CN101252596A - Method and system for protecting number information privacy - Google Patents
Method and system for protecting number information privacy Download PDFInfo
- Publication number
- CN101252596A CN101252596A CNA2008100361362A CN200810036136A CN101252596A CN 101252596 A CN101252596 A CN 101252596A CN A2008100361362 A CNA2008100361362 A CN A2008100361362A CN 200810036136 A CN200810036136 A CN 200810036136A CN 101252596 A CN101252596 A CN 101252596A
- Authority
- CN
- China
- Prior art keywords
- user
- application
- replacement
- module
- database module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
Disclosed are code information privacy protection method and the system in the communication field. In the invention, a client interface receives the request of a client and transmits the request to a management function module; the management function module transmits register orders to a database module if the client requests business register; transmits protection application orders to a code generator if the client requests protection application; transmits application orders to the database module if the client request harassment number inhibition application. The code generator receives the protection application orders to produce codes and transmits the produced codes to a client interface and simultaneously to the database module for memory; a network interface receives the call from a third party and searches the database module through the codes; the database module respectively takes the operations of client initialization, number searching and code log-off according to the network interface and the request of the management function module. The invention can protect the private information of clients and confirm where the telephone information of the clients is leaked.
Description
Technical field
The present invention relates to a kind of method for secret protection and system of communication technical field, specifically is a kind of protecting number information privacy method and system.
Background technology
People usually can suffer the harassing and wrecking that some phone/Emails/communication is in time sold, and these harassing and wrecking comprise merchandising, insurance or the like.Often such harassing and wrecking meeting occurs repeatedly, influences people's life, wherein leaks with phone number especially and disturbs the most serious to people's life.The approach that people's telephone number information leaks has a lot.People tend to compare repeatedly when buying some staple commodities, wish to obtain from the sales force best preferential simultaneously there, and people's telephone number can be left these representatives of sales ﹠ marketing for; People are required to fill in telephone number so that obtain better service when the visit number of site sometimes; The user's telephone number information that is obtained by aforesaid way representative of sales ﹠ marketing or website is by the third party that resells, and the third party can interrelate with user's direct demand or potential demand.
China there is no special protection personal telephone number privacy system at present; there are two kinds of methods can play certain secret protection effect; a kind of is to utilize present telecom operators that the caller identification business is provided, and refusal is answered strange incoming call, but this can not make people avoid the harassing and wrecking of not clear phone.Another kind method is to utilize the one number service service of business system, be that operator provides a virtual-number for the user, when incoming call, user's office telephone is transferred in calling by named order, home phone number or mobile phone, but because this number and user are man-to-man binding relationships, the cellphone subscriber still can't effectively shield the harassing call by the one number service switching.
Find through literature search prior art, Chinese patent application number 02127336.7, publication number is CN1472913A, patent name is: in the communication apparatus in order to guarantee the device and method of user information safety, this device comprises: storage module, key are obtained module, encrypting module and deciphering module, user's information storage is in storage module, key is obtained module in order to transmit the fine and close key generation module of input data, and obtain user's information from storage module, and use the information encryption of key subsequently, and then produce enciphered message this user.After producing enciphered message, enciphered message is stored in the storage module, and displacement is stored in the information of this user in this storage module.When this user's informational needs was used, deciphering module obtained this key in order to obtain module via this key, and obtains this enciphered message from this storage module, and uses this key that enciphered message is deciphered subsequently, and then recovers this user's information.The weak point of this patent is and can only maintains secrecy to the information of communication apparatus stored, and can not avoid the leakage of information such as number, addresses of items of mail, also can't avoid selling the interference of phone to the user.
Summary of the invention
The present invention is directed to above-mentioned the deficiencies in the prior art, a kind of protecting number information privacy method and system are provided, make it by a number service is provided, the telephone number that the user can't be changed easily is transformed into a plurality of user's replacement number, user's replacement number can be used for different occasions by the user, and in system record; The user can cancel certain replacement number or open certain replacement number according to actual conditions, and a user can apply for a plurality of replacement number, and guarantees to derive the true number of user from replacement number.
