CN109788471A - A kind of information Anti-theft method, server and computer readable storage medium - Google Patents
A kind of information Anti-theft method, server and computer readable storage medium Download PDFInfo
- Publication number
- CN109788471A CN109788471A CN201711105360.8A CN201711105360A CN109788471A CN 109788471 A CN109788471 A CN 109788471A CN 201711105360 A CN201711105360 A CN 201711105360A CN 109788471 A CN109788471 A CN 109788471A
- Authority
- CN
- China
- Prior art keywords
- terminal
- identity
- voice messaging
- information
- obtains
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Abstract
The embodiment of the invention discloses a kind of information Anti-theft methods, which comprises receives the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, the first identity of the first terminal is carried in the acquisition request;Obtain the corresponding communication feature information of first identity;If the communication feature information is matched with presupposed information, corresponding first voice messaging of first identity is obtained;First voice messaging is sent to the first terminal.The embodiment of the present invention also discloses a kind of server and computer readable storage medium simultaneously.
Description
Technical field
The present invention relates to the technology of the voice mail Anti-theft in field of communication technology more particularly to a kind of information Anti-thefts
Method, server and computer readable storage medium.
Background technique
With the development of telecommunication network, user generallys use the Voice Mail Service of operator's offer to guarantee that terminal is being come
Voice messaging can also be received in the case that electricity is not smooth.But in existing voice mail service, criminal can be used
The mode of calling number camouflage, trespasses other people voice mails, eavesdrops or steal the information content in voice mail, cause to use
The privacy leakage at family or even biggish property loss.
The prior art generallys use the mode of setting user password, to prevent privacy of user from revealing and reduce the property of user
Loss.But it is practical in the scheme of setting user password, operating process is more numerous;And most of user accesses language in terminal
Be not provided with user password when message case, however it remains the problem of privacy of user is revealed, information in voice mail there are still
Security risk.
Summary of the invention
In order to solve the above technical problems, an embodiment of the present invention is intended to provide a kind of information Anti-theft method, server and meters
Calculation machine readable storage medium storing program for executing, there are security risks for the information for solving the problems, such as in voice mail in the prior art, realize base
Voice messaging is sent in the identity of the communications status and terminal communication object of the terminal for obtaining voice messaging, is simplified
Operating process, and improve the safety of the information in voice mail.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
A kind of information Anti-theft method, which comprises
Receive the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, it is carried in the acquisition request
There is the first identity of the first terminal;
Obtain the corresponding communication feature information of first identity;
If the communication feature information is matched with presupposed information, the corresponding first voice letter of first identity is obtained
Breath;
First voice messaging is sent to the first terminal.
It is optionally, described to obtain the corresponding communication feature information of first identity, comprising:
Based on first identity, the working condition of the first terminal is detected;
If the working condition of the first terminal is communications status, the second terminal communicated with the first terminal is obtained
Second identity obtains the communication feature information.
Optionally, the method also includes:
If the communication feature information and the presupposed information mismatch, generates warning message and send the warning message
To the first terminal.
Optionally, the method also includes:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to institute
State first terminal.
Optionally, the generation warning message and after sending the warning message to the first terminal, further includes:
Based on the acquisition request, the address information of the acquisition request and storage are obtained.
Optionally, before the acquisition request for obtaining voice messaging for receiving first terminal transmission, comprising:
When the first terminal and third terminal not can be carried out communication, receives the third terminal and be sent to described first
First voice messaging of terminal;
Generate encryption key and decruption key;
First voice messaging is encrypted using the encryption key, obtains the second voice messaging;
According to the corresponding relationship between second voice messaging and first identity, second voice is stored
Information;
Default mark is generated based on the decruption key, and sends the default mark to the first terminal.
Optionally, the generation encryption key and decruption key, comprising:
Obtain key parameter;
Based on the key parameter, the encryption key and the decruption key are generated using preset algorithm.
It is optionally, described to obtain the corresponding communication feature information of first identity, comprising:
Obtain default mark corresponding with first identity;
It identifies the decruption key in the default mark, obtains the communication feature information.
Optionally, if the communication feature information is matched with presupposed information, it is corresponding to obtain first identity
The first voice messaging, comprising:
Obtain the second voice messaging corresponding with first identity;
If the decruption key is matched with the encryption key of second voice messaging, using the decruption key to described
Second voice messaging is decrypted, and obtains first voice messaging;Wherein, the presupposed information includes the second voice letter
The encryption key of breath.
It is optionally, described to obtain default mark corresponding with first identity, comprising:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, second communicated with the first terminal is obtained eventually
Second identity at end;
If second identity is identical as the default mark, the default mark is obtained.
A kind of server, the server include: the first receiving unit, first acquisition unit, first processing units and hair
Send unit;Wherein:
First receiving unit is configured to receive the acquisition request for being used to obtain voice messaging that first terminal is sent;
Wherein, the first identity of the first terminal is carried in the acquisition request;
The first acquisition unit is configured to obtain the corresponding communication feature information of first identity;
The first processing units match if being configured to the communication feature information with presupposed information, obtain described first
Corresponding first voice messaging of identity;
The transmission unit is configured to send first voice messaging to the first terminal.
Optionally, the first acquisition unit includes: that detection module and first obtain module;Wherein:
The detection module is configured to first identity, detects the working condition of the first terminal;
It is described first obtain module, if be configured to the first terminal working condition be communications status, obtain with it is described
Second identity of the second terminal of first terminal communication, obtains the communication feature information.
