponding communication feature information of the first identity of first terminal, full in the communication feature information The first identity corresponding first voice messaging is just obtained when sufficient presupposed information and is sent to first terminal, solves existing skill There is security risk in the information in art in voice mail, realize the communications status based on the terminal for obtaining voice messaging And the identity of terminal communication object sends voice messaging, simplifies operating process, and improve in voice mail The safety of information.
Based on previous embodiment, the embodiment of the present invention provides a kind of information Anti-theft method, method includes the following steps:
Step 201, server receive the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in acquisition request.
Specifically, being the terminal of the first user with first terminal, the first identity of first terminal is first terminal The number of voice mail, to be illustrated for the telephone number of first terminal, the first user dials acquisition using first terminal The voice mail access code access server of voice messaging, while acquisition request is sent to server.
Step 202, server are based on the first identity, detect the working condition of first terminal.
Specifically, the working condition of first terminal can be the call state of mobile phone.Server is from home location register The call state of the corresponding first terminal of the first identity of inquiry in (Home Location Register, HLR).
Wherein, after server executes step 202, it can choose and execute step 203-208 or selection execution step 209- 210;If the working condition of first terminal is that communications status can choose execution step 203-208, if the work shape of first terminal State is that idle state can choose execution step 209-210;
If step 203, the working condition of first terminal are communications status, server obtains second communicated with first terminal Second identity of terminal, obtains communication feature information.
Specifically, second terminal can be server, it is also possible to other terminals in addition to first terminal.Work as first terminal Working condition be that server is from Visited Location Registor (Visiting Location Register, VLR)/shifting when the line is busy The real-time calls state of first terminal is inquired in dynamic switching centre (Mobile Switching Center, MSC) server, really Second identity of the second terminal that fixed and first terminal is conversed, obtains communication feature information.
Step 204, server judge whether communication feature information matches with presupposed information.
Wherein, after server executes step 204, it can choose and execute step 205-208 or step 209-210, if Communication feature information and presupposed information match selection execute step 205-208, if communication feature information and presupposed information mismatch Selection executes step 209-210;
If step 205, communication feature information are matched with presupposed information, server obtains the first identity corresponding first Voice messaging.
Specifically, presupposed information is voice mail access code, can be fixed and invariable, i.e., the terminal of all users is being opened After logical Voice Mail Service, user's using terminal establishes connection by dialing the voice mail access code and server, then takes Business device obtains the identification information of terminal after establishing communication linkage to determine voice messaging.
In other embodiments of the present invention, presupposed information is voice mail access code, be can be according to voicemail message It changes.
When the second identity of the second terminal conversed with first terminal is voice messaging access code, show One terminal is currently strictly to be communicated with server, this calling is legal, obtains the corresponding with the first identity of storage The first voice messaging.
Step 206, server send the first voice messaging to first terminal.
Specifically, server can be sent to first terminal in the form of compress speech packet with by the first voice messaging, it can also To be that server plays first voice messaging, first terminal answers first voice messaging by first terminal earpiece.
If step 207, communication feature information and presupposed information mismatch, server generates warning message and sends warning letter It ceases to first terminal.
Specifically, if the identity of the second terminal of first terminal current talking is not voice mail access code It is to have illegal user will using technological means to determine first terminal currently there is no the first voice messaging of request storage Illegal number disguises oneself as the first identity of first terminal, attempts the corresponding voice of the first identity for obtaining first terminal Information.At this point, server judge this time to call be it is illegal, warning message can be generated, and " such as your identity information is currently stolen With, it is noted that property safety ", and it is sent to first terminal, while terminating and the calling procedure between first identity.
Step 208, server are based on acquisition request, obtain the address information of the acquisition request and storage.
Specifically, acquisition request of the server according to sending, can determine the corresponding VLR of the acquisition request, Original Signaling Point Encode (Original Point Code, OPC) and/or session initiation protocol (Session Initiation Protocol, The calling address information such as SIP), and stored, it is analyzed so as to subsequent.
If step 209, the working condition of first terminal are idle state, server generates warning message and sends warning letter It ceases to first terminal.
Specifically, when first terminal call state be idle state, i.e., first terminal currently with any terminal not Carry out communication process, it is illegal for showing this time to call, can be generated warning message " such as your identity information is currently stolen, Please note that property safety ", and it is sent to first terminal, while terminating and the calling procedure between first identity.
Step 210, server are based on acquisition request, obtain the address information of the acquisition request and storage.
It should be noted that the explanation in the present embodiment with same steps in other embodiments or concept, is referred to Description in other embodiments, details are not described herein again.
Information Anti-theft method provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain language After the acquisition request of message breath, the corresponding communication feature information of the first identity is obtained, if communication feature information and default letter Breath matching obtains corresponding first voice messaging of the first identity, and sends the first voice messaging to first terminal;In this way, Server analyzes the corresponding communication feature information of the first identity of first terminal, full in the communication feature information The first identity corresponding first voice messaging is just obtained when sufficient presupposed information and is sent to first terminal, solves existing skill There is security risk in the information in art in voice mail, realize the communications status based on the terminal for obtaining voice messaging And the identity of terminal communication object sends voice messaging, simplifies operating process, and improve in voice mail The safety of information.
Based on previous embodiment, the embodiment of the present invention provides a kind of information Anti-theft method, method includes the following steps:
Step 301, when first terminal and third terminal not can be carried out communication, server receives third terminal and is sent to the First voice messaging of one terminal.
Specifically, after first terminal opens voice mail function, all terminals conversed with first terminal Think that first terminal carries out tone information.For example, when third terminal is made a phone call to first terminal, first terminal is currently In call, when out of reach, that is, first terminal shuts down currently without signal of communication or first terminal, third terminal and first is eventually End cannot establish communication linkage.At this point, third terminal can according to operator provide speech prompt information be first terminal into Row voice messaging message, and server receives third terminal to the first voice messaging of first terminal.That is, the first voice messaging can To be voice messaging that any terminal is sent to first terminal.
Further, the first identity of first terminal can be the communication address book stored in third terminal and be arranged and attaches most importance to It wants contact person for example and can be secrecy contacting identifiers.When third terminal is sent out in the first identity to server to first terminal When sending the first voice messaging, it is private information that the voice messaging, which can be set,.I.e. the first voice messaging is to leave word for important relation The voice messaging or private information of people, or leave word for important relation people and be the voice messaging of secret.
Step 302, server generate encryption key and decruption key.
Specifically, server can be raw using key schedule according to the identity of first terminal according to preset rules At dynamic encryption key and decruption key.
Wherein, step 302 server generates encryption key and decruption key and can be realized by following steps:
Step 302a, server obtains key parameter.
Specifically, key parameter can be the parameter for generating dynamic key pair.Such as it can be current third terminal The information such as the identity of message time and/or third terminal left a message to first terminal, message time can be message Initial time, message end time and/or message duration.
Step 302b, server is based on key parameter, generates server using preset algorithm and generates encryption key and decryption Key.
Specifically, preset algorithm can be key schedule, such as symmetric key algorithm, RSA cryptographic algorithms etc..
Step 303, server encrypt the first voice messaging using encryption key, obtain the second voice messaging.
Step 304, server store the second language according to the corresponding relationship between the second voice messaging and the first identity Message breath.
Specifically, when storing the second voice messaging, the second voice messaging is stored in as the first identity for server The storage region of distribution.
Step 305, server are based on decruption key and generate default mark, and send default mark to first terminal.
Wherein, it presets mark and establishes communication linkage for first terminal and server.
Specifically, whenever the first terminal for thering is different voice messagings to leave word for the first identity, server according to Decruption key generates different default marks to first terminal, makes first terminal by dialing the default mark, establishes and service The process of acquisition voice messaging between device.
Step 306, server obtain default mark corresponding with the first identity.
Specifically, due to the default mark that first terminal can be sent to first terminal by dialing server, Lai Jianli The communication process of acquisition voice messaging between server, in this way, server can directly obtain default mark.
In other embodiments of the present invention, step 306 can be realized by following steps:
Step 306a, the working condition of server detection first terminal.
If step 306b, the working condition of first terminal is communications status, server acquisition is communicated with first terminal Second terminal the second identity.
If step 306c, the second identity is identical as default mark, server obtains default mark.
Specifically, default be identified as the default mark that server is sent to terminal.
The meaning of step 306a-306c is to further decrease server to be sent to the default mark of first terminal by illegal point After son obtains, the privacy leakage of user or the risk of property loss are caused when stealing the voice messaging of first terminal.
Decruption key in step 307, the default mark of server identification, obtains communication feature information.
Specifically, server identifies the default mark of acquisition, the decruption key in default mark is obtained, and determine For communication feature information.
If step 308, communication feature information are matched with presupposed information, server obtains the first identity corresponding first Voice messaging.
Specifically, presupposed information is the decruption key that server generates.If communication feature information and presupposed information mismatch, Stop subsequent operation.
Wherein, step 308 can be realized by following steps:
Step 308a, server obtains the second voice messaging corresponding with the first identity.
If step 308b, decruption key is matched with the encryption key of the second voice messaging, server uses decruption key pair Second voice messaging is decrypted, and obtains the first voice messaging.
Wherein, presupposed information includes the encryption key of the second voice messaging.
Step 309, server send the first voice messaging to first terminal.
A kind of corresponding application scenarios of information Anti-theft method of the embodiment of the present invention include: first in the application scenarios Terminal A, Visited Location Registor (Visiting Location Register, VLR)/mobile switching centre (Mobile Switching Center server, MSC) B, core net C and home location register (Home Location Register, HLR)D.Wherein, first terminal A be box-number terminal by the VLR/MSC B and core net C of box-number terminal attaching and HLR D carries out realization communication connection, as shown in Figure 2.Specifically, first terminal A, VLR/MSC B, core net C and HLR D are used Information Anti-theft method of the present invention realizes that the functional module of anti-eavesdrop includes: Voice Mail Service module 401, user's call state Enquiry module 402, mail encryption/decryption module 403, condition code generation and correction verification module 404 and new mail notice module 405, In: Voice Mail Service module 401 is handled for basic Voice Mail Service, is responsible for storaged voice message and plays voice to stay The operation flow of speech;User's call state enquiry module 402 is for being responsible for HLR D and VLR/ with box-number terminal A ownership MSC B interacting message is responsible for the current talking state of inquiry box-number terminal A;Mail encryption/decryption module 403 is used for according to institute The key pair of generation is encrypted to the message file of box-number terminal A, and based on condition code generation and correction verification module 404 The decruption key matched is decrypted;Condition code generate and correction verification module 404 be used for for secret message according to box-number, Writer's number and message time dynamic generation key and condition code, and box-number terminal A is dialed into and listens to message Calling, parse the condition code that carries in calling, and match corresponding decruption key;New mail notice module 405 is used for When there is secret message, the notice of the modes such as short message is initiated box-number terminal A, and carries the feature of message in short message Code.
It should be noted that the explanation in the present embodiment with same steps in other embodiments or concept, is referred to Description in other embodiments, details are not described herein again.
Information Anti-theft method provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain language After the acquisition request of message breath, the corresponding communication feature information of the first identity is obtained, if communication feature information and default letter Breath matching obtains corresponding first voice messaging of the first identity, and sends the first voice messaging to first terminal;In this way, Server analyzes the corresponding communication feature information of the first identity of first terminal, full in the communication feature information The first identity corresponding first voice messaging is just obtained when sufficient presupposed information and is sent to first terminal, solves existing skill There is security risk in the information in art in voice mail, realize the communications status based on the terminal for obtaining voice messaging And the identity of terminal communication object sends voice messaging, simplifies operating process, and improve in voice mail The safety of information.
Based on previous embodiment, the embodiment of the invention provides a kind of servers 5, can be applied to the corresponding embodiment of Fig. 1 And in a kind of information Anti-theft method provided by the above embodiment, referring to shown in Fig. 3, which includes: the first receiving unit 51, first acquisition unit 52, first processing units 53 and transmission unit 54, in which:
First receiving unit 51 is configured to receive the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in acquisition request.
First acquisition unit 52 is configured to obtain the corresponding communication feature information of the first identity.
First processing units 53 match if being configured to communication feature information with presupposed information, obtain the first identity pair The first voice messaging answered.
Transmission unit 54 is configured to send the first voice messaging to first terminal.
Specifically, in other embodiments of the present invention, first acquisition unit 52 includes: that detection module and first obtain mould Block, in which:
Detection module is configured to the first identity, detects the working condition of first terminal.
First obtains module, if the working condition for being configured to first terminal is communications status, acquisition is communicated with first terminal Second terminal the second identity, obtain communication feature information.
Specifically, in other embodiments of the present invention, server further include: the second processing unit, in which:
The second processing unit generates warning message and simultaneously sends if being configured to communication feature information and presupposed information mismatch Warning message is to first terminal.
Specifically, in other embodiments of the present invention, the second processing unit is additionally configured to:
If the working condition of first terminal is idle state, generates warning message and send warning message to first terminal.
Specifically, in other embodiments of the present invention, after the second processing unit, further includes: third processing unit, In:
Third processing unit, is configured to acquisition request, obtains the address information of acquisition request, storage address information.
Specifically, in other embodiments of the present invention, including: the second receiving unit before the first receiving unit 51, generating Unit, encryption unit, storage unit and fourth processing unit, in which:
Second receiving unit is configured to receive third terminal hair when first terminal not can be carried out communication with third terminal It send to the first voice messaging of first terminal.
Generation unit is configured to generate encryption key and decruption key.
Encryption unit is configured to encrypt the first voice messaging using encryption key, obtains the second voice messaging.
Storage unit is configured to according to the corresponding relationship between the second voice messaging and the first identity, storage second Voice messaging.
Fourth processing unit is configured to decruption key and generates default mark, and sends default mark to first terminal.
Specifically, in other embodiments of the present invention, generation unit includes: the second acquisition module and generation module, in which:
Second obtains module, is configured to obtain key parameter.
Generation module is configured to key parameter, generates encryption key and decruption key using preset algorithm.
Specifically, in other embodiments of the present invention, first acquisition unit includes: that third obtains module and identification module, Wherein:
Third obtains module, is configured to obtain default mark corresponding with the first identity.
Identification module is configured to identify the decruption key in default mark, obtains communication feature information.
Specifically, in other embodiments of the present invention, first processing units include: the 4th acquisition module, the first processing mould Block and Second processing module, in which:
4th obtains module, is configured to obtain the second voice messaging corresponding with the first identity.
First processing module matches if being configured to decruption key with the encryption key of the second voice messaging, close using decrypting The second voice messaging is decrypted in key, obtains the first voice messaging.
Wherein, presupposed information includes the encryption key of the second voice messaging.
Specifically, in other embodiments of the present invention, third obtains module concrete configuration are as follows:
Detect the working condition of first terminal.
If the working condition of first terminal is communications status, the second of the second terminal communicated with first terminal is obtained Identity.
If the second identity is identical as default mark, default mark is obtained.
It should be noted that the interactive process in the present embodiment between each unit and module, it is corresponding to be referred to Fig. 1 Interactive process in embodiment and a kind of information Anti-theft method provided by the above embodiment, details are not described herein again.
Server provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain voice messaging Acquisition request after, obtain the corresponding communication feature information of the first identity, if communication feature information is matched with presupposed information, Corresponding first voice messaging of the first identity is obtained, and sends the first voice messaging to first terminal;In this way, server pair The corresponding communication feature information of first identity of first terminal is analyzed, and meets default letter in the communication feature information The first identity corresponding first voice messaging is just obtained when breath and is sent to first terminal, solves voice in the prior art There is security risk in the information in mailbox, realize communications status and terminal based on the terminal for obtaining voice messaging The identity of communication object sends voice messaging, simplifies operating process, and improve the peace of the information in voice mail Quan Xing.
Based on previous embodiment, the present invention also provides a kind of computer readable storage medium, the computer-readable storages The thief-proof program fetch of information is stored on medium, computer-readable recording medium storage has one or more information Anti-theft journey Sequence, the thief-proof program fetch of one or more information can be executed by one or more processor, to perform the steps of
Receive the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in the acquisition request.
Obtain the corresponding communication feature information of the first identity.
If communication feature information is matched with presupposed information, corresponding first voice messaging of the first identity is obtained.
The first voice messaging is sent to first terminal.
Specifically, in other embodiments of the present invention, the corresponding communication feature information of the first identity of acquisition, including with Lower step:
Based on the first identity, the working condition of first terminal is detected.
If the working condition of first terminal is communications status, the second identity of the second terminal communicated with first terminal is obtained Mark, obtains communication feature information.
Specifically, in other embodiments of the present invention, it is further comprising the steps of:
If communication feature information and presupposed information mismatch, generates warning message and send warning message to first terminal.
Specifically, in other embodiments of the present invention, it is further comprising the steps of:
If the working condition of first terminal is idle state, generates warning message and send warning message to first terminal.
Specifically, in other embodiments of the present invention, after generating warning message and sending warning message to first terminal, It is further comprising the steps of:
Based on acquisition request, the address information of acquisition request and storage are obtained.
Specifically, in other embodiments of the present invention, receiving the acquisition for being used to obtain voice messaging that first terminal is sent Before request, comprising the following steps:
When first terminal and third terminal not can be carried out communication, the first language that third terminal is sent to first terminal is received Message breath.
Generate encryption key and decruption key.
The first voice messaging is encrypted using encryption key, obtains the second voice messaging.
According to the corresponding relationship between the second voice messaging and the first identity, the second voice messaging is stored.
Default mark is generated based on decruption key, and sends default mark to first terminal.
Specifically, in other embodiments of the present invention, generating encryption key and decruption key, comprising the following steps:
Obtain key parameter.
Based on key parameter, encryption key and decruption key are generated using preset algorithm.
Specifically, in other embodiments of the present invention, the corresponding communication feature information of the first identity of acquisition, including with Lower step:
Obtain default mark corresponding with the first identity.
Decruption key in the default mark of identification, obtains communication feature information.
Specifically, in other embodiments of the present invention, if communication feature information is matched with presupposed information, obtaining the first identity Identify corresponding first voice messaging, comprising the following steps:
Obtain the second voice messaging corresponding with the first identity.
If decruption key is matched with the encryption key of the second voice messaging, the second voice messaging is carried out using decruption key Decryption, obtains the first voice messaging.
Wherein, presupposed information includes the encryption key of the second voice messaging.
Specifically, in other embodiments of the present invention, obtaining default mark corresponding with the first identity, including following Step:
Detect the working condition of first terminal.
If the working condition of first terminal is communications status, the second of the second terminal communicated with first terminal is obtained Identity.
If the second identity is identical as default mark, default mark is obtained.
In practical applications, the first receiving unit 51, first acquisition unit 52, first processing units 53 and transmission unit 54 It can be by the central processing unit (Central Processing Unit, CPU) in wireless data sending device, micro process Device (Micro Processor Unit, MPU), digital signal processor (Digital Signal Processor, DSP) or existing Field programmable gate array (Field Programmable Gate Array, FPGA) etc. is realized.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (21)

1. a kind of information Anti-theft method, which is characterized in that the described method includes:
Receive the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, it is carried in the acquisition request State the first identity of first terminal;
Obtain the corresponding communication feature information of first identity;
If the communication feature information is matched with presupposed information, corresponding first voice messaging of first identity is obtained;
First voice messaging is sent to the first terminal.
2. the method according to claim 1, wherein described obtain the corresponding communication special of first identity Reference breath, comprising:
Based on first identity, the working condition of the first terminal is detected;
If the working condition of the first terminal is communications status, the second of the second terminal communicated with the first terminal is obtained Identity obtains the communication feature information.
3. the method according to claim 1, wherein the method also includes:
If the communication feature information and the presupposed information mismatch, generates warning message and send the warning message to institute State first terminal.
4. according to the method described in claim 2, it is characterized in that, the method also includes:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to described the One terminal.
5. the method according to claim 3 or 4, which is characterized in that the generation warning message simultaneously sends the warning letter After breath to the first terminal, further includes:
Based on the acquisition request, the address information of the acquisition request and storage are obtained.
6. the method according to claim 1, wherein described receive believing for obtaining voice for first terminal transmission Before the acquisition request of breath, comprising:
When the first terminal and third terminal not can be carried out communication, receives the third terminal and be sent to the first terminal The first voice messaging;
Generate encryption key and decruption key;
First voice messaging is encrypted using the encryption key, obtains the second voice messaging;
According to the corresponding relationship between second voice messaging and first identity, the second voice letter is stored Breath;
Default mark is generated based on the decruption key, and sends the default mark to the first terminal.
7. according to the method described in claim 6, it is characterized in that, the generation encryption key and decruption key, comprising:
Obtain key parameter;
Based on the key parameter, the encryption key and the decruption key are generated using preset algorithm.
8. method according to claim 6 or 7, which is characterized in that acquisition first identity is corresponding logical Believe characteristic information, comprising:
Obtain default mark corresponding with first identity;
It identifies the decruption key in the default mark, obtains the communication feature information.
9. if according to the method described in claim 8, it is characterized in that, the communication feature information and presupposed information Match, obtain corresponding first voice messaging of first identity, comprising:
Obtain the second voice messaging corresponding with first identity;
If the decruption key is matched with the encryption key of second voice messaging, using the decruption key to described second Voice messaging is decrypted, and obtains first voice messaging;Wherein, the presupposed information includes second voice messaging Encryption key.
10. according to the method described in claim 8, it is characterized in that, the acquisition is corresponding pre- with first identity Bidding is known, comprising:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, the second terminal communicated with the first terminal is obtained Second identity;
If second identity is identical as the default mark, the default mark is obtained.
11. a kind of server, which is characterized in that the server includes: the first receiving unit, first acquisition unit, at first Manage unit and transmission unit;Wherein:
First receiving unit is configured to receive the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, The first identity of the first terminal is carried in the acquisition request;
The first acquisition unit is configured to obtain the corresponding communication feature information of first identity;
The first processing units match if being configured to the communication feature information with presupposed information, obtain first identity Identify corresponding first voice messaging;
The transmission unit is configured to send first voice messaging to the first terminal.
12. server according to claim 11, which is characterized in that the first acquisition unit include: detection module and First obtains module;Wherein:
The detection module is configured to first identity, detects the working condition of the first terminal;
Described first obtains module, if the working condition for being configured to the first terminal is communications status, obtains and described first Second identity of the second terminal of terminal communication, obtains the communication feature information.
13. server according to claim 11, which is characterized in that the server further include: the second processing unit;Its In:
Described the second processing unit generates warning letter if being configured to the communication feature information and presupposed information mismatch It ceases and sends the warning message to the first terminal.
14. server according to claim 12, which is characterized in that described the second processing unit is additionally configured to:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to described the One terminal.
15. server described in 3 or 14 according to claim 1, which is characterized in that after described the second processing unit, further includes: Third processing unit;Wherein:
The third processing unit, is configured to the acquisition request, obtains the address information of the acquisition request, stores institute State address information.
16. server according to claim 11, which is characterized in that include: second to connect before first receiving unit Receive unit, generation unit, encryption unit, storage unit and fourth processing unit;Wherein:
Second receiving unit is configured to when the first terminal and third terminal not can be carried out communication, receives described the Three terminals are sent to the first voice messaging of the first terminal;
The generation unit is configured to generate encryption key and decruption key;
The encryption unit is configured to encrypt first voice messaging using the encryption key, obtains the second language Message breath;
The storage unit is configured to according to the corresponding relationship between second voice messaging and first identity, Store second voice messaging;
The fourth processing unit is configured to the decruption key and generates default mark, and sends the default mark extremely The first terminal.
17. server according to claim 16, which is characterized in that the generation unit include: the second acquisition module and Generation module;Wherein:
Described second obtains module, is configured to obtain key parameter;
The generation module is configured to the key parameter, generates the encryption key and the solution using preset algorithm Key.
18. server according to claim 16 or 17, which is characterized in that the first acquisition unit includes: that third obtains Modulus block and identification module;Wherein:
The third obtains module, is configured to obtain default mark corresponding with first identity;
The identification module is configured to identify the decruption key in the default mark, obtains the communication feature information.
19. server according to claim 18, which is characterized in that the first processing units include: the 4th acquisition mould Block, first processing module and Second processing module;Wherein:
Described 4th obtains module, is configured to obtain the second voice messaging corresponding with first identity;
The first processing module is matched with the encryption key of second voice messaging if being configured to the decruption key, is adopted Second voice messaging is decrypted with the decruption key, obtains first voice messaging;Wherein, the default letter Breath includes the encryption key of second voice messaging.
20. server according to claim 19, which is characterized in that the third obtains module concrete configuration are as follows:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, the second terminal communicated with the first terminal is obtained Second identity;
If second identity is identical as the default mark, the default mark is obtained.
21. a kind of computer readable storage medium, which is characterized in that it is anti-to be stored with information on the computer readable storage medium Snooper realizes such as letter according to any one of claims 1 to 10 when the thief-proof program fetch of information is executed by processor The step of ceasing Anti-theft method.
CN201711105360.8A 2017-11-10 2017-11-10 A kind of information Anti-theft method, server and computer readable storage medium Withdrawn CN109788471A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711105360.8A CN109788471A (en) 2017-11-10 2017-11-10 A kind of information Anti-theft method, server and computer readable storage medium
PCT/CN2018/107552 WO2019091238A1 (en) 2017-11-10 2018-09-26 Information anti-interception method, server and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711105360.8A CN109788471A (en) 2017-11-10 2017-11-10 A kind of information Anti-theft method, server and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109788471A true CN109788471A (en) 2019-05-21

Family

ID=66437578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711105360.8A Withdrawn CN109788471A (en) 2017-11-10 2017-11-10 A kind of information Anti-theft method, server and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN109788471A (en)
WO (1) WO2019091238A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6741705B1 (en) * 2000-02-23 2004-05-25 Cisco Technology, Inc. System and method for securing voice mail messages
CN101374050A (en) * 2008-10-23 2009-02-25 普天信息技术研究院有限公司 Apparatus, system and method for implementing identification authentication
CN102144381A (en) * 2008-09-03 2011-08-03 阿尔卡特朗讯公司 Verifying authenticity of voice mail participants in telephony networks
CN102483792A (en) * 2009-11-23 2012-05-30 富士通株式会社 Method and apparatus for sharing documents
CN103179504A (en) * 2011-12-23 2013-06-26 中兴通讯股份有限公司 Method and device for judging user legality, and method and system for accessing user to mailbox
CN104159230A (en) * 2014-07-21 2014-11-19 小米科技有限责任公司 Telephone call identification method and device
US20160080330A1 (en) * 2000-04-07 2016-03-17 At&T Intellectual Property Ii, L.P. Broadband Certified Mail

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740239B (en) * 2011-03-31 2016-06-22 中兴通讯股份有限公司 The method and system of secure transmission of media information
US8914406B1 (en) * 2012-02-01 2014-12-16 Vorstack, Inc. Scalable network security with fast response protocol

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6741705B1 (en) * 2000-02-23 2004-05-25 Cisco Technology, Inc. System and method for securing voice mail messages
US20160080330A1 (en) * 2000-04-07 2016-03-17 At&T Intellectual Property Ii, L.P. Broadband Certified Mail
CN102144381A (en) * 2008-09-03 2011-08-03 阿尔卡特朗讯公司 Verifying authenticity of voice mail participants in telephony networks
CN101374050A (en) * 2008-10-23 2009-02-25 普天信息技术研究院有限公司 Apparatus, system and method for implementing identification authentication
CN102483792A (en) * 2009-11-23 2012-05-30 富士通株式会社 Method and apparatus for sharing documents
CN103179504A (en) * 2011-12-23 2013-06-26 中兴通讯股份有限公司 Method and device for judging user legality, and method and system for accessing user to mailbox
CN104159230A (en) * 2014-07-21 2014-11-19 小米科技有限责任公司 Telephone call identification method and device

Also Published As

Publication number Publication date
WO2019091238A1 (en) 2019-05-16

Similar Documents

Publication Publication Date Title
US8467512B2 (en) Method and system for authenticating telephone callers and avoiding unwanted calls
CN105578461B (en) Communication, communication access/call-out method, apparatus and system are established between mobile terminal
KR101438243B1 (en) Sim based authentication
WO2009010944A2 (en) On-demand authentication of call session party information during a telephone call
CN104935758A (en) Calling method, calling device and system
CN106899969A (en) Specific secrecy terminal system implementation method based on iOS system
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN102209318A (en) Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN103179557A (en) Real-time encryption and decryption method and system for communication data and mobile terminal
US20110135093A1 (en) Secure telephone devices, systems and methods
CN105553669B (en) A kind of information encryption transmission device and method and monitoring and managing method based on ID authentication
US8693686B2 (en) Secure telephone devices, systems and methods
CN112929339B (en) Message transmitting method for protecting privacy
CN106921633A (en) Calling number Verification System and method
CN102984335A (en) Identity authentication method, equipment and system for making fixed-line call
CN105228156B (en) A kind of method for processing communication messages, apparatus and system
CN106911628A (en) A kind of user registers the method and device of application software on the client
KR20160121828A (en) Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals
US9106429B2 (en) Method and system for pre-accessing conference telephone and network side device
CN105743859B (en) A kind of method, apparatus and system of light application certification
US11616781B2 (en) Air gap-based network isolation device
JPH0759154A (en) Inter-network authentication key generating method
CN102413462B (en) Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
CN105430150B (en) Method and device for realizing safe call
CN109788471A (en) A kind of information Anti-theft method, server and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190521