WO2021135602A1 - Number privacy protection method, network device and computer storage medium - Google Patents

Number privacy protection method, network device and computer storage medium Download PDF

Info

Publication number
WO2021135602A1
WO2021135602A1 PCT/CN2020/125205 CN2020125205W WO2021135602A1 WO 2021135602 A1 WO2021135602 A1 WO 2021135602A1 CN 2020125205 W CN2020125205 W CN 2020125205W WO 2021135602 A1 WO2021135602 A1 WO 2021135602A1
Authority
WO
WIPO (PCT)
Prior art keywords
phone number
network device
verification token
token
terminal device
Prior art date
Application number
PCT/CN2020/125205
Other languages
French (fr)
Chinese (zh)
Inventor
王冲
叶筠
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021135602A1 publication Critical patent/WO2021135602A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/24Arrangements for supervision, monitoring or testing with provision for checking the normal operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol

Definitions

  • This application belongs to the technical field of software applications, and in particular relates to a number privacy protection method, network equipment and computer storage media.
  • the embodiments of the present application provide a number privacy protection method, network equipment, and computer storage medium to solve the problem that existing user numbers are easy to leak and affect user privacy and security.
  • the first aspect of the embodiments of the present application provides a number privacy protection method, including:
  • the network device obtains a call request sent by the first terminal device, where the call request includes a verification token and the first phone number of the first calling party;
  • the network device verifies the first phone number according to the verification token
  • the network device obtains the second phone number associated with the verification token, and establishes a call connection between the first phone number and the second phone number.
  • the first calling party does not directly use the called party's second phone number to make a call, but uses a verification token to make a call, which means that the called party does not need to show the second phone directly when showing the contact information. Instead, just show the verification token, so as to realize the anonymization of the called party’s phone number and prevent the called party’s second phone number from being leaked unintentionally or maliciously.
  • the verification token is associated with the phone number of the designated user.
  • the network device will check the first phone number of the first calling party according to the verification token. Perform verification. Only when the first calling party is the designated user, the verification token can pass the verification. Therefore, even if the verification token is leaked, other non-designated users cannot call the called party through the verification token.
  • the method before the network device obtains the call request sent by the first terminal device, the method further includes:
  • the network device creates the verification token according to the second phone number and the third phone number
  • the network device sends the verification token to the designated recipient.
  • the network device when creating a verification token, if the called party can directly obtain the third phone number of the second calling party, the network device can directly create a verification order based on the second phone number and the third phone number.
  • the creation process of the verification token is relatively convenient.
  • the method before the network device obtains the call request sent by the first terminal device, the method further includes:
  • the network device creates a first identity corresponding to the third telephone number, and returns the first identity to the third terminal device;
  • the network device queries a third phone number corresponding to the first identity identifier, and creates the verification token according to the second phone number and the third phone number;
  • the network device sends the verification token to the designated recipient.
  • the second calling party may also show the first identity to the called party.
  • the called party can know the first identity, but cannot know the third phone number, so that the third phone number is anonymized.
  • the network device obtains the first creation instruction, it queries the third phone number corresponding to the first identity, and then creates a verification token based on the second phone number and the third phone number.
  • this verification token creation method is relatively cumbersome, but it can realize the anonymization of the third phone number and prevent the third phone number from being leaked.
  • sending, by the network device, the verification token to a designated recipient includes:
  • the network device sends the verification token to the second terminal device, or sends the verification token to the third terminal device.
  • the network device may directly send the verification token to the third-end device, or the network device may also send the verification token to the second terminal device, and the called party will show the verification token to the second terminal device.
  • the second calling party may directly send the verification token to the third-end device, or the network device may also send the verification token to the second terminal device, and the called party will show the verification token to the second terminal device. The second calling party.
  • the network device obtains a second phone number associated with the verification token, and establishes the first phone number.
  • the call connection between a phone number and the second phone number includes:
  • the network device obtains the second phone number associated with the verification token, and establishes the first phone number and the second phone number Call connection.
  • the third phone number corresponding to the verification token can be obtained, and it is determined whether the first phone number is consistent with the third phone number.
  • first phone number is consistent with the third phone number, it means that the first calling party and the second calling party are the same user, and the first calling party has the right to call the second phone number.
  • the first phone number is not consistent with the third phone number, it means that the first calling party and the second calling party are not the same user, and the first calling party does not have the authority to call the second phone number.
  • the network device acquiring a second phone number associated with the verification token, and establishing a call connection between the first phone number and the second phone number includes :
  • the network device obtains the second phone number associated with the verification token, and sends the first phone number and the second phone number to the teleconference server to instruct the teleconference server to transfer the first A phone number and the second phone number are pulled into the same conference call.
  • the call connection between the first phone number and the second phone number may be established in the form of a conference call. At this time, even if the operator network of the first calling party and the operator network of the called party are different, the above solution can be implemented smoothly.
  • the numbers displayed on the first terminal device and the second terminal device are the conference number of the conference call, not the real number of the first phone number or the real number of the second phone number, Thereby protecting the privacy of the first phone number and the second phone number.
  • the second aspect of the embodiments of the present application provides a network device, including:
  • a call request module configured to obtain a call request sent by a first terminal device, the call request including a verification token and the first phone number of the first calling party;
  • a number verification module configured to verify the first phone number according to the verification token
  • a call connection module configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call connection between the first phone number and the second phone number .
  • the network device further includes:
  • a creation request module configured to obtain a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
  • a token creation module configured to create the verification token according to the second phone number and the third phone number
  • the token sending module is used to send the verification token to the designated receiver.
  • the network device further includes:
  • An identity request module configured to obtain an identity request sent by a third terminal device, where the identity request includes the third phone number of the second calling party;
  • An identity module configured to create a first identity corresponding to the third phone number, and return the first identity to the third terminal device
  • a creation request module configured to obtain a first creation request sent by a second terminal device, the first creation request including the second phone number and the first identity;
  • a token creation module configured to query a third phone number corresponding to the first identity identifier, and create the verification token according to the second phone number and the third phone number;
  • the token sending module is used to send the verification token to the designated receiver.
  • the token sending module is specifically configured to send the verification token to the second terminal device, or send the verification token To the third terminal device.
  • the call connection module is specifically configured to, if the first phone number is consistent with the third phone number, obtain the first phone number associated with the verification token. Two phone numbers, establishing a call connection between the first phone number and the second phone number.
  • the call connection module includes:
  • the teleconference submodule is used to obtain the second telephone number associated with the verification token, and send the first telephone number and the second telephone number to the telephone conference server to instruct the telephone conference server to The first phone number and the second phone number are pulled into the same conference call.
  • the third aspect of the embodiments of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and running on the processor.
  • a terminal device including a memory, a processor, and a computer program stored in the memory and running on the processor.
  • the processor executes the computer program, Implement the steps as described above.
  • the fourth aspect of the embodiments of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the steps of the foregoing method are implemented.
  • the fifth aspect of the embodiments of the present application provides a computer program product, which when the computer program product runs on a terminal device, enables the terminal device to implement the steps of the above-mentioned method.
  • the embodiment of the application provides a number privacy protection method.
  • the first terminal device as the first calling party wants to call the called party, it sends a call request to the network device.
  • the call request includes the verification token and the first terminal device.
  • the network device verifies the first phone number according to the verification token. If the first phone number is verified, the second phone number associated with the verification token is obtained, and a call connection between the first phone number and the second phone number is established.
  • the first calling party does not directly make a call through the called party’s second phone number, but makes a call through a verification token.
  • the called party shows the contact information
  • the verification token is associated with the phone number of the designated user.
  • the network device will check the first phone number of the first calling party according to the verification token. Perform verification to determine whether the call of the first calling party is legal. Only when the first calling party is the designated user, the verification token can pass the verification. Therefore, even if the verification token is leaked, other non-designated users cannot call the called party through the verification token, which prevents the called party from frequently receiving harassing calls due to the leak of the verification token, which improves the user’s privacy and security. It has strong ease of use and practicality.
  • FIG. 1 is a schematic flowchart of a method for protecting number privacy according to an embodiment of the present application
  • Figure 2 is a signaling diagram of an application scenario provided by an embodiment of the present application.
  • Figure 3 is a signaling diagram of another application scenario provided by an embodiment of the present application.
  • Figure 4 is a signaling diagram of another application scenario provided by an embodiment of the present application.
  • Figure 5 is a signaling diagram of another application scenario provided by an embodiment of the present application.
  • Figure 6 is a signaling diagram of another application scenario provided by an embodiment of the present application.
  • Figure 7 is a signaling diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • Fig. 9 is a schematic structural diagram of another network device provided by an embodiment of the present application.
  • the term “if” can be interpreted as “when” or “once” or “in response to determination” or “in response to detection” depending on the context .
  • the phrase “if determined” or “if detected [described condition or event]” can be interpreted as meaning “once determined” or “in response to determination” or “once detected [described condition or event]” depending on the context ]” or “in response to detection of [condition or event described]”.
  • the number privacy protection method provided in the embodiments of the present application can be applied to network equipment.
  • the network device can be any device with data transmission and reception and data processing functions, including but not limited to smart phones, tablets, wearable devices, vehicle-mounted devices, augmented reality (AR)/virtual reality (VR) Equipment, laptops, ultra-mobile personal computers (UMPC), netbooks, personal digital assistants (PDAs), artificial intelligence (AI) terminals and other network equipment.
  • AR augmented reality
  • VR virtual reality
  • UMPC ultra-mobile personal computers
  • PDAs personal digital assistants
  • AI artificial intelligence terminals and other network equipment.
  • the embodiments of this application do not impose any restrictions on the specific types of network devices.
  • the network device may be a station (STAION, ST) in a WLAN, a cell phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, Personal Digital Assistant (PDA) devices, handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, in-vehicle devices, car networking terminals, computers, laptop computers, handheld communication devices , Handheld computing devices, satellite wireless devices, customer premise equipment (CPE) and/or other devices used to communicate on wireless systems, and next-generation communication systems, such as mobile terminals in 5G networks or the future Mobile terminals in the evolved Public Land Mobile Network (PLMN) network.
  • STAION, ST in a WLAN
  • a cell phone a cordless phone
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • handheld devices with wireless communication functions computing devices or other processing devices connected to wireless modems
  • users can block some harassing phone numbers through the blacklist function of the mobile phone to ensure that they will not receive calls and messages from these blocked numbers in the future.
  • This method is a passive defense method that relies on each user to mark the number of the harassing call.
  • many harassing calls are now dialed through virtual dialing software, using virtual numbers. Even if the user pulls the virtual number into the blacklist, the harasser can change the virtual number to continue the harassment.
  • the blacklist has the effect of blocking harassing calls limited.
  • users can enter their real phone number into the scan code and call the front desk. Scan the QR code to call the front desk to generate a QR code based on the user's real phone number, store the user information and the QR code in the relational database, and return the QR code to the user. When users need to share their contact information with others, they can show the QR code as the contact information. Later, when the caller needs to call the user, he can scan the QR code to access the scan code to call the front desk, and the scan code to call the front desk returns the middle number assigned by the middle number platform to the caller. The caller dials the intermediate number, and the operator roams to the intermediate number platform, and the intermediate number platform is transferred to the user's real number, so that the caller can call the user.
  • the user number can be anonymized.
  • the above two-dimensional code is maliciously shared, users will still receive a large number of harassing calls.
  • the above two-dimensional code is set with an expiration time, it is not suitable for some organizations or individuals who need to stay in contact for a long time and cannot be fully trusted.
  • the implementation of the above solution relies on the support of operator network roaming, and it is difficult to implement the above solution when the operator network of the caller and the user are different.
  • the embodiment of the application provides a number privacy protection method.
  • the first terminal device as the first calling party wants to call the called party, it sends a call request to the network device, and the call request includes verification.
  • the token and the first phone number of the first caller The network device verifies the first phone number according to the verification token. If the first phone number is verified, the second phone number associated with the verification token is obtained, and a call connection between the first phone number and the second phone number is established.
  • the first calling party does not directly make a call through the called party’s second phone number, but makes a call through a verification token.
  • the called party shows the contact information
  • the verification token is associated with the phone number of the designated user.
  • the network device will check the first phone number of the first calling party according to the verification token. Perform verification to determine whether the call of the first calling party is legal. Only when the first calling party is the designated user, the verification token can pass the verification. Therefore, even if the verification token is leaked, other non-designated users cannot call the called party through the verification token, which prevents the called party from frequently receiving harassing calls due to the leak of the verification token.
  • the number privacy protection method provided in this embodiment solves the problem that existing user numbers are easy to leak and affect user privacy and security.
  • the method includes:
  • a network device obtains a call request sent by a first terminal device, where the call request includes a verification token and the first phone number of the first calling party.
  • the first terminal device is the terminal device of the first calling party
  • the second terminal device is the terminal device of the called party
  • the third terminal device is the terminal device of the second calling party.
  • the first calling party is a user who wants to call the called party
  • the second calling party is a user who interacts with the called party. It is understandable that the first calling party and the second calling party may be the same user or different users.
  • the first calling party wants to call the called party, the first calling party can send a call request to the network device through the first terminal device.
  • the network device receives the call request sent by the first terminal device, and performs subsequent operations according to the content contained in the call request.
  • the call request can be set according to the actual situation.
  • the call request may include the verification token and the first phone number of the first calling party.
  • the call request in addition to the verification token and the first phone number of the first calling party, may also include one or more of information such as dialing location and dialing time.
  • the generation method of the verification token can be set according to the actual situation.
  • the second calling party when the called party leaves the contact information for the second calling party, the second calling party can be asked to show the third phone number.
  • the called party After obtaining the third phone number of the second calling party, the called party sends the first creation request to the network device through the second terminal device.
  • the first creation request includes the second phone number of the called party and the third phone number of the second calling party.
  • the network device When the network device receives the first creation request, it can create a verification token based on the second phone number and the third phone number, and store the correlation between the verification token and the second phone number and the third phone number.
  • the second calling party is required to show the third phone number.
  • the second caller is also concerned that his third phone number will be unintentionally or deliberately leaked by others, leading to a large number of harassing calls.
  • the second calling party may not directly show its phone number.
  • the second calling party can send an identity request to the network device through the third terminal device. If the second calling party has previously stored the third phone number in the network device, the network device may generate the first identity according to the identity request, and associate the first identity with the third phone number.
  • the identity request should include the third phone number of the second calling party.
  • the network device generates the first identity identifier according to the identity identifier request, stores the third telephone number and the first identity identifier, and associates the third telephone number with the first identity identifier.
  • the first identity can be returned to the third terminal device.
  • the form of the first identity can be determined according to actual conditions.
  • the first identity identifier may be one or more of two-dimensional code, barcode, number, character, and the like.
  • the second calling party When the second calling party needs to show the contact information to the called party, it can show the first identity to the called party.
  • the called party After obtaining the first identity, the called party sends a first creation request to the network device through the second terminal device.
  • the first creation request includes the second phone number of the called party and the first identity of the second calling party.
  • corresponding leakage prevention measures can be set for the first identity.
  • the effective number of times of the first identity can be set, assuming that the number of effective times is set to 1, then the first identity will become invalid after it is used once; or, the effective time of the first identity can also be set, assuming that it is valid If the time is 5 minutes, the second calling party or called party must use the first identity within 5 minutes, otherwise the first identity becomes invalid.
  • the network device After receiving the first creation request, the network device verifies the legitimacy and validity of the first identity. If the first identity is verified, the third phone number corresponding to the first identity is queried, a verification token is created based on the third phone number and the second phone number, and the verification token and the third phone number are stored And the association relationship of the second phone number.
  • the method of creating a verification token based on the third phone number and the second phone number can be set according to actual conditions.
  • random numbers can be used as verification tokens.
  • the network device receives the first creation request, it generates a random number, uses the random number as a verification token, and records the association relationship between the random number and the third phone number and the second phone number.
  • the hash value can also be used as the verification token.
  • the network device receives the first creation request, it hashes the time when the first creation request is received to obtain a hash value, uses the hash value as a verification token, and records the hash value and The association relationship between the third phone number and the second phone number.
  • other methods may be selected to generate the verification token, which will not be repeated here.
  • the network device After the network device generates the verification token, it can send the verification token to the designated recipient.
  • the sending form of the verification token and the designated receiver can be set according to the actual situation.
  • the third terminal device can be used as the designated receiver, and the network device can send the verification token to the third terminal device in the form of Uniform Resource Locator (URL) via SMS, and the URL contains the verification token.
  • URL Uniform Resource Locator
  • Token or, the second terminal device can also be used as the designated recipient, the network device sends the verification token to the second terminal device in the form of a URL through a short message, and the called party then verifies the verification token through the second terminal device The token is presented to the third terminal device.
  • S102 The network device verifies the first phone number according to the verification token.
  • the network device After the network device obtains the call request, it can verify the verification token according to the first phone number.
  • the network device may first verify the validity of the verification token, and determine whether the verification token is legitimate according to whether the format information of the verification token is compliant, whether the verification token is stored in a database, and so on.
  • the first phone number can be verified according to the verification token.
  • the network device can obtain the third phone number associated with the verification token. If the first phone number is consistent with the third phone number, it means that the first phone number has passed the verification. If the first phone number is inconsistent with the third phone number, it means that the first phone number verification failed.
  • the called party can set the callable time period of the verification token.
  • the network device can obtain the dialing time and verify the dialing time according to the callable time period. If the dialing time is within the callable time period, it means that the first phone number has passed the verification. If the dialing time is not within the callable time, the first phone number indicates that the verification has failed.
  • the network device can obtain the dialing time through the call request. At this time, the dialing time indicates the time when the first user triggers the call request. Alternatively, the network device may also use the time when the call request is received as the dialing time.
  • the time between 7 am and 23:00 at night can be set as the callable time period.
  • dialing time is 10:23 when the first calling party triggers the call request, and 10:23 is within the time interval from 7 to 23:00, the first phone number will pass the verification in terms of dialing time.
  • the dialing time is 23:12 when the first calling party triggers the call request, and 23:12 is not within the time interval from 7 to 23:00, the first phone number verification fails.
