CN115022867A - Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship - Google Patents

Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship Download PDF

Info

Publication number
CN115022867A
CN115022867A CN202210611553.5A CN202210611553A CN115022867A CN 115022867 A CN115022867 A CN 115022867A CN 202210611553 A CN202210611553 A CN 202210611553A CN 115022867 A CN115022867 A CN 115022867A
Authority
CN
China
Prior art keywords
real number
privacy
real
binding relationship
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210611553.5A
Other languages
Chinese (zh)
Inventor
李楠
刘剑波
李文浩
彭荣茂
冯伟才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unicom Guangdong Industrial Internet Co Ltd
Original Assignee
China Unicom Guangdong Industrial Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unicom Guangdong Industrial Internet Co Ltd filed Critical China Unicom Guangdong Industrial Internet Co Ltd
Priority to CN202210611553.5A priority Critical patent/CN115022867A/en
Publication of CN115022867A publication Critical patent/CN115022867A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The scheme belongs to the technical field of voice communication and discloses a method and a device for realizing bidirectional voice communication between a privacy number and a real number in a non-binding relationship, wherein the method comprises the following steps: acquiring a real number C which is in a non-binding relation with the privacy number Y1 and calls the privacy number Y1; sending information to the real number C to prompt the real number C to input a real number B of the entrusted call; receiving a real number B input by a real number C; inquiring and judging whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, if so, acquiring a real number A in the binding relationship AX1Y 1B; and establishing a binding relation AX2Y1C between the real number C and the real number A. The scheme can ensure that the real number which is originally in the non-binding relationship and needs to contact the privacy number can be connected with the privacy number, and can avoid harassment caused by mistaken dialing or harassing calls to the real number corresponding to the privacy number; can be realized by utilizing a mature and stable technology, has low development cost and is beneficial to application and popularization.

