CN111756932A - Communication number protection method and storage medium - Google Patents

Communication number protection method and storage medium Download PDF

Info

Publication number
CN111756932A
CN111756932A CN201910247804.4A CN201910247804A CN111756932A CN 111756932 A CN111756932 A CN 111756932A CN 201910247804 A CN201910247804 A CN 201910247804A CN 111756932 A CN111756932 A CN 111756932A
Authority
CN
China
Prior art keywords
call
user
call request
server
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910247804.4A
Other languages
Chinese (zh)
Inventor
刘德建
丁迪锋
林陶钧
林星帆
周小白
林琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianyi Network Technology Co ltd
Original Assignee
Fujian Tianyi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianyi Network Technology Co ltd filed Critical Fujian Tianyi Network Technology Co ltd
Priority to CN201910247804.4A priority Critical patent/CN111756932A/en
Publication of CN111756932A publication Critical patent/CN111756932A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • H04M3/4365Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a communication number protection method and a storage medium, wherein the method comprises the following steps: the server generates a corresponding virtual number according to a real number input by a user at the webpage end; the server receives the time effectiveness of the virtual number set by the user at the webpage end; the server receives a call rule which is set by a user at a webpage end and corresponds to the real number; and in the time limit, the service end accesses the call request corresponding to the virtual number and forwards the call request to the real number or rejects the call request according to the conversation rule. The invention is convenient for the user to randomly apply the virtual number to various scenes within the validity period, and the big data analysis of the server and the self-defined conversation rule are combined to be taken as the basis for finally connecting the incoming call, thereby fundamentally blocking the harassment and simultaneously keeping the privacy of the real number. The method can be operated through the webpage terminal without additionally downloading app software.