  • the called party can set the callable area of the verification token, and the network device can obtain the dialing location through the call request, and verify the dialing location according to the callable area. If the dialing location is within the callable area, it means that the first phone number has passed the verification. If the dialing location is not in the callable area, it means that the first phone number verification failed.
  • the called party can set Guangzhou, Shenzhen, and Nanjing as callable areas.
  • the call request includes the location information of the first terminal device, and the location information is the dialing location. If the dialing location is Nanshan District, Shenzhen, which is within the callable area, it means that the first phone number has passed the verification of the dialing location.
  • the dialing location of the first calling party is Shijiazhuang, Hebei, and Shijiazhuang, Hebei is not in the callable area, the first phone number verification fails.
  • the called party can set the valid times of the verification token.
  • the network device receives the call request, it detects whether the verification token is invalid. If the verification token is not invalid, the first phone number has passed the verification in terms of the token status, and the number of calls is increased by 1. When the number of calls is greater than or equal to the valid number, the verification token is invalid. If the verification token is invalid, it means that the verification of the first phone number has failed.
  • the second calling party is a real estate salesperson
  • the called party leaves contact information, considering that the number of contacts between the two parties may not exceed 10 times, in order to avoid continuous harassment by the real estate salesperson, the first creation request or follow-up
  • the number of times setting instruction sets the valid times of the verification token to 10 times.
  • the first phone number passes the verification in terms of the token status.
  • the number of calls increases by 1.
  • the number of calls of the verification token is 10, and the number of calls is equal to the number of valid times, and the network device modifies the token status of the verification token to an invalid state.
  • the verification of the first phone number fails.
  • the called party can set the valid time of the verification token.
  • the network device receives the call request, it detects whether the verification token is invalid. If the verification token is not invalid, the first phone number is verified in terms of the status of the token. If the valid time has passed, the verification token becomes invalid, indicating that the verification of the first phone number has failed.
  • the first creation request or follow-up sets the valid time of the verification token to 2 hours.
  • the called party sets the valid time of the verification token to 2 hours at 11:23.
  • the network device detects that the current verification token is in a valid state, and the first phone number passes the verification in terms of the token status.
  • the network device detects that the valid time of the verification token is over, and then modifies the token status of the verification token to an invalid state.
  • the called party may also actively send a state modification instruction to the network device, so that the network device changes the token state of the verification token to an invalid state. Therefore, when the network device receives the call request, it detects whether the verification token is invalid. If the verification token is not invalid, the first phone number is verified in terms of the status of the token. If the verification token is invalid, the first phone number verification fails.
  • the called party can actively send a state modification instruction to the network device through the second terminal device, and the network device sets the token state of the designated check token to the network device according to the state modification instruction Invalid state.
  • the network device When the first calling party subsequently sends a call request to the network device, and the network device detects that the verification token is in an invalid state, the verification of the first phone number fails.
  • the network device obtains a second phone number associated with the verification token, and establishes a call connection between the first phone number and the second phone number .
  • the network device can obtain the second phone number associated with the verification token, and establish a call connection between the first phone number and the second phone number.
  • the call connection establishment method can be set according to the actual situation.
  • the network device can directly establish a call link between the first phone number and the second phone number through the operator’s network, and perform an anonymous operation on the first phone number and the second phone number, and transfer the first phone number to the second phone number.
  • the number and the second phone number are converted into intermediate numbers generated according to preset rules, thereby disguising the real numbers of the first phone number and the second phone number, and protecting the privacy of the first phone number and the second phone number.
  • the network device may send the first phone number and the second phone number to the conference call server to instruct the conference call server to pull the first phone number and the second phone number into the same conference call ,
  • the first calling party and called party can talk.
  • the call connection between the first phone number and the second phone number is established in the form of a conference call, there is no need to use the operator's roaming service, even if the operator network of the first calling party and the operator network of the called party are different.
  • the above solution can also be implemented smoothly, which expands the application scenarios of the number privacy protection method of this embodiment, and improves user experience.
  • the numbers displayed on the first terminal device and the second terminal device are the conference number of the conference call, not the real number of the first phone number or the real number of the second phone number, Thereby protecting the privacy of the first phone number and the second phone number.
  • the phone number is forged, that is, the first phone number of the first calling party is not the third phone number, but the first phone number is changed through the number virtualization software.
  • a phone number is virtualized as a third phone number, so as to pass the token verification program of the network device.
  • the telephone conference server calls the third telephone number and the second telephone number instead of the original number and the first telephone number.
  • the second phone number is the third telephone number and the second telephone number instead of the original number and the first telephone number.
  • the first calling party can virtualize the original number 138XXXXX101 of the first phone number into 188XXXX404 through the number virtualization software.
  • the number called by the teleconference server is 188XXXXX404 and the second phone number instead of 138XXXX101 and the second phone number.
  • the first calling party passes the token verification procedure of the network device by forging the number, it cannot enter the conference call and cannot harass the called party.
  • the verification of the first phone number fails, it means that the first caller and the second caller are not the same user, the verification token may have been leaked to an unrelated person, and the call request of the first caller may be Harassing phone calls.
  • the network device refuses to create a call channel for the first phone number and the second phone number.
  • the called party when the called party finds that the verification token has been leaked to an unrelated person and changes the token status of the verification token to an invalid state, if the called party saves the third phone number of the second calling party, Or the called party saves the first identity of the second calling party and the first identity is in a valid state, the called party can send a second creation instruction to the network device, and the second creation instruction includes the second phone number, And the third phone number or the first identity.
  • the network device can obtain the second phone number and the third phone number, generate a new verification token based on the second phone number and the third phone number, and send the new verification token to The designated recipient.
  • the token retrieval instruction can also be sent to the network device.
  • the network device receives the token retrieval instruction, it sends the verification token associated with the second phone number to the second terminal device, and/or sends the verification token associated with the third phone number to the third terminal equipment.
  • terminal device 1 is the terminal device of user 1
  • terminal device 2 is the terminal device of user 2.
  • User 1 is a real estate salesperson, and user 2 wants to entrust the real estate to user 1 for rent.
  • the terminal device 1 and the terminal device 2 are installed with privacy protection software, and the registration process of the privacy protection software and the binding phone number have been completed.
  • User 2 needs to leave the contact information as user 1.
  • User 2 consults User 1’s contact information, and User 1 informs User 2 of his phone number 1.
  • User 2 records user 1's phone number 1 into the mobile phone address book of terminal device 1, and sends the first creation request to the network device through the privacy protection software of terminal device 1.
  • the first creation request contains the phone number 1 of user 1 and the phone number 2 of user 2.
  • the network device generates a verification token 1 according to the telephone number 1 and the telephone number 2, and stores the association relationship between the telephone number 1, the telephone number 2 and the verification token 1. After that, the network device sends the verification token 1 to the short message server to instruct the short message server to send the URL link of the H5 web page carrying the verification token 1 to the terminal device 1 in the form of a short message.
  • the network device After receiving the dialing instruction 1, the network device generates a dialing web page and returns it to the terminal device 1.
  • User 1 views the dialing web page displayed on the terminal device and clicks the dial button to trigger call request 1.
  • the terminal device 1 sends the call request 1 to the network device.
  • the call request 1 contains the phone number 1, the verification token 1, and the terminal device 1.
  • Current location information (ie dialing location).
  • the network device After the network device receives the call request 1, it detects that the verification token 1 is a valid verification token, and the token status 1 of the verification token 1 is valid (indicating that the number of uses of the verification token 1 has not exceeded the valid The number of times and/or the current time has not exceeded the valid time of verification token 1), the dialing time of the network device receiving call request 1 is within the callable time period and the dialing location in call request 1 is within the callable area, then the network The device obtains the phone number 1 associated with the verification token 1.
  • the network device verifies that the phone number 1 in the call request 1 is the same as the phone number 1 associated with the verification token 1, and the phone number 1 passes the verification, and the phone number 1 and the phone associated with the verification token 1
  • the number 2 is sent to the teleconference server to instruct the teleconference server to call the terminal device 1 according to the telephone number 1 and the terminal device 2 according to the telephone number 2, and pull the terminal device 1 and the terminal device 2 into the same conference call, so that the user 1 and User 2 can communicate by phone.
  • the user 3 clicks the URL link in the short message related to the verification token 1 through the terminal device 3 to trigger the dialing instruction 2 and send it to the network device.
  • the network device After receiving the dialing instruction 2, the network device generates a dialing web page and returns it to the terminal device 3.
  • the terminal device 3 sends the call request 2 to the network device.
  • the call request 2 contains the phone number 3, the verification token 1, and the terminal device 3.
  • Current location information ie dialing location).
  • the network device After the network device receives the call request 2, it detects that the verification token 1 is a valid verification token, and the token status 1 of the verification token 1 is a valid state (indicating that the number of uses of the verification token 1 has not exceeded the valid The number of times and/or the current time has not exceeded the valid time of the verification token 1), the dialing time of the network device receiving the call request 2 is within the callable time period and the dialing location in the call request 2 is within the callable area, then the network The device obtains the phone number 1 associated with the verification token 1.
  • the network device verification found that the phone number 3 in the call request 2 is inconsistent with the phone number 1 associated with the verification token 1, indicating that the phone number 3 does not have the right to call the phone associated with the verification token 2 through the verification token 1 Number 2.
  • the network device returns the call failure information to the terminal device 3, notifies the user 3 of the call result, and ends the response to the call request 2.
  • user 1 when user 1 accidentally deletes the short message related to verification token 1 when clearing the short message, user 1 can send a retrieval instruction to the network device through the privacy protection software in the terminal device 1, and retrieve it The command contains the phone number 1 of user 1.
  • the network device After receiving the retrieval instruction, the network device queries the verification token associated with the phone number 1. After inquiring, the network device inquires that the verification token 1 is associated with the phone number 1, and then sends the verification token 1 to the SMS server to instruct the SMS server to link the URL of the H5 webpage carrying the verification token 1 to the SMS The method is sent to the terminal device 1.
  • user 2 can send a second creation request to the network device through the privacy protection software of terminal device 2.
  • the second creation request contains user 1’s phone number. Number 1 and User 2’s phone number 2.
  • the network device generates the verification token 2 according to the phone number 1 and the phone number 2, stores the association relationship between the phone number 1, the phone number 2 and the verification token 2, and modifies the token status of the verification token 1 to the invalid state .
  • the network device sends the verification token 2 to the short message server to instruct the short message server to send the URL link of the H5 webpage carrying the verification token 2 to the terminal device 1 in the form of a short message.
  • user 2 can send a state modification instruction to the network device by the privacy protection software of terminal device 2.
  • the network device After receiving the state modification instruction, the network device modifies the token state of the verification token 2 to an invalid state according to the state modification instruction.
  • the user 1 wants to contact the user 2, he can click the URL link related to the verification token 2 in the short message of the terminal device 1 to trigger the dialing instruction 3 and send it to the network device.
  • the network device After receiving the dialing instruction 3, the network device generates a dialing web page and returns it to the terminal device 1.
  • the terminal device 1 sends the call request 3 to the network device.
  • the call request 3 contains the phone number 1, the verification token 2 and the terminal device 1.
  • Current location information ie dialing location).
  • the network device After the network device receives the call request 1, it detects that the token status of the verification token 1 is invalid, which means that the user 1 does not have the authority to contact the user 2 through the verification token 2, and the verification of the phone number 1 fails, and the network device returns The call failure information is sent to the terminal device 1, informing the user 1 of the call result, and ending the response to the call request 3.
  • the first calling party does not directly make a call through the called party's second phone number, but makes a call through a verification token.
  • the called party shows the contact information, it is not necessary to show the second phone number directly, but just show the verification token, so as to realize the anonymization of the called party's phone number and prevent the called party's second phone number from being unintentionally leaked or Malicious disclosure.
  • the verification token is generated based on the second phone number of the called party and the third phone number of the second calling party.
  • the network device will verify the first phone number of the first calling party according to the verification token, and identify whether the first phone number is the same as the third phone number.
  • the numbers are the same.
  • the first phone number is consistent with the third phone number, it means that the first calling party and the second calling party are the same users, and the first calling party has the right to call the second phone number.
  • the first phone number is not consistent with the third phone number, it means that the first calling party and the second calling party are different users, and the first calling party has no right to call the second phone number, and the call fails. Therefore, even if the verification token is leaked, users other than the second calling party cannot call the called party through the verification token, which prevents the called party from frequently receiving harassing calls due to the leak of the verification token.
  • the called party can manage the authority of the verification token, for example, whether to set the callable time period, whether to set the callable area, whether to set the effective number of times, whether to set the effective time, and whether to verify the token of the token The status is changed to a failed status, etc.
  • the called party can also actively request the network device to generate a new verification token and revoke the original verification token.
  • the second calling party can also manage the verification token to a certain extent. For example, when the second calling party discovers that the verification token is leaked, it can also actively send a status modification instruction to the network device to instruct the network device to modify the token status of the verification token to an invalid state; When the calling party loses the verification token, it can also request the network device to retrieve the lost verification token.
  • the second calling party can also manage the verification token to a certain extent. For example, when the second calling party discovers that the verification token is leaked, it can also actively send a status modification instruction to the network device to instruct the network device to modify the token status of the verification token to an invalid state; When the calling party loses the verification token, it can also request the network device to retrieve the lost verification token.
  • the network device includes:
  • the call request module 801 is configured to obtain a call request sent by a first terminal device, where the call request includes a verification token and the first phone number of the first calling party;
  • the number verification module 802 is configured to verify the first phone number according to the verification token
  • the call connection module 803 is configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call between the first phone number and the second phone number connection.
  • the network equipment further includes:
  • a creation request module configured to obtain a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
  • a token creation module configured to create the verification token according to the second phone number and the third phone number
  • the token sending module is used to send the verification token to the designated receiver.
  • the network equipment further includes:
  • An identity request module configured to obtain an identity request sent by a third terminal device, where the identity request includes the third phone number of the second calling party;
  • An identity module configured to create a first identity corresponding to the third phone number, and return the first identity to the third terminal device
  • a creation request module configured to obtain a first creation request sent by a second terminal device, the first creation request including the second phone number and the first identity;
  • a token creation module configured to query a third phone number corresponding to the first identity identifier, and create the verification token according to the second phone number and the third phone number;
  • the token sending module is used to send the verification token to the designated receiver.
  • the token sending module is specifically configured to send the verification token to the second terminal device, or send the verification token to the third terminal device.
  • the call connection module 803 is specifically configured to, if the first phone number is consistent with the third phone number, obtain a second phone number associated with the verification token, and establish the first phone number. The phone number is connected to the call of the second phone number.
  • the call connection module 803 includes:
  • the teleconference sub-module is used to obtain the second telephone number associated with the verification token, and send the first telephone number and the second telephone number to the teleconference server to instruct the teleconference server to The first phone number and the second phone number are pulled into the same conference call.
  • an embodiment of the present application also provides a network device.
  • the network device 9 includes: a processor 90, a memory 91, and a computer program stored in the memory 91 and running on the processor 90 92.
  • the processor 90 executes the computer program 92, the steps in the above embodiment of the number privacy protection method are implemented, such as steps S101 to S103 shown in FIG. 1.
  • the processor 90 executes the computer program 92, the functions of the modules/units in the foregoing device embodiments, for example, the functions of the modules 801 to 803 shown in FIG. 8 are realized.
  • the computer program 92 may be divided into one or more modules/units, and the one or more modules/units are stored in the memory 91 and executed by the processor 90 to complete This application.
  • the one or more modules/units may be a series of computer program instruction segments capable of completing specific functions, and the instruction segments are used to describe the execution process of the computer program 92 in the network device 9.
  • the computer program 92 can be divided into a call request module, a number verification module, and a call connection module. The specific functions of each module are as follows:
  • a call request module configured to obtain a call request sent by a first terminal device, the call request including a verification token and the first phone number of the first calling party;
  • a number verification module configured to verify the first phone number according to the verification token
  • a call connection module configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call connection between the first phone number and the second phone number .
  • the network device 9 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
  • the network device may include, but is not limited to, a processor 90 and a memory 91.
  • FIG. 9 is only an example of the network device 9 and does not constitute a limitation on the network device 9. It may include more or less components than those shown in the figure, or a combination of certain components, or different components.
  • the network device may also include input and output devices, network access devices, buses, and so on.
  • the so-called processor 90 may be a central processing unit (Central Processing Unit, CPU), other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory 91 may be an internal storage unit of the network device 9, for example, a hard disk or a memory of the network device 9.
  • the memory 91 may also be an external storage device of the network device 9, for example, a plug-in hard disk equipped on the network device 9, a smart memory card (Smart Media Card, SMC), or a Secure Digital (SD). Card, Flash Card, etc.
  • the memory 91 may also include both an internal storage unit of the network device 9 and an external storage device.
  • the memory 91 is used to store the computer program and other programs and data required by the network device.
  • the memory 91 can also be used to temporarily store data that has been output or will be output.
  • the disclosed apparatus/network equipment and method may be implemented in other ways.
  • the device/network device embodiments described above are only illustrative.
  • the division of the modules or units is only a logical function division, and there may be other divisions in actual implementation, such as multiple units.
  • components can be combined or integrated into another system, or some features can be omitted or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated module/unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the present application implements all or part of the processes in the above-mentioned embodiments and methods, and can also be completed by instructing relevant hardware through a computer program.
  • the computer program can be stored in a computer-readable storage medium. When the program is executed by the processor, it can implement the steps of the foregoing method embodiments.
  • the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file, or some intermediate forms.
  • the computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory) , Random Access Memory (RAM, Random Access Memory), electrical carrier signal, telecommunications signal, and software distribution media, etc.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • electrical carrier signal telecommunications signal
  • software distribution media etc.
  • the content contained in the computer-readable medium can be appropriately added or deleted according to the requirements of the legislation and patent practice in the jurisdiction.
  • the computer-readable medium Does not include electrical carrier signals and telecommunication signals.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present application is applicable to the technical field of software applications, and provides a number privacy protection method, a network device and a computer storage medium. Said method can be applied to an artificial intelligence (AI) terminal. Said method comprises: a network device acquiring a call request sent by a first terminal device, the call request comprising a verification token and a first phone number of a first calling party; the network device verifying the first phone number according to the verification token; and if the verification of the first phone number is passed, the network device acquiring a second phone number associated with the verification token, and establishing call connection between the first phone number and the second phone number. The present application can solve the problem in the prior art that the privacy security of a user is affected due to easy leakage of the user's number.

Description

号码隐私保护方法、网络设备及计算机存储介质Number privacy protection method, network equipment and computer storage medium
本申请要求于2020年01月04日提交国家知识产权局、申请号为202010007477.8、申请名称为“号码隐私保护方法、网络设备及计算机存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the State Intellectual Property Office, the application number is 202010007477.8, and the application name is "number privacy protection method, network equipment and computer storage medium" on January 4, 2020, the entire content of which is by reference Incorporated in this application.
技术领域Technical field
本申请属于软件应用技术领域,尤其涉及一种号码隐私保护方法、网络设备及计算机存储介质。This application belongs to the technical field of software applications, and in particular relates to a number privacy protection method, network equipment and computer storage media.
背景技术Background technique
在日常的工作和生活当中,有时候用户需要将电话号码分享给一些机构或者个人,以便他人可以及时联系到自己。但是,部分机构或个人可能会出现任意分享、出卖他人电话号码的行为,导致用户接到大量的骚扰电话,如产品推销电话、诈骗电话等,影响到用户的隐私安全。In daily work and life, sometimes users need to share their phone numbers with some organizations or individuals so that others can contact them in time. However, some organizations or individuals may arbitrarily share or sell other people's phone numbers, causing users to receive a large number of harassing calls, such as product promotion calls, fraud calls, etc., which affects users' privacy and security.
发明内容Summary of the invention
有鉴于此,本申请实施例提供了一种号码隐私保护方法、网络设备及计算机存储介质,以解决现有的用户号码容易泄露,影响到用户隐私安全的问题。In view of this, the embodiments of the present application provide a number privacy protection method, network equipment, and computer storage medium to solve the problem that existing user numbers are easy to leak and affect user privacy and security.
本申请实施例的第一方面提供了一种号码隐私保护方法,包括:The first aspect of the embodiments of the present application provides a number privacy protection method, including:
网络设备获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;The network device obtains a call request sent by the first terminal device, where the call request includes a verification token and the first phone number of the first calling party;
所述网络设备根据所述校验令牌对所述第一电话号码进行校验;The network device verifies the first phone number according to the verification token;
若所述第一电话号码校验通过,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。If the first phone number is verified, the network device obtains the second phone number associated with the verification token, and establishes a call connection between the first phone number and the second phone number.
需要说明的是,第一主叫方并非直接通过被叫方的第二电话号码进行呼叫,而是通过校验令牌进行呼叫,表示被叫方在出示联系方式时,不必直接出示第二电话号码,而是出示校验令牌即可,从而实现被叫方电话号码的匿名化,避免被叫方的第二电话号码被无意泄露或恶意泄露。It should be noted that the first calling party does not directly use the called party's second phone number to make a call, but uses a verification token to make a call, which means that the called party does not need to show the second phone directly when showing the contact information. Instead, just show the verification token, so as to realize the anonymization of the called party’s phone number and prevent the called party’s second phone number from being leaked unintentionally or maliciously.
并且,校验令牌与指定用户的电话号码存在关联关系,当主叫方通过校验令牌呼叫被叫方时,网络设备会根据校验令牌对第一主叫方的第一电话号码进行校验。只有当第一主叫方为指定用户时,校验令牌才能够校验通过。因此,即使校验令牌泄露,其他非指定用户也无法通过该校验令牌呼叫被叫方。In addition, the verification token is associated with the phone number of the designated user. When the calling party calls the called party through the verification token, the network device will check the first phone number of the first calling party according to the verification token. Perform verification. Only when the first calling party is the designated user, the verification token can pass the verification. Therefore, even if the verification token is leaked, other non-designated users cannot call the called party through the verification token.
在第一方面的一种可能的实现方式中,在所述网络设备获取第一终端设备发送的呼叫请求之前,还包括:In a possible implementation manner of the first aspect, before the network device obtains the call request sent by the first terminal device, the method further includes:
所述网络设备获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和第二主叫方的第三电话号码;Acquiring, by the network device, a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
所述网络设备根据所述第二电话号码和所述第三电话号码创建所述校验令牌;The network device creates the verification token according to the second phone number and the third phone number;
所述网络设备将所述校验令牌发送至指定的接收方。The network device sends the verification token to the designated recipient.
需要说明的是,创建校验令牌时,如果被叫方可以直接获取到第二主叫方的第三电话号码,则网络设备可以直接根据第二电话号码和第三电话号码创建校验令牌,校验令牌的创建过程较为便捷。It should be noted that when creating a verification token, if the called party can directly obtain the third phone number of the second calling party, the network device can directly create a verification order based on the second phone number and the third phone number. The creation process of the verification token is relatively convenient.
在第一方面的另一种可能的实现方式中,在所述网络设备获取第一终端设备发送的呼叫请求之前,还包括:In another possible implementation manner of the first aspect, before the network device obtains the call request sent by the first terminal device, the method further includes:
所述网络设备获取第三终端设备发送的身份标识请求,所述身份标识请求包括第二主叫方的第三电话号码;Acquiring, by the network device, an identity request sent by a third terminal device, where the identity request includes the third telephone number of the second calling party;
所述网络设备创建与所述第三电话号码对应的第一身份标识,将所述第一身份标识返回至所述第三终端设备;The network device creates a first identity corresponding to the third telephone number, and returns the first identity to the third terminal device;
所述网络设备获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和所述第一身份标识;Acquiring, by the network device, a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the first identity;
所述网络设备查询与所述第一身份标识对应的第三电话号码,根据所述第二电话号码和所述第三电话号码创建所述校验令牌;The network device queries a third phone number corresponding to the first identity identifier, and creates the verification token according to the second phone number and the third phone number;
所述网络设备将所述校验令牌发送至指定的接收方。The network device sends the verification token to the designated recipient.
需要说明的是,如果第二主叫方担心第三电话号码被泄露,则第二主叫方也可以出示第一身份标识给被叫方。此时,被叫方可以得知第一身份标识,但是无法得知第三电话号码,从而实现第三电话号码的匿名化。网络设备获取到第一创建指令时,查询第一身份标识对应的第三电话号码,然后再根据第二电话号码和第三电话号码创建校验令牌。It should be noted that if the second calling party is worried that the third phone number will be leaked, the second calling party may also show the first identity to the called party. At this time, the called party can know the first identity, but cannot know the third phone number, so that the third phone number is anonymized. When the network device obtains the first creation instruction, it queries the third phone number corresponding to the first identity, and then creates a verification token based on the second phone number and the third phone number.
由上可知,这种校验令牌的创建方式较为繁琐,但是可以实现第三电话号码的匿名化,避免第三电话号码被泄露。It can be seen from the above that this verification token creation method is relatively cumbersome, but it can realize the anonymization of the third phone number and prevent the third phone number from being leaked.
在第一方面的一种可能的实现方式中,所述网络设备将所述校验令牌发送至指定的接收方包括:In a possible implementation manner of the first aspect, sending, by the network device, the verification token to a designated recipient includes:
所述网络设备将所述校验令牌发送至所述第二终端设备,或者,将所述校验令牌发送至所述第三终端设备。The network device sends the verification token to the second terminal device, or sends the verification token to the third terminal device.
需要说明的是,网络设备可以直接将校验令牌发送给第三端设备,或者,网络设备也可以将校验令牌发送给第二终端设备,由被叫方将校验令牌出示给第二主叫方。It should be noted that the network device may directly send the verification token to the third-end device, or the network device may also send the verification token to the second terminal device, and the called party will show the verification token to the second terminal device. The second calling party.
在第一方面的一种可能的实现方式中,所述若所述第一电话号码校验通过,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接包括:In a possible implementation manner of the first aspect, if the first phone number is verified, the network device obtains a second phone number associated with the verification token, and establishes the first phone number. The call connection between a phone number and the second phone number includes:
若所述第一电话号码与所述第三电话号码一致,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。If the first phone number is consistent with the third phone number, the network device obtains the second phone number associated with the verification token, and establishes the first phone number and the second phone number Call connection.
需要说明的是,根据校验令牌对第一电话号码进行校验时,可以获取校验令牌对应的第三电话号码,判断第一电话号码与第三电话号码是否一致。It should be noted that when the first phone number is verified according to the verification token, the third phone number corresponding to the verification token can be obtained, and it is determined whether the first phone number is consistent with the third phone number.
如果第一电话号码与第三电话号码一致,则表示第一主叫方和第二主叫方为相同的用户,第一主叫方有呼叫第二电话号码的权限。If the first phone number is consistent with the third phone number, it means that the first calling party and the second calling party are the same user, and the first calling party has the right to call the second phone number.
如果第一电话号码与第三电话号码不一致,则表示第一主叫方和第二主叫方并非相同的用户,第一主叫方没有呼叫第二电话号码的权限。If the first phone number is not consistent with the third phone number, it means that the first calling party and the second calling party are not the same user, and the first calling party does not have the authority to call the second phone number.
在第一方面的一种可能的实现方式中,所述网络设备获取与所述校验令牌关联的 第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接包括:In a possible implementation of the first aspect, the network device acquiring a second phone number associated with the verification token, and establishing a call connection between the first phone number and the second phone number includes :
所述网络设备获取与所述校验令牌关联的第二电话号码,将所述第一电话号码和所述第二电话号码发送至电话会议服务器,以指示所述电话会议服务器将所述第一电话号码和所述第二电话号码拉入同一电话会议中。The network device obtains the second phone number associated with the verification token, and sends the first phone number and the second phone number to the teleconference server to instruct the teleconference server to transfer the first A phone number and the second phone number are pulled into the same conference call.
需要说明的是,在建立第一电话号码和第二电话号码的呼叫连接的过程中,可以采用电话会议的形式建立第一电话号码和第二电话号码的呼叫连接。此时,即使第一主叫方的运营商网络和被叫方的运营商网络不同,也可以顺利实现上述方案。It should be noted that in the process of establishing a call connection between the first phone number and the second phone number, the call connection between the first phone number and the second phone number may be established in the form of a conference call. At this time, even if the operator network of the first calling party and the operator network of the called party are different, the above solution can be implemented smoothly.
并且,当采用电话会议形式的呼叫连接时,在第一终端设备和第二终端设备上显示的号码是电话会议的会议号码,并非第一电话号码的真实号码或第二电话号码的真实号码,从而保护第一电话号码和第二电话号码的隐私。Moreover, when a call connection in the form of a conference call is used, the numbers displayed on the first terminal device and the second terminal device are the conference number of the conference call, not the real number of the first phone number or the real number of the second phone number, Thereby protecting the privacy of the first phone number and the second phone number.
本申请实施例的第二方面提供了一种网络设备,包括:The second aspect of the embodiments of the present application provides a network device, including:
呼叫请求模块,用于获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;A call request module, configured to obtain a call request sent by a first terminal device, the call request including a verification token and the first phone number of the first calling party;
号码校验模块,用于根据所述校验令牌对所述第一电话号码进行校验;A number verification module, configured to verify the first phone number according to the verification token;
呼叫连接模块,用于若所述第一电话号码校验通过,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。A call connection module, configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call connection between the first phone number and the second phone number .
在第二方面的一种可能的实现方式中,所述网络设备还包括:In a possible implementation manner of the second aspect, the network device further includes:
创建请求模块,用于获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和第二主叫方的第三电话号码;A creation request module, configured to obtain a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
令牌创建模块,用于根据所述第二电话号码和所述第三电话号码创建所述校验令牌;A token creation module, configured to create the verification token according to the second phone number and the third phone number;
令牌发送模块,用于将所述校验令牌发送至指定的接收方。The token sending module is used to send the verification token to the designated receiver.
在第二方面的一种可能的实现方式中,所述网络设备还包括:In a possible implementation manner of the second aspect, the network device further includes:
身份请求模块,用于获取第三终端设备发送的身份标识请求,所述身份标识请求包括第二主叫方的第三电话号码;An identity request module, configured to obtain an identity request sent by a third terminal device, where the identity request includes the third phone number of the second calling party;
身份标识模块,用于创建与所述第三电话号码对应的第一身份标识,将所述第一身份标识返回至所述第三终端设备;An identity module, configured to create a first identity corresponding to the third phone number, and return the first identity to the third terminal device;
创建请求模块,用于获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和所述第一身份标识;A creation request module, configured to obtain a first creation request sent by a second terminal device, the first creation request including the second phone number and the first identity;
令牌创建模块,用于查询与所述第一身份标识对应的第三电话号码,根据所述第二电话号码和所述第三电话号码创建所述校验令牌;A token creation module, configured to query a third phone number corresponding to the first identity identifier, and create the verification token according to the second phone number and the third phone number;
令牌发送模块,用于将所述校验令牌发送至指定的接收方。The token sending module is used to send the verification token to the designated receiver.
在第二方面的另一种可能的实现方式中,所述令牌发送模块,具体用于将所述校验令牌发送至所述第二终端设备,或者,将所述校验令牌发送至所述第三终端设备。In another possible implementation manner of the second aspect, the token sending module is specifically configured to send the verification token to the second terminal device, or send the verification token To the third terminal device.
在第二方面的一种可能的实现方式中,所述呼叫连接模块,具体用于若所述第一电话号码与所述第三电话号码一致,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。In a possible implementation of the second aspect, the call connection module is specifically configured to, if the first phone number is consistent with the third phone number, obtain the first phone number associated with the verification token. Two phone numbers, establishing a call connection between the first phone number and the second phone number.
在第二方面的一种可能的实现方式中,所述呼叫连接模块包括:In a possible implementation manner of the second aspect, the call connection module includes:
电话会议子模块,用于获取与所述校验令牌关联的第二电话号码,将所述第一电 话号码和所述第二电话号码发送至电话会议服务器,以指示所述电话会议服务器将所述第一电话号码和所述第二电话号码拉入同一电话会议中。The teleconference submodule is used to obtain the second telephone number associated with the verification token, and send the first telephone number and the second telephone number to the telephone conference server to instruct the telephone conference server to The first phone number and the second phone number are pulled into the same conference call.
本申请实施例的第三方面提供了一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如上述方法的步骤。The third aspect of the embodiments of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and running on the processor. When the processor executes the computer program, Implement the steps as described above.
本申请实施例的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如上述方法的步骤。The fourth aspect of the embodiments of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the steps of the foregoing method are implemented.
本申请实施例的第五方面提供了一种计算机程序产品,当计算机程序产品在终端设备上运行时,使得终端设备实现如上述方法的步骤。The fifth aspect of the embodiments of the present application provides a computer program product, which when the computer program product runs on a terminal device, enables the terminal device to implement the steps of the above-mentioned method.
本申请实施例与现有技术相比存在的有益效果是:Compared with the prior art, the embodiments of this application have the following beneficial effects:
本申请实施例提供了一种号码隐私保护方法,当作为第一主叫方的第一终端设备想要呼叫被叫方时,发送呼叫请求至网络设备,呼叫请求中包括校验令牌以及第一主叫方的第一电话号码。网络设备根据校验令牌对第一电话号码进行校验。若第一电话号码校验通过,则获取与校验令牌关联的第二电话号码,建立第一电话号码与第二电话号码的呼叫连接。The embodiment of the application provides a number privacy protection method. When the first terminal device as the first calling party wants to call the called party, it sends a call request to the network device. The call request includes the verification token and the first terminal device. The first phone number of a calling party. The network device verifies the first phone number according to the verification token. If the first phone number is verified, the second phone number associated with the verification token is obtained, and a call connection between the first phone number and the second phone number is established.
也即是说,在本实例的方法中,第一主叫方并非直接通过被叫方的第二电话号码进行呼叫,而是通过校验令牌进行呼叫,被叫方在出示联系方式时,不必直接出示第二电话号码,而是出示校验令牌即可,从而实现被叫方电话号码的匿名化,避免被叫方的第二电话号码被无意泄露或恶意泄露。That is to say, in the method of this example, the first calling party does not directly make a call through the called party’s second phone number, but makes a call through a verification token. When the called party shows the contact information, It is not necessary to directly show the second phone number, but just show the verification token, so as to realize the anonymization of the called party's phone number and avoid the called party's second phone number from being unintentionally or maliciously leaked.
并且,校验令牌与指定用户的电话号码存在关联关系,当主叫方通过校验令牌呼叫被叫方时,网络设备会根据校验令牌对第一主叫方的第一电话号码进行校验,从而判断第一主叫方的呼叫是否合法。只有当第一主叫方为指定用户时,校验令牌才能够校验通过。因此,即使校验令牌泄露,其他非指定用户也无法通过该校验令牌呼叫被叫方,避免被叫方因为校验令牌泄露而频繁接到骚扰电话,提高了用户的隐私安全,具有较强的易用性和实用性。In addition, the verification token is associated with the phone number of the designated user. When the calling party calls the called party through the verification token, the network device will check the first phone number of the first calling party according to the verification token. Perform verification to determine whether the call of the first calling party is legal. Only when the first calling party is the designated user, the verification token can pass the verification. Therefore, even if the verification token is leaked, other non-designated users cannot call the called party through the verification token, which prevents the called party from frequently receiving harassing calls due to the leak of the verification token, which improves the user’s privacy and security. It has strong ease of use and practicality.
附图说明Description of the drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly describe the technical solutions in the embodiments of the present application, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only of the present application. For some embodiments, those of ordinary skill in the art can obtain other drawings based on these drawings without creative work.
图1是本申请实施例提供的一种号码隐私保护方法的流程示意图;FIG. 1 is a schematic flowchart of a method for protecting number privacy according to an embodiment of the present application;
图2是本申请实施例提供的一种应用场景的信令图;Figure 2 is a signaling diagram of an application scenario provided by an embodiment of the present application;
图3是本申请实施例提供的另一种应用场景的信令图;Figure 3 is a signaling diagram of another application scenario provided by an embodiment of the present application;
图4是本申请实施例提供的另一种应用场景的信令图;Figure 4 is a signaling diagram of another application scenario provided by an embodiment of the present application;
图5是本申请实施例提供的另一种应用场景的信令图;Figure 5 is a signaling diagram of another application scenario provided by an embodiment of the present application;
图6是本申请实施例提供的另一种应用场景的信令图;Figure 6 is a signaling diagram of another application scenario provided by an embodiment of the present application;
图7是本申请实施例提供的另一种应用场景的信令图;Figure 7 is a signaling diagram of another application scenario provided by an embodiment of the present application;
图8是本申请实施例提供的一种网络设备的结构示意图;FIG. 8 is a schematic structural diagram of a network device provided by an embodiment of the present application;
图9是本申请实施例提供的另一种网络设备的结构示意图。Fig. 9 is a schematic structural diagram of another network device provided by an embodiment of the present application.
具体实施方式Detailed ways
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。In the following description, for the purpose of illustration rather than limitation, specific details such as a specific system structure and technology are proposed for a thorough understanding of the embodiments of the present application. However, it should be clear to those skilled in the art that the present application can also be implemented in other embodiments without these specific details. In other cases, detailed descriptions of well-known systems, devices, circuits, and methods are omitted to avoid unnecessary details from obstructing the description of this application.
为了说明本申请所述的技术方案,下面通过具体实施例来进行说明。In order to illustrate the technical solutions described in the present application, specific embodiments are used for description below.
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the existence of the described features, wholes, steps, operations, elements and/or components, but does not exclude one or more other features , The existence or addition of a whole, a step, an operation, an element, a component, and/or a collection thereof.
还应当理解,在此本申请说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本申请。如在本申请说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。It should also be understood that the terms used in the specification of this application are only for the purpose of describing specific embodiments and are not intended to limit the application. As used in the specification of this application and the appended claims, unless the context clearly indicates other circumstances, the singular forms "a", "an" and "the" are intended to include plural forms.
还应当进一步理解,在本申请说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。It should be further understood that the term "and/or" used in the specification and appended claims of this application refers to any combination and all possible combinations of one or more of the associated listed items, and includes these combinations .
如在本说明书和所附权利要求书中所使用的那样,术语“如果”可以依据上下文被解释为“当...时”或“一旦”或“响应于确定”或“响应于检测到”。类似地,短语“如果确定”或“如果检测到[所描述条件或事件]”可以依据上下文被解释为意指“一旦确定”或“响应于确定”或“一旦检测到[所描述条件或事件]”或“响应于检测到[所描述条件或事件]”。As used in this specification and the appended claims, the term "if" can be interpreted as "when" or "once" or "in response to determination" or "in response to detection" depending on the context . Similarly, the phrase "if determined" or "if detected [described condition or event]" can be interpreted as meaning "once determined" or "in response to determination" or "once detected [described condition or event]" depending on the context ]" or "in response to detection of [condition or event described]".
本申请实施例提供的号码隐私保护方法可以应用于网络设备。该网络设备可以是任意具有数据收发以及数据处理功能的设备,包括但不限于智能手机、平板电脑、可穿戴设备、车载设备、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本、个人数字助理(personal digital assistant,PDA)、人工智能(Artificial Intelligence,AI)终端等网络设备。本申请实施例对网络设备的具体类型不作任何限制。The number privacy protection method provided in the embodiments of the present application can be applied to network equipment. The network device can be any device with data transmission and reception and data processing functions, including but not limited to smart phones, tablets, wearable devices, vehicle-mounted devices, augmented reality (AR)/virtual reality (VR) Equipment, laptops, ultra-mobile personal computers (UMPC), netbooks, personal digital assistants (PDAs), artificial intelligence (AI) terminals and other network equipment. The embodiments of this application do not impose any restrictions on the specific types of network devices.
例如,所述网络设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session InitiationProtocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、车联网终端、电脑、膝上型计算机、手持式通信设备、手持式计算设备、卫星无线设备、用户驻地设备(customer premise equipment,CPE)和/或用于在无线系统上进行通信的其它设备以及下一代通信系统,例如,5G网络中的移动终端或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的移动终端等。For example, the network device may be a station (STAION, ST) in a WLAN, a cell phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, Personal Digital Assistant (PDA) devices, handheld devices with wireless communication functions, computing devices or other processing devices connected to wireless modems, in-vehicle devices, car networking terminals, computers, laptop computers, handheld communication devices , Handheld computing devices, satellite wireless devices, customer premise equipment (CPE) and/or other devices used to communicate on wireless systems, and next-generation communication systems, such as mobile terminals in 5G networks or the future Mobile terminals in the evolved Public Land Mobile Network (PLMN) network.
另外,在本申请的描述中,术语“第一”、“第二”、“第三”等仅用于区分描述,而不能理解为指示或暗示相对重要性。In addition, in the description of this application, the terms "first", "second", "third", etc. are only used to distinguish the description, and cannot be understood as indicating or implying relative importance.
在日常的工作和生活当中,有时候用户需要电话号码分享给一些机构或者个人,以便他人可以及时联系到自己。但是,部分机构或个人可能会出现任意分享、出卖他人电话号码的行为,导致用户接到大量的骚扰电话,如产品推销电话、诈骗电话等。In daily work and life, sometimes users need to share their phone numbers with some organizations or individuals so that others can contact them in time. However, some organizations or individuals may arbitrarily share or sell others' phone numbers, causing users to receive a large number of harassing calls, such as product promotion calls and fraudulent calls.
为了减少骚扰电话的干扰,用户可以通过手机的黑名单功能,屏蔽一些骚扰电话 的号码,确保以后不会收到这些屏蔽号码的电话和信息。In order to reduce the interference of harassing calls, users can block some harassing phone numbers through the blacklist function of the mobile phone to ensure that they will not receive calls and messages from these blocked numbers in the future.
这种方式属于一种被动的防御手段,依赖各个用户对骚扰电话的号码进行标记。并且,现在许多骚扰电话都是通过虚拟拨号软件拨出,使用的是虚拟号码,即使用户对将虚拟号码拉入黑名单,骚扰者也可以更换虚拟号码继续骚扰,黑名单对骚扰电话的拦截效果有限。This method is a passive defense method that relies on each user to mark the number of the harassing call. In addition, many harassing calls are now dialed through virtual dialing software, using virtual numbers. Even if the user pulls the virtual number into the blacklist, the harasser can change the virtual number to continue the harassment. The blacklist has the effect of blocking harassing calls limited.
对此,另一些用户会在分享电话号码时,将非常用的电话号码(俗称“小号”)分享给无法完全信任的机构或个人,从而避免自己常用的电话号码频繁收到骚扰电话。In this regard, when sharing phone numbers, other users will share very frequently used phone numbers (commonly known as "small numbers") with institutions or individuals that cannot be fully trusted, so as to avoid frequent harassing calls to their frequently used phone numbers.
但是,如果用户非常用的电话号码被恶意泄露,用户依然会收到大量的骚扰电话,这种方式只能对用户常用的电话号码进行保护,起到一定的匿名作用。如果用户通过频繁更新非常用的电话号码的方式减少骚扰电话,则用户非常用的电话号码不适合留给一些需要长时间保持联系且无法完全信任的机构或个人。However, if the user's very frequently used phone number is maliciously leaked, the user will still receive a large number of harassing calls. This method can only protect the user's frequently used phone number and play a certain anonymous role. If users frequently update unused phone numbers to reduce nuisance calls, the unused phone numbers are not suitable for organizations or individuals who need to keep in touch for a long time and cannot be fully trusted.
在另一些号码隐私保护的方案中,用户可以将真实的电话号码录入扫码呼前台。扫码呼前台根据用户真实的电话号码生成二维码,将用户信息和该二维码存储至关系数据库,并将该二维码返回给用户。当用户需要将联系方式分享给他人时,可以出示二维码作为联系方式。后续当呼叫人需要呼叫用户时,可以扫描二维码访问扫码呼前台,扫码呼前台将中间号平台分配的中间号返回给呼叫人。呼叫人拨打中间号,通过运营商漫游至中间号平台,中间号平台转接至用户的真实号码,从而使呼叫人可以呼叫到用户。In other number privacy protection schemes, users can enter their real phone number into the scan code and call the front desk. Scan the QR code to call the front desk to generate a QR code based on the user's real phone number, store the user information and the QR code in the relational database, and return the QR code to the user. When users need to share their contact information with others, they can show the QR code as the contact information. Later, when the caller needs to call the user, he can scan the QR code to access the scan code to call the front desk, and the scan code to call the front desk returns the middle number assigned by the middle number platform to the caller. The caller dials the intermediate number, and the operator roams to the intermediate number platform, and the intermediate number platform is transferred to the user's real number, so that the caller can call the user.
这种方式可以实现用户号码的匿名化。但是,如果上述二维码被恶意分享,用户依然会收到大量的骚扰电话。同时,如果上述二维码设置有失效时间,则不适合留给一些需要长时间保持联系且无法完全信任的机构或个人。此外,上述方案的实现依赖于运营商网络漫游的支持,当呼叫人与用户的运营商网络不同时,难以实现上述方案。In this way, the user number can be anonymized. However, if the above two-dimensional code is maliciously shared, users will still receive a large number of harassing calls. At the same time, if the above two-dimensional code is set with an expiration time, it is not suitable for some organizations or individuals who need to stay in contact for a long time and cannot be fully trusted. In addition, the implementation of the above solution relies on the support of operator network roaming, and it is difficult to implement the above solution when the operator network of the caller and the user are different.
综上,现有的用户号码隐私保护方案均无法有效避免用户收到骚扰电话。有鉴于此,本申请实施例提供了一种号码隐私保护方法,当作为第一主叫方的第一终端设备想要呼叫被叫方时,发送呼叫请求至网络设备,呼叫请求中包括校验令牌以及第一主叫方的第一电话号码。网络设备根据校验令牌对第一电话号码进行校验。若第一电话号码校验通过,则获取与校验令牌关联的第二电话号码,建立第一电话号码与第二电话号码的呼叫连接。In summary, none of the existing user number privacy protection solutions can effectively prevent users from receiving harassing calls. In view of this, the embodiment of the application provides a number privacy protection method. When the first terminal device as the first calling party wants to call the called party, it sends a call request to the network device, and the call request includes verification. The token and the first phone number of the first caller. The network device verifies the first phone number according to the verification token. If the first phone number is verified, the second phone number associated with the verification token is obtained, and a call connection between the first phone number and the second phone number is established.
也即是说,在本实例的方法中,第一主叫方并非直接通过被叫方的第二电话号码进行呼叫,而是通过校验令牌进行呼叫,被叫方在出示联系方式时,不必直接出示第二电话号码,而是出示校验令牌即可,从而实现被叫方电话号码的匿名化,避免被叫方的第二电话号码被无意泄露或恶意泄露。That is to say, in the method of this example, the first calling party does not directly make a call through the called party’s second phone number, but makes a call through a verification token. When the called party shows the contact information, It is not necessary to directly show the second phone number, but just show the verification token, so as to realize the anonymization of the called party's phone number and avoid the called party's second phone number from being unintentionally or maliciously leaked.
并且,校验令牌与指定用户的电话号码存在关联关系,当主叫方通过校验令牌呼叫被叫方时,网络设备会根据校验令牌对第一主叫方的第一电话号码进行校验,从而判断第一主叫方的呼叫是否合法。只有当第一主叫方为指定用户时,校验令牌才能够校验通过。因此,即使校验令牌泄露,其他非指定用户也无法通过该校验令牌呼叫被叫方,避免被叫方因为校验令牌泄露而频繁接到骚扰电话。In addition, the verification token is associated with the phone number of the designated user. When the calling party calls the called party through the verification token, the network device will check the first phone number of the first calling party according to the verification token. Perform verification to determine whether the call of the first calling party is legal. Only when the first calling party is the designated user, the verification token can pass the verification. Therefore, even if the verification token is leaked, other non-designated users cannot call the called party through the verification token, which prevents the called party from frequently receiving harassing calls due to the leak of the verification token.
因此,本实施例提供的号码隐私保护方法解决了现有的用户号码容易泄露,影响到用户隐私安全的问题。Therefore, the number privacy protection method provided in this embodiment solves the problem that existing user numbers are easy to leak and affect user privacy and security.
接下来,将从网络设备的角度,对本实施例提供的号码隐私保护方法的内容进行描述。请参阅图1所示的号码隐私保护方法的流程图,该方法包括:Next, from the perspective of a network device, the content of the number privacy protection method provided in this embodiment will be described. Please refer to the flowchart of the number privacy protection method shown in Figure 1. The method includes:
S101、网络设备获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;S101. A network device obtains a call request sent by a first terminal device, where the call request includes a verification token and the first phone number of the first calling party.
在本实施例以下的内容中,第一终端设备为第一主叫方的终端设备,第二终端设备为被叫方的终端设备,第三终端设备为第二主叫方的终端设备。In the following content of this embodiment, the first terminal device is the terminal device of the first calling party, the second terminal device is the terminal device of the called party, and the third terminal device is the terminal device of the second calling party.
第一主叫方为想要呼叫被叫方的用户,第二主叫方为与被叫方交互联系方式的用户。可以理解的是,第一主叫方与第二主叫方可能是相同的用户,也可能是不同的用户。The first calling party is a user who wants to call the called party, and the second calling party is a user who interacts with the called party. It is understandable that the first calling party and the second calling party may be the same user or different users.
如果第一主叫方想要呼叫被叫方时,第一主叫方可以通过第一终端设备发送呼叫请求至网络设备。If the first calling party wants to call the called party, the first calling party can send a call request to the network device through the first terminal device.
网络设备接收第一终端设备发送的呼叫请求,根据呼叫请求包含的内容执行后续的操作。The network device receives the call request sent by the first terminal device, and performs subsequent operations according to the content contained in the call request.
呼叫请求中包括的内容可以根据实际情况进行设置。在一些可能的实现方式中,呼叫请求可以包含校验令牌以及第一主叫方的第一电话号码。在另一些可能的实现方式中,呼叫请求除了包含校验令牌以及第一主叫方的第一电话号码以外,还可以包括拨号地点、拨号时间等信息中的一种或多种。The content included in the call request can be set according to the actual situation. In some possible implementations, the call request may include the verification token and the first phone number of the first calling party. In other possible implementation manners, in addition to the verification token and the first phone number of the first calling party, the call request may also include one or more of information such as dialing location and dialing time.
校验令牌的生成方式可以根据实际情况进行设置。在一些可能的实现方式中,当被叫方留联系方式给第二主叫方时,可以让第二主叫方出示第三电话号码。The generation method of the verification token can be set according to the actual situation. In some possible implementations, when the called party leaves the contact information for the second calling party, the second calling party can be asked to show the third phone number.
被叫方获取到第二主叫方的第三电话号码后,通过第二终端设备发送第一创建请求至网络设备。第一创建请求中包括被叫方的第二电话号码和第二主叫方的第三电话号码。After obtaining the third phone number of the second calling party, the called party sends the first creation request to the network device through the second terminal device. The first creation request includes the second phone number of the called party and the third phone number of the second calling party.
当网络设备接收到第一创建请求后,可以根据第二电话号码和第三电话号码创建校验令牌,存储上述校验令牌与第二电话号码以及第三电话号码的关联关系。When the network device receives the first creation request, it can create a verification token based on the second phone number and the third phone number, and store the correlation between the verification token and the second phone number and the third phone number.
可以理解的是,在上述校验令牌的生成方式中,需要第二主叫方出示第三电话号码。但是,在一些情境下,第二主叫方也担心自己的第三电话号码被他人无意泄露或有意泄露,导致自身接到大量的骚扰电话。It is understandable that in the above-mentioned method of generating the verification token, the second calling party is required to show the third phone number. However, in some situations, the second caller is also worried that his third phone number will be unintentionally or deliberately leaked by others, leading to a large number of harassing calls.
因此,在另一些可能的实现方式中,第二主叫方也可以不直接出示自己的电话号码。第二主叫方可以通过第三终端设备发送身份标识请求至网络设备。如果第二主叫方已经预先将第三电话号码存储至网络设备,则网络设备可以根据身份标识请求生成第一身份标识,将第一身份标识与第三电话号码相关联。Therefore, in other possible implementation manners, the second calling party may not directly show its phone number. The second calling party can send an identity request to the network device through the third terminal device. If the second calling party has previously stored the third phone number in the network device, the network device may generate the first identity according to the identity request, and associate the first identity with the third phone number.
如果第二主叫方未预先将第一号码电话存储至网络设备,则身份标识请求中应当包含第二主叫方的第三电话号码。网络设备根据身份标识请求生成第一身份标识,存储第三电话号码、第一身份标识,并将第三电话号码与第一身份标识相关联。If the second calling party does not store the first phone number in the network device in advance, the identity request should include the third phone number of the second calling party. The network device generates the first identity identifier according to the identity identifier request, stores the third telephone number and the first identity identifier, and associates the third telephone number with the first identity identifier.
网络设备生成第一身份标识之后,可以将第一身份标识返回至第三终端设备。第一身份标识的形式可以根据实际情况进行确定。例如,第一身份标识可以为二维码、条形码、数字、字符等形式中的一种或多种。After the network device generates the first identity, the first identity can be returned to the third terminal device. The form of the first identity can be determined according to actual conditions. For example, the first identity identifier may be one or more of two-dimensional code, barcode, number, character, and the like.
当第二主叫方需要出示联系方式给被叫方时,可以出示第一身份标识给被叫方。被叫方获取到第一身份标识后,通过第二终端设备发送第一创建请求至网络设备,第 一创建请求包括被叫方的第二电话号码和第二主叫方的第一身份标识。When the second calling party needs to show the contact information to the called party, it can show the first identity to the called party. After obtaining the first identity, the called party sends a first creation request to the network device through the second terminal device. The first creation request includes the second phone number of the called party and the first identity of the second calling party.
可以理解的是,为了防止第一身份标识被他人无意泄露或恶意泄露,可以为第一身份标识设置相应的防泄漏措施。例如,可以设置第一身份标识的有效次数,假设有效次数被设置为1次,则该第一身份标识被使用1次后即失效;或者,也可以设置第一身份标识的有效时间,假设有效时间为5分钟,则要求第二主叫方或被叫方必须在5分钟内使用第一身份标识,否则第一身份标识失效。It is understandable that, in order to prevent the first identity from being leaked unintentionally or maliciously by others, corresponding leakage prevention measures can be set for the first identity. For example, the effective number of times of the first identity can be set, assuming that the number of effective times is set to 1, then the first identity will become invalid after it is used once; or, the effective time of the first identity can also be set, assuming that it is valid If the time is 5 minutes, the second calling party or called party must use the first identity within 5 minutes, otherwise the first identity becomes invalid.
网络设备接收到第一创建请求后,校验第一身份标识的合法性和有效性。若第一身份标识校验通过,则查询与第一身份标识对应的第三电话号码,根据第三电话号码和第二电话号码创建校验令牌,存储上述校验令牌与第三电话号码以及第二电话号码的关联关系。After receiving the first creation request, the network device verifies the legitimacy and validity of the first identity. If the first identity is verified, the third phone number corresponding to the first identity is queried, a verification token is created based on the third phone number and the second phone number, and the verification token and the third phone number are stored And the association relationship of the second phone number.
根据第三电话号码和第二电话号码创建校验令牌的方式可以根据实际情况进行设置。在一些实施例中,可以将随机数作为校验令牌。例如,当网络设备接收到第一创建请求后,生成一随机数,将该随机数作为校验令牌,记录该随机数与第三电话号码和第二电话号码的关联关系。在另一些实施例中,也可以将哈希值作为校验令牌。例如,当网络设备接收到第一创建请求后,对接收到第一创建请求的时间进行哈希计算,得到一哈希值,将该哈希值作为校验令牌,记录该哈希值与第三电话号码和第二电话号码的关联关系。或者,在其他的一些实施例中,也可以选取其他方式生成校验令牌,在此不一一赘述。The method of creating a verification token based on the third phone number and the second phone number can be set according to actual conditions. In some embodiments, random numbers can be used as verification tokens. For example, when the network device receives the first creation request, it generates a random number, uses the random number as a verification token, and records the association relationship between the random number and the third phone number and the second phone number. In other embodiments, the hash value can also be used as the verification token. For example, when the network device receives the first creation request, it hashes the time when the first creation request is received to obtain a hash value, uses the hash value as a verification token, and records the hash value and The association relationship between the third phone number and the second phone number. Alternatively, in some other embodiments, other methods may be selected to generate the verification token, which will not be repeated here.
网络设备生成了校验令牌之后,可以将校验令牌发送至指定的接收方。校验令牌的发送形式以及指定的接收方可以根据实际情况进行设置。例如,可以将第三终端设备作为指定的接收方,网络设备可以通过短信将校验令牌以统一资源定位符(Uniform Resource Locator,URL)的形式发送至第三终端设备,URL中包含校验令牌;或者,也可以将第二终端设备作为指定的接收方,网络设备通过短信将校验令牌以URL的形式发送至第二终端设备,被叫方再通过第二终端设备将校验令牌出示给第三终端设备。After the network device generates the verification token, it can send the verification token to the designated recipient. The sending form of the verification token and the designated receiver can be set according to the actual situation. For example, the third terminal device can be used as the designated receiver, and the network device can send the verification token to the third terminal device in the form of Uniform Resource Locator (URL) via SMS, and the URL contains the verification token. Token; or, the second terminal device can also be used as the designated recipient, the network device sends the verification token to the second terminal device in the form of a URL through a short message, and the called party then verifies the verification token through the second terminal device The token is presented to the third terminal device.
S102、所述网络设备根据所述校验令牌对所述第一电话号码进行校验;S102: The network device verifies the first phone number according to the verification token.
当网络设备获取到呼叫请求后,可以根据第一电话号码对校验令牌进行校验。After the network device obtains the call request, it can verify the verification token according to the first phone number.
网络设备可以先对校验令牌进行合法性校验,根据校验令牌的格式信息是否合规、校验令牌是否存储在数据库等方面判断校验令牌是否合法。The network device may first verify the validity of the verification token, and determine whether the verification token is legitimate according to whether the format information of the verification token is compliant, whether the verification token is stored in a database, and so on.
如果校验令牌合法,则可以根据校验令牌对第一电话号码进行校验。网络设备可以获取校验令牌关联的第三电话号码,如果第一电话号码与第三电话号码一致,则表示第一电话号码校验通过。如果第一电话号码与第三电话号码不一致,则表示第一电话号码校验失败。If the verification token is valid, the first phone number can be verified according to the verification token. The network device can obtain the third phone number associated with the verification token. If the first phone number is consistent with the third phone number, it means that the first phone number has passed the verification. If the first phone number is inconsistent with the third phone number, it means that the first phone number verification failed.
除了使用第三电话号码对第一电话号码进行校验之外,还可以通过其他信息进行校验。In addition to using the third phone number to verify the first phone number, other information can also be used for verification.
在一些可能的实现方式中,被叫方可以设置该校验令牌的可呼叫时间段。网络设备可以获取拨号时间,根据可呼叫时间段对拨号时间进行校验。如果拨号时间在可呼叫时间段内,则表示第一电话号码校验通过。如果拨号时间不在可呼叫时间内,则第一电话号码表示校验失败。In some possible implementations, the called party can set the callable time period of the verification token. The network device can obtain the dialing time and verify the dialing time according to the callable time period. If the dialing time is within the callable time period, it means that the first phone number has passed the verification. If the dialing time is not within the callable time, the first phone number indicates that the verification has failed.
网络设备可以通过呼叫请求获取拨号时间,此时,拨号时间表示第一用户触发呼 叫请求的时间。或者,网络设备也可以将接收到呼叫请求的时间作为拨号时间。The network device can obtain the dialing time through the call request. At this time, the dialing time indicates the time when the first user triggers the call request. Alternatively, the network device may also use the time when the call request is received as the dialing time.
例如,被叫方在夜间23点到早晨7点之间不想接到电话,可以将早晨7点至夜间23点之间的时间设置为可呼叫时间段。For example, if the called party does not want to receive a call between 23:00 at night and 7 am, the time between 7 am and 23:00 at night can be set as the callable time period.
如果第一主叫方触发呼叫请求时,拨号时间为10点23分,10点23分在7点到23点的时间区间内,则第一电话号码在拨号时间方面校验通过。If the dialing time is 10:23 when the first calling party triggers the call request, and 10:23 is within the time interval from 7 to 23:00, the first phone number will pass the verification in terms of dialing time.
如果第一主叫方触发呼叫请求时,拨号时间为23点12分,23点12分不在7点到23点的时间区间内,则第一电话号码校验失败。If the dialing time is 23:12 when the first calling party triggers the call request, and 23:12 is not within the time interval from 7 to 23:00, the first phone number verification fails.
在另一些可能的实现方式中,被叫方可以设置该校验令牌的可呼叫区域,则网络设备可以通过呼叫请求获取拨号地点,根据可呼叫区域对拨号地点进行校验。如果拨号地点在可呼叫区域内,则表示第一电话号码校验通过。如果拨号地点不在可呼叫区域内,则表示第一电话号码校验失败。In other possible implementation manners, the called party can set the callable area of the verification token, and the network device can obtain the dialing location through the call request, and verify the dialing location according to the callable area. If the dialing location is within the callable area, it means that the first phone number has passed the verification. If the dialing location is not in the callable area, it means that the first phone number verification failed.
例如,被叫方的客户都在广州、深圳和南京,则被叫方可以将广州、深圳和南京设置为可呼叫区域。For example, if the customers of the called party are in Guangzhou, Shenzhen, and Nanjing, the called party can set Guangzhou, Shenzhen, and Nanjing as callable areas.
当第一主叫方发送呼叫请求至网络设备时,呼叫请求包括第一终端设备的位置信息,该位置信息即拨号地点。如果拨号地点为深圳南山区,深圳南山区在可呼叫区域内,则表示第一电话号码在拨号地点方面校验通过。When the first calling party sends a call request to the network device, the call request includes the location information of the first terminal device, and the location information is the dialing location. If the dialing location is Nanshan District, Shenzhen, which is within the callable area, it means that the first phone number has passed the verification of the dialing location.
如果第一主叫方的拨号地点为河北石家庄,河北石家庄不在可呼叫区域内,则第一电话号码校验失败。If the dialing location of the first calling party is Shijiazhuang, Hebei, and Shijiazhuang, Hebei is not in the callable area, the first phone number verification fails.
在另一些可能的实现方式中,被叫方可以设置该校验令牌的有效次数。当网络设备接收到呼叫请求时,检测校验令牌是否失效。若校验令牌未失效,则第一电话号码在令牌状态方面校验通过,呼叫次数加1,当呼叫次数大于或等于有效次数时,校验令牌失效。若校验令牌失效,则表示第一电话号码校验失败。In other possible implementations, the called party can set the valid times of the verification token. When the network device receives the call request, it detects whether the verification token is invalid. If the verification token is not invalid, the first phone number has passed the verification in terms of the token status, and the number of calls is increased by 1. When the number of calls is greater than or equal to the valid number, the verification token is invalid. If the verification token is invalid, it means that the verification of the first phone number has failed.
例如,第二主叫方为房产销售人员,被叫方留联系方式时,考虑到双方联系次数可能不会超过10次,则为了避免该房产销售人员持续骚扰,可以通过第一创建请求或后续的次数设置指令将校验令牌的有效次数设置为10次。For example, the second calling party is a real estate salesperson, and when the called party leaves contact information, considering that the number of contacts between the two parties may not exceed 10 times, in order to avoid continuous harassment by the real estate salesperson, the first creation request or follow-up The number of times setting instruction sets the valid times of the verification token to 10 times.
当第一主叫方发送呼叫请求到网络设备时,假设网络设备检测到校验令牌的呼叫次数为9,校验令牌未失效,则第一电话号码在令牌状态方面校验通过,呼叫次数加1。When the first calling party sends a call request to the network device, assuming that the network device detects that the number of calls of the verification token is 9, and the verification token has not expired, the first phone number passes the verification in terms of the token status. The number of calls increases by 1.
在本次呼叫之后,校验令牌的呼叫次数为10,呼叫次数等于有效次数,则网络设备将校验令牌的令牌状态修改为失效状态。After this call, the number of calls of the verification token is 10, and the number of calls is equal to the number of valid times, and the network device modifies the token status of the verification token to an invalid state.
当第一主叫方下一次发送呼叫请求到网络设备时,网络设备检测到校验令牌的状态为失效状态,则第一电话号码校验失败。When the first calling party sends a call request to the network device next time, and the network device detects that the status of the verification token is an invalid state, the verification of the first phone number fails.
在另一些可能的实现方式中,被叫方可以设置该校验令牌的有效时间。当网络设备接收到呼叫请求时,检测校验令牌是否失效。如果校验令牌未失效,则第一电话号码在令牌状态方面校验通过。如果已过了有效时间,则校验令牌失效,表示第一电话号码校验失败。In other possible implementations, the called party can set the valid time of the verification token. When the network device receives the call request, it detects whether the verification token is invalid. If the verification token is not invalid, the first phone number is verified in terms of the status of the token. If the valid time has passed, the verification token becomes invalid, indicating that the verification of the first phone number has failed.
例如,第二主叫方为送餐人员,被叫方留联系方式时,考虑到双方可能就两个小时内需要联系,则为了避免该送餐人员持续骚扰,可以通过第一创建请求或后续的时间设置指令将校验令牌的有效时间设置为2个小时。For example, if the second caller is a food delivery person, when the called party leaves the contact information, considering that both parties may need to contact within two hours, in order to avoid continuous harassment by the food delivery person, the first creation request or follow-up The time setting instruction sets the valid time of the verification token to 2 hours.
假设被叫方是在11点23分将校验令牌的有效时间设置为2个小时。当第一主叫 方在12点45分发送呼叫请求到网络设备时,网络设备检测到当前校验令牌为有效状态,则第一电话号码在令牌状态方面校验通过。Assume that the called party sets the valid time of the verification token to 2 hours at 11:23. When the first calling party sends a call request to the network device at 12:45, the network device detects that the current verification token is in a valid state, and the first phone number passes the verification in terms of the token status.
在13点23分时,网络设备检测到该校验令牌的有效时间结束,则将该校验令牌的令牌状态修改为失效状态。At 13:23, the network device detects that the valid time of the verification token is over, and then modifies the token status of the verification token to an invalid state.
当第一主叫方在13点34分发送呼叫请求到网络设备时,网络设备检测到当前校验令牌为失效状态,则第一电话号码校验失败。When the first calling party sends a call request to the network device at 13:34, and the network device detects that the current verification token is in an invalid state, the verification of the first phone number fails.
在另一些可能的实现方式中,被叫方也可以主动发送状态修改指令给网络设备,让网络设备将校验令牌的令牌状态修改为失效状态。因此,当网络设备接收到呼叫请求时,检测校验令牌是否失效。如果校验令牌未失效,则第一电话号码在令牌状态方面校验通过。如果校验令牌失效,则第一电话号码校验失败。In other possible implementation manners, the called party may also actively send a state modification instruction to the network device, so that the network device changes the token state of the verification token to an invalid state. Therefore, when the network device receives the call request, it detects whether the verification token is invalid. If the verification token is not invalid, the first phone number is verified in terms of the status of the token. If the verification token is invalid, the first phone number verification fails.
例如,被叫方如果不想继续被第二主叫方呼叫,可以通过第二终端设备主动发送状态修改指令给网络设备,网络设备根据状态修改指令将指定的校验令牌的令牌状态设置为失效状态。For example, if the called party does not want to continue to be called by the second calling party, it can actively send a state modification instruction to the network device through the second terminal device, and the network device sets the token state of the designated check token to the network device according to the state modification instruction Invalid state.
后续第一主叫方发送呼叫请求到网络设备时,网络设备检测到校验令牌为失效状态,则第一电话号码校验失败。When the first calling party subsequently sends a call request to the network device, and the network device detects that the verification token is in an invalid state, the verification of the first phone number fails.
S103、若所述第一电话号码校验通过,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。S103. If the first phone number is verified, the network device obtains a second phone number associated with the verification token, and establishes a call connection between the first phone number and the second phone number .
如果第一电话号码校验通过,则表示第一主叫方与第二主叫方为相同的用户,该呼叫请求并非是骚扰电话。此时,网络设备可以获取与校验令牌关联的第二电话号码,建立第一电话号码与第二电话号码的呼叫连接。If the first phone number is verified, it means that the first calling party and the second calling party are the same user, and the call request is not a nuisance call. At this time, the network device can obtain the second phone number associated with the verification token, and establish a call connection between the first phone number and the second phone number.
呼叫连接的建立方式可以根据实际情况进行设置。在一些可能的实现方式中,网络设备可以直接通过运营商网络建立第一电话号码和第二电话号码的通话链路,并对第一电话号码和第二电话号码执行匿名操作,将第一电话号码和第二电话号码转变为根据预设规则生成的中间号码,从而掩饰第一电话号码和第二电话号码的真实号码,保护第一电话号码和第二电话号码的隐私。The call connection establishment method can be set according to the actual situation. In some possible implementations, the network device can directly establish a call link between the first phone number and the second phone number through the operator’s network, and perform an anonymous operation on the first phone number and the second phone number, and transfer the first phone number to the second phone number. The number and the second phone number are converted into intermediate numbers generated according to preset rules, thereby disguising the real numbers of the first phone number and the second phone number, and protecting the privacy of the first phone number and the second phone number.
在另一种可能的实现方式中,网络设备可以将第一电话号码和第二电话号码发送至电话会议服务器,以指示电话会议服务器将第一电话号码和第二电话号码拉入同一电话会议中,第一主叫方和被叫方即可进行通话。In another possible implementation, the network device may send the first phone number and the second phone number to the conference call server to instruct the conference call server to pull the first phone number and the second phone number into the same conference call , The first calling party and called party can talk.
当采用电话会议的形式建立第一电话号码和第二电话号码的呼叫连接时,不需要使用运营商的漫游服务,即使第一主叫方的运营商网络和被叫方的运营商网络不同,也可以顺利实现上述方案,扩展了本实施例的号码隐私保护方法的应用场景,提高了用户体验。并且,当采用电话会议形式的呼叫连接时,在第一终端设备和第二终端设备上显示的号码是电话会议的会议号码,并非第一电话号码的真实号码或第二电话号码的真实号码,从而保护第一电话号码和第二电话号码的隐私。When the call connection between the first phone number and the second phone number is established in the form of a conference call, there is no need to use the operator's roaming service, even if the operator network of the first calling party and the operator network of the called party are different, The above solution can also be implemented smoothly, which expands the application scenarios of the number privacy protection method of this embodiment, and improves user experience. Moreover, when a call connection in the form of a conference call is used, the numbers displayed on the first terminal device and the second terminal device are the conference number of the conference call, not the real number of the first phone number or the real number of the second phone number, Thereby protecting the privacy of the first phone number and the second phone number.
此外,第一主叫方在呼叫被叫方的过程中,有可能出现伪造电话号码的情况,即第一主叫方的第一电话号码不是第三电话号码,而是通过号码虚拟软件将第一电话号码虚拟成第三电话号码,从而通过网络设备的令牌校验程序。In addition, when the first calling party calls the called party, it is possible that the phone number is forged, that is, the first phone number of the first calling party is not the third phone number, but the first phone number is changed through the number virtualization software. A phone number is virtualized as a third phone number, so as to pass the token verification program of the network device.
此时,如果采用电话会议的形式建立第一电话号码和第二电话号码的呼叫连接,则电话会议服务器呼叫的是第三电话号码和第二电话号码,而不是第一电话号码的原 始号码和第二电话号码。At this time, if a call connection between the first telephone number and the second telephone number is established in the form of a telephone conference, the telephone conference server calls the third telephone number and the second telephone number instead of the original number and the first telephone number. The second phone number.
例如,假设第一电话号码的原始号码是138XXXXX101,第三电话号码为188XXXXX404。此时,第一主叫方为了呼叫被叫方,可以通过号码虚拟软件将第一电话号码的原始号码138XXXXX101虚拟成188XXXXX404。但是,即使第一主叫方通过伪造号码的方式通过了网络设备的令牌校验程序,电话会议服务器呼叫的号码也是188XXXXX404和第二电话号码,而不是138XXXXX101和第二电话号码。也即是说,即使第一主叫方通过伪造号码的方式通过了网络设备的令牌校验程序,也无法进入电话会议中,无法对被叫方进行骚扰。For example, suppose that the original number of the first phone number is 138XXXXX101, and the third phone number is 188XXXXX404. At this time, in order to call the called party, the first calling party can virtualize the original number 138XXXXX101 of the first phone number into 188XXXXX404 through the number virtualization software. However, even if the first calling party passes the token verification procedure of the network device by forging the number, the number called by the teleconference server is 188XXXXX404 and the second phone number instead of 138XXXXX101 and the second phone number. In other words, even if the first calling party passes the token verification procedure of the network device by forging the number, it cannot enter the conference call and cannot harass the called party.
如果第一电话号码校验失败,则表示第一主叫方和第二主叫方并非同一个用户,该校验令牌可能被泄露给了无关人员,第一主叫方的呼叫请求可能是骚扰电话。此时,网络设备拒绝创建第一电话号码和第二电话号码的呼叫渠道。If the verification of the first phone number fails, it means that the first caller and the second caller are not the same user, the verification token may have been leaked to an unrelated person, and the call request of the first caller may be Harassing phone calls. At this time, the network device refuses to create a call channel for the first phone number and the second phone number.
此外,当被叫方发现校验令牌被泄露给了无关人员,将校验令牌的令牌状态修改为无效状态之后,如果被叫方保存有第二主叫方的第三电话号码,或被叫方保存有第二主叫方的第一身份标识且该第一身份标识为有效状态,则被叫方可以发送第二创建指令给网络设备,第二创建指令包括第二电话号码,以及第三电话号码或第一身份标识。In addition, when the called party finds that the verification token has been leaked to an unrelated person and changes the token status of the verification token to an invalid state, if the called party saves the third phone number of the second calling party, Or the called party saves the first identity of the second calling party and the first identity is in a valid state, the called party can send a second creation instruction to the network device, and the second creation instruction includes the second phone number, And the third phone number or the first identity.
网络设备接收到第二创建指令后,可以获取到第二电话号码和第三电话号码,根据第二电话号码和第三电话号码生成新的校验令牌,将新的校验令牌发送给指定的接收方。After receiving the second creation instruction, the network device can obtain the second phone number and the third phone number, generate a new verification token based on the second phone number and the third phone number, and send the new verification token to The designated recipient.
当第二终端设备和/或第三终端设备丢失了校验令牌时,也可以发送令牌寻回指令至网络设备。网络设备接收到令牌寻回指令时,将与第二电话号码关联的校验令牌发送至第二终端设备,和/或将与第三电话号码关联的校验令牌发送至第三终端设备。When the second terminal device and/or the third terminal device loses the verification token, the token retrieval instruction can also be sent to the network device. When the network device receives the token retrieval instruction, it sends the verification token associated with the second phone number to the second terminal device, and/or sends the verification token associated with the third phone number to the third terminal equipment.
以下结合具体的应用场景对本实施例提供的号码隐私保护方法进行说明:The following describes the number privacy protection method provided in this embodiment in combination with specific application scenarios:
如图2所示,终端设备1为用户1的终端设备,终端设备2为用户2的终端设备。用户1为房产销售人员,用户2想要将房产委托给用户1出租。终端设备1和终端设备2安装有隐私保护软件,并已完成隐私保护软件的注册流程以及绑定电话号码。As shown in Figure 2, terminal device 1 is the terminal device of user 1, and terminal device 2 is the terminal device of user 2. User 1 is a real estate salesperson, and user 2 wants to entrust the real estate to user 1 for rent. The terminal device 1 and the terminal device 2 are installed with privacy protection software, and the registration process of the privacy protection software and the binding phone number have been completed.
此时,用户2需要留下联系方式为用户1。用户2咨询了用户1的联系方式,用户1将自身的电话号码1告知了用户2。At this time, user 2 needs to leave the contact information as user 1. User 2 consults User 1’s contact information, and User 1 informs User 2 of his phone number 1.
用户2将用户1的电话号码1录入终端设备1的手机通讯录,通过终端设备1的隐私保护软件发送第一创建请求给网络设备。第一创建请求中包含用户1的电话号码1以及用户2的电话号码2。User 2 records user 1's phone number 1 into the mobile phone address book of terminal device 1, and sends the first creation request to the network device through the privacy protection software of terminal device 1. The first creation request contains the phone number 1 of user 1 and the phone number 2 of user 2.
网络设备根据电话号码1和电话号码2生成校验令牌1,存储电话号码1、电话号码2和校验令牌1的关联关系。之后,网络设备将校验令牌1发送至短信服务器,以指示短信服务器将携带有校验令牌1的H5网页URL链接以短信的方式发送到终端设备1。The network device generates a verification token 1 according to the telephone number 1 and the telephone number 2, and stores the association relationship between the telephone number 1, the telephone number 2 and the verification token 1. After that, the network device sends the verification token 1 to the short message server to instruct the short message server to send the URL link of the H5 web page carrying the verification token 1 to the terminal device 1 in the form of a short message.
如图3所示,当用户1找到了合适的租客后,想要联系用户2,此时,用户1可以点击终端设备1的短信中的URL链接,触发拨号指令1并发送给网络设备。As shown in Figure 3, when user 1 finds a suitable tenant and wants to contact user 2, user 1 can click the URL link in the short message of terminal device 1 to trigger dial instruction 1 and send it to the network device.
网络设备接收到拨号指令1后,生成拨号网页页面并返回给终端设备1。After receiving the dialing instruction 1, the network device generates a dialing web page and returns it to the terminal device 1.
用户1查看终端设备上显示拨号网页页面,点击拨号按键,触发呼叫请求1,终 端设备1将呼叫请求1发送至网络设备,呼叫请求1中包含电话号码1、校验令牌1以及终端设备1当前的位置信息(即拨号地点)。User 1 views the dialing web page displayed on the terminal device and clicks the dial button to trigger call request 1. The terminal device 1 sends the call request 1 to the network device. The call request 1 contains the phone number 1, the verification token 1, and the terminal device 1. Current location information (ie dialing location).
网络设备接收到呼叫请求1后,检测到校验令牌1为合法的校验令牌,校验令牌1的令牌状态1为有效状态(表示校验令牌1的使用次数尚未超出有效次数和/或当前时间尚未超出校验令牌1的有效时间),网络设备接收到呼叫请求1的拨号时间在可呼叫时间段内且呼叫请求1中的拨号地点在可呼叫区域内,则网络设备获取与校验令牌1关联的电话号码1。After the network device receives the call request 1, it detects that the verification token 1 is a valid verification token, and the token status 1 of the verification token 1 is valid (indicating that the number of uses of the verification token 1 has not exceeded the valid The number of times and/or the current time has not exceeded the valid time of verification token 1), the dialing time of the network device receiving call request 1 is within the callable time period and the dialing location in call request 1 is within the callable area, then the network The device obtains the phone number 1 associated with the verification token 1.
网络设备校验发现呼叫请求1中的电话号码1和上述与校验令牌1关联的电话号码1一致,则电话号码1校验通过,将电话号码1以及与校验令牌1关联的电话号码2发送至电话会议服务器,以指示电话会议服务器根据电话号码1呼叫终端设备1以及根据电话号码2呼叫终端设备2,将终端设备1和终端设备2拉入同一个电话会议,使得用户1和用户2可以进行电话沟通。The network device verifies that the phone number 1 in the call request 1 is the same as the phone number 1 associated with the verification token 1, and the phone number 1 passes the verification, and the phone number 1 and the phone associated with the verification token 1 The number 2 is sent to the teleconference server to instruct the teleconference server to call the terminal device 1 according to the telephone number 1 and the terminal device 2 according to the telephone number 2, and pull the terminal device 1 and the terminal device 2 into the same conference call, so that the user 1 and User 2 can communicate by phone.
如图4所示,如果用户1或者用户2不小心将校验令牌1泄露给了用户3,用户3想要给用户2推销产品。As shown in Figure 4, if the user 1 or the user 2 accidentally leaks the verification token 1 to the user 3, the user 3 wants to promote the product to the user 2.
此时,用户3通过终端设备3点击与校验令牌1相关的短信中的URL链接,触发拨号指令2并发送给网络设备。At this time, the user 3 clicks the URL link in the short message related to the verification token 1 through the terminal device 3 to trigger the dialing instruction 2 and send it to the network device.
网络设备接收到拨号指令2后,生成拨号网页页面并返回给终端设备3。After receiving the dialing instruction 2, the network device generates a dialing web page and returns it to the terminal device 3.
用户3查看终端设备上显示拨号网页页面,点击拨号按键,触发呼叫请求2,终端设备3将呼叫请求2发送至网络设备,呼叫请求2中包含电话号码3、校验令牌1以及终端设备3当前的位置信息(即拨号地点)。User 3 views the dialing web page displayed on the terminal device, clicks the dial button, and triggers a call request 2. The terminal device 3 sends the call request 2 to the network device. The call request 2 contains the phone number 3, the verification token 1, and the terminal device 3. Current location information (ie dialing location).
网络设备接收到呼叫请求2后,检测到校验令牌1为合法的校验令牌,校验令牌1的令牌状态1为有效状态(表示校验令牌1的使用次数尚未超出有效次数和/或当前时间尚未超出校验令牌1的有效时间),网络设备接收到呼叫请求2的拨号时间在可呼叫时间段内且呼叫请求2中的拨号地点在可呼叫区域内,则网络设备获取与校验令牌1关联的电话号码1。After the network device receives the call request 2, it detects that the verification token 1 is a valid verification token, and the token status 1 of the verification token 1 is a valid state (indicating that the number of uses of the verification token 1 has not exceeded the valid The number of times and/or the current time has not exceeded the valid time of the verification token 1), the dialing time of the network device receiving the call request 2 is within the callable time period and the dialing location in the call request 2 is within the callable area, then the network The device obtains the phone number 1 associated with the verification token 1.
网络设备校验发现呼叫请求2中的电话号码3和上述与校验令牌1关联的电话号码1不一致,表示电话号码3无权通过校验令牌1呼叫与校验令牌2关联的电话号码2。The network device verification found that the phone number 3 in the call request 2 is inconsistent with the phone number 1 associated with the verification token 1, indicating that the phone number 3 does not have the right to call the phone associated with the verification token 2 through the verification token 1 Number 2.
此时,网络设备返回呼叫失败信息给终端设备3,告知用户3呼叫结果,结束对呼叫请求2的响应。At this time, the network device returns the call failure information to the terminal device 3, notifies the user 3 of the call result, and ends the response to the call request 2.
如图5所示,当用户1在清理短信时,不小心删除了与校验令牌1相关的短信时,用户1可以通过终端设备1中隐私保护软件发送寻回指令至网络设备,寻回指令包含用户1的电话号码1。As shown in Figure 5, when user 1 accidentally deletes the short message related to verification token 1 when clearing the short message, user 1 can send a retrieval instruction to the network device through the privacy protection software in the terminal device 1, and retrieve it The command contains the phone number 1 of user 1.
网络设备接收到寻回指令后,查询与电话号码1关联校验令牌。经过查询,网络设备查询到校验令牌1与电话号码1关联,则将校验令牌1发送给短信服务器,以指示短信服务器将携带有校验令牌1的H5网页URL链接以短信的方式发送到终端设备1。After receiving the retrieval instruction, the network device queries the verification token associated with the phone number 1. After inquiring, the network device inquires that the verification token 1 is associated with the phone number 1, and then sends the verification token 1 to the SMS server to instruct the SMS server to link the URL of the H5 webpage carrying the verification token 1 to the SMS The method is sent to the terminal device 1.
如图6所示,如果用户2发现校验令牌1已经被泄露,则用户2可以通过终端设备2的隐私保护软件发送第二创建请求给网络设备,第二创建请求中包含用户1的电 话号码1以及用户2的电话号码2。As shown in Figure 6, if user 2 finds that verification token 1 has been leaked, user 2 can send a second creation request to the network device through the privacy protection software of terminal device 2. The second creation request contains user 1’s phone number. Number 1 and User 2’s phone number 2.
网络设备根据电话号码1和电话号码2生成校验令牌2,存储电话号码1、电话号码2和校验令牌2的关联关系,并将校验令牌1的令牌状态修改为失效状态。之后,网络设备将校验令牌2发送至短信服务器,以指示短信服务器将携带有校验令牌2的H5网页URL链接以短信的方式发送到终端设备1。The network device generates the verification token 2 according to the phone number 1 and the phone number 2, stores the association relationship between the phone number 1, the phone number 2 and the verification token 2, and modifies the token status of the verification token 1 to the invalid state . After that, the network device sends the verification token 2 to the short message server to instruct the short message server to send the URL link of the H5 webpage carrying the verification token 2 to the terminal device 1 in the form of a short message.
如图7所示,如果用户1完成了用户2的租房委托之后,为了防止用户1后续对用户2进行骚扰,用户2可以终端设备2的隐私保护软件发送状态修改指令给网络设备。As shown in Fig. 7, after user 1 completes user 2’s house rental entrustment, in order to prevent user 1 from harassing user 2 subsequently, user 2 can send a state modification instruction to the network device by the privacy protection software of terminal device 2.
网络设备接收到状态修改指令后,根据状态修改指令将校验令牌2的令牌状态修改为失效状态。After receiving the state modification instruction, the network device modifies the token state of the verification token 2 to an invalid state according to the state modification instruction.
之后,当用户1想要联系用户2时,可以点击终端设备1的短信中与校验令牌2相关的URL链接,触发拨号指令3并发送给网络设备。Later, when the user 1 wants to contact the user 2, he can click the URL link related to the verification token 2 in the short message of the terminal device 1 to trigger the dialing instruction 3 and send it to the network device.
网络设备接收到拨号指令3后,生成拨号网页页面并返回给终端设备1。After receiving the dialing instruction 3, the network device generates a dialing web page and returns it to the terminal device 1.
用户1查看终端设备上显示拨号网页页面,点击拨号按键,触发呼叫请求3,终端设备1将呼叫请求3发送至网络设备,呼叫请求3中包含电话号码1、校验令牌2以及终端设备1当前的位置信息(即拨号地点)。User 1 views the dialing web page displayed on the terminal device and clicks the dial button to trigger a call request 3. The terminal device 1 sends the call request 3 to the network device. The call request 3 contains the phone number 1, the verification token 2 and the terminal device 1. Current location information (ie dialing location).
网络设备接收到呼叫请求1后,检测到校验令牌1的令牌状态为失效状态,表示用户1没有权限通过校验令牌2与用户2联系,电话号码1校验失败,网络设备返回呼叫失败信息给终端设备1,告知用户1呼叫结果,结束对呼叫请求3的响应。After the network device receives the call request 1, it detects that the token status of the verification token 1 is invalid, which means that the user 1 does not have the authority to contact the user 2 through the verification token 2, and the verification of the phone number 1 fails, and the network device returns The call failure information is sent to the terminal device 1, informing the user 1 of the call result, and ending the response to the call request 3.
在本实施例的号码隐私保护方法中,第一主叫方并非直接通过被叫方的第二电话号码进行呼叫,而是通过校验令牌进行呼叫。被叫方出示联系方式时,不必直接出示第二电话号码,而是出示校验令牌即可,从而实现被叫方电话号码的匿名化,避免被叫方的第二电话号码被无意泄露或恶意泄露。In the number privacy protection method of this embodiment, the first calling party does not directly make a call through the called party's second phone number, but makes a call through a verification token. When the called party shows the contact information, it is not necessary to show the second phone number directly, but just show the verification token, so as to realize the anonymization of the called party's phone number and prevent the called party's second phone number from being unintentionally leaked or Malicious disclosure.
校验令牌是根据被叫方的第二电话号码和第二主叫方的第三电话号码生成的。当第一主叫方通过校验令牌呼叫被叫方时,网络设备会根据校验令牌对第一主叫方的第一电话号码进行校验,辨识第一电话号码是否与第三电话号码一致。当第一电话号码与第三电话号码一致时,表示第一主叫方与第二主叫方为相同的用户,第一主叫方有呼叫第二电话号码的权限。当第一电话号码与第三电话号码不一致时,表示第一主叫方与第二主叫方为不同的用户,第一主叫方无权呼叫第二电话号码,呼叫失败。因此,即使校验令牌泄露,除了第二主叫方以外的用户也无法通过该校验令牌呼叫被叫方,避免被叫方因为校验令牌泄露频繁接到骚扰电话。The verification token is generated based on the second phone number of the called party and the third phone number of the second calling party. When the first calling party calls the called party through the verification token, the network device will verify the first phone number of the first calling party according to the verification token, and identify whether the first phone number is the same as the third phone number. The numbers are the same. When the first phone number is consistent with the third phone number, it means that the first calling party and the second calling party are the same users, and the first calling party has the right to call the second phone number. When the first phone number is not consistent with the third phone number, it means that the first calling party and the second calling party are different users, and the first calling party has no right to call the second phone number, and the call fails. Therefore, even if the verification token is leaked, users other than the second calling party cannot call the called party through the verification token, which prevents the called party from frequently receiving harassing calls due to the leak of the verification token.
此外,被叫方可以对校验令牌的权限进行管理,例如,是否设置可呼叫时间段、是否设置可呼叫区域、是否设置有效次数、是否设置有效时间、是否将校验令牌的令牌状态修改为失效状态等。并且,当校验令牌遭到泄露时,被叫方还可以主动请求网络设备生成新的校验令牌,废除原有的校验令牌。通过上述权限管理措施可以进一步避免被叫方接收到他人的骚扰电话。In addition, the called party can manage the authority of the verification token, for example, whether to set the callable time period, whether to set the callable area, whether to set the effective number of times, whether to set the effective time, and whether to verify the token of the token The status is changed to a failed status, etc. In addition, when the verification token is leaked, the called party can also actively request the network device to generate a new verification token and revoke the original verification token. Through the above-mentioned authority management measures, it is possible to further prevent the called party from receiving harassing calls from others.
同时,第二主叫方也可以对校验令牌进行一定限度的管理。例如,当第二主叫方发现校验令牌泄漏时,也可以主动发送状态修改指令给网络设备,以指示网络设备将该校验令牌的令牌状态修改为失效状态;当第二主叫方遗失校验令牌时,也可以请求 网络设备寻回丢失的校验令牌。通过上述权限管理措施可以进一步避免被叫方接收到他人的骚扰电话,以及避免第二主叫方丢失校验令牌后无法与被叫方联系。At the same time, the second calling party can also manage the verification token to a certain extent. For example, when the second calling party discovers that the verification token is leaked, it can also actively send a status modification instruction to the network device to instruct the network device to modify the token status of the verification token to an invalid state; When the calling party loses the verification token, it can also request the network device to retrieve the lost verification token. Through the above rights management measures, it is possible to further prevent the called party from receiving harassing calls from others, and to prevent the second calling party from being unable to contact the called party after losing the verification token.
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that the size of the sequence number of each step in the foregoing embodiment does not mean the order of execution, and the execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation to the implementation process of the embodiment of the present application.
请参阅图8,本申请实施例提供了一种网络设备,为便于说明,仅示出与本申请相关的部分,如图8所示,网络设备包括,Please refer to FIG. 8, an embodiment of the present application provides a network device. For ease of description, only the parts related to the present application are shown. As shown in FIG. 8, the network device includes:
呼叫请求模块801,用于获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;The call request module 801 is configured to obtain a call request sent by a first terminal device, where the call request includes a verification token and the first phone number of the first calling party;
号码校验模块802,用于根据所述校验令牌对所述第一电话号码进行校验;The number verification module 802 is configured to verify the first phone number according to the verification token;
呼叫连接模块803,用于若所述第一电话号码校验通过,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。The call connection module 803 is configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call between the first phone number and the second phone number connection.
进一步地,所述网络设备还包括:Further, the network equipment further includes:
创建请求模块,用于获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和第二主叫方的第三电话号码;A creation request module, configured to obtain a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
令牌创建模块,用于根据所述第二电话号码和所述第三电话号码创建所述校验令牌;A token creation module, configured to create the verification token according to the second phone number and the third phone number;
令牌发送模块,用于将所述校验令牌发送至指定的接收方。The token sending module is used to send the verification token to the designated receiver.
进一步地,所述网络设备还包括:Further, the network equipment further includes:
身份请求模块,用于获取第三终端设备发送的身份标识请求,所述身份标识请求包括第二主叫方的第三电话号码;An identity request module, configured to obtain an identity request sent by a third terminal device, where the identity request includes the third phone number of the second calling party;
身份标识模块,用于创建与所述第三电话号码对应的第一身份标识,将所述第一身份标识返回至所述第三终端设备;An identity module, configured to create a first identity corresponding to the third phone number, and return the first identity to the third terminal device;
创建请求模块,用于获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和所述第一身份标识;A creation request module, configured to obtain a first creation request sent by a second terminal device, the first creation request including the second phone number and the first identity;
令牌创建模块,用于查询与所述第一身份标识对应的第三电话号码,根据所述第二电话号码和所述第三电话号码创建所述校验令牌;A token creation module, configured to query a third phone number corresponding to the first identity identifier, and create the verification token according to the second phone number and the third phone number;
令牌发送模块,用于将所述校验令牌发送至指定的接收方。The token sending module is used to send the verification token to the designated receiver.
进一步地,所述令牌发送模块,具体用于将所述校验令牌发送至所述第二终端设备,或者,将所述校验令牌发送至所述第三终端设备。Further, the token sending module is specifically configured to send the verification token to the second terminal device, or send the verification token to the third terminal device.
进一步地,所述呼叫连接模块803,具体用于若所述第一电话号码与所述第三电话号码一致,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。Further, the call connection module 803 is specifically configured to, if the first phone number is consistent with the third phone number, obtain a second phone number associated with the verification token, and establish the first phone number. The phone number is connected to the call of the second phone number.
进一步地,所述呼叫连接模块803包括:Further, the call connection module 803 includes:
电话会议子模块,用于获取与所述校验令牌关联的第二电话号码,将所述第一电话号码和所述第二电话号码发送至电话会议服务器,以指示所述电话会议服务器将所述第一电话号码和所述第二电话号码拉入同一电话会议中。The teleconference sub-module is used to obtain the second telephone number associated with the verification token, and send the first telephone number and the second telephone number to the teleconference server to instruct the teleconference server to The first phone number and the second phone number are pulled into the same conference call.
需要说明的是,上述装置/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其具体功能及带来的技术效果,具体可参见方法实施例部 分,此处不再赘述。It should be noted that the information interaction and execution process between the above-mentioned devices/units are based on the same concept as the method embodiment of this application, and its specific functions and technical effects can be found in the method embodiment section. I won't repeat it here.
请参阅图9,本申请实施例还提供了一种网络设备,该网络设备9包括:处理器90、存储器91以及存储在所述存储器91中并可在所述处理器90上运行的计算机程序92。所述处理器90执行所述计算机程序92时实现上述号码隐私保护方法实施例中的步骤,例如图1所示的步骤S101至S103。或者,所述处理器90执行所述计算机程序92时实现上述各装置实施例中各模块/单元的功能,例如图8所示模块801至803的功能。Referring to FIG. 9, an embodiment of the present application also provides a network device. The network device 9 includes: a processor 90, a memory 91, and a computer program stored in the memory 91 and running on the processor 90 92. When the processor 90 executes the computer program 92, the steps in the above embodiment of the number privacy protection method are implemented, such as steps S101 to S103 shown in FIG. 1. Alternatively, when the processor 90 executes the computer program 92, the functions of the modules/units in the foregoing device embodiments, for example, the functions of the modules 801 to 803 shown in FIG. 8 are realized.
示例性的,所述计算机程序92可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器91中,并由所述处理器90执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序92在所述网络设备9中的执行过程。例如,所述计算机程序92可以被分割成呼叫请求模块、号码校验模块以及呼叫连接模块,各模块具体功能如下:Exemplarily, the computer program 92 may be divided into one or more modules/units, and the one or more modules/units are stored in the memory 91 and executed by the processor 90 to complete This application. The one or more modules/units may be a series of computer program instruction segments capable of completing specific functions, and the instruction segments are used to describe the execution process of the computer program 92 in the network device 9. For example, the computer program 92 can be divided into a call request module, a number verification module, and a call connection module. The specific functions of each module are as follows:
呼叫请求模块,用于获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;A call request module, configured to obtain a call request sent by a first terminal device, the call request including a verification token and the first phone number of the first calling party;
号码校验模块,用于根据所述校验令牌对所述第一电话号码进行校验;A number verification module, configured to verify the first phone number according to the verification token;
呼叫连接模块,用于若所述第一电话号码校验通过,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。A call connection module, configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call connection between the first phone number and the second phone number .
所述网络设备9可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述网络设备可包括,但不仅限于,处理器90、存储器91。本领域技术人员可以理解,图9仅仅是网络设备9的示例,并不构成对网络设备9的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述网络设备还可以包括输入输出设备、网络接入设备、总线等。The network device 9 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server. The network device may include, but is not limited to, a processor 90 and a memory 91. Those skilled in the art can understand that FIG. 9 is only an example of the network device 9 and does not constitute a limitation on the network device 9. It may include more or less components than those shown in the figure, or a combination of certain components, or different components. For example, the network device may also include input and output devices, network access devices, buses, and so on.
所称处理器90可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The so-called processor 90 may be a central processing unit (Central Processing Unit, CPU), other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
所述存储器91可以是所述网络设备9的内部存储单元,例如网络设备9的硬盘或内存。所述存储器91也可以是所述网络设备9的外部存储设备,例如所述网络设备9上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器91还可以既包括所述网络设备9的内部存储单元也包括外部存储设备。所述存储器91用于存储所述计算机程序以及所述网络设备所需的其他程序和数据。所述存储器91还可以用于暂时地存储已经输出或者将要输出的数据。The memory 91 may be an internal storage unit of the network device 9, for example, a hard disk or a memory of the network device 9. The memory 91 may also be an external storage device of the network device 9, for example, a plug-in hard disk equipped on the network device 9, a smart memory card (Smart Media Card, SMC), or a Secure Digital (SD). Card, Flash Card, etc. Further, the memory 91 may also include both an internal storage unit of the network device 9 and an external storage device. The memory 91 is used to store the computer program and other programs and data required by the network device. The memory 91 can also be used to temporarily store data that has been output or will be output.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个 处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and conciseness of description, only the division of the above functional units and modules is used as an example. In practical applications, the above functions can be allocated to different functional units and modules as required. Module completion, that is, the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above. The functional units and modules in the embodiments can be integrated into one processing unit, or each unit can exist alone physically, or two or more units can be integrated into one unit. The above-mentioned integrated units can be hardware-based Formal realization can also be realized in the form of a software functional unit. In addition, the specific names of the functional units and modules are only for the convenience of distinguishing each other, and are not used to limit the protection scope of the present application. For the specific working process of the units and modules in the foregoing system, reference may be made to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。In the above-mentioned embodiments, the description of each embodiment has its own focus. For parts that are not described in detail or recorded in an embodiment, reference may be made to related descriptions of other embodiments.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may realize that the units and algorithm steps of the examples described in combination with the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
在本申请所提供的实施例中,应该理解到,所揭露的装置/网络设备和方法,可以通过其它的方式实现。例如,以上所描述的装置/网络设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。In the embodiments provided in this application, it should be understood that the disclosed apparatus/network equipment and method may be implemented in other ways. For example, the device/network device embodiments described above are only illustrative. For example, the division of the modules or units is only a logical function division, and there may be other divisions in actual implementation, such as multiple units. Or components can be combined or integrated into another system, or some features can be omitted or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
所述集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。If the integrated module/unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. Based on this understanding, the present application implements all or part of the processes in the above-mentioned embodiments and methods, and can also be completed by instructing relevant hardware through a computer program. The computer program can be stored in a computer-readable storage medium. When the program is executed by the processor, it can implement the steps of the foregoing method embodiments. Wherein, the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file, or some intermediate forms. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory) , Random Access Memory (RAM, Random Access Memory), electrical carrier signal, telecommunications signal, and software distribution media, etc. It should be noted that the content contained in the computer-readable medium can be appropriately added or deleted according to the requirements of the legislation and patent practice in the jurisdiction. For example, in some jurisdictions, according to the legislation and patent practice, the computer-readable medium Does not include electrical carrier signals and telecommunication signals.
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实 施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。The above-mentioned embodiments are only used to illustrate the technical solutions of the present application, not to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that they can still implement the foregoing The technical solutions recorded in the examples are modified, or some of the technical features are equivalently replaced; and these modifications or replacements do not cause the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the application, and should be included in Within the scope of protection of this application.

Claims (14)

  1. 一种号码隐私保护方法,其特征在于,包括:A method for protecting number privacy, which is characterized in that it includes:
    网络设备获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;The network device obtains a call request sent by the first terminal device, where the call request includes a verification token and the first phone number of the first calling party;
    所述网络设备根据所述校验令牌对所述第一电话号码进行校验;The network device verifies the first phone number according to the verification token;
    若所述第一电话号码校验通过,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。If the first phone number is verified, the network device obtains the second phone number associated with the verification token, and establishes a call connection between the first phone number and the second phone number.
  2. 如权利要求1所述的号码隐私保护方法,其特征在于,在所述网络设备获取第一终端设备发送的呼叫请求之前,还包括:The number privacy protection method according to claim 1, wherein before the network device obtains the call request sent by the first terminal device, the method further comprises:
    所述网络设备获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和第二主叫方的第三电话号码;Acquiring, by the network device, a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
    所述网络设备根据所述第二电话号码和所述第三电话号码创建所述校验令牌;The network device creates the verification token according to the second phone number and the third phone number;
    所述网络设备将所述校验令牌发送至指定的接收方。The network device sends the verification token to the designated recipient.
  3. 如权利要求1所述的号码隐私保护方法,其特征在于,在所述网络设备获取第一终端设备发送的呼叫请求之前,还包括:The number privacy protection method according to claim 1, wherein before the network device obtains the call request sent by the first terminal device, the method further comprises:
    所述网络设备获取第三终端设备发送的身份标识请求,所述身份标识请求包括第二主叫方的第三电话号码;Acquiring, by the network device, an identity request sent by a third terminal device, where the identity request includes the third telephone number of the second calling party;
    所述网络设备创建与所述第三电话号码对应的第一身份标识,将所述第一身份标识返回至所述第三终端设备;The network device creates a first identity corresponding to the third telephone number, and returns the first identity to the third terminal device;
    所述网络设备获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和所述第一身份标识;Acquiring, by the network device, a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the first identity;
    所述网络设备查询与所述第一身份标识对应的第三电话号码,根据所述第二电话号码和所述第三电话号码创建所述校验令牌;The network device queries a third phone number corresponding to the first identity identifier, and creates the verification token according to the second phone number and the third phone number;
    所述网络设备将所述校验令牌发送至指定的接收方。The network device sends the verification token to the designated recipient.
  4. 如权利要求2或3所述的号码隐私保护方法,其特征在于,所述网络设备将所述校验令牌发送至指定的接收方包括:The number privacy protection method according to claim 2 or 3, wherein the network device sending the verification token to a designated recipient comprises:
    所述网络设备将所述校验令牌发送至所述第二终端设备,或者,将所述校验令牌发送至所述第三终端设备。The network device sends the verification token to the second terminal device, or sends the verification token to the third terminal device.
  5. 如权利要求2或3所述的号码隐私保护方法,其特征在于,所述若所述第一电话号码校验通过,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接包括:The number privacy protection method according to claim 2 or 3, wherein if the first phone number is verified, the network device obtains the second phone number associated with the verification token Establishing a call connection between the first telephone number and the second telephone number includes:
    若所述第一电话号码与所述第三电话号码一致,则所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。If the first phone number is consistent with the third phone number, the network device obtains the second phone number associated with the verification token, and establishes the first phone number and the second phone number Call connection.
  6. 如权利要求1所述的号码隐私保护方法,其特征在于,所述网络设备获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接包括:The number privacy protection method of claim 1, wherein the network device obtains a second phone number associated with the verification token, and establishes a connection between the first phone number and the second phone number Call connection includes:
    所述网络设备获取与所述校验令牌关联的第二电话号码,将所述第一电话号码和所述第二电话号码发送至电话会议服务器,以指示所述电话会议服务器将所述第一电话号码和所述第二电话号码拉入同一电话会议中。The network device obtains the second phone number associated with the verification token, and sends the first phone number and the second phone number to the teleconference server to instruct the teleconference server to transfer the first A phone number and the second phone number are pulled into the same conference call.
  7. 一种网络设备,其特征在于,包括:A network device, characterized in that it comprises:
    呼叫请求模块,用于获取第一终端设备发送的呼叫请求,所述呼叫请求包括校验令牌以及第一主叫方的第一电话号码;A call request module, configured to obtain a call request sent by a first terminal device, the call request including a verification token and the first phone number of the first calling party;
    号码校验模块,用于根据所述校验令牌对所述第一电话号码进行校验;A number verification module, configured to verify the first phone number according to the verification token;
    呼叫连接模块,用于若所述第一电话号码校验通过,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。A call connection module, configured to obtain a second phone number associated with the verification token if the first phone number is verified, and establish a call connection between the first phone number and the second phone number .
  8. 如权利要求7所述的网络设备,其特征在于,所述网络设备还包括:8. The network device of claim 7, wherein the network device further comprises:
    创建请求模块,用于获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和第二主叫方的第三电话号码;A creation request module, configured to obtain a first creation request sent by a second terminal device, where the first creation request includes the second phone number and the third phone number of the second calling party;
    令牌创建模块,用于根据所述第二电话号码和所述第三电话号码创建所述校验令牌;A token creation module, configured to create the verification token according to the second phone number and the third phone number;
    令牌发送模块,用于将所述校验令牌发送至指定的接收方。The token sending module is used to send the verification token to the designated receiver.
  9. 如权利要求7所述的网络设备,其特征在于,所述网络设备还包括:8. The network device of claim 7, wherein the network device further comprises:
    身份请求模块,用于获取第三终端设备发送的身份标识请求,所述身份标识请求包括第二主叫方的第三电话号码;An identity request module, configured to obtain an identity request sent by a third terminal device, where the identity request includes the third phone number of the second calling party;
    身份标识模块,用于创建与所述第三电话号码对应的第一身份标识,将所述第一身份标识返回至所述第三终端设备;An identity module, configured to create a first identity corresponding to the third phone number, and return the first identity to the third terminal device;
    创建请求模块,用于获取第二终端设备发送的第一创建请求,所述第一创建请求包括所述第二电话号码和所述第一身份标识;A creation request module, configured to obtain a first creation request sent by a second terminal device, the first creation request including the second phone number and the first identity;
    令牌创建模块,用于查询与所述第一身份标识对应的第三电话号码,根据所述第二电话号码和所述第三电话号码创建所述校验令牌;A token creation module, configured to query a third phone number corresponding to the first identity identifier, and create the verification token according to the second phone number and the third phone number;
    令牌发送模块,用于将所述校验令牌发送至指定的接收方。The token sending module is used to send the verification token to the designated receiver.
  10. 如权利要求8或9所述的网络设备,其特征在于,所述令牌发送模块,具体用于将所述校验令牌发送至所述第二终端设备,或者,将所述校验令牌发送至所述第三终端设备。The network device according to claim 8 or 9, wherein the token sending module is specifically configured to send the verification token to the second terminal device, or send the verification command The card is sent to the third terminal device.
  11. 如权利要求8或9所述的网络设备,其特征在于,所述呼叫连接模块,具体用于若所述第一电话号码与所述第三电话号码一致,则获取与所述校验令牌关联的第二电话号码,建立所述第一电话号码与所述第二电话号码的呼叫连接。The network device according to claim 8 or 9, wherein the call connection module is specifically configured to obtain the verification token if the first phone number is consistent with the third phone number The associated second phone number establishes a call connection between the first phone number and the second phone number.
  12. 如权利要求7所述的网络设备,其特征在于,所述呼叫连接模块包括:8. The network device according to claim 7, wherein the call connection module comprises:
    电话会议子模块,用于获取与所述校验令牌关联的第二电话号码,将所述第一电话号码和所述第二电话号码发送至电话会议服务器,以指示所述电话会议服务器将所述第一电话号码和所述第二电话号码拉入同一电话会议中。The teleconference sub-module is used to obtain the second telephone number associated with the verification token, and send the first telephone number and the second telephone number to the teleconference server to instruct the teleconference server to The first phone number and the second phone number are pulled into the same conference call.
  13. 一种网络设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至6任一项所述方法的步骤。A network device, comprising a memory, a processor, and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the computer program as claimed in claims 1 to 6. Steps of any one of the methods.
  14. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至6任一项所述方法的步骤。A computer-readable storage medium storing a computer program, wherein the computer program implements the steps of the method according to any one of claims 1 to 6 when the computer program is executed by a processor.
PCT/CN2020/125205 2020-01-04 2020-10-30 Number privacy protection method, network device and computer storage medium WO2021135602A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010007477.8 2020-01-04
CN202010007477.8A CN113079258A (en) 2020-01-04 2020-01-04 Number privacy protection method, network device and computer storage medium

Publications (1)

Publication Number Publication Date
WO2021135602A1 true WO2021135602A1 (en) 2021-07-08

Family

ID=76608805

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/125205 WO2021135602A1 (en) 2020-01-04 2020-10-30 Number privacy protection method, network device and computer storage medium

Country Status (2)

Country Link
CN (1) CN113079258A (en)
WO (1) WO2021135602A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277943A (en) * 2022-07-11 2022-11-01 瑞庭网络技术(上海)有限公司 Number obtaining method and device, electronic equipment and storage medium

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449112B (en) * 2022-04-08 2023-06-16 荣耀终端有限公司 Prompting method for telephone conference, electronic equipment and storage medium
CN115150511B (en) * 2022-06-01 2023-12-19 清华大学 Communication system and method based on privacy protection of two communication parties
CN115037546B (en) * 2022-06-20 2024-04-26 深圳海星智驾科技有限公司 Key leakage judging method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418977A (en) * 2018-03-20 2018-08-17 上海工程技术大学 A kind of Multifunctional calling method for limiting of mobile operator
CN108769436A (en) * 2018-05-31 2018-11-06 中国—东盟信息港股份有限公司 It is a kind of that guard method is customized based on the user mobile phone security privacy of USSD and Quick Response Code
CN108777750A (en) * 2018-05-31 2018-11-09 中国—东盟信息港股份有限公司 A kind of user mobile phone security privacy guard method based on Quick Response Code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106303100B (en) * 2015-05-18 2019-08-02 中国联合网络通信集团有限公司 A kind of method and system of number protection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418977A (en) * 2018-03-20 2018-08-17 上海工程技术大学 A kind of Multifunctional calling method for limiting of mobile operator
CN108769436A (en) * 2018-05-31 2018-11-06 中国—东盟信息港股份有限公司 It is a kind of that guard method is customized based on the user mobile phone security privacy of USSD and Quick Response Code
CN108777750A (en) * 2018-05-31 2018-11-09 中国—东盟信息港股份有限公司 A kind of user mobile phone security privacy guard method based on Quick Response Code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277943A (en) * 2022-07-11 2022-11-01 瑞庭网络技术(上海)有限公司 Number obtaining method and device, electronic equipment and storage medium
CN115277943B (en) * 2022-07-11 2024-03-08 瑞庭网络技术(上海)有限公司 Number acquisition method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113079258A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
WO2021135602A1 (en) Number privacy protection method, network device and computer storage medium
US10244105B2 (en) Methods and systems for real time display of caller location, profile, and trust relationship
RU2357378C2 (en) Method and device for hiding true user identity in communication system
EP1596611B1 (en) Method and system for notifying a changed telephone number
FI107863B (en) Procedures and systems for protecting a user identification
CN106302927A (en) The voice call platform that two-way number is hidden
US20150043724A1 (en) Caller id verification
CN110263575B (en) Method for realizing data fusion and data privacy protection based on Hash algorithm and session control
CA2823983C (en) Constructing a contact sharing history
KR101306074B1 (en) Method and system to prevent phishing
CN100514988C (en) Caller identity information service system and method
WO2021129803A1 (en) Information processing method and communication apparatus
US7945235B2 (en) Network-based subscriber calling restrictions
US20070254637A1 (en) Device, Method and Computer Program Product Readable Medium for Establishing a Communication Session
KR20100060130A (en) System for protecting private information and method thereof
KR20210039190A (en) Method for maintaining private information on blockchain network and device thereof
CN104243613A (en) User information protection system and method
CN113541981B (en) Member management method and system for network slice
CN106330831A (en) User management method and system of government and enterprise network, service server and communication core network
KR20090061432A (en) Service system and method of presentation of a caller
CN111224918A (en) Real-time networking security control platform and access authentication method
WO2023071926A1 (en) Communication method and apparatus
WO2023202321A1 (en) Data management method, system, and device
US20220408260A1 (en) Verification
KR101070543B1 (en) method and system for providing personal information security in network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20909570

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20909570

Country of ref document: EP

Kind code of ref document: A1