Description

Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relation
Technical Field
The scheme belongs to the technical field of voice communication, and particularly relates to a method and a device for realizing bidirectional voice communication between a privacy number and a real number in a non-binding relationship.
Background
With the continuous development of society, no matter the country, enterprise or individual level all pay more and more attention to privacy protection, so the privacy intermediary number technology comes into play. The privacy intermediate number technology is used for protecting the mobile phone number of a client, calling is carried out through the transferred temporary number, the privacy is protected while voice incoming and outgoing calls are provided for the user, and therefore the real numbers of calling parties are prevented from being revealed.
The privacy intermediary number service is a service facing enterprises (such as dripping, beauty group, Shunfeng and the like), provides mobile phone numbers (without SIM cards) for the enterprises as privacy intermediary numbers, and is used for telephone communication between business personnel (such as drivers, couriers, dispatchers and the like) and users in certain business scenes (such as taxi taking, takeaway, express delivery and the like).
The current privacy intermediate number technology is realized on the premise that the numbers of calling and called parties establish a binding relationship, namely the calling and called parties and the privacy intermediate number need to establish the binding relationship by a calling platform before communication, and the calling and called parties cannot realize calling through the privacy intermediate number without the binding relationship. However, in reality, there are some scenarios that need to implement voice communication between the calling party and the called party under the condition that the non-binding relationship exists. For example, in industries such as take-out, express delivery, home-entry installation and maintenance, the small brows contact the next single person through the privacy intermediary numbers to process the work order, however, the next person is in a moment, the number (the privacy intermediary number) of the received small brows is shared with other people and entrusted to contact the small brows to process the work order, the calling platform is not clear of the situation and does not establish the privacy intermediary number binding relationship for the entrusted person and the small brows, and therefore the entrusted person cannot dial the number (the privacy intermediary number) of the small brows to contact the small brows, and therefore the work order processing progress of the business scene is influenced.
Disclosure of Invention
Based on this, it is necessary to provide a method and an apparatus for implementing bidirectional voice communication between a privacy number and a real number in a non-binding relationship, so as to solve the problem that a temporarily trusted real number cannot contact the real number corresponding to the privacy number through the privacy number.
One aspect of the present disclosure provides a method for implementing bidirectional voice communication between a privacy number and a true number in a non-binding relationship, where the method includes:
acquiring a real number C which is in a non-binding relation with the privacy number Y1 and calls the privacy number Y1;
sending information to the real number C to prompt the real number C to input a real number B of the entrusted call;
receiving a real number B input by a real number C;
inquiring and judging whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, if so, acquiring a real number A in the binding relationship AX1Y 1B;
and establishing a binding relation AX2Y1C between the real number C and the real number A.
In another aspect of the present disclosure, a device for implementing bidirectional voice communication between a privacy number and a true number in a non-binding relationship is provided, where the device includes:
the calling party acquiring module is used for acquiring a calling privacy number Y1 and a real number C which is in a non-binding relation with the privacy number Y1;
the prompt sending module is used for sending information to the real number C to prompt the real number C to input the real number B of the entrusted call;
the verification receiving module is used for receiving the real number B input by the real number C;
the query judging module is used for querying and judging whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, and if so, acquiring the real number A in the binding relationship AX1Y 1B;
and the binding module is used for establishing a binding relationship AX2Y1C between the real number C and the real number A.
10. The method according to claim 8 or 9, wherein the method is applied to service contact, and further comprises:
prior to the step of obtaining the call privacy number Y1 and the real number C in an unbound relationship with the privacy number Y1,
acquiring a service contact establishing request sent by a real number A and a real number B,
the privacy number Y1 and the privacy number X1 are respectively obtained from the number pool as the real number a and the real number B,
establishing a binding relation AX1Y1B for the real number A and the real number B;
after the step of establishing a binding relationship AX2Y1C for real number C and real number a,
acquiring a service contact ending request sent by a real number A and/or a real number B,
the real number A is in the unbinding relation with the real number B and the real number C, the AX1Y1B and the AX2Y1C,
the privacy numbers X1, X2, and Y1 are reclaimed to the number pool.
11. The method according to claim 8 or 9, wherein the method is applied to service contact, and further comprises:
prior to the step of obtaining the call privacy number Y1 and the true number C in an unbound relationship with the privacy number Y1,
acquiring a binding relationship establishment request sent by a service system,
acquiring a real number A and a real number B according to the information carried by the binding relationship establishment request,
the privacy number Y1 and the privacy number X1 are respectively obtained from the number pool as the real number a and the real number B,
establishing a binding relationship AX1Y1B for the real number A and the real number B;
after the step of establishing a binding relationship AX2Y1C for real number C and real number a,
acquiring a binding relationship release request sent by a service system,
unbinding the relations AX1Y1B and AX2Y1C according to the information carried by the binding relation unbinding request,
the privacy numbers X1, X2, and Y1 are reclaimed to the number pool.
12. The method of claim 11, further comprising:
after the step of establishing the binding relationship AX1Y1B for real number a and real number B,
pushing the binding relationship AX1Y1B to the serving system;
after the step of establishing a binding relationship AX2Y1C for real number C and real number a,
the binding relationship AX2Y1C is pushed to the serving system.
13. The non-binding relation realizes the two-way speech communication device of privacy number and true number, characterized by that, the apparatus includes:
the calling party acquiring module is used for acquiring a calling privacy number Y1 and a real number C which is in a non-binding relation with the privacy number Y1;
the prompt sending module is used for sending information to the real number C to prompt the real number C to input the real number B of the entrusted call;
