CN110611908A - Method for protecting user number privacy by using intermediate number - Google Patents

Method for protecting user number privacy by using intermediate number Download PDF

Info

Publication number
CN110611908A
CN110611908A CN201910889157.7A CN201910889157A CN110611908A CN 110611908 A CN110611908 A CN 110611908A CN 201910889157 A CN201910889157 A CN 201910889157A CN 110611908 A CN110611908 A CN 110611908A
Authority
CN
China
Prior art keywords
user
order
virtual
client platform
sends
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910889157.7A
Other languages
Chinese (zh)
Inventor
张淦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dajiang Network Technology (shanghai) Co Ltd
Original Assignee
Dajiang Network Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dajiang Network Technology (shanghai) Co Ltd filed Critical Dajiang Network Technology (shanghai) Co Ltd
Priority to CN201910889157.7A priority Critical patent/CN110611908A/en
Publication of CN110611908A publication Critical patent/CN110611908A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/45Security arrangements using identity modules using multiple identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for protecting user number privacy by intermediate number includes sending order request to client platform by user A, receiving order request from user A by client platform, and obtains the real telephone number of the user A and the real telephone number of the user B associated with the order, the client platform server generates a corresponding order number according to the order, and sends an instruction to the virtual number server to make the virtual number server dispatch a virtual number, when the user A submits the order request to the client platform server, the client platform server generates an order number according to the order request, binds a virtual number for the order number, sends the order number to a user B associated with the order, therefore, the user B can communicate with the user A by using the virtual number, and users except the user A and the user B cannot get through the virtual number, so that the occurrence of harassing calls is reduced.

Description

Method for protecting user number privacy by using intermediate number
Technical Field
The invention relates to the technical field of communication, in particular to a method for protecting user number privacy by using an intermediate number.
Background
In many scenarios, the mobile phone number of the user is often known by lawbreakers or salespeople, so that the user often receives some harassing calls and fraud short messages, which is very annoying.
At present, as mobile internet is developed more and more, the frequency range of exposure and leakage of personal communication numbers of users is wider and wider, and privacy and property safety of people cannot be guaranteed, so that the privacy protection requirement on the personal mobile phone communication numbers of the users is urgent and strong.
In order to solve the above problems, the present application provides a method for protecting user number privacy by using an intermediary number.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides a method for protecting the privacy of a user number by using an intermediate number.
(II) technical scheme
In order to solve the problems, the invention provides a method for protecting user number privacy by an intermediate number, wherein a user A sends an order request to a client platform, the client platform receives the order request of the user A and obtains a real telephone number of the user A and a real telephone number of a user B associated with the order, a client platform server generates a corresponding order number according to the order and sends an instruction to a virtual number server, so that the virtual number server dispatches a virtual number, the client platform server sends the dispatched virtual number to a device of the user B as a contact telephone number of the user A, the virtual number generated by the order is not the real telephone number of the user A but displayed on the device of the user B, if the user B does not receive the telephone, the user B can call back the virtual number, and the client service platform receives the request of the number, and automatically searching the real telephone number of the user A which is recently contacted with the user B, and sending a virtual number again to dial the equipment of the user A, so that the communication is established between the equipment of the user A and the equipment of the user B.
Preferably, when the user C obtains a virtual number from the device of the user B or the user a and dials the virtual number using the device of the user C, the client platform server receives the request, but the real number of the device of the user C is not found in the system storage unit, the system cannot find the order number related to the device of the user C, and the system defaults that the call is a nuisance call or invalid, so that the call cannot be connected.
Preferably, when a user A needs to send a short message to a user B, the user A firstly sends an order request to a client platform, the client platform sends the order request to a client platform server, and obtains a real telephone number of the user A and a real telephone number of the user B associated with the order, the client platform server generates a corresponding order number according to the order and sends an instruction to a virtual number server, the virtual number server selects an unallocated virtual number from a virtual number pool to the user A, the user A edits the content of the short message and sends the edited content of the short message to a dispatched virtual number, at the moment, the client platform server searches the real telephone number of the user B associated with the order according to the order number and sends the content of the short message to the user B through the virtual number generated by the order, and the user B can simultaneously carry out a receipt short message to the user A through the virtual number, and the client platform server side can correspondingly distribute according to the order number.
Preferably, when the user C obtains a virtual number from another place and sends a short message to the user C, the client platform server receives the request, but the storage unit does not store the order number associated with the device number of the user C, so the system defaults that the short message is a spam short message, and thus the sending is invalid.
Preferably, the receiving unit receives a request of an order and sends the information to the processing unit, the processing unit generates an order number according to the order, selects an unassigned virtual number from the virtual number pool to be used by the order, and sends the unassigned virtual number to the outside through the sending unit, and the storage unit stores the order number information.
Preferably, the storage unit is adapted to store the corresponding order number, as well as the virtual number associated with the order number and the real telephone numbers of user a and user B.
Preferably, the sending unit sends the virtual number allocated by the order generation to the user B as the contact phone number of the user a, so as to establish communication between the user a and the user B.
The technical scheme of the invention has the following beneficial technical effects: when a user A submits an order request to a client platform server, the client platform server generates an order number according to the order request, binds a virtual number for the order number, and sends the order number to a user B associated with the order, so that the user B can communicate with the user A by using the virtual number, and the user except the user A and the user B cannot get through the virtual number, thereby reducing the occurrence of harassing calls, and after receiving the order ending request, the virtual number distributed for the order number is recovered, thereby protecting the real telephone number of the user, and saving the virtual number resources. Causing property loss of residents and improving personal information security.
Drawings
Fig. 1 is a schematic structural diagram of a method for protecting user number privacy by using an intermediary number according to the present invention.
Fig. 2 is a flowchart of a method for protecting user number privacy by using an intermediary number according to the present invention.
Fig. 3 is a flowchart of information transmission in the method for protecting user number privacy by using an intermediary number according to the present invention.
Fig. 4 is a schematic structural diagram of a first embodiment of a method for protecting user number privacy by using an intermediary number according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1-4, according to the method for protecting privacy of a user number by using an intermediary number provided by the present invention, a user a sends an order request to a client platform, the client platform receives the order request from the user a and obtains a real phone number of the user a and a real phone number of a user B associated with the order, a client platform server generates a corresponding order number according to the order and sends an instruction to a virtual number server, so that the virtual number server dispatches a virtual number, the client platform server sends the dispatched virtual number to a device of the user B as a contact phone number of the user a, at this time, the virtual number generated by the order is not the real phone number of the user a displayed on the device of the user B, and if the user B does not receive the phone call, the user B can call back the virtual number, and the client platform receives the request of the number, and automatically searching the real telephone number of the user A which is recently contacted with the user B, and sending a virtual number again to dial the equipment of the user A, so that the communication is established between the equipment of the user A and the equipment of the user B.
In an alternative embodiment, when user C obtains a virtual number from user B or user a's device and uses user C's device to dial the virtual number, the client platform server receives the request, but does not find the real number of user C's device in its system storage unit, the system cannot find the order number associated with user C's device, and the system defaults that the call is a nuisance call or invalid, thus making the call inaccessible.
In an optional embodiment, when a user a needs to send a short message to a user B, the user a first sends an order request to a client platform, the client platform sends the order request to a client platform server, and obtains a real telephone number of the user a and a real telephone number of the user B associated with the order, the client platform server generates a corresponding order number according to the order and sends an instruction to a virtual number server, the virtual number server selects an unassigned virtual number from a virtual number pool to the user a, the user a edits the content of the short message and sends the edited content of the short message to a dispatched virtual number, at the moment, the client platform server searches the real telephone number of the user B associated with the order according to the order number and sends the content of the short message to the user B through the virtual number generated by the order, and the user B can simultaneously execute a short message back to the user a through the virtual number, and the client platform server side can correspondingly distribute according to the order number.
In an alternative embodiment, when user C obtains a virtual number from elsewhere and sends a short message to user C, the client platform server receives the request, but does not store the order number associated with user C's device number in its storage unit, so the system defaults that the short message is a spam message and the sending is invalid.
In an optional embodiment, the receiving unit receives a request of an order and sends the information to the processing unit, the processing unit generates an order number according to the order, selects an unassigned virtual number from the virtual number pool to be used by the order, and sends the unassigned virtual number to the outside through the sending unit, and the storage unit stores the order number information.
In an alternative embodiment the storage unit is arranged to store the corresponding order number, as well as the virtual number associated with the order number and the real telephone numbers of user a and user B.
In an alternative embodiment, the sending unit sends the virtual number allocated by the order generation to the user B as the contact phone number of the user a, so that the user a and the user B can establish communication.
It should be noted that, when the user A submits the order request to the client platform server, the client platform server generates the order number according to the order request, binds a virtual number for the order number, and sends the order number to the user B associated with the order, so that the user B can use the virtual number to communicate with the user A, and the user except the user A and the user B can not get through the virtual number, thereby reducing the occurrence of harassing calls, and after receiving the order ending request, the virtual number allocated for the order number is recovered, thereby protecting the real telephone number of the user, and saving the virtual number resources. Causing property loss of residents and improving personal information security.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (7)

1. A method for protecting user number privacy by using an intermediate number is characterized by comprising the following steps of; user A sends an order request to a client platform, the client platform receives the order request of user A and obtains the real telephone number of user A and the real telephone number of user B associated with the order, a client platform server generates a corresponding order number according to the order and sends an instruction to a virtual number server, so that the virtual number server dispatches a virtual number, the client platform server sends the dispatched virtual number to the equipment of user B as the contact telephone number of user A, the virtual number generated by the order is not the real telephone number of user A but displayed on the equipment of user B, if user B does not receive the telephone, user B can call back the virtual number, the client platform receives the request of the number and automatically searches the real telephone number of user A recently contacted with user B, and a virtual number is dispatched again to dial the user A device, so that the user A device and the user B device are communicated.
2. The method as claimed in claim 1, wherein when user C obtains a virtual number from user B or user a's device and dials the virtual number using user C's device, the client platform server receives the request, but does not find the real number of user C's device in its system storage unit, the system cannot find the order number associated with user C's device, and the system defaults the call as a nuisance call or invalid, thereby making the call unavailable.
3. The method of claim 1, wherein when a user A needs to send a short message to a user B, the user A first sends an order request to the client platform, the client platform sends the order request to the client platform server, and obtains a real phone number of the user A and a real phone number of the user B associated with the order, the client platform server generates a corresponding order number according to the order and sends an instruction to the virtual number server, the virtual number server selects an unassigned virtual number from the virtual number pool to the user A, the user A edits the content of the short message and sends the edited content of the short message to a dispatched virtual number, and then the client platform server searches the real phone number of the user B associated with the order according to the order number, and sends the content of the short message to the user B through the virtual number generated by the order, and the user B can simultaneously carry out receipt short messages to the user A through the virtual number, and the client platform server side can correspondingly distribute the receipt short messages according to the order number.
4. The method of claim 1, wherein when user C obtains a virtual number from another location and sends a short message, the client platform server receives the request but does not store the order number associated with the device number of user C in its storage unit, so the system defaults the short message to spam and the sending is invalid.
5. The method for protecting privacy of subscriber numbers according to claim 1, wherein the receiving unit receives a request for an order and transmits the information to the processing unit, the processing unit generates an order number according to the order, selects an unassigned virtual number from the pool of virtual numbers to use for the order, and transmits the order number to the outside through the transmitting unit, and the storage unit stores the order number information.
6. The method of claim 5, wherein the storage unit is configured to store the corresponding order number, and the virtual number associated with the order number, and the real phone number of user A and the real phone number of user B.
7. The method of claim 5, wherein the sending unit sends the virtual number assigned by the order generation to the user B as the contact phone number of the user A, so as to establish communication between the user A and the user B.
CN201910889157.7A 2019-09-19 2019-09-19 Method for protecting user number privacy by using intermediate number Pending CN110611908A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910889157.7A CN110611908A (en) 2019-09-19 2019-09-19 Method for protecting user number privacy by using intermediate number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910889157.7A CN110611908A (en) 2019-09-19 2019-09-19 Method for protecting user number privacy by using intermediate number

Publications (1)

Publication Number Publication Date
CN110611908A true CN110611908A (en) 2019-12-24

Family

ID=68891576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910889157.7A Pending CN110611908A (en) 2019-09-19 2019-09-19 Method for protecting user number privacy by using intermediate number

Country Status (1)

Country Link
CN (1) CN110611908A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111740970A (en) * 2020-06-15 2020-10-02 广西东信易通科技有限公司 Safe privacy conversation system of intelligent voice equipment
CN112203266A (en) * 2020-08-26 2021-01-08 汉海信息技术(上海)有限公司 Call method and electronic equipment
WO2023077979A1 (en) * 2021-11-02 2023-05-11 青岛海尔科技有限公司 Communication method, apparatus and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827355A (en) * 2009-03-04 2010-09-08 中兴通讯股份有限公司 Communication method and system using virtual numbers, and mobile terminal
CN104980903A (en) * 2015-06-30 2015-10-14 华为技术有限公司 Method and apparatus for protecting user' privacy

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827355A (en) * 2009-03-04 2010-09-08 中兴通讯股份有限公司 Communication method and system using virtual numbers, and mobile terminal
CN104980903A (en) * 2015-06-30 2015-10-14 华为技术有限公司 Method and apparatus for protecting user' privacy

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111740970A (en) * 2020-06-15 2020-10-02 广西东信易通科技有限公司 Safe privacy conversation system of intelligent voice equipment
CN111740970B (en) * 2020-06-15 2022-08-16 广西东信易通科技有限公司 Safe privacy conversation system of intelligent voice equipment
CN112203266A (en) * 2020-08-26 2021-01-08 汉海信息技术(上海)有限公司 Call method and electronic equipment
WO2023077979A1 (en) * 2021-11-02 2023-05-11 青岛海尔科技有限公司 Communication method, apparatus and device

Similar Documents

Publication Publication Date Title
US9548883B2 (en) Support incident routing
EP0924917A2 (en) Method for adding context to communications
CN110611908A (en) Method for protecting user number privacy by using intermediate number
CN102572904B (en) System and method for implementing automatic dial test business
RU2615333C2 (en) Method and device for processing data on receiver
CN111182159B (en) Communication method, device and storage medium based on team instant messaging application
US8582744B2 (en) Method and apparatus for identifier change notification
CN104822139B (en) A method of communicating number isolation and secret protection are realized based on intermediate number
CN106303100B (en) A kind of method and system of number protection
CN105393523A (en) Privacy protection method, device and user terminal
CN101459885B (en) Method, system and device for customer state automatic playing
CN104184871B (en) A kind of method and apparatus prompting harassing call number
EP2424204A1 (en) System and method for processing extension traffic in virtual switchboard, and virtual switchboard server
US20110051719A1 (en) Providing a call service in a communication network
CN107835325B (en) Method and server for real-time control of call
JP2008236450A (en) Method of providing nickname telephone service using mobile internet technology
CN109600369A (en) A kind of communication management method and device
KR101755021B1 (en) SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION
CN114598774B (en) Cloud mobile phone communication method and system
CN110234079A (en) A kind of important traffic group calling method, server, user equipment and storage device
WO2015099073A1 (en) Personal-information-adding system and charging method
KR100459764B1 (en) System and Method for Providing a Voice Mail-Box Service
KR20060088776A (en) System and method for notifing a telephone call by using messenger
KR20230096508A (en) Rich communication service message relay system and method thereof
JP4962876B2 (en) Earthquake information notification method and information processing apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191224

RJ01 Rejection of invention patent application after publication