Description

Communication number protection method and storage medium
Technical Field
The invention relates to the field of data protection, in particular to a communication number protection method and a storage medium.
Background
With the development and popularization of the internet, the application of big data brings convenience to common people and brings much trouble to people. Such as browsing or purchasing various types of products on a treasure, an east, or a plurality of people, and then receiving a telemarketing of the customer.
Most of the existing communication number protection modes need to download specific APP for interception, such as 360 mobile phone stewards, Tencent mobile phone stewards and the like. The applied technology comprises the following steps: and marking the mobile phone number by using big data, and judging whether the mobile phone number belongs to the marketing number or not by acquiring the caller identification, thereby determining whether blocking is performed or not. The existing protection mode has the following defects: 1. the related software needs to be installed; 2. require data tagging from the user; 3. huge data storage needs to be established.
Therefore, it is necessary to provide a method for protecting a communication number, which can overcome the above-mentioned disadvantages.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: a communication number protection method and a storage medium are provided, which can protect a communication number without installing specific software and without a user mark.
In order to solve the technical problems, the invention adopts the technical scheme that:
the communication number protection method comprises the following steps:
the server generates a corresponding virtual number according to a real number input by a user at the webpage end;
the server receives the time effectiveness of the virtual number set by the user at the webpage end;
the server receives a call rule which is set by a user at a webpage end and corresponds to the real number;
and in the time limit, the service end accesses the call request corresponding to the virtual number and forwards the call request to the real number or rejects the call request according to the call-through rule.
The invention provides another technical scheme as follows:
a computer-readable storage medium on which a computer program is stored, which program, when executed by a processor, is capable of implementing the steps included in the above-described communication number protection method.
The invention has the beneficial effects that: by providing the virtual number with the self-defined valid period, the user can conveniently and freely apply the virtual number to various scenes in the valid period without worrying about exposing the real number. On the basis, the method also supports the user to flexibly set the call rule and takes the call rule as the basis for finally connecting the incoming call, thereby fundamentally blocking harassment and simultaneously keeping the privacy of the real number. In addition, the method and the device can be operated and implemented through the webpage end without additionally downloading app software, so that the space is saved, and the method and the device have better operation flexibility.
Drawings
Fig. 1 is a schematic flow chart of a communication number protection method according to an embodiment of the present invention;
fig. 2 is a conceptual diagram of a communication number protection method according to an embodiment of the present invention;
fig. 3 is a schematic view of a server big data analysis process according to a first embodiment of the present invention;
fig. 4 is a schematic view of a web page operation interface according to a first embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
The most key concept of the invention is as follows: the user can use the virtual number in various scenes randomly within the validity period conveniently, and the user can use the customized conversation rule as the basis for finally connecting or not, so that harassment is fundamentally blocked, and the privacy of the real number is kept. The APP software does not need to be downloaded additionally, and the operation can be carried out through the webpage end.
Referring to fig. 1 and fig. 2, the present invention provides a method for protecting a communication number, including:
the server generates a corresponding virtual number according to a real number input by a user at the webpage end;
the server receives the time effectiveness of the virtual number set by the user at the webpage end;
the server receives a call rule which is set by a user at a webpage end and corresponds to the real number;
and in the time limit, the service end accesses the call request corresponding to the virtual number and forwards the call request to the real number or rejects the call request according to the call-through rule.
From the above description, the beneficial effects of the present invention are:
1. specific software does not need to be installed, and the method can be implemented through webpage end operation, so that the terminal space is saved, and the operation convenience is realized;
2. the virtual number with the self-defined effective period is provided, so that the user can apply the virtual number to various scenes such as communication numbers reserved for shopping conveniently, the user does not need to worry about exposing the real number, and disturbance can be effectively avoided.
3. The method also supports the user to flexibly set the call rule and then is used as the basis for finally connecting the incoming call, and the method can fundamentally block disturbance by combining the application of the virtual number and simultaneously keep the privacy of the real number.
4. The data analysis basis can be provided for efficiently positioning the intrusive object, so that the positioning of the intrusive object is facilitated.
Further, if the call rule corresponds to a white list call rule, the service end accesses the call request corresponding to the virtual number in the time limit, and forwards the call request to the real number or rejects the call request according to the call rule, which specifically includes:
the server stores a white list corresponding to the real number and set by the user through the webpage end to a database;
in the time limit, the server accesses the call request corresponding to the virtual number and judges whether the call number corresponding to the call request corresponds to a white list of a database;
if not, rejecting the call request;
if yes, the call request is forwarded to the real number.
As can be seen from the above description, in a specific example, the user can dedicate the virtual number to the service range according to professional positioning, and set the white list call rule at the same time, so that only incoming calls of numbers with service on the white list can be connected during the working time when the corresponding virtual number is valid, and all working incoming calls and harassing incoming calls caused by the used number (i.e., the virtual number) exposed during working are rejected during the working time outside the timeliness, i.e., the personal time. Therefore, the invention can realize the isolation of work and life from the communication layer, and enables the user to better enjoy personal life.
Further, if the call rule corresponds to a blacklist shielding rule, the server accesses a call request corresponding to the virtual number, and forwards the call request to the real number or rejects the call request according to the call rule, which specifically includes:
the server accesses a calling request corresponding to the virtual number and judges whether the calling number corresponding to the calling request corresponds to a blacklist of a database or not;
if yes, hanging up the calling number;
if not, the call request is forwarded to the real number.
As can be seen from the above description, in a specific embodiment, the call rule set by the user will obtain a result of whether to finally connect the incoming call based on the big data analysis of the server, so as to block all harassing incoming calls to the greatest extent.
Further, the forwarding the call request to the real number further includes:
the server receives the mark of the user to the calling number;
the server side matches the marks with known marks in the blacklist;
if the matching is successful, storing the calling number under a corresponding known mark name in a blacklist;
if the matching fails, storing the calling number and the unknown mark marked to the database, and setting a calling request for rejecting the calling number corresponding to the real number;
when the number of the marks corresponding to the calling number in the unknown marks reaches a preset value, the mark corresponding to the maximum proportion of the calling number is transferred to be stored as the known mark of the blacklist, and meanwhile, the calling number is transferred to be stored under the corresponding known mark name in the blacklist.
As can be seen from the above description, in a specific embodiment, if a new harassing phone number appears, along with the increase of the number of user tags, data learning and updating are autonomously completed in the server, and the server is applied to the blacklist judgment of all users, and all users can be ensured not to be harassed by continuously autonomously learning and updating through the general blacklist data, without manually tagging each user.
Further, the method also comprises the following steps:
and the server terminates, starts or suspends the time efficiency of the virtual number corresponding to the real number according to the state information corresponding to the real number, which is set by the user at the webpage end.
As can be seen from the above description, the validity of the virtual number can be set for a longer time, but during this time, the user is supported to flexibly suspend the validity of the virtual number or continue the validity of the virtual number or log off the virtual number through setting of the status information. The invention has high flexibility in configuration and implementation.
The invention provides another technical scheme as follows:
a computer-readable storage medium on which a computer program is stored, which program, when executed by a processor, is capable of implementing the steps included in the above-described communication number protection method.
As can be understood from the above description, those skilled in the art can understand that all or part of the processes in the above technical solutions can be implemented by instructing related hardware through a computer program, where the program can be stored in a computer-readable storage medium, and when the program is executed, the program can include the processes of the above methods, and has corresponding effects.
Example one
Introduction of background:
after a user buys or rents a house, a pile of people may continuously disturb the user through a real telephone number reserved by the user, such as buying the house, and then continuously disturb decoration advertisement calls, electric appliance sale advertisements and the like. For another example, a user is about to live a child in a hospital, a merchant who carelessly keeps track of the user can drain the "needs" of the user (baby daily necessities, nursing services, diaper, slimming and the like), which obviously brings trouble to the life of the user.
Referring to fig. 1 to 4, the present embodiment provides a method for protecting a communication number based on big data, which can fundamentally block a communication channel disturbing marketing while maintaining privacy of a real number of a user; further, additional software installation is not required.
The method comprises the following steps:
the user inputs a real number at the webpage end and sets the protection period of the real number. And after receiving the real number input by the user, the server end in communication connection with the webpage end generates a virtual number corresponding to the real number, and sets the time effectiveness of the virtual number according to the protection period set by the user. Here, the virtual number also has a communication function, and is not significantly different from a real number in terms of format and structure, and is not easily perceived as a false number. Meanwhile, the user is supported to define the time length of the protection period, the shortest time is up to several minutes, and the longest time can reach one year. An alternative age calculation may be in a countdown manner, for example, 170495441155, a virtual number with a remaining age of 514891 seconds.
It should be noted that after the virtual number is generated, the user can use the virtual number, for example, as a reserved telephone for shopping. Because the time efficiency of flexibly setting the virtual number is supported, the user does not need to worry about that the seller cannot arrive at the seller in time.
The user also sets the conversation rule of the real number at the webpage end and then transmits the conversation rule to the service end to take effect. The call rules at least comprise white list call rules and black list shielding rules, and the white list call rules and the black list shielding rules are basic rules. The white list conversation rule only accepts incoming calls of communication numbers on the white list and automatically rejects other incoming calls in the aging period of the virtual number, and the scene is suitable for specific professional users, such as boss and salesmen. And the blacklist shielding rule corresponds to the validity of the virtual number, and if the blacklist shielding rule is the incoming call of the blacklist number obtained by the big data analysis, the blacklist shielding rule is automatically rejected. Such a scenario is suitable for an ordinary user. In a specific example, a user is supported to customize a specific call rule, for example, to customize a member of a blacklist, and a customized blacklist screening rule is set, so as to screen only incoming calls of the member of the customized blacklist, and to specifically screen incoming calls of a specified group of people.
And after the server receives the time limit of the user about the virtual number and the setting of the conversation rule, starting the protection of the corresponding real number, namely entering the time limit of the virtual number.
And in the effective time limit of the virtual number, if a calling request sent to the virtual number by a dialing direction exists, the calling request is uniformly received by the server, then a preset conversation rule corresponding to the virtual number is obtained, and the calling request is processed according to the conversation rule. The specific processing mode includes two types, one is to transfer the call request to the real number according to the conversation rule, which can be understood as establishing a communication line between the incoming call number and the real number, and the two types carry out conversation. And the other is the incoming call which does not accord with the conversation rule, the calling request is rejected by the processing of the service terminal. Optionally, the rejecting mode includes hanging up directly, replying that the user is in a call, replying that the user has powered off, replying that the number is a null number, and the like.
The following describes the processing manner of the server side according to specific call rules:
(1) the call rule corresponds to a white list call rule.
And the user submits a white list corresponding to the real number to be protected to the service end through the webpage end in advance. And the server side receives the white list and stores the white list corresponding to the real number. Specifically, the association relationship between the white list and the corresponding real number and the specific contents of the white list and the corresponding real number may be stored in the database.
Within the effective time limit of the virtual number, once the server receives a call request of the virtual number corresponding to the real number of the user, the server acquires the call number corresponding to the call request and then judges whether the call number exists in a white list corresponding to the real number of the user stored in a database; if not, rejecting the call request; if yes, the call request is forwarded to the real number of the user.
Optionally, each user may identify a member of the address list of the user, and then construct a white list according to the identification. The identification supports customization, such as setting a unique mark according to own preference, and then selecting members with uniform identification, such as 'parent' identification, to form a white list. The setting of the identification can not only play a role of classifying and managing the telephone numbers, but also be used for customizing and making a conversation rule.
A specific application scenario corresponding to the white list call rule is as follows:
the hamames are successful women, who are young and lightly on the boss, do not want to be disturbed by others during work, and do not want non-relatives to get her phone number. Therefore, she can register at the webpage end of the invention to generate the virtual number A corresponding to the real number of her, and the virtual number A is used for work communication, such as being provided to business partners for business communication. At the same time, she would mark the communication number of the business partner that provided the virtual number a as "business partner XXXX" on the web page, preferably, this marking step could also be performed directly on the address book of the terminal (e.g. mobile phone) and then automatically synchronized to the server. Meanwhile, the user formulates the aging of the virtual number A on the webpage end as the working time of each working day and takes effect immediately; and setting the currently used call rule as a white list call rule, wherein the white list members are all communication numbers with a business partner mark. After that, the server side only needs to receive the calling request corresponding to the virtual number A, and judges whether the calling number corresponding to the calling request is in the white list, if so, the server side forwards the calling number to the real number of the user; if the current call is not in the white list, polite refusal is performed, such as prompting that the opposite side is currently in the call or the opposite side is powered off. Thus, the real number of the Korean plum female can be protected, the real business partner can keep communication with the real number A at work time on the basis of the virtual number A and the white list rule without preventing other people from calling at any time through the real number in time; meanwhile, even if the virtual number a of the work party is scattered by a real business partner or acquired by a marketer, it cannot cause a disturbance to her.
Therefore, the application of the white list rule in the embodiment can help a specific professional user to reject the incoming call harassment of people on the non-white list within a specific time period while keeping the privacy and normal use of the real number.
(2) The call rule corresponds to a blacklist call rule.
It should be noted that the blacklist of this example corresponds to a blacklist that is common to all users after the server side is analyzed and processed by big data, and may be understood as a list that has been regarded as a nuisance call by the anti-big data module of the server side.
Corresponding to the situation, the user can reject all calls which are identified as harassing calls without specially setting a white list or a black list through the webpage end. However, customized addition of the blacklist member is also supported, and the reverse big data module of the server side continuously and autonomously learns and updates the general blacklist according to the addition records of all users, so that the updating of the blacklist based on big data analysis is realized, the blacklist data is continuously improved, and the identification accuracy of the crank calls is improved.
Specifically, after a service terminal accesses a call request corresponding to a virtual number generated by the service terminal, a call number of the call request is acquired; then judging whether the calling number corresponds to a blacklist of a database; if yes, rejecting the call request of the call number; since here a nuisance call has been identified, a direct hang-up can be chosen. If the virtual number is not in the blacklist of the database, the real number corresponding to the virtual number is obtained, and then the call request is transferred to the real number.
Referring to fig. 3, the big data analysis processing procedure according to this example may include the following steps:
the server side can search the confirmed reliable crank call name list through various ways to update the general blacklist of the database; on the other hand, after the user connects the call number which is judged by the server side not to belong to the general blacklist, the call is regarded as a crank call through the conversation process, a mark can be added to the crank call automatically, and then the crank call is sent to the server side. After receiving the mark of the user to the crank call, the server matches the mark with the known marks in the general blacklist in the database. The known markers may include: advertising, promotion/promotion, fraud, etc. Moreover, in order to improve the matching accuracy and simultaneously be compatible with the personalized mark, a fuzzy matching mode is preferably adopted for matching. For example, the mark of the user is "promotion", but the known mark is not "promotion", and only the same "promotion" known mark exists, and the matching is successful in a fuzzy matching mode, namely a similar meaning word matching mode. If the matching can be successful, if the 'advertisement' mark is matched, the harassing call is directly stored under the 'advertisement' mark of the general blacklist, and the association between the harassing call and the 'advertisement' mark can be established. If the known mark cannot be matched, a type of disturbance mode which appears newly is possible, and assumed to be an education promotion, and the 'education' related mark added by the user does not belong to the known mark of the black list, at this time, the calling number and the mark thereof are stored to the unknown mark of the database, namely, an 'education' unknown mark is created. At the same time, since the user already identified the calling number as disturbing (embodied by the mark), the user will also set to reject the calling request of the calling number to the real number (virtual number) of the user. The unknown tags of the database do not correspond to a single user, but rather belong to a general tag group. And when the number of the marks corresponding to the calling number in the unknown marks reaches a preset value, namely, when a plurality of users simultaneously mark the calling number as "or similar marks, the service end acquires the mark corresponding to the maximum occupation ratio of the calling number and stores the mark into the known mark group of the blacklist, namely, a" "known mark is newly established, and simultaneously the calling number is also stored under the known mark name corresponding to the blacklist, namely, the calling number exists under the" "name".
One specific application scenario corresponding to this example is:
a woman who is a mother who is first-minded may be afraid of harassment because she needs to purchase products for babies, and then she has registered 3 virtual phone numbers for three persons: the milk powder, the paper diaper and the baby washing are purchased, and the time efficiency of the three virtual telephone numbers is set corresponding to the conventional receiving time. Here we mark the three virtual numbers as a1, a2 and A3, respectively. It can be understood that the virtual number a1 is used as a receiving telephone for purchasing milk powder on the Taobao, and the virtual number a1 is set to be 5 days old, because the goods can be received within 5 days after placing the order, in this period, if there is a problem, the buyer can contact the lady through the virtual number a1, and after 5 days, the virtual number a1 is disabled, and the lady cannot be contacted even if the seller or others dial the virtual number a1 again.
Some days later, a woman receives a promotion of the phone corresponding to virtual number a2, and after talking, the woman marks it as an advertisement and hangs up. At this time, the inverse big data module of the server receives the mark operation record of the lady and judges whether the mark operation record belongs to the known marks of the blacklist of the database, if the blacklist is not included in the known marks, the known marks of the database are temporarily added with the mark and the corresponding telephone number, and the telephone is prevented from being called into the virtual number A2 according to the user setting. When the mark corresponding to the telephone number reaches a certain amount (the corresponding server statistics include the mark of the lady or other users to the number), the server binds the telephone number with the mark with the maximum proportion according to the proportion of the mark, and adds the mark into the known mark of the universal blacklist. Preferably, this process is changed by the amount of marking by the user. And when the server finishes the anti-data learning, the self-updating of the blacklist is finished. When the telephone number dials any virtual number belonging to the server again, the server makes corresponding rule (hang-up) with the request on the server according to the mark, otherwise, the server is connected.
Corresponding to another specific example of the embodiment, the method also supports that the user flexibly enables, terminates or suspends the protection of the communication number by the service end. Specifically, the server terminates or starts or suspends the time effect of the virtual number corresponding to the real number according to the state information corresponding to the real number input by the user, which is set by the user at the webpage end. And the state information correspondingly starts anti-harassment, closes anti-harassment or recovers the virtual number. The server starts the anti-harassment protection of the real number according to the state information set by the user quickly, and can be understood as the effective preset aging period; or the time efficiency of one virtual number is suspended, and the time efficiency is continued after the starting operation; or logging out a certain virtual number, namely terminating the aging of the corresponding virtual number and putting the virtual number into a number recycle bin. One of the management interfaces of the web page is shown in fig. 4.
The embodiment realizes flexible, convenient and quick management and control of the virtual number, and supports operations of closing, pausing, logout and the like at any time.
Corresponding to the embodiment, malicious marketing disturbance can be blocked by establishing the time-limited call, so that the privacy and the safety of the user are guaranteed; and specific APP does not need to be installed, so that the method is convenient to operate and saves the terminal space. Furthermore, the method can also facilitate the analysis of the virtual numbers by enterprises, classify which people are more easily invaded by advertisements, and facilitate the enterprises to make strategic schemes; furthermore, the problem can be efficiently/quickly positioned and is embodied in the virtual number, and because the virtual number is bound with the real number of the user, in various advertisements, the server can collect user data to conclude which people are more easily disturbed by which types, and help the user to position the related problems.
Example two
This embodiment provides a corresponding first embodiment, and provides a computer readable storage medium, on which a computer program is stored, where the computer program is capable of implementing the steps included in the communication number protection method according to the first embodiment when the computer program is executed by a processor (such as a processor of a server in the first embodiment). The detailed steps are not repeated here, and refer to the description of the first embodiment in detail.
The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
In summary, the communication number protection method and the storage medium provided by the invention can apply the virtual number to various scenes at will, so that not only is there no need to worry about exposing the real number, but also the server can filter harassing calls based on big data analysis and by combining with the user-defined call rule, thereby realizing fundamentally blocking harassment and simultaneously keeping the privacy of the real number. Furthermore, the implementation of the invention can be operated and implemented through the webpage end without additionally downloading app software, thereby not only saving space, but also having more operation flexibility.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields are included in the scope of the present invention.

Claims (6)

1. A method for protecting a communication number, comprising:
the server generates a corresponding virtual number according to a real number input by a user at the webpage end;
the server receives the time effectiveness of the virtual number set by the user at the webpage end;
the server receives a call rule which is set by a user at a webpage end and corresponds to the real number;
and in the time limit, the service end accesses the call request corresponding to the virtual number and forwards the call request to the real number or rejects the call request according to the conversation rule.
2. The method for protecting a communication number according to claim 1, wherein if the call rule corresponds to a white list call rule, the server accesses a call request corresponding to the virtual number in the time period, and forwards the call request to the real number or rejects the call request according to the call rule, specifically:
the server stores a white list corresponding to the real number and set by the user through the webpage end to a database;
in the time limit, the server accesses a call request corresponding to the virtual number and judges whether the call number corresponding to the call request corresponds to a white list of a database;
if not, rejecting the call request;
if yes, the call request is forwarded to the real number.
3. The method for protecting a communication number according to claim 1, wherein if the call rule corresponds to a blacklist shielding rule, the server accesses a call request corresponding to the virtual number, and forwards the call request to the real number or rejects the call request according to the call rule, specifically:
the server accesses a calling request corresponding to the virtual number and judges whether the calling number corresponding to the calling request corresponds to a blacklist of the database or not;
if yes, hanging up the calling number;
if not, the call request is forwarded to the real number.
4. The method for protecting communications numbers of claim 3, wherein the forwarding the call request to the real number further comprises:
the server receives the mark of the user to the calling number;
the server side matches the marks with known marks in the blacklist;
if the matching is successful, storing the calling number under a corresponding known mark name in a blacklist;
if the matching fails, storing the calling number and the unknown mark marked to the database, and setting a calling request for rejecting the calling number corresponding to the real number;
when the number of the marks corresponding to the calling number in the unknown marks reaches a preset value, the mark corresponding to the maximum proportion of the calling number is transferred to be stored as the known mark of the blacklist, and meanwhile, the calling number is transferred to be stored under the corresponding known mark name in the blacklist.
5. The method of protecting a communication number of claim 1, further comprising:
and the server terminates or starts or suspends the aging of the virtual number corresponding to the real number according to the state information corresponding to the real number, which is set by the user at the webpage end.
6. A computer-readable storage medium on which a computer program is stored, the program being capable of implementing the steps included in the method for protecting a communication number of any one of claims 1 to 5 when executed by a processor.
CN201910247804.4A 2019-03-29 2019-03-29 Communication number protection method and storage medium Pending CN111756932A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910247804.4A CN111756932A (en) 2019-03-29 2019-03-29 Communication number protection method and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910247804.4A CN111756932A (en) 2019-03-29 2019-03-29 Communication number protection method and storage medium

Publications (1)

Publication Number Publication Date
CN111756932A true CN111756932A (en) 2020-10-09

Family

ID=72671616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910247804.4A Pending CN111756932A (en) 2019-03-29 2019-03-29 Communication number protection method and storage medium

Country Status (1)

Country Link
CN (1) CN111756932A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261659A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Control method and device for terminal and server, terminal and storage medium
CN113329130A (en) * 2021-06-15 2021-08-31 上海云鱼智能科技有限公司 Pseudo-virtual telephone number using method and device based on Internet and server

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060291411A1 (en) * 2005-06-08 2006-12-28 Varland Jason E Methods and systems for temporary additional telephone numbers
JP2009232116A (en) * 2008-03-21 2009-10-08 Nippon Telegr & Teleph Corp <Ntt> Telephone switching system and method
CN102469216A (en) * 2010-11-01 2012-05-23 米特尔网络公司 Establishing publicly accessible temporary telephone numbers enabling reversed caller identification
US20130115921A1 (en) * 2010-07-12 2013-05-09 Telefonaktiebolaget L M Ericsson (Publ) Enhanced Privacy Protection in a Telecommunication Network
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform
CN104284031A (en) * 2014-11-05 2015-01-14 格科微电子(上海)有限公司 Speech communication method, communication terminal and server
CN104836924A (en) * 2015-03-31 2015-08-12 小米科技有限责任公司 Number marking method and device
US20170013113A1 (en) * 2015-07-10 2017-01-12 Verizon Patent And Licensing Inc. Emergency call service for groups of devices with a shared number
CN106341558A (en) * 2016-08-30 2017-01-18 五八同城信息技术有限公司 Virtual number processing method and device and server
CN106791229A (en) * 2012-04-13 2017-05-31 北京搜狗科技发展有限公司 The identification method and device of number
CN107948448A (en) * 2016-10-12 2018-04-20 北京京东尚科信息技术有限公司 Method, system and the terminal device of telecommunication security protection
US10171653B1 (en) * 2013-01-23 2019-01-01 West Corporation Instant support agent call setup and call connection application
CN109361806A (en) * 2018-11-13 2019-02-19 北京奇虎科技有限公司 Black number storage method, black number mark method, system and device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060291411A1 (en) * 2005-06-08 2006-12-28 Varland Jason E Methods and systems for temporary additional telephone numbers
JP2009232116A (en) * 2008-03-21 2009-10-08 Nippon Telegr & Teleph Corp <Ntt> Telephone switching system and method
US20130115921A1 (en) * 2010-07-12 2013-05-09 Telefonaktiebolaget L M Ericsson (Publ) Enhanced Privacy Protection in a Telecommunication Network
CN102469216A (en) * 2010-11-01 2012-05-23 米特尔网络公司 Establishing publicly accessible temporary telephone numbers enabling reversed caller identification
CN106791229A (en) * 2012-04-13 2017-05-31 北京搜狗科技发展有限公司 The identification method and device of number
US10171653B1 (en) * 2013-01-23 2019-01-01 West Corporation Instant support agent call setup and call connection application
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform
CN104284031A (en) * 2014-11-05 2015-01-14 格科微电子(上海)有限公司 Speech communication method, communication terminal and server
CN104836924A (en) * 2015-03-31 2015-08-12 小米科技有限责任公司 Number marking method and device
US20170013113A1 (en) * 2015-07-10 2017-01-12 Verizon Patent And Licensing Inc. Emergency call service for groups of devices with a shared number
CN106341558A (en) * 2016-08-30 2017-01-18 五八同城信息技术有限公司 Virtual number processing method and device and server
CN107948448A (en) * 2016-10-12 2018-04-20 北京京东尚科信息技术有限公司 Method, system and the terminal device of telecommunication security protection
CN109361806A (en) * 2018-11-13 2019-02-19 北京奇虎科技有限公司 Black number storage method, black number mark method, system and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261659A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Control method and device for terminal and server, terminal and storage medium
CN112261659B (en) * 2020-10-20 2024-01-09 北京字节跳动网络技术有限公司 Control method and device for terminal and server, terminal and storage medium
CN113329130A (en) * 2021-06-15 2021-08-31 上海云鱼智能科技有限公司 Pseudo-virtual telephone number using method and device based on Internet and server

Similar Documents

Publication Publication Date Title
US9055146B2 (en) Social network based call management
US20030112941A1 (en) Identifying a context for a call
CN106302927A (en) The voice call platform that two-way number is hidden
CN106997357A (en) A kind of message treatment method, apparatus and system
CN107861773A (en) Associate management-control method, device, storage medium and the mobile terminal started
JP6224927B2 (en) Incoming call management apparatus and incoming call management system
CN102946343A (en) Method and system for accessing virtual rooms of audio and video communities
CN111756932A (en) Communication number protection method and storage medium
CN107707722A (en) SMS interception treating method and apparatus
CN107404580A (en) A kind of method, storage medium and equipment for intercepting harassing call number and short message
CN107332999A (en) A kind of Stranger Calls number identification method and device
US20230156111A1 (en) Methods and apparatus for placing call using qr code
CN108718369A (en) A kind of gateway accessing method, apparatus and computer storage media
CN109302539A (en) Harassing call hold-up interception method and device
CA2962311C (en) Improved automatic caller identification translation
CN108510630A (en) Property management method
KR101669659B1 (en) Method of telephone counseling to prevent exposure of private phone number
CN110383861B (en) Method and terminal for sharing information in call
CN109286931B (en) Wireless local area network access method and device
CN105472154B (en) Communication event processing method and processing device
CN110881072A (en) Voice message method, intelligent terminal and device with storage function
KR101605133B1 (en) Method for providing display data corresponding phone call
JP2003338884A (en) Method for connecting telephone line
KR102627512B1 (en) System for providing lettering service
TR2023018674A2 (en) A CALL AND MESSAGE BLOCKING SYSTEM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201009

RJ01 Rejection of invention patent application after publication