the verification receiving module is used for receiving the real number B input by the real number C;
the query judging module is used for querying and judging whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, and if so, acquiring the real number A in the binding relationship AX1Y 1B;
and the binding module is used for establishing a binding relationship AX2Y1C between the real number C and the real number A.
14. The apparatus of claim 13, wherein the caller obtaining module is further configured to query and determine that the real number C is in an unbound relationship with the privacy number Y1.
15. The apparatus of claim 14, wherein the caller obtaining module is further configured to query for a called privacy number Y1 that determines that a binding relationship exists, or to monitor a called status of a privacy number Y1 that has a binding relationship.
16. The device of claim 13, wherein the prompt message sent by the prompt sending module to the real number C is output through voice or short message
17. The apparatus of claim 13, wherein the prompt sending module is further configured to send a message to the real number C prompting the user to re-enter the real number B of the delegated call when there is no binding relationship AX1Y1B between the entered real number B and the privacy number Y1.
18. The apparatus of claim 17, wherein the query determining module is further configured to determine whether the number of times of sending the prompt message to the real number C or the number of times of inputting the real number C exceeds a preset number, if yes, the real number C is automatically suspended, and if not, the prompt sending module sends a message to the real number C to prompt the real number C to re-input the real number B of the entrusted call.
19. The apparatus of claim 13, further comprising a number pool, a get setup request module, a get release request module, and a unbind module;
if the device can be applied to a service system with the privacy number binding function, the device can be used for the service system with the privacy number binding function
The acquisition and establishment request module is used for acquiring a service establishment contact request sent by the real number A and the real number B; the binding module is also used for respectively acquiring a privacy number Y1 and a privacy number X1 for the real number A and the real number B from the number pool and establishing a binding relationship AX1Y1B for the real number A and the real number B; the acquisition and release request module is used for acquiring a service contact ending request sent by the real number A and/or the real number B; the unbinding module is used for unbinding the relationships AX1Y1B and AX2Y1C between the real number A and the real number B as well as the real number C, and withdrawing the privacy numbers X1, X2 and Y1 to the number pool;
if the device can be applied to a privacy number binding platform independent of a service system, the device can be applied to the privacy number binding platform
The acquiring and establishing request module is used for acquiring a binding relationship establishing request sent by the service system and acquiring a real number A and a real number B according to information carried by the binding relationship establishing request; the binding module is also used for respectively acquiring a privacy number Y1 and a privacy number X1 for the real number A and the real number B from the number pool and establishing a binding relationship AX1Y1B for the real number A and the real number B; the obtaining and releasing request module is used for obtaining a binding relationship releasing request sent by the service system; the unbinding module is used for unbinding the relationships AX1Y1B and AX2Y1C according to the information carried by the binding relationship unbinding request, and recovering the privacy numbers X1, X2 and Y1 to the number pool.
20. The apparatus of claim 19, wherein the binding module is further configured to push the binding relationship AX1Y1B and/or AX2Y1C to the service system if the apparatus is applicable to a privacy number binding platform independent of the service system.
This scheme possesses following beneficial effect:
when the real number which is not bound with the privacy number calls the privacy number, the real number is prompted to input a number which is bound with the privacy number, whether a new binding relation is established for the real number or not is judged, so that the real number can dial through the privacy number, the fact that the real number which is originally not bound with the privacy number needs to be contacted can be ensured, and harassment caused by mistaken dialing or harassing calls to the real number corresponding to the privacy number can be avoided. The scheme can be realized by utilizing a mature and stable technology, has low development cost and is beneficial to application and popularization.
Drawings
In order to more clearly illustrate the technical solution in the present embodiment, the drawings needed to be used in the description of the embodiment will be briefly introduced below, and it is obvious that the drawings described below are only some embodiments of the present solution, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method for implementing bidirectional voice communication between a privacy number and a real number in a non-binding relationship according to embodiment 1.
Fig. 2 is a flowchart of a method of embodiment 1 for obtaining a real number C of a call privacy number Y1 and having an unbound relationship with a privacy number Y1.
Fig. 3 is a flowchart of another method of embodiment 1 of obtaining a real number C of a call privacy number Y1 and having an unbound relationship with a privacy number Y1.
FIG. 4 is a flowchart of another method for implementing a two-way voice communication method between a privacy number and a real number in a non-binding relationship according to embodiment 1.
Fig. 5 is a flowchart of a method of embodiment 1 of obtaining a privacy number X2 for a real number C from a number pool.
FIG. 6 is a flowchart of another method for implementing a two-way voice communication method between a privacy number and a real number in a non-binding relationship according to embodiment 1.
FIG. 7 is a flowchart of still another method for implementing a two-way voice communication between a privacy number and a true number in a non-binding relationship according to embodiment 1.
Fig. 8 is a block diagram of an apparatus for realizing a bidirectional voice communication apparatus between a privacy number and a true number in the non-binding relationship in embodiment 2.
Fig. 9 is a block diagram of another apparatus for implementing a bidirectional voice communication apparatus between a privacy number and a real number in a non-binding relationship in embodiment 2.
Detailed Description
The method and the device for realizing the bidirectional voice communication between the privacy number and the real number by the non-binding relationship provided by the scheme are described in detail by the embodiment below with reference to the attached drawings. In the following embodiments, the description of the technical solution is given by taking only a scenario in which the service requester (real number B) temporarily delegates the third person (real number C) to contact the service provider (real number a) as an example, and it can be understood by those skilled in the art that the technical solution described is also applicable to other business scenarios, for example, the service provider temporarily delegates the third person to provide services for the service requester.
Example 1
Referring to fig. 1, a flow chart of a method for implementing a bidirectional voice communication method between a privacy number and a real number by using an unbound relation is shown, wherein the method comprises the following steps:
step S101, acquiring a real number C which calls the privacy number Y1 and is in a non-binding relation with the privacy number Y1.
The method comprises the steps that when a service requester (a real number B) needs to purchase a service, a service system places an order, after a service provider (the real number A) receives the order and selects to receive the order, the service system directly or indirectly establishes a binding relationship AX1Y1B between the real number A and the real number B, feeds back a privacy number X1 of the service requester (the real number B) to the service provider (the real number A), feeds back a privacy number Y1 of the service provider (the real number A) to the service provider (the real number A), the service provider (the real number A) can be contacted with the service requester (the real number B) through dialing a privacy number X1, and the service requester (the real number B) can be contacted with the service provider (the real number A) through a privacy dialing number Y1. When the service requester (real number B) has a temporary event and cannot contact the service provider (real number a), the privacy number Y1 of the service provider (real number a) is shared with the temporary delegate (real number C) and delegated to contact the service provider (real number a).
The temporary trustee (real number C) receives the delegation and tries to call the privacy number Y1 of the service provider (real number A), at this time, the service system or the privacy number binding platform obtains the real number C of the temporary trustee according to the call signaling and inquires to determine that the real number C and the privacy number Y1 are in a non-binding relation, and therefore an authentication mechanism is triggered. Aiming at the calling of the real number of the non-binding relationship to the privacy number, the service system or the privacy number binding platform can inquire whether the privacy number has the binding relationship when the privacy number is called, if so, the real number of the privacy number is called, and if not, the real number of the privacy number is automatically hung up; the called condition of the privacy number with the binding relation can be monitored in real time, and when the called of the privacy number is monitored, the real number calling the privacy number is directly acquired; specifically, the method comprises the following steps:
referring to fig. 2, step S101 may include the following steps:
s101a, inquiring and determining that the called privacy number Y1 has a binding relation;
s101b, acquiring a real number C of the call privacy number Y1;
S101C, inquiring to determine that the real number C and the privacy number Y1 are in a non-binding relationship.
Referring to fig. 3, step S101 may include the following steps:
s101d, monitoring the called condition of the privacy number Y1 with the binding relationship;
s101e, when the privacy number Y1 is monitored to be called, the real number C of the calling privacy number Y1 is obtained;
s101f, inquiring to determine that the real number C and the privacy number Y1 are in a non-binding relationship.
Step S102, sending information to the real number C to prompt the real number C to input the real number B of the entrusted call.
After the authentication mechanism is triggered, the service system or privacy number binding platform will prompt the temporary delegate (true number C) to enter verification information in order to authenticate its identity. The real number of the service requester (real number B) who requests the temporary assignee (real number C) to call the privacy number Y1 is preferably requested to be input by the temporary assignee (real number C), and the service system or the privacy number binding platform can directly make an inquiry judgment using the received number input by the temporary assignee (real number C).
The service system or the privacy number binding platform can send prompt information to the temporary trustee (real number C) in a voice or short message sending mode, and correspondingly output the prompt information through voice or short messages at the terminal of the temporary trustee (real number C).
Step S103, receiving the real number B input by the real number C.
If the prompt message is output by voice, step S103 includes:
inputting a real number B through voice or clicking/touching a keyboard;
if the prompt message is output by a short message, step S103 includes:
and inputting a real number B through a short message.
In step S104, the inquiry judges whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1. If yes, step S105 is executed, and if no, step S102 or step S107 is executed.
In step S105, the real number a in the binding relationship AX1Y1B is acquired.
And step S107, automatic hang-up.
After receiving the real number B input by the temporary delegate (real number C), the service system or the privacy number binding platform may query whether a binding relationship exists between the real number B and the privacy number Y1, and if the binding relationship exists, the binding relationship may only be AX1Y1B, so as to determine that the temporary delegate (real number C) and the service requester (real number B) are in a recognized relationship, and call the privacy number Y1 to perform voice communication with the service provider (real number a), and the service system or the privacy number binding platform acquires the real number a from the binding relationship AX1Y1B, so as to establish a binding relationship between the temporary delegate (real number C) and the service provider (real number a).
If the number input by the temporary trustee (the real number C) is wrong, or the temporary trustee is not the trustee at all, the service system or the privacy number binding platform cannot inquire the binding relationship and cannot make the temporary trustee call the privacy number Y1, at this time, information can be sent to the real number C to indicate that the input is wrong and automatically hang up, and information can also be sent to the real number C to prompt the real number C to re-input the number of the service requester (the real number B), for example, "the number of the service requester input by you is wrong, please re-input". In the latter case, if the real number C inputs an error number for multiple times, the service system or the privacy number binding platform will hang up automatically, and before hanging up, a message can be sent to the real number C to explain the reason of hanging up, for example, "you lose error for too many times, expect your next use, see again".
Specifically, referring to fig. 4, step S104, step S102 or step S107 may include the following steps:
step S108, judging whether the number of times of sending the prompt information to the real number C or the number of times of inputting the real number C exceeds the preset number. If yes, go to step S107; if not, go to step S102.
The preset number may be 3, 5, or other numbers.
Step S106, establishing a binding relationship AX2Y1C between the real number C and the real number A.
When a binding relationship is established between the real number C and the real number A, the privacy number of the service provider (the real number A) is reused Y1 so that the temporary trustee (the real number C) can be perceived as the same service provider; the privacy number X2 of the temporary delegate (real number C) is obtained from the number pool so that the service provider (real number a) perceives as a new contact, and also in order to support the service provider (real number a) to call back the temporary delegate (real number C); thereby keeping the customer experience of both sides of the order indistinguishable from normal times.
The number pool can be established on a service system or a privacy number binding platform and is accessed to mobile communication operators, so that each mobile communication operator provides a vacant number which can be used as a privacy number for the number pool; or the mobile communication system can be established at the side of the mobile communication operator, and the service system or the privacy number binding platform sends an acquisition request to the mobile communication operator when needed.
Referring to fig. 5, if the number pool is controlled by the mobile communication operator, the step of obtaining the privacy number X2 for the real number C from the number pool includes the following steps:
step S106a, sending a request for obtaining the privacy number X2 to the mobile communication operator;
in step S106b, a privacy number X2 extracted from the number pool fed back by the mobile communication carrier is received.
Steps S101 to S106 may be executed by a service system having a privacy number binding function, or may be executed by a privacy number binding platform independent of the service system, specifically:
referring to fig. 6, if the service system having the privacy number binding function performs steps S101 to S106, the method may further include the following steps:
before the step S101, the process proceeds to,
step S100a, obtaining the request for establishing service contact sent by the real number A and the real number B,
step S100B, obtaining a privacy number Y1 and a privacy number X1 for the true number A and the true number B respectively from the number pool,
step S100c, establishing a binding relationship AX1Y1B for the real number A and the real number B;
after the step S106 is completed, the step S106,
step S109a, obtaining the end service contact request sent by the real number A and/or the real number B,
step S109B, for the true number A and true number B, true number C unbinding relationship AX1Y1B and AX2Y1C,
in step S109c, the privacy numbers X1, X2 and Y1 are reclaimed to the number pool.
Referring to fig. 7, if the privacy number binding platform independent of the service system performs steps S101 to S106, the method may further include the following steps:
before the step S101, the process proceeds to,
step S100d, acquiring the binding relationship establishment request sent by the service system,
step S100e, acquiring the real number A and the real number B according to the information carried by the binding relationship establishing request,
step S100f, obtaining a privacy number Y1 and a privacy number X1 for the true number A and the true number B respectively from the number pool,
step S100g, establishing a binding relationship AX1Y1B for the real number A and the real number B;
after the step S106 is completed, the step S106,
step S109d, acquiring the binding relation release request sent by the service system,
step S109e, unbinding the binding relationships AX1Y1B and AX2Y1C according to the information carried by the binding relationship unbinding request,
in step S109f, the privacy numbers X1, X2 and Y1 are reclaimed to the number pool.
Whether a service requester (number A) who makes an order on a service system or a service provider (number B) which may need to frequently establish a binding relationship with other people does not have a fixed privacy number, the privacy number is randomly acquired from a number pool when/after a service order is established, and the privacy number is recycled when/after the order is finished so as to release precious privacy number resources and establish the binding relationship between the service requester and the service provider in other service orders.
For the privacy number binding platform independent of the service system, the method may further comprise the following steps:
after step S100g, pushing the binding relationship AX1Y1B to the serving system;
after step S106, the binding relationship AX2Y1C is pushed to the serving system.
After receiving the binding relationship sent by the privacy number binding platform, the service system can decipher the binding relationship according to the binding mode, then feed back the privacy number X1 of the service requester (real number B) and the privacy number X2 of the temporary trustee (real number C) to the service provider (real number A), and feed back the privacy number Y1 of the service provider (real number A) to the service requester (real number B) and the temporary trustee (real number C), so that each party can get in touch with the other party by calling the privacy number.
Example 2
Referring to fig. 8, it shows a block diagram of an apparatus for implementing a bidirectional voice communication apparatus for a privacy number and a true number in a non-binding relationship, the apparatus may include:
the caller acquisition module 201 is used for acquiring a real number C which calls the privacy number Y1 and is in a non-binding relationship with the privacy number Y1;
a prompt sending module 202, configured to send information to the real number C to prompt the real number C to input the real number B of the entrusted call;
the verification receiving module 203 is used for receiving the real number B input by the real number C;
the query judgment module 204 is configured to query and judge whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, and if yes, acquire a real number a in the binding relationship AX1Y 1B;
and the binding module 205 is configured to establish a binding relationship AX2Y1C between the real number C and the real number a.
When the privacy number Y1 is called, the caller obtaining module 201 obtains the number of the calling privacy number Y1, and queries whether the number is bound to the privacy number Y1. If the number is in a binding relationship with the privacy number Y1, such as the real number B, the number can be used for dialing the privacy number Y1; if the number is not bound to the privacy number Y1, for example, the true number C, an authentication mechanism is triggered, and whether a binding relationship is established between the number and the privacy number Y1 is determined by the prompt sending module 202, the verification receiving module 203, and the query judging module 204, so that the privacy number Y1 can be dialed through. Therefore, the caller obtaining module 201 is also configured to query and determine that the real number C is in an unbound relationship with the privacy number Y1.
In principle, when Y1 is the privacy number for which there is a binding, the true number C of call Y1 needs to be obtained. Therefore, the caller obtaining module 201 is further configured to query and determine that the called privacy number Y1 has a binding relationship, then obtain the real number C of the calling privacy number Y1, and query and determine that the real number C and the privacy number Y1 are in a non-binding relationship; or the method is also used for monitoring the called condition of the privacy number Y1 with the binding relationship, namely only the privacy number with the binding relationship is monitored, the real number C of the calling privacy number Y1 is obtained when the privacy number Y1 with the binding relationship is monitored to be called, and the real number C and the privacy number Y1 are inquired and determined to be in the non-binding relationship.
The prompt message sent by the prompt sending module 202 to the real number C may be output through voice or a short message. If the prompt information is output through voice, the real number C can be input into the real number B through voice or clicking/touching a keyboard; if the prompt message is output through the short message, the real number C can be input into the real number B through the short message.
When the query and judgment module 204 queries and judges that there is no binding relationship between the real number B and the privacy number Y1, the real number C may be automatically hung up, so that the real number C cannot dial the privacy number Y1, or a chance of re-inputting the correct real number B to the real number C may be given, that is, the prompt and send module 202 is further configured to send a message to the real number C to prompt the real number C to re-input the real number B of the delegated call when there is no binding relationship AX1Y1B between the input real number B and the privacy number Y1.
It is unrealistic to give the real number C an unlimited number of times a correct real number B is re-entered, so the query and determination module 204 is further configured to determine whether the number of times of sending the prompt message to the real number C or the number of times of inputting the real number C exceeds a preset number, if so, the real number C is automatically hung up, and if not, the prompt and send module 202 sends a message to the real number C to prompt the real number C to re-enter the real number B of the commission call. The preset number may be 3, 5, or other numbers.
Referring to fig. 9, the apparatus may further include: a number pool 206, a get setup request module 207, a get release request module 208, and a unbind module 209.
The number pool 206 is used for providing or recovering the privacy numbers, can be established on a service system or a privacy number binding platform, and is accessed to mobile communication operators, so that each mobile communication operator provides null numbers which can be used as the privacy numbers for the number pool; or the privacy number binding platform can be established at the mobile communication operator side, and the service system or the privacy number binding platform sends an acquisition request to the mobile communication operator and receives the privacy number extracted from the number pool and fed back by the mobile communication operator as required.
The device can be applied to a service system with a privacy number binding function, and can also be applied to a privacy number binding platform independent of the service system, specifically:
if the device can be applied to a service system with a privacy number binding function, the obtaining and establishing request module 207 is used for obtaining a service contact establishing request sent by a real number A and a real number B; the binding module 205 is further configured to obtain a privacy number Y1 and a privacy number X1 for the real number a and the real number B from the number pool, respectively, and establish a binding relationship AX1Y1B for the real number a and the real number B; the obtaining and releasing request module 208 is configured to obtain a service contact ending request sent by the real number a and/or the real number B; the unbinding module 209 is configured to unbind the relationships AX1Y1B and AX2Y1C between the real number a and the real number B and the real number C, and reclaim the privacy numbers X1, X2, and Y1 to the number pool 206.
If the device can be applied to a privacy number binding platform independent of a service system, the obtaining and establishing request module 207 is used for obtaining a binding relationship establishing request sent by the service system and obtaining a real number A and a real number B according to information carried by the binding relationship establishing request; the binding module 205 is further configured to obtain a privacy number Y1 and a privacy number X1 for the real number a and the real number B from the number pool, respectively, and establish a binding relationship AX1Y1B for the real number a and the real number B; the obtaining release request module 208 is configured to obtain a binding relationship release request sent by the service system; the unbinding module 209 is configured to unbind the relationship AX1Y1B and AX2Y1C according to the information carried by the binding relationship unbinding request, and reclaim the privacy numbers X1, X2, and Y1 to the number pool 206.
Whether a service requester (number A) who makes an order on a service system or a service provider (number B) which may need to frequently establish a binding relationship with other people does not have a fixed privacy number, the privacy number is randomly acquired from a number pool when/after a service order is established, and the privacy number is recycled when/after the order is finished so as to release precious privacy number resources and establish the binding relationship between the service requester and the service provider in other service orders.
For a privacy number binding platform independent of the serving system, the binding module may further be configured to push the binding relationship AX1Y1B and/or AX2Y1C to the serving system.
It should be noted that: the non-binding relationship provided in the above embodiment implements a bidirectional voice communication apparatus with a privacy number and a real number, which is only illustrated by the above division of each functional module, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the apparatus is divided into different functional modules to complete all or part of the above described functions. In addition, the above-mentioned embodiments provide a method embodiment for implementing a bidirectional voice communication apparatus with a privacy number and a real number in a non-binding relationship, and a method embodiment for implementing a bidirectional voice communication method with a privacy number and a real number in a non-binding relationship, which belong to the same concept, and the specific implementation process thereof is described in the method embodiment and is not described herein again.
In summary, the present solution is proposed for a scenario where one (B) of two parties of two-way voice communication via privacy numbers temporarily entrusts another (C) to contact instead of the former one because the former one cannot directly contact the other (a) due to temporary origin, and when the consignee C calls the privacy number Y1, an authentication mechanism, such as an IVR procedure, etc., is triggered, authenticating the consignee C, verifying that the consignee C has a trust relationship with the principal B, establishing a binding relationship AX2Y1C between the consignee C and the privacy number Y1 as an acceptance basis, wherein X2 is a newly added privacy number for the delegate C, which is different from the privacy number X1 for the delegate B, so that a can perceive it as a new contact, the key is to support a to call back X2 to find C at the same time, and the privacy number of A is multiplexed with Y1, so that both the principal B and the consignee C can perceive the same contact, and the experience of each party is ensured to be indistinguishable from that of the ordinary times. The scheme can be developed at low cost by means of IVR and DTMF technologies, and the technology is mature and stable.
It should be understood that the above-mentioned embodiments of the present invention are only examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.

Claims (10)

1. The method for realizing the bidirectional voice communication between the privacy number and the real number by the non-binding relationship comprises the following steps:
acquiring a real number C which is in a non-binding relation with the privacy number Y1 and calls the privacy number Y1;
sending information to the real number C to prompt the real number C to input a real number B of the entrusted call;
receiving a real number B input by a real number C;
inquiring and judging whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, if so, acquiring a real number A in the binding relationship AX1Y 1B;
and establishing a binding relation AX2Y1C between the real number C and the real number A.
2. The method of claim 1, wherein the step of obtaining the real number C of the call privacy number Y1 and having an unbound relation with the privacy number Y1 comprises:
the query determines that the real number C is in an unbound relationship with the privacy number Y1.
3. The method of claim 2, wherein the step of obtaining the real number C of the call privacy number Y1 and having an unbound relation with the privacy number Y1 comprises:
inquiring and determining that a binding relation exists between the called privacy number Y1; or alternatively
The called condition of the privacy number Y1 of the binding relationship is monitored.
4. The method according to claim 1, wherein the step of querying whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1 comprises:
if not, the call is automatically hung up, or information is sent to the real number C to prompt the real number C to input the real number B of the entrusted call again.
5. The method according to claim 1, wherein the step of querying whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1 comprises:
if not, judging whether the number of times of sending the prompt information to the real number C or the number of times of inputting the real number C exceeds a preset number; if yes, automatically hanging up; if not, sending information to the real number C to prompt the real number C to re-input the real number B of the entrusted call.
6. The method of claim 4 or 5, wherein the step of sending a message to the real number C prompting the real number C to enter the real number B of the delegated call or the step of sending a message to the real number C prompting the real number C to re-enter the real number B of the delegated call comprises:
and outputting prompt information through voice or short messages.
7. The method of claim 6,
if the prompt message is output by voice, the step of receiving the real number B input by the real number C includes:
inputting a real number B through voice or clicking/touching a keyboard;
if the prompt message is output through a short message, the step of receiving the real number B input by the real number C comprises the following steps:
and inputting a real number B through a short message.
8. The method according to claim 1, wherein the step of establishing the binding relationship AX2Y1C between the real number C and the real number a comprises:
the privacy number X2 is obtained for the true number C from the number pool.
9. The method of claim 8, wherein if the number pool is controlled by a mobile communication carrier, the step of obtaining the privacy number X2 for the real number C from the number pool comprises:
sending a request for obtaining a privacy number X2 to a mobile communication operator;
a privacy number X2 extracted from the number pool fed back by the mobile communications carrier is received.
10. The non-binding relation realizes privacy number and true number two-way voice communication device, its characterized in that, the device includes:
the calling party acquiring module is used for acquiring a calling privacy number Y1 and a real number C which is in a non-binding relation with the privacy number Y1;
the prompt sending module is used for sending information to the real number C to prompt the real number C to input the real number B of the entrusted call;
the verification receiving module is used for receiving the real number B input by the real number C;
the query judging module is used for querying and judging whether a binding relationship AX1Y1B exists between the real number B and the privacy number Y1, and if so, acquiring the real number A in the binding relationship AX1Y 1B;
and the binding module is used for establishing a binding relationship AX2Y1C between the real number C and the real number A.
CN202210611553.5A 2022-05-31 2022-05-31 Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship Pending CN115022867A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210611553.5A CN115022867A (en) 2022-05-31 2022-05-31 Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210611553.5A CN115022867A (en) 2022-05-31 2022-05-31 Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship

Publications (1)

Publication Number Publication Date
CN115022867A true CN115022867A (en) 2022-09-06

Family

ID=83071806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210611553.5A Pending CN115022867A (en) 2022-05-31 2022-05-31 Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship

Country Status (1)

Country Link
CN (1) CN115022867A (en)

Similar Documents

Publication Publication Date Title
JP3054225B2 (en) Wireless phone service access method
CA2030439C (en) Enhanced privacy feature for telephone systems
CN1278537C (en) Telephone status notification system
CN112351134B (en) Virtual intermediate number privacy protection system
KR100690762B1 (en) A telephone call method and system for using many number in mobile communication station
US6611689B1 (en) System for integrating mobile telecommunication terminals into a private telecommunication system
US6813347B2 (en) Selective call waiting
CN110944088A (en) Method, device, storage medium and server for calling based on virtual telephone number
US20050084077A1 (en) Destination device based callee identification
CN1343425A (en) Communication network
CN113596262A (en) Method for increasing efficiency and ensuring full coverage of call based on logistics industry and service platform
CN103067620A (en) Method and device of realizing customer services
CN115022867A (en) Method and device for realizing bidirectional voice communication between privacy number and real number in non-binding relationship
CN1901683B (en) Method and apparatus for processing a communication request
EP0873032A1 (en) Authentication system for a mobile telephone
CN102013979A (en) Anti-counterfeiting authentication system
KR101323744B1 (en) Method for providing the business calling party numbers and system using the same
CN101056471B (en) Special network card implementation device and method
SE512440C2 (en) Method for secure telephony with mobility in a telephone and data communication system comprising an IP network
CN115334461B (en) One-chain calling system based on 4G module voice and transmission method thereof
RU2768757C1 (en) System and method for communication with vehicle owner
KR100872052B1 (en) Driver calling service method using relay type communication
KR100598968B1 (en) Method for managing call resource in Intelligent Network System and system thereof
CN1178423C (en) Method for protecting Internet supplementary service
JP3522228B2 (en) A communication system using a telephone network that allows arbitrary incoming calls to a data communication terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination