CN110086944B - Communication method and device based on virtual number - Google Patents

Communication method and device based on virtual number Download PDF

Info

Publication number
CN110086944B
CN110086944B CN201811431637.0A CN201811431637A CN110086944B CN 110086944 B CN110086944 B CN 110086944B CN 201811431637 A CN201811431637 A CN 201811431637A CN 110086944 B CN110086944 B CN 110086944B
Authority
CN
China
Prior art keywords
communication
party
virtual
service
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811431637.0A
Other languages
Chinese (zh)
Other versions
CN110086944A (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201811431637.0A priority Critical patent/CN110086944B/en
Publication of CN110086944A publication Critical patent/CN110086944A/en
Application granted granted Critical
Publication of CN110086944B publication Critical patent/CN110086944B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a communication method and a communication device based on a virtual number, wherein the method comprises the following steps: receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user; judging whether the first real number and the second virtual number have a preset corresponding relation or not; when the first real number and the second virtual number have a preset corresponding relationship, respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship; and sending the communication information sent by the first virtual number to the second real number. According to the embodiment of the application, the leakage of the personal information of the user is blocked, the safety of the personal information of both communication parties is effectively improved, and the situation that both communication parties receive harassment of other people is avoided.

Description

Communication method and device based on virtual number
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a communication method based on a virtual number and a communication device based on a virtual number.
Background
With the popularization of mobile devices, the mobile devices have been developed to almost one part of human hands, and the usage rate of the mobile devices in various aspects of work, study, daily communication and the like of people is higher and higher, so that the mobile devices are an indispensable part of life of people.
Mobile devices are mostly personal items carrying personal information of the user, such as a telephone number. With the wide application of mobile devices, personal information of users is easily leaked, and security problems are easily caused.
For example, some merchants distribute cheap goods maliciously, and a large number of users need to fill out personal information such as telephone numbers when purchasing, but the merchants do not ship goods after the users purchase the goods, but sell the personal information of the large number of users.
For another example, the article may be sold by a lawbreaker collecting personal information of the user during the express process.
The leakage of the personal information of the user easily causes the receipt of fraud calls, harassing calls and even the attack of the supplementary card (namely, lawless persons forge the personal information of the user, such as an identity card, apply for the supplementary mobile phone card of the user to an operator, and steal the virtual and real property of the user bound with the mobile phone card), and the potential safety hazard is very large.
Therefore, one technical problem that needs to be urgently solved by those skilled in the art is: how to provide a communication mechanism based on virtual numbers, and improve the safety of personal information of users.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present application is to provide a communication method based on a virtual number, so as to improve the security of personal information of a user.
Correspondingly, the embodiment of the application also provides a communication device based on the virtual number, which is used for ensuring the realization and the application of the method.
In order to solve the above problem, an embodiment of the present application discloses a communication method based on a virtual number, including:
receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
judging whether the first real number and the second virtual number have a preset corresponding relation or not;
when the first real number and the second virtual number have a preset corresponding relationship, respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
and sending the communication information sent by the first virtual number to the second real number.
Preferably, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Preferably, the correspondence configures a failure identifier; the failure identification is used for identifying the failure of the corresponding relation.
Preferably, the corresponding relationship includes an operation identifier corresponding to the processing operation; the method further comprises the following steps:
and deleting the invalid identifier in the corresponding relation when a recovery request sent by the first user or the second user for the operation identifier is received.
Preferably, the method further comprises the following steps:
when the first real number and the second virtual number do not have a preset corresponding relation, judging whether the communication frequency of the non-credible number of the second user is smaller than a preset communication frequency threshold value or not; the non-credible number is other real numbers which do not have a preset corresponding relation with the second virtual number;
if yes, sending communication information sent by the first real number to the second real number;
if not, rejecting the communication information which is sent by the first user and communicated with the second user.
The embodiment of the present application further discloses a communication device based on virtual numbers, including:
the communication information receiving module is used for receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
the corresponding relation judging module is used for judging whether a preset corresponding relation exists between the first real number and the second virtual number or not;
the number extraction module is used for respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship when the first real number and the second virtual number have a preset corresponding relationship;
and the first communication information sending module is used for sending the communication information sent by the first virtual number to the second real number.
Preferably, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Preferably, the method further comprises the following steps:
the failure identifier configuration module is used for configuring a failure identifier for the corresponding relation when the processing operation of the specified business object is finished; the failure identification is used for identifying the failure of the corresponding relation.
Preferably, the corresponding relationship includes an operation identifier corresponding to the processing operation; the device further comprises:
and the invalid identifier deleting module is used for deleting the invalid identifier in the corresponding relation when receiving a recovery request which is sent by the first user or the second user aiming at the operation identifier.
Preferably, the method further comprises the following steps:
the non-credible communication frequency judging module is used for judging whether the communication frequency of the non-credible number of the second user is smaller than a preset communication frequency threshold value or not when the first real number and the second virtual number do not have a preset corresponding relation; if yes, calling a second communication information sending module, and if not, calling a communication rejection module; the non-credible number is other real numbers which do not have a preset corresponding relation with the second virtual number;
the second communication information sending module is used for sending the communication information sent by the first real number to the second real number;
and the communication rejection module is used for rejecting communication information which is sent by the first user and is communicated with the second user.
Compared with the prior art, the embodiment of the application has the following advantages:
when a first real number of a first user and a second virtual number of a second user have a corresponding relation, the real number and the virtual number are considered to be credible numbers, communication information sent by the first virtual number of the first user is sent to the second real number of the second user, so that communication between the first user and the second user is carried out in a closed channel encrypted by the virtual number, the two-way white list mechanism can be regarded as, the first user and the second user cannot acquire real personal information of a communication opposite party, other people cannot acquire real personal information of the communication opposite party, leakage of the personal information of the users is blocked, and safety of the personal information of the communication opposite parties is effectively improved; and the virtual number dialed by other numbers which are not verified by the corresponding relation can be blocked by the server, namely the first user or the second user can not be communicated through the virtual number, so that the two communication parties are prevented from being harassed by others.
According to the embodiment of the application, when the processing operation of the specified business object is finished, the corresponding relation is configured with the failure identification, so that the corresponding relation is failed, the effective time of the virtual number is short, a specific operator for communication between two communication parties is easy to track within a specific effective time, the crime cost of communication problems such as fraud calls, harassing calls and even being attacked by a card complement is greatly increased, and the safety of the real environment of the two communication parties is effectively improved.
According to the embodiment of the application, when the recovery request sent by the first user or the second user for the operation identifier is received, the failure identifier in the corresponding relationship is deleted to reactivate the corresponding relationship, and the operation flexibility is improved on the basis of the technology of improving the safety of the real environment of the user.
According to the communication method and the communication device, when the communication information of the untrusted number is received, the establishment of communication or the rejection of the communication information is selected according to the number of times of communication of the untrusted number, the problem that communication cannot be carried out when an accident happens is prevented, and practicability is improved
Drawings
Fig. 1 is a flowchart illustrating steps of an embodiment 1 of a communication method based on virtual numbers according to the present application;
fig. 2 is a flowchart illustrating steps of an embodiment 2 of a virtual number-based communication method according to the present application;
fig. 3 is a flowchart illustrating steps of embodiment 3 of a virtual number-based communication method according to the present application;
fig. 4 is a block diagram illustrating a virtual number-based communication device according to embodiment 1 of the present application;
fig. 5 is a block diagram illustrating a virtual number based communication device according to embodiment 2 of the present application;
fig. 6 is a block diagram of a virtual number-based communication device according to embodiment 3 of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of embodiment 1 of a communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 101, receiving communication information submitted by a first user and communicated with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
step 102, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
103, when the first real number and the second virtual number have a preset corresponding relationship, extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship respectively;
and 104, sending the communication information sent by the first virtual number to the second real number.
In a communication system, a first terminal device, a second terminal device, and a server may be included.
The first user may have a first terminal device, the second user may have a second terminal device, and the first user may forward communication information for communicating with the second user to the server through the first terminal device, and the second user may receive the communication information sent by the first virtual number through the second terminal device.
The first terminal device and the second terminal device may comprise an electronic computer, a mobile device, a stationary telephone, or the like.
The electronic computer may support a designated application program, and the application program may interact with a server (for example, send and receive communication information) through a network such as the Internet by using an HTTP (Hypertext transfer Protocol) Protocol, so as to implement a network IP (Internet Protocol, Protocol for interconnecting networks) telephone function.
The mobile device may include a mobile phone, a tablet computer, and the like, and the mobile device may interact with the server (e.g., send and receive communication information) through a mobile network by using a WAP (Wireless Application Protocol) Protocol or an HTTP Protocol. The mobile Network may include a second generation mobile communication technology 2G Network, an integrated digital enhanced Network (i.e., 2.5G Network), a third generation mobile communication technology 3G Network, a fourth generation mobile communication technology 4G Network, a Virtual Network Operator (VNO) Network, and so on.
The fixed Telephone can interact with the server (for example, send communication information and receive communication information) through a Public Switched Telephone Network (PSTN) Network.
When a first real number of a first user and a second virtual number of a second user have a corresponding relation, the real number and the virtual number are considered to be credible numbers and are sent to the second real number of the second user, and communication information sent by the first virtual number of the first user enables communication between the first user and the second user to be carried out in a closed channel encrypted by the virtual number, so that the first user and the second user can not obtain real personal information of a communication opposite party and other people can not obtain the real personal information of the communication opposite party, leakage of the personal information of the users is blocked, and safety of the personal information of the communication opposite parties is effectively improved; and the virtual number dialed by other numbers which are not verified by the corresponding relation can be blocked by the server, namely the first user or the second user can not be communicated through the virtual number, so that the two communication parties are prevented from being harassed by others.
Referring to fig. 2, a flowchart of steps of embodiment 2 of the communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 201, receiving communication information which is sent by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
by applying the embodiment of the application, the first user can have the first terminal device, and the second user can have the second terminal device. The first terminal device may have a corresponding first real number and the second terminal device may have a second real number.
By real number, it is possible to refer to a number assigned by a communication carrier in the implementation.
For example, the fixed telephone number of Guangzhou consists of the area code "020" and 8 digits, the number of the mobile operator consists of 11 digits, and each mobile operator may have a specific number segment, and so on.
When the first user and the second user perform the processing operation of the designated service object, in order to protect the real personal information of the user, for example, the real number, a corresponding first virtual number and a corresponding second virtual number may be allocated to the first real number and the second real number.
The virtual number is a virtual number, which is a number corresponding to a real number, but has a communication function of the real number, that is, a user can communicate through the virtual number.
The virtual number may be a number owned by any communication operator, and a virtual number identification rule may be pre-agreed, for example, a number segment rule (a number in a certain number segment is specially used for configuring a virtual number), a null number marking rule (some numbers are null numbers and may be used for configuring a virtual number), and the like.
For different business domains, there may be different business objects, i.e. objects with business domain characteristics.
For example, for the semiconductor industry, business objects may include materials (e.g., silicon wafers); for the news media domain, the business object may include news data; for the mobile communication field, the service object may include mobile communication data; for the field of Electronic Commerce (EC), a business object may include a commodity.
In order to make the embodiments of the present application better understood by those skilled in the art, in the present specification, a commodity in the field of electronic commerce is described as an example of a business object.
The first user may be a buyer and the second user may be a seller and the processing operation of the business object may be a transaction for goods.
Of course, the first user may be a seller, and the second user may be a buyer, which is not limited in this embodiment of the application.
When the buyer and the seller transact for the commodity, the server can allocate virtual numbers for the buyer and the seller.
Specifically, when the buyer pays for the goods in the transaction, the server may allocate a first virtual number and a second virtual number to the buyer and the seller, and transmit the first virtual number of the buyer and the second virtual number of the seller to the buyer; and when the seller sends the buyer the goods in the transaction, the server may send the buyer's first virtual number and the seller's second virtual number to the seller.
It should be noted that the server can provide a cloud server, i.e., a service platform for providing comprehensive business capability for various internet users, so that data can be managed in a centralized manner.
Therefore, the buyer and the seller cannot acquire the real telephone number of the opposite party, and other people cannot acquire the real numbers of the two communication parties in the situations of express links and the like, so that the leakage of personal information of the user is effectively prevented.
Of course, the present example may assign the buyer and the seller a first virtual number and a second virtual number at any time of the transaction activity and transmit the buyer's first virtual number and the seller's second virtual number to the buyer and the seller.
After the first virtual number and the second virtual number are assigned, the corresponding relationship of the first real number, the first virtual number, the second real number, and the second virtual number may be added to a preset database.
For example, the format of the correspondence relationship may be as shown in the following table:
TABLE 1
Figure GDA0002718504400000081
The correspondence relationship may include a failure flag and an operation flag corresponding to the processing operation.
The failure identifier may be used to identify that the corresponding relationship is failed, and when the corresponding relationship is failed, the corresponding relationship may be considered to be absent; the operation identifier may identify the processing operation, that is, a unique operation identifier may be configured for the processing operations of the first user and the second user to identify the processing operation.
An example of the correspondence relationship may be shown in the following table, taking a transaction of a buyer and a seller as an example:
TABLE 2
Figure GDA0002718504400000082
The failure flag being "0" may indicate that the failure flag does not exist and the current corresponding relationship is valid.
When the first user and the second user perform the processing operation of the designated business object, communication may be performed.
For example, a buyer consults a seller about the performance, price, etc. of a good.
In this case, the first user may submit communication information for communication with the second user to the server through the first terminal device.
For example, as shown in Table 2, the buyer may dial a second virtual number "19087654321" for the seller via the cell phone, and the number "19087654321" being dialed may be displayed on the buyer's cell phone.
It should be noted that the communication information may be any information interactively transmitted through the real number mark, such as call information, short message information, multimedia message information, and the like, that is, the first user and the second user may perform telephone communication, short message communication, multimedia message communication, and the like based on the virtual number.
The server can receive communication information submitted by a first user through first terminal equipment and communicated with a second user; the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user.
For example, as shown in table 2, when the buyer dials the second virtual number "19087654321" of the seller through the mobile phone, the server may recognize that the first real number of the buyer is "18012345678" and the second virtual number of the seller is "19087654321".
Step 202, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
in a specific implementation, whether the first real number and the second virtual number have a corresponding relationship may be searched in a preset database.
If the first real number and the second virtual number are found, the corresponding relation between the first real number and the second virtual number can be judged.
If not, it can be determined that there is no correspondence between the first real number and the second virtual number.
For example, the server may recognize that the first real number of the buyer is "18012345678" and the second virtual number of the seller is "19087654321" in the communication information received, and after finding the corresponding relationship shown in table 2, it may be determined that the first real number "18012345678" and the second virtual number "19087654321" have a corresponding relationship.
Step 203, when the first real number and the second virtual number have a preset corresponding relationship, extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship respectively;
as shown in table 2, the first real number of the buyer is "18012345678", the corresponding first virtual number is "19012345678", the second virtual number of the seller is "19087654321", and the corresponding second real number is "18087654321".
Step 204, sending the communication information sent by the first virtual number to the second real number;
in a specific implementation, the server may dial a second real number in the voice gateway to establish a communication connection between the first user and the second user, but the first real number may be sent to the second user instead of the first virtual number.
For example, as shown in Table 2, a buyer with a first real number of "18012345678" dials a second virtual number of "19087654321" from the seller. After determining that the first real number "18012345678" and the second virtual number "19087654321" have a corresponding relationship, the server may dial the second real number "18087654321" corresponding to the second virtual number "19087654321" in the language gateway to establish a telephone communication connection between the buyer and the seller, and send the first virtual number "19012345678" corresponding to the first real number "18012345678" to the second real number "18087654321", that is, the mobile phone of the seller may display the incoming call with the received number "18087654321".
Step 205, when the processing operation of the specified business object is finished, configuring a failure identifier for the corresponding relationship;
in the embodiment of the present application, when the processing operation of the specified business object is finished, the corresponding relationship may be configured with the invalidation identifier, and the corresponding relationship is released.
For example, after the commodity transaction is completed, the correspondence relationship between the first real number, the first virtual number, the second real number and the second virtual number of the buyer and the seller may be released, and the first virtual number and the second virtual number may be deactivated.
After the invalidation identifier is configured for the corresponding relationship, the corresponding relationship may be considered to be absent.
At this time, if the first user requests the second virtual number to communicate with the first real number, the server may reject the communication request of the first user.
For example, after configuring the fail flag in table 2, the following table may be used:
TABLE 3
Figure GDA0002718504400000111
Wherein, the failure flag is "1" which may indicate that the failure flag exists and the current corresponding relationship is failed.
At this time, if the buyer requests communication with the second virtual number 19087654321 through the first real number 18012345678, the server may reject the buyer's communication request.
According to the embodiment of the application, when the processing operation of the specified business object is finished, the corresponding relation is configured with the failure identification, so that the corresponding relation is failed, the effective time of the virtual number is short, a specific operator for communication between two communication parties is easy to track within a specific effective time, the crime cost of communication problems such as fraud calls, harassing calls and even being attacked by a card complement is greatly increased, and the safety of the real environment of the two communication parties is effectively improved.
And step 206, deleting the invalid identifier in the corresponding relation when receiving a recovery request sent by the first user or the second user for the operation identifier.
In a specific implementation, for some reasons, the first user or the second user needs to communicate with the other party after the processing operation of the designated service object is finished.
For example, after the transaction of the product is completed, the buyer finds that the product has quality problems and needs to maintain after-sales rights, and therefore needs to communicate with the seller.
In this case, the server may find the corresponding relationship according to the operation identifier, and delete the invalid identifier in the corresponding relationship to activate the corresponding relationship.
For example, as shown in table 3, when receiving a recovery request of the buyer for the commodity transaction with the operation identifier "117135", the server may delete the revocation identifier in table 3, i.e., set the revocation identifier to "0" to activate the correspondence relationship.
After the invalid identifier is deleted, the corresponding relationship is valid and can be considered to exist, and the first user and the second user can communicate based on the first virtual number and the second virtual number again.
It should be noted that, because the storage capacity of the server is limited and the virtual number is limited, in order to release the storage capacity of the server and the virtual number, the server may delete the correspondence after the correspondence is invalidated for a period of time.
In this case, when the first user or the second user sends a recovery request for the operation identifier, the server may reassign the virtual number to the first user and the second user to allow the first user and the second user to communicate.
According to the embodiment of the application, when the recovery request sent by the first user or the second user for the operation identifier is received, the failure identifier in the corresponding relationship is deleted to reactivate the corresponding relationship, and the operation flexibility is improved on the basis of the technology of improving the safety of the real environment of the user.
Referring to fig. 3, a flowchart illustrating steps of embodiment 3 of the communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 301, receiving communication information submitted by a first user and communicated with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
step 302, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
step 303, when the first real number and the second virtual number do not have a preset corresponding relationship, determining whether the communication frequency of the untrusted number of the second user is smaller than a preset communication frequency threshold value; if yes, go to step 304, otherwise go to step 305;
in order to prevent, for example, a SIM (Subscriber Identity Module) from being damaged when an accident occurs, and thus, communication cannot be performed based on the original real number and the virtual number, in this embodiment of the present application, the first user and the second user may be allowed to perform communication of the untrusted number.
The non-trusted number may be another real number that does not have a preset correspondence with the second virtual number.
For example, the buyer and the seller are assigned corresponding virtual numbers in the commodity transaction, and the correspondence relationship as shown in table 2 is established. But the purchaser's SIM card is damaged and thus cannot communicate with the second virtual number "19087654321" using the first real number "18012345678".