Optionally, the server further include: the second processing unit;Wherein:
Described the second processing unit generates police if being configured to the communication feature information and presupposed information mismatch
It accuses information and sends the warning message to the first terminal.
Optionally, described the second processing unit, is additionally configured to:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to institute
State first terminal.
Optionally, after described the second processing unit, further includes: third processing unit;Wherein:
The third processing unit, is configured to the acquisition request, obtains the address information of the acquisition request, deposits
Store up the address information.
It optionally, include: the second receiving unit, generation unit, encryption unit, storage list before first receiving unit
Member and fourth processing unit;Wherein:
Second receiving unit is configured to receive institute when the first terminal not can be carried out communication with third terminal
State the first voice messaging that third terminal is sent to the first terminal;
The generation unit is configured to generate encryption key and decruption key;
The encryption unit is configured to encrypt first voice messaging using the encryption key, obtains the
Two voice messagings;
The storage unit is configured to according to the corresponding pass between second voice messaging and first identity
System stores second voice messaging;
The fourth processing unit is configured to the decruption key and generates default mark, and sends the pre- bidding
Know to the first terminal.
Optionally, the generation unit includes: the second acquisition module and generation module;Wherein:
Described second obtains module, is configured to obtain key parameter;
The generation module is configured to the key parameter, generates the encryption key and institute using preset algorithm
State decruption key.
Optionally, the first acquisition unit includes: that third obtains module and identification module;Wherein:
The third obtains module, is configured to obtain default mark corresponding with first identity;
The identification module is configured to identify the decruption key in the default mark, obtains the communication feature information.
Optionally, the first processing units include: the 4th acquisition module, first processing module and Second processing module;
Wherein:
Described 4th obtains module, is configured to obtain the second voice messaging corresponding with first identity;
The first processing module, if being configured to the encryption key of the decruption key Yu second voice messaging
Match, second voice messaging is decrypted using the decruption key, obtains first voice messaging;Wherein, described
Presupposed information includes the encryption key of second voice messaging.
Optionally, the third obtains module concrete configuration are as follows:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, second communicated with the first terminal is obtained eventually
Second identity at end;
If second identity is identical as the default mark, the default mark is obtained.
A kind of computer readable storage medium is stored with the thief-proof program fetch of information on the computer readable storage medium,
The step of information thief-proof program fetch realizes information Anti-theft method as described in any one of the above embodiments when being executed by processor.
Information Anti-theft method, server and computer readable storage medium provided by the embodiment of the present invention receive
After the acquisition request for obtaining voice messaging that first terminal is sent, the corresponding communication special reference of the first identity is obtained
Breath obtains corresponding first voice messaging of the first identity, and send first if communication feature information is matched with presupposed information
Voice messaging is to first terminal;In this way, server to the corresponding communication feature information of the first identity of first terminal into
It is concurrent just to obtain corresponding first voice messaging of the first identity when the communication feature information meets presupposed information for row analysis
It send to first terminal, solves the problems, such as the information in voice mail in the prior art there are security risk, realize and be based on obtaining
It takes the identity of the communications status and terminal communication object of the terminal of voice messaging to send voice messaging, simplifies operation
Process, and improve the safety of the information in voice mail.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of information Anti-theft method provided in an embodiment of the present invention;
Fig. 2 is a kind of information Anti-theft method application scenarios schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description.
The embodiment of the present invention provides a kind of information Anti-theft method, shown referring to Fig.1, method includes the following steps:
Step 101 receives the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in acquisition request.
Specifically, the acquisition request for obtaining voice messaging that step 101 receives first terminal transmission can be by servicing
Device is realized.The acquisition request for obtaining voice messaging that first terminal is sent can be first terminal and receive user's transmission
Slave server in obtain voice messaging operational order after, respond the operational order and to server send;The acquisition refers to
It enables for obtaining the corresponding voice messaging of the first identity with first terminal.Voice messaging can be voicemail message etc.
Information.
Step 102 obtains the corresponding communication feature information of the first identity.
Specifically, step 102 obtains the corresponding communication feature information of the first identity can be realized by server.Its
In, when the corresponding communication feature information of the first identity can be intended to indicate that the working condition of first terminal is communications status
The key information that the identity of corresponding communication object either server is obtained based on the identity of the communication object.
If step 103, communication feature information are matched with presupposed information, the corresponding first voice letter of the first identity is obtained
Breath.
If obtaining the first identity corresponding first specifically, step 103 communication feature information is matched with presupposed information
Voice messaging can be realized by server.Wherein, when communication feature information is the identity of communication object, presupposed information
For preset identification information, for making first terminal obtain the voice messaging stored in server according to the presupposed information;When logical
When believing that characteristic information is the key information according to the identity of communication object, presupposed information is letter corresponding with the key information
Breath, such as when the key information is encryption key, presupposed information is corresponding decruption key.
Step 104 sends the first voice messaging to first terminal.
Specifically, step 104 sends the first voice messaging to first terminal can be realized by server.First voice letter
Breath is voice messaging corresponding with first terminal, is that server receives the voice messaging that other users are sent to first terminal,
And stored based on the corresponding relationship between voice messaging and first terminal, when the corresponding voice of first terminal request
When information, server carries out certification analysis to first terminal, and the first voice messaging is sent to the after certification analysis passes through
One terminal.The mode specifically sent, which can be, is directly sent to terminal for voice messaging packet, or plays voice messaging to first
Terminal.
Information Anti-theft method provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain language
After the acquisition request of message breath, the corresponding communication feature information of the first identity is obtained, if communication feature information and default letter
Breath matching obtains corresponding first voice messaging of the first identity, and sends the first voice messaging to first terminal;In this way,
Server analyzes the corresponding communication feature information of the first identity of first terminal, full in the communication feature information
The first identity corresponding first voice messaging is just obtained when sufficient presupposed information and is sent to first terminal, solves existing skill
There is security risk in the information in art in voice mail, realize the communications status based on the terminal for obtaining voice messaging
And the identity of terminal communication object sends voice messaging, simplifies operating process, and improve in voice mail
The safety of information.
Based on previous embodiment, the embodiment of the present invention provides a kind of information Anti-theft method, method includes the following steps:
Step 201, server receive the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in acquisition request.
Specifically, being the terminal of the first user with first terminal, the first identity of first terminal is first terminal
The number of voice mail, to be illustrated for the telephone number of first terminal, the first user dials acquisition using first terminal
The voice mail access code access server of voice messaging, while acquisition request is sent to server.
Step 202, server are based on the first identity, detect the working condition of first terminal.
Specifically, the working condition of first terminal can be the call state of mobile phone.Server is from home location register
The call state of the corresponding first terminal of the first identity of inquiry in (Home Location Register, HLR).
Wherein, after server executes step 202, it can choose and execute step 203-208 or selection execution step 209-
210;If the working condition of first terminal is that communications status can choose execution step 203-208, if the work shape of first terminal
State is that idle state can choose execution step 209-210;
If step 203, the working condition of first terminal are communications status, server obtains second communicated with first terminal
Second identity of terminal, obtains communication feature information.
Specifically, second terminal can be server, it is also possible to other terminals in addition to first terminal.Work as first terminal
Working condition be that server is from Visited Location Registor (Visiting Location Register, VLR)/shifting when the line is busy
The real-time calls state of first terminal is inquired in dynamic switching centre (Mobile Switching Center, MSC) server, really
Second identity of the second terminal that fixed and first terminal is conversed, obtains communication feature information.
Step 204, server judge whether communication feature information matches with presupposed information.
Wherein, after server executes step 204, it can choose and execute step 205-208 or step 209-210, if
Communication feature information and presupposed information match selection execute step 205-208, if communication feature information and presupposed information mismatch
Selection executes step 209-210;
If step 205, communication feature information are matched with presupposed information, server obtains the first identity corresponding first
Voice messaging.
Specifically, presupposed information is voice mail access code, can be fixed and invariable, i.e., the terminal of all users is being opened
After logical Voice Mail Service, user's using terminal establishes connection by dialing the voice mail access code and server, then takes
Business device obtains the identification information of terminal after establishing communication linkage to determine voice messaging.
In other embodiments of the present invention, presupposed information is voice mail access code, be can be according to voicemail message
It changes.
When the second identity of the second terminal conversed with first terminal is voice messaging access code, show
One terminal is currently strictly to be communicated with server, this calling is legal, obtains the corresponding with the first identity of storage
The first voice messaging.
Step 206, server send the first voice messaging to first terminal.
Specifically, server can be sent to first terminal in the form of compress speech packet with by the first voice messaging, it can also
To be that server plays first voice messaging, first terminal answers first voice messaging by first terminal earpiece.
If step 207, communication feature information and presupposed information mismatch, server generates warning message and sends warning letter
It ceases to first terminal.
Specifically, if the identity of the second terminal of first terminal current talking is not voice mail access code
It is to have illegal user will using technological means to determine first terminal currently there is no the first voice messaging of request storage
Illegal number disguises oneself as the first identity of first terminal, attempts the corresponding voice of the first identity for obtaining first terminal
Information.At this point, server judge this time to call be it is illegal, warning message can be generated, and " such as your identity information is currently stolen
With, it is noted that property safety ", and it is sent to first terminal, while terminating and the calling procedure between first identity.
Step 208, server are based on acquisition request, obtain the address information of the acquisition request and storage.
Specifically, acquisition request of the server according to sending, can determine the corresponding VLR of the acquisition request, Original Signaling Point
Encode (Original Point Code, OPC) and/or session initiation protocol (Session Initiation Protocol,
The calling address information such as SIP), and stored, it is analyzed so as to subsequent.
If step 209, the working condition of first terminal are idle state, server generates warning message and sends warning letter
It ceases to first terminal.
Specifically, when first terminal call state be idle state, i.e., first terminal currently with any terminal not
Carry out communication process, it is illegal for showing this time to call, can be generated warning message " such as your identity information is currently stolen,
Please note that property safety ", and it is sent to first terminal, while terminating and the calling procedure between first identity.
Step 210, server are based on acquisition request, obtain the address information of the acquisition request and storage.
It should be noted that the explanation in the present embodiment with same steps in other embodiments or concept, is referred to
Description in other embodiments, details are not described herein again.
Information Anti-theft method provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain language
After the acquisition request of message breath, the corresponding communication feature information of the first identity is obtained, if communication feature information and default letter
Breath matching obtains corresponding first voice messaging of the first identity, and sends the first voice messaging to first terminal;In this way,
Server analyzes the corresponding communication feature information of the first identity of first terminal, full in the communication feature information
The first identity corresponding first voice messaging is just obtained when sufficient presupposed information and is sent to first terminal, solves existing skill
There is security risk in the information in art in voice mail, realize the communications status based on the terminal for obtaining voice messaging
And the identity of terminal communication object sends voice messaging, simplifies operating process, and improve in voice mail
The safety of information.
Based on previous embodiment, the embodiment of the present invention provides a kind of information Anti-theft method, method includes the following steps:
Step 301, when first terminal and third terminal not can be carried out communication, server receives third terminal and is sent to the
First voice messaging of one terminal.
Specifically, after first terminal opens voice mail function, all terminals conversed with first terminal
Think that first terminal carries out tone information.For example, when third terminal is made a phone call to first terminal, first terminal is currently
In call, when out of reach, that is, first terminal shuts down currently without signal of communication or first terminal, third terminal and first is eventually
End cannot establish communication linkage.At this point, third terminal can according to operator provide speech prompt information be first terminal into
Row voice messaging message, and server receives third terminal to the first voice messaging of first terminal.That is, the first voice messaging can
To be voice messaging that any terminal is sent to first terminal.
Further, the first identity of first terminal can be the communication address book stored in third terminal and be arranged and attaches most importance to
It wants contact person for example and can be secrecy contacting identifiers.When third terminal is sent out in the first identity to server to first terminal
When sending the first voice messaging, it is private information that the voice messaging, which can be set,.I.e. the first voice messaging is to leave word for important relation
The voice messaging or private information of people, or leave word for important relation people and be the voice messaging of secret.
Step 302, server generate encryption key and decruption key.
Specifically, server can be raw using key schedule according to the identity of first terminal according to preset rules
At dynamic encryption key and decruption key.
Wherein, step 302 server generates encryption key and decruption key and can be realized by following steps:
Step 302a, server obtains key parameter.
Specifically, key parameter can be the parameter for generating dynamic key pair.Such as it can be current third terminal
The information such as the identity of message time and/or third terminal left a message to first terminal, message time can be message
Initial time, message end time and/or message duration.
Step 302b, server is based on key parameter, generates server using preset algorithm and generates encryption key and decryption
Key.
Specifically, preset algorithm can be key schedule, such as symmetric key algorithm, RSA cryptographic algorithms etc..
Step 303, server encrypt the first voice messaging using encryption key, obtain the second voice messaging.
Step 304, server store the second language according to the corresponding relationship between the second voice messaging and the first identity
Message breath.
Specifically, when storing the second voice messaging, the second voice messaging is stored in as the first identity for server
The storage region of distribution.
Step 305, server are based on decruption key and generate default mark, and send default mark to first terminal.
Wherein, it presets mark and establishes communication linkage for first terminal and server.
Specifically, whenever the first terminal for thering is different voice messagings to leave word for the first identity, server according to
Decruption key generates different default marks to first terminal, makes first terminal by dialing the default mark, establishes and service
The process of acquisition voice messaging between device.
Step 306, server obtain default mark corresponding with the first identity.
Specifically, due to the default mark that first terminal can be sent to first terminal by dialing server, Lai Jianli
The communication process of acquisition voice messaging between server, in this way, server can directly obtain default mark.
In other embodiments of the present invention, step 306 can be realized by following steps:
Step 306a, the working condition of server detection first terminal.
If step 306b, the working condition of first terminal is communications status, server acquisition is communicated with first terminal
Second terminal the second identity.
If step 306c, the second identity is identical as default mark, server obtains default mark.
Specifically, default be identified as the default mark that server is sent to terminal.
The meaning of step 306a-306c is to further decrease server to be sent to the default mark of first terminal by illegal point
After son obtains, the privacy leakage of user or the risk of property loss are caused when stealing the voice messaging of first terminal.
Decruption key in step 307, the default mark of server identification, obtains communication feature information.
Specifically, server identifies the default mark of acquisition, the decruption key in default mark is obtained, and determine
For communication feature information.
If step 308, communication feature information are matched with presupposed information, server obtains the first identity corresponding first
Voice messaging.
Specifically, presupposed information is the decruption key that server generates.If communication feature information and presupposed information mismatch,
Stop subsequent operation.
Wherein, step 308 can be realized by following steps:
Step 308a, server obtains the second voice messaging corresponding with the first identity.
If step 308b, decruption key is matched with the encryption key of the second voice messaging, server uses decruption key pair
Second voice messaging is decrypted, and obtains the first voice messaging.
Wherein, presupposed information includes the encryption key of the second voice messaging.
Step 309, server send the first voice messaging to first terminal.
A kind of corresponding application scenarios of information Anti-theft method of the embodiment of the present invention include: first in the application scenarios
Terminal A, Visited Location Registor (Visiting Location Register, VLR)/mobile switching centre (Mobile
Switching Center server, MSC) B, core net C and home location register (Home Location Register,
HLR)D.Wherein, first terminal A be box-number terminal by the VLR/MSC B and core net C of box-number terminal attaching and
HLR D carries out realization communication connection, as shown in Figure 2.Specifically, first terminal A, VLR/MSC B, core net C and HLR D are used
Information Anti-theft method of the present invention realizes that the functional module of anti-eavesdrop includes: Voice Mail Service module 401, user's call state
Enquiry module 402, mail encryption/decryption module 403, condition code generation and correction verification module 404 and new mail notice module 405,
In: Voice Mail Service module 401 is handled for basic Voice Mail Service, is responsible for storaged voice message and plays voice to stay
The operation flow of speech;User's call state enquiry module 402 is for being responsible for HLR D and VLR/ with box-number terminal A ownership
MSC B interacting message is responsible for the current talking state of inquiry box-number terminal A;Mail encryption/decryption module 403 is used for according to institute
The key pair of generation is encrypted to the message file of box-number terminal A, and based on condition code generation and correction verification module 404
The decruption key matched is decrypted;Condition code generate and correction verification module 404 be used for for secret message according to box-number,
Writer's number and message time dynamic generation key and condition code, and box-number terminal A is dialed into and listens to message
Calling, parse the condition code that carries in calling, and match corresponding decruption key;New mail notice module 405 is used for
When there is secret message, the notice of the modes such as short message is initiated box-number terminal A, and carries the feature of message in short message
Code.
It should be noted that the explanation in the present embodiment with same steps in other embodiments or concept, is referred to
Description in other embodiments, details are not described herein again.
Information Anti-theft method provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain language
After the acquisition request of message breath, the corresponding communication feature information of the first identity is obtained, if communication feature information and default letter
Breath matching obtains corresponding first voice messaging of the first identity, and sends the first voice messaging to first terminal;In this way,
Server analyzes the corresponding communication feature information of the first identity of first terminal, full in the communication feature information
The first identity corresponding first voice messaging is just obtained when sufficient presupposed information and is sent to first terminal, solves existing skill
There is security risk in the information in art in voice mail, realize the communications status based on the terminal for obtaining voice messaging
And the identity of terminal communication object sends voice messaging, simplifies operating process, and improve in voice mail
The safety of information.
Based on previous embodiment, the embodiment of the invention provides a kind of servers 5, can be applied to the corresponding embodiment of Fig. 1
And in a kind of information Anti-theft method provided by the above embodiment, referring to shown in Fig. 3, which includes: the first receiving unit
51, first acquisition unit 52, first processing units 53 and transmission unit 54, in which:
First receiving unit 51 is configured to receive the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in acquisition request.
First acquisition unit 52 is configured to obtain the corresponding communication feature information of the first identity.
First processing units 53 match if being configured to communication feature information with presupposed information, obtain the first identity pair
The first voice messaging answered.
Transmission unit 54 is configured to send the first voice messaging to first terminal.
Specifically, in other embodiments of the present invention, first acquisition unit 52 includes: that detection module and first obtain mould
Block, in which:
Detection module is configured to the first identity, detects the working condition of first terminal.
First obtains module, if the working condition for being configured to first terminal is communications status, acquisition is communicated with first terminal
Second terminal the second identity, obtain communication feature information.
Specifically, in other embodiments of the present invention, server further include: the second processing unit, in which:
The second processing unit generates warning message and simultaneously sends if being configured to communication feature information and presupposed information mismatch
Warning message is to first terminal.
Specifically, in other embodiments of the present invention, the second processing unit is additionally configured to:
If the working condition of first terminal is idle state, generates warning message and send warning message to first terminal.
Specifically, in other embodiments of the present invention, after the second processing unit, further includes: third processing unit,
In:
Third processing unit, is configured to acquisition request, obtains the address information of acquisition request, storage address information.
Specifically, in other embodiments of the present invention, including: the second receiving unit before the first receiving unit 51, generating
Unit, encryption unit, storage unit and fourth processing unit, in which:
Second receiving unit is configured to receive third terminal hair when first terminal not can be carried out communication with third terminal
It send to the first voice messaging of first terminal.
Generation unit is configured to generate encryption key and decruption key.
Encryption unit is configured to encrypt the first voice messaging using encryption key, obtains the second voice messaging.
Storage unit is configured to according to the corresponding relationship between the second voice messaging and the first identity, storage second
Voice messaging.
Fourth processing unit is configured to decruption key and generates default mark, and sends default mark to first terminal.
Specifically, in other embodiments of the present invention, generation unit includes: the second acquisition module and generation module, in which:
Second obtains module, is configured to obtain key parameter.
Generation module is configured to key parameter, generates encryption key and decruption key using preset algorithm.
Specifically, in other embodiments of the present invention, first acquisition unit includes: that third obtains module and identification module,
Wherein:
Third obtains module, is configured to obtain default mark corresponding with the first identity.
Identification module is configured to identify the decruption key in default mark, obtains communication feature information.
Specifically, in other embodiments of the present invention, first processing units include: the 4th acquisition module, the first processing mould
Block and Second processing module, in which:
4th obtains module, is configured to obtain the second voice messaging corresponding with the first identity.
First processing module matches if being configured to decruption key with the encryption key of the second voice messaging, close using decrypting
The second voice messaging is decrypted in key, obtains the first voice messaging.
Wherein, presupposed information includes the encryption key of the second voice messaging.
Specifically, in other embodiments of the present invention, third obtains module concrete configuration are as follows:
Detect the working condition of first terminal.
If the working condition of first terminal is communications status, the second of the second terminal communicated with first terminal is obtained
Identity.
If the second identity is identical as default mark, default mark is obtained.
It should be noted that the interactive process in the present embodiment between each unit and module, it is corresponding to be referred to Fig. 1
Interactive process in embodiment and a kind of information Anti-theft method provided by the above embodiment, details are not described herein again.
Server provided by the embodiment of the present invention, what server reception first terminal was sent is used to obtain voice messaging
Acquisition request after, obtain the corresponding communication feature information of the first identity, if communication feature information is matched with presupposed information,
Corresponding first voice messaging of the first identity is obtained, and sends the first voice messaging to first terminal;In this way, server pair
The corresponding communication feature information of first identity of first terminal is analyzed, and meets default letter in the communication feature information
The first identity corresponding first voice messaging is just obtained when breath and is sent to first terminal, solves voice in the prior art
There is security risk in the information in mailbox, realize communications status and terminal based on the terminal for obtaining voice messaging
The identity of communication object sends voice messaging, simplifies operating process, and improve the peace of the information in voice mail
Quan Xing.
Based on previous embodiment, the present invention also provides a kind of computer readable storage medium, the computer-readable storages
The thief-proof program fetch of information is stored on medium, computer-readable recording medium storage has one or more information Anti-theft journey
Sequence, the thief-proof program fetch of one or more information can be executed by one or more processor, to perform the steps of
Receive the acquisition request for being used to obtain voice messaging that first terminal is sent.
Wherein, the first identity of first terminal is carried in the acquisition request.
Obtain the corresponding communication feature information of the first identity.
If communication feature information is matched with presupposed information, corresponding first voice messaging of the first identity is obtained.
The first voice messaging is sent to first terminal.
Specifically, in other embodiments of the present invention, the corresponding communication feature information of the first identity of acquisition, including with
Lower step:
Based on the first identity, the working condition of first terminal is detected.
If the working condition of first terminal is communications status, the second identity of the second terminal communicated with first terminal is obtained
Mark, obtains communication feature information.
Specifically, in other embodiments of the present invention, it is further comprising the steps of:
If communication feature information and presupposed information mismatch, generates warning message and send warning message to first terminal.
Specifically, in other embodiments of the present invention, it is further comprising the steps of:
If the working condition of first terminal is idle state, generates warning message and send warning message to first terminal.
Specifically, in other embodiments of the present invention, after generating warning message and sending warning message to first terminal,
It is further comprising the steps of:
Based on acquisition request, the address information of acquisition request and storage are obtained.
Specifically, in other embodiments of the present invention, receiving the acquisition for being used to obtain voice messaging that first terminal is sent
Before request, comprising the following steps:
When first terminal and third terminal not can be carried out communication, the first language that third terminal is sent to first terminal is received
Message breath.
Generate encryption key and decruption key.
The first voice messaging is encrypted using encryption key, obtains the second voice messaging.
According to the corresponding relationship between the second voice messaging and the first identity, the second voice messaging is stored.
Default mark is generated based on decruption key, and sends default mark to first terminal.
Specifically, in other embodiments of the present invention, generating encryption key and decruption key, comprising the following steps:
Obtain key parameter.
Based on key parameter, encryption key and decruption key are generated using preset algorithm.
Specifically, in other embodiments of the present invention, the corresponding communication feature information of the first identity of acquisition, including with
Lower step:
Obtain default mark corresponding with the first identity.
Decruption key in the default mark of identification, obtains communication feature information.
Specifically, in other embodiments of the present invention, if communication feature information is matched with presupposed information, obtaining the first identity
Identify corresponding first voice messaging, comprising the following steps:
Obtain the second voice messaging corresponding with the first identity.
If decruption key is matched with the encryption key of the second voice messaging, the second voice messaging is carried out using decruption key
Decryption, obtains the first voice messaging.
Wherein, presupposed information includes the encryption key of the second voice messaging.
Specifically, in other embodiments of the present invention, obtaining default mark corresponding with the first identity, including following
Step:
Detect the working condition of first terminal.
If the working condition of first terminal is communications status, the second of the second terminal communicated with first terminal is obtained
Identity.
If the second identity is identical as default mark, default mark is obtained.
In practical applications, the first receiving unit 51, first acquisition unit 52, first processing units 53 and transmission unit 54
It can be by the central processing unit (Central Processing Unit, CPU) in wireless data sending device, micro process
Device (Micro Processor Unit, MPU), digital signal processor (Digital Signal Processor, DSP) or existing
Field programmable gate array (Field Programmable Gate Array, FPGA) etc. is realized.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention
Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (21)
1. a kind of information Anti-theft method, which is characterized in that the described method includes:
Receive the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein, it is carried in the acquisition request
State the first identity of first terminal;
Obtain the corresponding communication feature information of first identity;
If the communication feature information is matched with presupposed information, corresponding first voice messaging of first identity is obtained;
First voice messaging is sent to the first terminal.
2. the method according to claim 1, wherein described obtain the corresponding communication special of first identity
Reference breath, comprising:
Based on first identity, the working condition of the first terminal is detected;
If the working condition of the first terminal is communications status, the second of the second terminal communicated with the first terminal is obtained
Identity obtains the communication feature information.
3. the method according to claim 1, wherein the method also includes:
If the communication feature information and the presupposed information mismatch, generates warning message and send the warning message to institute
State first terminal.
4. according to the method described in claim 2, it is characterized in that, the method also includes:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to described the
One terminal.
5. the method according to claim 3 or 4, which is characterized in that the generation warning message simultaneously sends the warning letter
After breath to the first terminal, further includes:
Based on the acquisition request, the address information of the acquisition request and storage are obtained.
6. the method according to claim 1, wherein described receive believing for obtaining voice for first terminal transmission
Before the acquisition request of breath, comprising:
When the first terminal and third terminal not can be carried out communication, receives the third terminal and be sent to the first terminal
The first voice messaging;
Generate encryption key and decruption key;
First voice messaging is encrypted using the encryption key, obtains the second voice messaging;
According to the corresponding relationship between second voice messaging and first identity, the second voice letter is stored
Breath;
Default mark is generated based on the decruption key, and sends the default mark to the first terminal.
7. according to the method described in claim 6, it is characterized in that, the generation encryption key and decruption key, comprising:
Obtain key parameter;
Based on the key parameter, the encryption key and the decruption key are generated using preset algorithm.
8. method according to claim 6 or 7, which is characterized in that acquisition first identity is corresponding logical
Believe characteristic information, comprising:
Obtain default mark corresponding with first identity;
It identifies the decruption key in the default mark, obtains the communication feature information.
9. if according to the method described in claim 8, it is characterized in that, the communication feature information and presupposed information
Match, obtain corresponding first voice messaging of first identity, comprising:
Obtain the second voice messaging corresponding with first identity;
If the decruption key is matched with the encryption key of second voice messaging, using the decruption key to described second
Voice messaging is decrypted, and obtains first voice messaging;Wherein, the presupposed information includes second voice messaging
Encryption key.
10. according to the method described in claim 8, it is characterized in that, the acquisition is corresponding pre- with first identity
Bidding is known, comprising:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, the second terminal communicated with the first terminal is obtained
Second identity;
If second identity is identical as the default mark, the default mark is obtained.
11. a kind of server, which is characterized in that the server includes: the first receiving unit, first acquisition unit, at first
Manage unit and transmission unit;Wherein:
First receiving unit is configured to receive the acquisition request for being used to obtain voice messaging that first terminal is sent;Wherein,
The first identity of the first terminal is carried in the acquisition request;
The first acquisition unit is configured to obtain the corresponding communication feature information of first identity;
The first processing units match if being configured to the communication feature information with presupposed information, obtain first identity
Identify corresponding first voice messaging;
The transmission unit is configured to send first voice messaging to the first terminal.
12. server according to claim 11, which is characterized in that the first acquisition unit include: detection module and
First obtains module;Wherein:
The detection module is configured to first identity, detects the working condition of the first terminal;
Described first obtains module, if the working condition for being configured to the first terminal is communications status, obtains and described first
Second identity of the second terminal of terminal communication, obtains the communication feature information.
13. server according to claim 11, which is characterized in that the server further include: the second processing unit;Its
In:
Described the second processing unit generates warning letter if being configured to the communication feature information and presupposed information mismatch
It ceases and sends the warning message to the first terminal.
14. server according to claim 12, which is characterized in that described the second processing unit is additionally configured to:
If the working condition of the first terminal is idle state, generates warning message and send the warning message to described the
One terminal.
15. server described in 3 or 14 according to claim 1, which is characterized in that after described the second processing unit, further includes:
Third processing unit;Wherein:
The third processing unit, is configured to the acquisition request, obtains the address information of the acquisition request, stores institute
State address information.
16. server according to claim 11, which is characterized in that include: second to connect before first receiving unit
Receive unit, generation unit, encryption unit, storage unit and fourth processing unit;Wherein:
Second receiving unit is configured to when the first terminal and third terminal not can be carried out communication, receives described the
Three terminals are sent to the first voice messaging of the first terminal;
The generation unit is configured to generate encryption key and decruption key;
The encryption unit is configured to encrypt first voice messaging using the encryption key, obtains the second language
Message breath;
The storage unit is configured to according to the corresponding relationship between second voice messaging and first identity,
Store second voice messaging;
The fourth processing unit is configured to the decruption key and generates default mark, and sends the default mark extremely
The first terminal.
17. server according to claim 16, which is characterized in that the generation unit include: the second acquisition module and
Generation module;Wherein:
Described second obtains module, is configured to obtain key parameter;
The generation module is configured to the key parameter, generates the encryption key and the solution using preset algorithm
Key.
18. server according to claim 16 or 17, which is characterized in that the first acquisition unit includes: that third obtains
Modulus block and identification module;Wherein:
The third obtains module, is configured to obtain default mark corresponding with first identity;
The identification module is configured to identify the decruption key in the default mark, obtains the communication feature information.
19. server according to claim 18, which is characterized in that the first processing units include: the 4th acquisition mould
Block, first processing module and Second processing module;Wherein:
Described 4th obtains module, is configured to obtain the second voice messaging corresponding with first identity;
The first processing module is matched with the encryption key of second voice messaging if being configured to the decruption key, is adopted
Second voice messaging is decrypted with the decruption key, obtains first voice messaging;Wherein, the default letter
Breath includes the encryption key of second voice messaging.
20. server according to claim 19, which is characterized in that the third obtains module concrete configuration are as follows:
Detect the working condition of the first terminal;
If the working condition of the first terminal is communications status, the second terminal communicated with the first terminal is obtained
Second identity;
If second identity is identical as the default mark, the default mark is obtained.
21. a kind of computer readable storage medium, which is characterized in that it is anti-to be stored with information on the computer readable storage medium
Snooper realizes such as letter according to any one of claims 1 to 10 when the thief-proof program fetch of information is executed by processor
The step of ceasing Anti-theft method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711105360.8A CN109788471A (en) | 2017-11-10 | 2017-11-10 | A kind of information Anti-theft method, server and computer readable storage medium |
PCT/CN2018/107552 WO2019091238A1 (en) | 2017-11-10 | 2018-09-26 | Information anti-interception method, server and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711105360.8A CN109788471A (en) | 2017-11-10 | 2017-11-10 | A kind of information Anti-theft method, server and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109788471A true CN109788471A (en) | 2019-05-21 |
Family
ID=66437578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711105360.8A Withdrawn CN109788471A (en) | 2017-11-10 | 2017-11-10 | A kind of information Anti-theft method, server and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109788471A (en) |
WO (1) | WO2019091238A1 (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6741705B1 (en) * | 2000-02-23 | 2004-05-25 | Cisco Technology, Inc. | System and method for securing voice mail messages |
CN101374050A (en) * | 2008-10-23 | 2009-02-25 | 普天信息技术研究院有限公司 | Apparatus, system and method for implementing identification authentication |
CN102144381A (en) * | 2008-09-03 | 2011-08-03 | 阿尔卡特朗讯公司 | Verifying authenticity of voice mail participants in telephony networks |
CN102483792A (en) * | 2009-11-23 | 2012-05-30 | 富士通株式会社 | Method and apparatus for sharing documents |
CN103179504A (en) * | 2011-12-23 | 2013-06-26 | 中兴通讯股份有限公司 | Method and device for judging user legality, and method and system for accessing user to mailbox |
CN104159230A (en) * | 2014-07-21 | 2014-11-19 | 小米科技有限责任公司 | Telephone call identification method and device |
US20160080330A1 (en) * | 2000-04-07 | 2016-03-17 | At&T Intellectual Property Ii, L.P. | Broadband Certified Mail |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102740239B (en) * | 2011-03-31 | 2016-06-22 | 中兴通讯股份有限公司 | The method and system of secure transmission of media information |
US8914406B1 (en) * | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
-
2017
- 2017-11-10 CN CN201711105360.8A patent/CN109788471A/en not_active Withdrawn
-
2018
- 2018-09-26 WO PCT/CN2018/107552 patent/WO2019091238A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6741705B1 (en) * | 2000-02-23 | 2004-05-25 | Cisco Technology, Inc. | System and method for securing voice mail messages |
US20160080330A1 (en) * | 2000-04-07 | 2016-03-17 | At&T Intellectual Property Ii, L.P. | Broadband Certified Mail |
CN102144381A (en) * | 2008-09-03 | 2011-08-03 | 阿尔卡特朗讯公司 | Verifying authenticity of voice mail participants in telephony networks |
CN101374050A (en) * | 2008-10-23 | 2009-02-25 | 普天信息技术研究院有限公司 | Apparatus, system and method for implementing identification authentication |
CN102483792A (en) * | 2009-11-23 | 2012-05-30 | 富士通株式会社 | Method and apparatus for sharing documents |
CN103179504A (en) * | 2011-12-23 | 2013-06-26 | 中兴通讯股份有限公司 | Method and device for judging user legality, and method and system for accessing user to mailbox |
CN104159230A (en) * | 2014-07-21 | 2014-11-19 | 小米科技有限责任公司 | Telephone call identification method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2019091238A1 (en) | 2019-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8467512B2 (en) | Method and system for authenticating telephone callers and avoiding unwanted calls | |
CN105578461B (en) | Communication, communication access/call-out method, apparatus and system are established between mobile terminal | |
KR101438243B1 (en) | Sim based authentication | |
WO2009010944A2 (en) | On-demand authentication of call session party information during a telephone call | |
CN104935758A (en) | Calling method, calling device and system | |
CN106899969A (en) | Specific secrecy terminal system implementation method based on iOS system | |
CN102202299A (en) | Realization method of end-to-end voice encryption system based on 3G/B3G | |
CN102209318A (en) | Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card | |
CN103179557A (en) | Real-time encryption and decryption method and system for communication data and mobile terminal | |
US20110135093A1 (en) | Secure telephone devices, systems and methods | |
CN105553669B (en) | A kind of information encryption transmission device and method and monitoring and managing method based on ID authentication | |
US8693686B2 (en) | Secure telephone devices, systems and methods | |
CN112929339B (en) | Message transmitting method for protecting privacy | |
CN106921633A (en) | Calling number Verification System and method | |
CN102984335A (en) | Identity authentication method, equipment and system for making fixed-line call | |
CN105228156B (en) | A kind of method for processing communication messages, apparatus and system | |
CN106911628A (en) | A kind of user registers the method and device of application software on the client | |
KR20160121828A (en) | Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals | |
US9106429B2 (en) | Method and system for pre-accessing conference telephone and network side device | |
CN105743859B (en) | A kind of method, apparatus and system of light application certification | |
US11616781B2 (en) | Air gap-based network isolation device | |
JPH0759154A (en) | Inter-network authentication key generating method | |
CN102413462B (en) | Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card | |
CN105430150B (en) | Method and device for realizing safe call | |
CN109788471A (en) | A kind of information Anti-theft method, server and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190521 |