The present invention is achieved through the following technical solutions:
The number addresses of items of mail information privacy protection method that the present invention relates to comprises the steps:
Step 1, the protection of user applies number is professional: the user sends the professional application of number protection by note or internet to user interface, this application comprises the true number information of user, after user interface receives application, be transferred to the management function module, if system accepts applications, the then user data cell in the management function module initialization database module, and storing subscriber information; After obtaining the initialization affirmation, user interface sends professional Requisition Validation to the user;
Step 2, the user needs to leave number for certain third party, at first send number protection request to user interface, user interface is after receiving number protection request, the replacement number maker produces a replacement number and stores database module into, by network interface this replacement number is informed the user simultaneously, the user is obtaining to leave this replacement number for certain third party after the replacement number;
Step 3, by replacing the number call user, network interface obtains to replace number, and searches user's true number in database module if any the third party, and calling party's true number writes down third-party environmental information simultaneously and sends to the user.
Step 4, when certain replacement number harassing and wrecking that the user is stayed by oneself repeatedly, the user nullifies this replacement number by the user interface application, by database module the replacement number of user applies is nullified, and it is invalid that the state of validity is changed to.
Described number is telephone number, e-mail address or instant communication number.
Described environmental information is meant each replacement number of user discrimination and the note done, and for example, the user will leave certain replacement number for certain sales company, and this environmental information is the title of this company.
The protecting number information privacy system that the present invention relates to comprises: user interface, replacement number maker, database module, network interface, management function module, wherein:
User interface receives user's application, and application is passed to the management function module, and application comprises: application number is forbidden in application for registration, number protection application and harassing and wrecking;
If the application category that the management function module receives according to user interface during the service log-on application, is transferred to database module with register instruction; If the protection application then will protect the application instruction to be transferred to the replacement number maker; If the harassing and wrecking number is forbidden application, will apply for that instruction is transferred to database module;
The replacement number maker receives protection application instruction and produces replacement number, and the replacement number that produces is transferred to user interface, is transferred to database module simultaneously and preserves;
Network interface receives from third-party calling, and what third party call was imported is the replacement number that the user announces, network interface utilizes replacement number data query library module, and reception database module Query Result is forwarded in user's the true telephone number calling;
Database module is carried out user's initialization, number inquiry, the operation of cancellation replacement number respectively according to the request of network interface and management function module.
Described network interface comprises communication network interface or Internet interface.
Described database module, if when receiving the application for registration of management function module, the user data cell in the initialization data library module, and storing subscriber information; If receive the query requests of network interface, substitute the true telephone number of number inquiring user by match user, and be transferred to network interface; If the harassing and wrecking number that receives the management function module is forbidden application, the replacement number of the user applies of storing in the database is nullified, the state of validity of this replacement number is changed to disarmed state.
Described database module is responsible for storage encryption or unencryption user profile, and user profile comprises the real telephone number of user, environmental information, validity date, validity, and validity is section effective time of replacement number.
Compared with prior art, the present invention has following beneficial effect: the present invention can integrate with existing communication network or Internet, does not change original network; The present invention does not influence user's use habit, makes troubles as the normal communication contact of not giving the user, that is to say that the user is guaranteeing do not have under the situation of privacy compromise, and original pattern is constant, and user's normally associate people can use original service; Among the present invention, the user can confirm conveniently where user's phone information is leaked, for the user provides reliable evidence.After the user finds leakage of information, can be conveniently by suspending or deleting the inconvenience that this special user stops similar leakage to cause alternative number, the user need not change original telephone number simultaneously.
Description of drawings
Fig. 1 carries out the workflow diagram of professional application for user among the present invention.
The workflow diagram that Fig. 2 carries out the replacement number application for user among the present invention.
Fig. 3 is the workflow diagram of third party call customer call among the present invention.
Fig. 4 is a system architecture diagram of the present invention.
Embodiment
Below in conjunction with accompanying drawing embodiments of the invention are elaborated: present embodiment is being to implement under the prerequisite with the technical solution of the present invention, provided detailed execution mode and concrete operating process, but protection scope of the present invention is not limited to following embodiment.
The privacy information of present embodiment protection is a user's telephone number.
The protecting number information privacy method that present embodiment relates to comprises the steps:
Step 1, the protection of user applies number is professional: as shown in Figure 1, the professional application of number protection that the user sends by user interface, this application comprises user profile (telephone number/e-mail address), user interface is transmitted to the management function module after receiving application, if accept applications, the management function module requires corresponding user data cell in the initialization data library module, and storing subscriber information; After obtaining the initialization affirmation, the management function module is sent professional Requisition Validation by user interface to the user.
Step 2, as shown in Figure 2, the user needs to leave number for certain sales company, at first send number protection request to user interface, user interface is transmitted to the management function module with request, if management function module reception condition requires a replacement number maker replacement number of generation and stores database module into, by user interface this replacement number is informed the user simultaneously, the user is obtaining to leave this replacement number for sales company after the replacement number;
Described number protection request, it comprises the environmental information of user applies protection, number protection request is as follows:
{ number protection request
{ environmental information }
}
Environmental information can be the title of this sales company.
As shown in table 1, storage mode for user data cell in the database module, in this data cell, comprise user profile, be the real telephone number of user, environmental information, validity date, validity, validity is section effective time of replacement number, and this field makes the user can forbid this replacement number.User profile can be stored in mode expressly, in order to improve the fail safe of system, also can select to store with encrypted test mode.
The storage mode of user data cell in table 1 database module
Step 3 as shown in Figure 3, passes through to replace the number call user if any the third party, network interface obtains to replace number, and in database module, searching user's true number, calling party's true number writes down third-party environmental information simultaneously and sends to the user.
Described environmental information is sent to the user, be specially: if the user is a mobile phone by called telephone, environmental variance is that the name of that sales company sends to the user with the note form; If the user is a landline telephone by called telephone, the user can pass through the corresponding environmental variance of system queries, thereby knows who called out the user.
Step 4, when certain replacement number harassing and wrecking that the user is stayed by oneself repeatedly, the user forbids by user interface application harassing and wrecking, after the management function module receives the application of user interface forwarding, require database module that the replacement number of user applies is nullified, and the state of validity is changed to invalid.
As shown in Figure 4, the protecting number information privacy system that present embodiment relates to comprises: user interface, replacement number maker, database module and network interface and management function module, wherein:
User interface receives user's number protection application or harassing and wrecking number and forbids application, and application is transferred to the management function module;
The application category that the management function module receives according to user interface, if during the service log-on application, the initialization user data; If the protection application then will protect the application instruction to be transferred to the replacement number maker; If the harassing and wrecking number is forbidden application, will apply for that instruction is transferred to database module;
The replacement number maker receives protection application instruction and produces replacement number, and the replacement number that will newly produce is transferred to user interface, is transferred to database module simultaneously and preserves;
Network interface receives from third-party calling, and what third party call was imported is the replacement number that the user announces, network interface utilizes replacement number data query library module, and reception database module Query Result is forwarded in user's the true telephone number calling;
Database module is carried out user's initialization, number inquiry, the operation of cancellation replacement number respectively according to the request of network interface and management function module.
Described replacement number generator, for: one of random number generator, counter and hash function module.
Described random number generator is one 11 grades a random number generator, is responsible for the user unduplicated one or more replacement number is provided, and feedback factor selects 4445;
Described counter produces one or more replacement number by excluding special number;
Described hash function module selects MD5 or SHA hash function to produce one or more replacement number.
Described network interface is the communication network interface.
Described database module if receive the query requests of network interface, substitutes the true telephone number of number inquiring user by match user, and is transferred to network interface;
If the harassing and wrecking number that receives the management function module is forbidden application, the replacement number of the user applies of storing in the database is nullified, the state of validity of this replacement number is changed to disarmed state.
Described database module is responsible for storage encryption or unencryption user profile, and user profile comprises the real telephone number of user, environmental information, validity date, validity, and validity is section effective time of replacement number.
Described environmental information is meant each replacement number of user discrimination and the note done, and for example, the user will leave certain replacement number for certain sales company, and this environmental information is the title of this company.
The present embodiment method and system can also be used to protecting the communicating number of user e-mail address/IP phone number/in time (MSN and QQ number etc.) etc., replace user e-mail address/IP phone number/timely communicating number to play the effect of number address information secret protection with an alternative address/number.
Present embodiment can integrate with existing communication network or Internet, does not change original network; Do not influence simultaneously user's use habit, make troubles as the normal communication contact of not giving the user, that is to say that the user is guaranteeing do not have under the situation of privacy compromise, original pattern is constant, and user's normally associate people can use original service; In addition, the user can confirm conveniently where user's phone information is leaked, for the user provides reliable evidence.After the user finds leakage of information, can be conveniently by suspending or deleting the inconvenience that this special user stops similar leakage to cause alternative number, the user need not change original telephone number simultaneously.
Claims (7)
1, a kind of protecting number information privacy method is characterized in that, comprises the steps:
Step 1, the user sends the professional application of number protection by note or internet to user interface, after user interface receives application, be transferred to the management function module, if system accepts applications, the then user data cell in the management function module initialization database module, and storing subscriber information; After obtaining the initialization affirmation, user interface sends professional Requisition Validation to the user;
Step 2, the user needs to leave number for certain third party, at first send number protection request to user interface, user interface is after receiving number protection request, the replacement number maker produces a replacement number and stores database module into, by network interface this replacement number is informed the user simultaneously, the user is obtaining to leave this replacement number for certain third party after the replacement number;
Step 3, by replacing the number call user, network interface obtains to replace number, and searches user's true number in database module if any the third party, and calling party's true number writes down third-party environmental information simultaneously and sends to the user;
Step 4, when certain replacement number harassing and wrecking that the user is stayed by oneself repeatedly, the user nullifies this replacement number by the user interface application, by database module the replacement number of user applies is nullified, and it is invalid that the state of validity is changed to.
2, protecting number information privacy method according to claim 1 is characterized in that, described environmental information is meant each replacement number of user discrimination and the note done.
3, protecting number information privacy method according to claim 1 is characterized in that, described number is telephone number, e-mail address or instant communication number.
4, a kind of protecting number information privacy system is characterized in that, comprising: user interface, replacement number maker, database module, network interface, management function module, wherein:
User interface receives user's application, and application is passed to the management function module, and application comprises: application number is forbidden in application for registration, number protection application and harassing and wrecking;
If the application category that the management function module receives according to user interface during the service log-on application, is transferred to database module with register instruction; If the protection application then will protect the application instruction to be transferred to the replacement number maker; If the harassing and wrecking number is forbidden application, will apply for that instruction is transferred to database module;
The replacement number maker receives protection application instruction and produces replacement number, and the replacement number that produces is transferred to user interface, is transferred to database module simultaneously and preserves;
Network interface receives from third-party calling, and what third party call was imported is the replacement number that the user announces, network interface utilizes replacement number data query library module, and reception database module Query Result is forwarded in user's the true telephone number calling;
Database module is carried out user's initialization, number inquiry, the operation of cancellation replacement number respectively according to the request of network interface and management function module.
5, protecting number information privacy according to claim 4 system is characterized in that described network interface comprises communication network interface or Internet interface.
6, protecting number information privacy according to claim 4 system is characterized in that, described database module, if when receiving the application for registration of management function module, and the user data cell in the initialization data library module, and storing subscriber information;
If receive the query requests of network interface, substitute the true telephone number of number inquiring user by match user, and be transferred to network interface;
If the harassing and wrecking number that receives the management function module is forbidden application, the replacement number of the user applies of storing in the database is nullified, the state of validity of this replacement number is changed to disarmed state.
7, according to claim 4 or 6 described protecting number information privacy systems; it is characterized in that; described database module; be responsible for storing subscriber information; user profile comprises the real telephone number of user, replacement number; environmental information, validity date, validity, validity are section effective time of replacement number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100361362A CN101252596A (en) | 2008-04-17 | 2008-04-17 | Method and system for protecting number information privacy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100361362A CN101252596A (en) | 2008-04-17 | 2008-04-17 | Method and system for protecting number information privacy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101252596A true CN101252596A (en) | 2008-08-27 |
Family
ID=39955779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100361362A Pending CN101252596A (en) | 2008-04-17 | 2008-04-17 | Method and system for protecting number information privacy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101252596A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413118A (en) * | 2010-09-09 | 2012-04-11 | 西尔瑞特有限公司 | Conditionally obfuscating one or more secret entities with respect to one or more billing statements |
CN103986846A (en) * | 2014-05-16 | 2014-08-13 | 中国联合网络通信集团有限公司 | Method and system for protecting phone numbers of online shopping users |
WO2017036216A1 (en) * | 2015-08-28 | 2017-03-09 | 中兴通讯股份有限公司 | Virtual number processing method and device |
CN107333013A (en) * | 2017-06-30 | 2017-11-07 | 北京金山安全软件有限公司 | Session establishing method, device, electronic equipment and storage medium |
CN108737443A (en) * | 2018-06-14 | 2018-11-02 | 北京大学 | A kind of concealment mail address method based on cryptographic algorithm |
CN108805661A (en) * | 2018-05-24 | 2018-11-13 | 拉扎斯网络科技(上海)有限公司 | multi-party number privacy protection method, device, equipment and computer storage medium |
CN108965567A (en) * | 2017-05-18 | 2018-12-07 | 镇江杜微人才咨询有限公司 | A method of shielding harassing and wrecking number |
CN109510758A (en) * | 2019-02-14 | 2019-03-22 | 紫光云数科技有限公司 | Session establishing method, terminal, third-party application server and system |
CN110868709A (en) * | 2019-11-26 | 2020-03-06 | 王永兴 | Method and system for preventing harassment and enabling normal communication |
CN111601001A (en) * | 2020-05-20 | 2020-08-28 | 重庆蓝岸通讯技术有限公司 | Telephone number storage method, call equipment and call system |
-
2008
- 2008-04-17 CN CNA2008100361362A patent/CN101252596A/en active Pending
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413118A (en) * | 2010-09-09 | 2012-04-11 | 西尔瑞特有限公司 | Conditionally obfuscating one or more secret entities with respect to one or more billing statements |
CN103986846A (en) * | 2014-05-16 | 2014-08-13 | 中国联合网络通信集团有限公司 | Method and system for protecting phone numbers of online shopping users |
CN103986846B (en) * | 2014-05-16 | 2017-08-08 | 中国联合网络通信集团有限公司 | The telephone number guard method of net purchase user a kind of and system |
WO2017036216A1 (en) * | 2015-08-28 | 2017-03-09 | 中兴通讯股份有限公司 | Virtual number processing method and device |
CN108965567A (en) * | 2017-05-18 | 2018-12-07 | 镇江杜微人才咨询有限公司 | A method of shielding harassing and wrecking number |
CN107333013A (en) * | 2017-06-30 | 2017-11-07 | 北京金山安全软件有限公司 | Session establishing method, device, electronic equipment and storage medium |
CN108805661A (en) * | 2018-05-24 | 2018-11-13 | 拉扎斯网络科技(上海)有限公司 | multi-party number privacy protection method, device, equipment and computer storage medium |
CN108737443A (en) * | 2018-06-14 | 2018-11-02 | 北京大学 | A kind of concealment mail address method based on cryptographic algorithm |
CN108737443B (en) * | 2018-06-14 | 2020-06-02 | 北京大学 | Method for hiding mail address based on cryptographic algorithm |
CN109510758A (en) * | 2019-02-14 | 2019-03-22 | 紫光云数科技有限公司 | Session establishing method, terminal, third-party application server and system |
CN109510758B (en) * | 2019-02-14 | 2019-05-17 | 紫光云数科技有限公司 | Session establishing method, terminal and system |
CN110868709A (en) * | 2019-11-26 | 2020-03-06 | 王永兴 | Method and system for preventing harassment and enabling normal communication |
CN111601001A (en) * | 2020-05-20 | 2020-08-28 | 重庆蓝岸通讯技术有限公司 | Telephone number storage method, call equipment and call system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101252596A (en) | Method and system for protecting number information privacy | |
US20100077205A1 (en) | System and Method for Cipher E-Mail Protection | |
KR100748569B1 (en) | Communication method, communication system, relay system, communication program, program for communication system, mail distribution system, mail distribution method, and mail distribution program | |
CN103401949B (en) | A kind of system and method shared for the personal data safety of mobile phone | |
CN103391377B (en) | Communication means, data processing platform (DPP) and communication system | |
US20070027920A1 (en) | Context aware data presentation | |
US20070027921A1 (en) | Context based action | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
CN101268470A (en) | Portable terminal device, address book transmitter, information displaying method in portable terminal device, address book transmitting method, and computer program | |
CN105354693A (en) | Logistics industry-oriented system and method for cascade protection of user privacy information | |
US20090044025A1 (en) | Smart card data protection method and system thereof | |
JP2003330861A (en) | Automatic change system for user data | |
CN105229985A (en) | Identity tokens | |
CN108307333B (en) | Method and device for transmitting intermediate number for mobile communication equipment and storage medium | |
CN102202299A (en) | Realization method of end-to-end voice encryption system based on 3G/B3G | |
CN105516943A (en) | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof | |
CN106685995B (en) | Leakage account data query system based on hardware encryption | |
CN108710931A (en) | A kind of address information privacy protection method based on Quick Response Code | |
CN114254382A (en) | Personal information protection authentication system and protection authentication method | |
CN105323254A (en) | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof | |
CN110166644A (en) | Data processing method, device, computer equipment and storage medium | |
CN105376733A (en) | Information processing method and electronic apparatus | |
CN116232773B (en) | Information release method, device, equipment and medium | |
CN105471711A (en) | Mail encryption system based on intelligent mobile phone and realization method thereof | |
CN113742674B (en) | Information labeling method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20080827 |