However, the buyer knows the second virtual number "19087654321" of the seller, and the buyer can request to communicate with the seller based on other real numbers, such as "15012345678". Since there is no correspondence between the other real number "15012345678" and the second virtual number "19087654321" of the seller, the other real number "15012345678" is an untrusted number with respect to the second virtual number "19087654321".
In a specific implementation, the first user and the second user may set the communication times of the untrusted number in a single direction or in both directions. Namely, the first user can set the communication frequency threshold of the communication of the own non-trusted number and can also set the communication frequency threshold of the communication of the non-trusted number of the second user; correspondingly, the second user may set a communication frequency threshold for the communication of the own untrusted number, or may set a communication frequency threshold for the communication of the untrusted number of the first user.
Of course, the setting manner of the communication time threshold is only used as an example, and other setting manners of the communication time threshold may also be set in the embodiment of the present application, for example, the server limits the highest value and the lowest value of the communication time threshold of the non-signal code communication, and the like, which is not limited in the embodiment of the present application.
It should be noted that, the threshold of the number of times of communication of the untrusted number may be set to 0, i.e., the communication from the untrusted number is not accepted.
Step 304, sending the communication information sent by the first real number to the second real number;
and when the communication times of the non-trusted number are less than the threshold value of the communication times, the second user can still receive the communication from the non-trusted number, and the server can establish communication connection between the first user and the second user.
For example, if the buyer requests to communicate with the seller's second virtual number "19087654321" using the other real number "15012345678", the number "19087654321" being dialed may be displayed on the buyer's phone. When it is determined that there is no correspondence between the other real number "15012345678" and the second virtual number "19087654321", assuming that the number of times of communication of the untrusted number of the seller is 3 and is less than the preset threshold value of the number of times of communication 4, the server may dial the second real number "18087654321" corresponding to the second virtual number "19087654321" in the language gateway to establish communication connection between the buyer and the seller, and send the other real number "15012345678" to the second real number "18087654321", that is, an incoming call with the number "15012345678" may be displayed on the mobile phone of the seller.
Step 305, rejecting communication information sent by the first user and communicated with a second user.
When the communication times of the untrusted number are equal to the communication time threshold value, the second user does not receive the communication from the untrusted number, and the server may refuse to establish communication connection between the first user and the second user.
According to the communication method and the communication device, when the communication information of the non-credible number is received, the communication is established or the communication information is rejected according to the number of times of communication of the non-credible number, the problem that communication cannot be carried out when an accident happens is prevented, and the practicability is improved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 4, a block diagram of a communication device 1 based on a virtual number according to an embodiment of the present application is shown, which may specifically include the following modules:
a communication information receiving module 401, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 402, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
a number extracting module 403, configured to, when a preset corresponding relationship exists between the first real number and the second virtual number, respectively extract a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
a first communication information sending module 404, configured to send the communication information sent by the first virtual number to the second real number.
Referring to fig. 5, a block diagram of a communication device 2 based on a virtual number according to an embodiment of the present disclosure is shown, which may specifically include the following modules:
a communication information receiving module 501, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 502, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
a number extracting module 503, configured to respectively extract, when a preset corresponding relationship exists between the first real number and the second virtual number, a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
a first communication information sending module 504, configured to send the communication information sent by the first virtual number to the second real number.
A failure identifier configuring module 505, configured to configure a failure identifier for the corresponding relationship when the processing operation of the specified service object is finished; the failure identification is used for identifying the failure of the corresponding relation.
A revocation identifier deleting module 506, configured to delete a revocation identifier in the corresponding relationship when a recovery request sent by the first user or the second user for the operation identifier is received.
The correspondence may include an operation identifier corresponding to the processing operation.
In a specific implementation, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Referring to fig. 6, a block diagram of a communication device 3 based on a virtual number according to an embodiment of the present application is shown, which may specifically include the following modules:
a communication information receiving module 601, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 602, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
an untrusted communication number determining module 603, configured to determine whether the communication number of the untrusted number of the second user is smaller than a preset communication number threshold when the first real number and the second virtual number do not have a preset correspondence; if yes, a second communication information sending module 604 is called, and if not, a communication rejection module 605 is called;
the non-trusted number can be other real numbers which do not have a preset corresponding relation with the second virtual number;
a second communication information sending module 604, configured to send the communication information sent by the first real number to the second real number;
a communication rejecting module 605, configured to reject communication information sent by the first user and used for communicating with the second user.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In a typical configuration, the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (fransitory media), such as modulated data signals and carrier waves.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The communication method based on the virtual number and the communication device based on the virtual number provided by the application are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the above embodiment is only used to help understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (9)

1. A communication method based on virtual numbers comprises the following steps:
when the appointed business object processing operation is carried out between a business request party and a business response party, virtual numbers used for the communication between the business request party and the business response party are respectively distributed for the business request party and the business response party;
storing the corresponding relation between the virtual number and the real number of the communication between the two parties;
after the processing operation is finished, configuring a failure identifier for the corresponding relation so as to stop the virtual numbers distributed to the two parties;
and deleting the failure identification in the corresponding relation when a recovery request aiming at the processing operation is received so as to activate the corresponding relation.
2. The method of claim 1, wherein the allocating virtual numbers for two-party communication to the service requester and the service responder respectively comprises:
sending the virtual number distributed to the service request party to the service response party;
and sending the virtual number distributed to the service response party to the service request party.
3. The method of claim 1, further comprising:
and when receiving a communication request facing the opposite side, which is initiated by the service requester or the service responder, initiating a communication request to the real number of the opposite side based on the virtual number of the service requester or the service responder.
4. The method of claim 1, further comprising:
after the processing operation is finished, if a communication request for the opposite party initiated by the service request party or the service response party is received, virtual numbers for the communication between the service request party and the service response party are distributed to the service request party and the service response party again.
5. A virtual number based communication device, comprising:
the number allocation unit is used for allocating virtual numbers for communication between the service request party and the service response party when the specified service object processing operation is carried out between the service request party and the service response party, and storing the corresponding relation between the virtual numbers and the real numbers of the communication between the two parties;
the number recovery unit is used for configuring a failure identifier for the corresponding relation after the processing operation is finished so as to stop the virtual numbers distributed to the two parties;
and the number distribution unit deletes the failure identification in the corresponding relationship to activate the corresponding relationship when receiving a recovery request aiming at the processing operation.
6. The apparatus of claim 5, the number assignment unit to:
sending the virtual number distributed to the service request party to the service response party;
and sending the virtual number distributed to the service response party to the service request party.
7. The apparatus of claim 5, further comprising:
and the first communication unit initiates a communication request to a real number of the opposite side based on the virtual number of the service requester or the service responder when receiving the communication request which is initiated by the service requester or the service responder and faces the opposite side.
8. The apparatus of claim 5, wherein the first and second electrodes are disposed in a common plane,
and the number allocation unit is used for reallocating the virtual numbers for the communication between the service request party and the service response party when receiving the communication request for the opposite party initiated by the service request party or the service response party after the processing operation is finished.
9. A virtual number based communication device, comprising:
a processor;
a memory for storing machine executable instructions;
wherein, by reading and executing machine-executable instructions stored by the memory corresponding to virtual number-based communication logic, the processor is caused to:
when the appointed business object processing operation is carried out between a business request party and a business response party, virtual numbers used for the communication between the business request party and the business response party are respectively distributed for the business request party and the business response party;
storing the corresponding relation between the virtual number and the real number of the communication between the two parties;
after the processing operation is finished, configuring a failure identifier for the corresponding relation so as to stop the virtual numbers distributed to the two parties;
and deleting the failure identification in the corresponding relation when a recovery request aiming at the processing operation is received so as to activate the corresponding relation.
CN201811431637.0A 2014-06-11 2014-06-11 Communication method and device based on virtual number Active CN110086944B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811431637.0A CN110086944B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410258483.5A CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number
CN201811431637.0A CN110086944B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410258483.5A Division CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number

Publications (2)

Publication Number Publication Date
CN110086944A CN110086944A (en) 2019-08-02
CN110086944B true CN110086944B (en) 2022-01-25

Family

ID=54996450

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201811431637.0A Active CN110086944B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number
CN201410258483.5A Active CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number
CN201811422475.4A Active CN109905875B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201410258483.5A Active CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number
CN201811422475.4A Active CN109905875B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Country Status (1)

Country Link
CN (3) CN110086944B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026946B (en) * 2016-01-29 2020-01-10 廖致庆 Communication method and system and method for logistics communication
CN107026944B (en) * 2016-01-29 2020-02-07 廖致庆 Communication service platform and method for protecting telephone number and realizing taxi calling communication
CN107770396A (en) * 2016-10-21 2018-03-06 优估(上海)信息科技有限公司 Method of calling, system and server
CN108347403B (en) * 2017-01-23 2020-06-02 腾讯科技(深圳)有限公司 Method and device for distributing intermediate communication identification
CN108696864B (en) * 2017-04-06 2021-04-23 北京嘀嘀无限科技发展有限公司 Virtual number request and transmission method, device and storage medium
CN107749930B (en) * 2017-09-28 2020-07-07 贝壳技术有限公司 Call processing method, server and storage medium for binding virtual numbers for calling and called parties respectively
CN109729601A (en) * 2017-10-30 2019-05-07 北京京东尚科信息技术有限公司 The method and apparatus for establishing call connection
CN107959572A (en) * 2017-11-28 2018-04-24 上海云信留客信息科技有限公司 A kind of cloud call management system and platform
CN108040163A (en) * 2017-12-25 2018-05-15 刘光明 The alternative distribution method of telephone number
CN108882060B (en) * 2018-06-27 2020-10-27 腾讯科技(深圳)有限公司 Mutual dialing method, device and system for public telephone and computer readable storage medium
CN109275135A (en) * 2018-09-27 2019-01-25 惠州Tcl移动通信有限公司 Choosing method, storage medium and the mobile terminal of virtual SIM card resource
CN109274838B (en) * 2018-11-21 2019-12-03 恒宝股份有限公司 Generation and application method and secret communication system based on SIM card virtual-number
CN110769121B (en) * 2018-11-29 2020-11-13 北京嘀嘀无限科技发展有限公司 Virtual number validity period determining method and device, electronic equipment and storage medium
CN109600369A (en) * 2018-12-07 2019-04-09 陈善席 A kind of communication management method and device
CN109547652A (en) * 2018-12-07 2019-03-29 陈善席 A kind of method and device of telecommunication management
CN109587354A (en) * 2018-12-20 2019-04-05 平安科技(深圳)有限公司 Communication hiding number method, apparatus, computer equipment and storage medium
CN109587356B (en) * 2019-02-20 2020-12-29 携程旅游信息技术(上海)有限公司 Virtual number calling method, device, system, electronic equipment and storage medium
CN110113498B (en) * 2019-04-08 2021-01-26 中国联合网络通信集团有限公司 Bidirectional number protection method and device
CN111131633B (en) * 2019-12-18 2021-10-22 华为技术有限公司 Application method of virtual number, communication method and related device
CN111294790A (en) * 2020-02-11 2020-06-16 北京皮尔布莱尼软件有限公司 Communication processing method and device and computing equipment
CN112040071B (en) * 2020-09-09 2021-09-24 北京嘀嘀无限科技发展有限公司 Number protection method, device and system and number calling method and device
CN114143111A (en) * 2021-12-08 2022-03-04 北京中电普华信息技术有限公司 Communication management method and related device in distribution network emergency repair process
CN115150511B (en) * 2022-06-01 2023-12-19 清华大学 Communication system and method based on privacy protection of two communication parties

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1502202A (en) * 2001-04-03 2004-06-02 株式会社复方 Virtual telephone number service method and system
CN1859594A (en) * 2006-03-20 2006-11-08 华为技术有限公司 Method and device for displaying communication number
GB2434944B (en) * 2005-12-22 2008-01-23 Intellprop Ltd Telecommunications services apparatus and methods
WO2012007018A1 (en) * 2010-07-12 2012-01-19 Telefonaktiebolagt L M Ericsson (Publ) Enhanced privacy protection in a telecommunication network
CN102624995A (en) * 2011-01-27 2012-08-01 中国电信股份有限公司 Virtual number application method, device and system applicable to Internet

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6408327B1 (en) * 1998-12-22 2002-06-18 Nortel Networks Limited Synthetic stereo conferencing over LAN/WAN
US20040101123A1 (en) * 2002-11-22 2004-05-27 Garcia Michael C. Method of providing a temporary telephone number
CN101175236A (en) * 2007-07-27 2008-05-07 中国移动通信集团福建有限公司 Mobile phone virtual number use method and device
CN101827355A (en) * 2009-03-04 2010-09-08 中兴通讯股份有限公司 Communication method and system using virtual numbers, and mobile terminal
CN101674567B (en) * 2009-10-16 2013-04-03 候万春 Device and method of self-help change of phone number of mobile phone user
CN103841077B (en) * 2012-11-20 2017-12-12 中国电信股份有限公司 Community users method of calling and system, community platform
CN103546652B (en) * 2013-10-17 2016-06-29 青岛海信传媒网络技术有限公司 A kind of Number translation service device and the communication means of telephone number secrecy, system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1502202A (en) * 2001-04-03 2004-06-02 株式会社复方 Virtual telephone number service method and system
GB2434944B (en) * 2005-12-22 2008-01-23 Intellprop Ltd Telecommunications services apparatus and methods
CN1859594A (en) * 2006-03-20 2006-11-08 华为技术有限公司 Method and device for displaying communication number
WO2012007018A1 (en) * 2010-07-12 2012-01-19 Telefonaktiebolagt L M Ericsson (Publ) Enhanced privacy protection in a telecommunication network
CN102624995A (en) * 2011-01-27 2012-08-01 中国电信股份有限公司 Virtual number application method, device and system applicable to Internet

Also Published As

Publication number Publication date
CN105227786B (en) 2018-12-21
CN105227786A (en) 2016-01-06
CN109905875A (en) 2019-06-18
CN109905875B (en) 2023-03-24
CN110086944A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
CN110086944B (en) Communication method and device based on virtual number
US11727396B2 (en) Processing electronic tokens
CN110086768B (en) Service processing method and device
US10938983B2 (en) Communication method and server
CN107204957B (en) Account binding and service processing method and device
US10956972B2 (en) Account access system
US11222327B2 (en) Resource allocation method and device, and electronic payment method
CN106529851B (en) Order data processing method, communication data query method and server
CN104462949B (en) The call method and device of a kind of plug-in unit
US10623560B2 (en) Method and server for securing communication number
US20160149854A1 (en) Framework for Application to Application Interworking in the M2M World
WO2022237558A1 (en) Blockchain-based user element authentication method and apparatus
CN105744514B (en) A kind of method and device carrying out terminal room communication
CN107230080B (en) Service processing method and device and intelligent terminal
FI130360B (en) Verifying source of text message
FI130520B (en) Verifying source of text message
CN115330529A (en) Identification method, identification device, electronic equipment and computer storage medium
JP2016057682A (en) Authentication system and authentication method
CN114629973A (en) Message processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant