CN102137196B - Anonymous service processing method as well as anonymous server and system - Google Patents

Anonymous service processing method as well as anonymous server and system Download PDF

Info

Publication number
CN102137196B
CN102137196B CN201010604732.3A CN201010604732A CN102137196B CN 102137196 B CN102137196 B CN 102137196B CN 201010604732 A CN201010604732 A CN 201010604732A CN 102137196 B CN102137196 B CN 102137196B
Authority
CN
China
Prior art keywords
anonymous
anonymity
true identity
anonymity side
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010604732.3A
Other languages
Chinese (zh)
Other versions
CN102137196A (en
Inventor
苏锋
智伟
王澜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201010604732.3A priority Critical patent/CN102137196B/en
Priority to PCT/CN2011/075339 priority patent/WO2011147360A1/en
Publication of CN102137196A publication Critical patent/CN102137196A/en
Application granted granted Critical
Publication of CN102137196B publication Critical patent/CN102137196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides an anonymous service processing method as well as an anonymous server and system. The method comprises the following steps that a server belonging to a non-anonymous party sends a true mark acquisition request for acquiring a true mark of an anonymous party to the anonymous server according to a received service request which is sent to the anonymous party by the non-anonymous party; the true mark acquisition request comprises a non-anonymous party true mark and an anonymous party true mark; the anonymous server searches the anonymous party true mark associated to the non-anonymous party true mark and an anonymous party anonymous mark and sends the searched anonymous party true mark associated to the non-anonymous party true mark and the anonymous party anonymous mark to the server belonging to the non-anonymous party; and the server belonging to the non-anonymous party uses the anonymous party true mark to replace the anonymous party anonymous mark and initiates service to the anonymous party. With the adoption of the invention, the purpose that two-way communication is carried out between a user adopting anonymous call and other non-anonymous user is realized.

Description

Anonymous method for processing business and anonymous server and system
Technical field
The embodiment of the present invention relates to the communication technology, relates in particular to a kind of anonymous method for processing business and anonymous server and system.
Background technology
In the communications field, user's communication identifier, for the identity of identifying user, has extremely important effect.Mobile subscriber's international number (Mobile Station ISDNNumber is called for short MSISDN) in moving communicating field, is in the numbering plan of public telephone network switching network, the unique number that can identify user.That is to say, user is when called, the number that calling party need dial.In existing communication business, telex network sign is mostly permanent identification.Once commercial undertaking or individual acquire user's communication identifier, just contact user always.In the situation that guaranteeing effectively to exchange, how protecting user's persistent communication sign is a very concerned problem.
The main persistent communication sign that adopts call line identification restriction (Calling Line Identification Restriction is called for short CLIR) method protection calling subscriber in prior art.User has contracted after CLIR business, and at it, during as calling party, network does not show this user's communication identifier to called subscriber.When callee receives this user's calling, cannot see this user's communication identifier, therefore protect the fail safe of calling party's communication identifier.
But because the user of the CLIR business of having contracted is when calling out other user, other user can't see its communication identifier, therefore, other user cannot initiatively make a call to the user of the CLIR business of having contracted, and communication is unidirectional in the case, the demand that cannot meet both sides and carry out two-way communication.
Summary of the invention
The embodiment of the present invention provides a kind of anonymous method for processing business and anonymous server and system, in order to solve in the situation that calling subscriber's communication identifier is hidden, other user cannot be initiatively to the defect of this user request of making a call, and has realized and has adopted the object of carrying out two-way communication between the user of anonymity call and other non-anonymous.
The embodiment of the present invention provides a kind of anonymous method for processing business, comprising:
The service request that non-anonymity side subordinate server sends according to the non-anonymous direction anonymity side receiving, obtains the true identity of anonymous side's true identity and obtains request to anonymous server transmission; The described true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification;
Described anonymous server is searched the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification, sends the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification finding to described non-anonymity side subordinate server;
Described non-anonymity side subordinate server replaces described anonymity side anonymous identification by described anonymity side true identity, to described anonymity side's initiation business.
The embodiment of the present invention also provides a kind of anonymous server, comprising:
The first receiver module, obtains request for the true identity for obtaining anonymous side's true identity that receives the subordinate server transmission of non-anonymity side; The described true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification;
First searches module, for searching the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification;
The first sending module, for when described first search module searches to be associated with described non-anonymity side true identity and described anonymity side anonymous identification anonymity side true identity time, to described non-anonymity side subordinate server, send the anonymity side's true identity finding;
Preserve module, for preserving the corresponding relation of non-anonymity side true identity and anonymous side's true identity and anonymous side's anonymous identification, the unique corresponding anonymity side's anonymous identification of described non-anonymity side true identity and described anonymity side true identity.
The embodiment of the present invention also provides a kind of anonymous service system, comprises anonymous server and non-anonymity side subordinate server;
Described non-anonymity side subordinate server, for the service request sending according to the non-anonymous direction anonymity side receiving, obtains the true identity of anonymous side's true identity and obtains request to anonymous server transmission; The described true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification; For replacing described anonymity side anonymous identification by described anonymity side true identity, to described anonymity side's initiation business;
Described anonymous server, for searching the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification, to described non-anonymity side subordinate server, send the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification finding.
The anonymous method for processing business of the embodiment of the present invention and anonymous server and system, in non-anonymity side as requesting party during to anonymity side's initiating business request, non-anonymity side subordinate server need to be searched by anonymity side's anonymous identification and non-anonymity side true identity anonymity side's true identity of unique correspondence, only, when finding anonymous side's true identity, anonymity can receive the service request that non-anonymity side initiates just now.Therefore, anonymity side receives only the service request that specific requesting party (side that once called out as requesting party anonymity side) initiates, thereby has reached the object that anonymous side and non-anonymity side carry out two-way communication.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is anonymous method for processing business embodiment mono-flow chart provided by the invention;
Fig. 2 is anonymous method for processing business embodiment bis-flow charts provided by the invention;
Fig. 3 is anonymous method for processing business embodiment tri-flow charts provided by the invention;
Fig. 4 is anonymous method for processing business embodiment tetra-flow charts provided by the invention;
Fig. 5 is anonymous method for processing business embodiment five flow charts provided by the invention;
Fig. 6 is anonymous server embodiment mono-structural representation provided by the invention;
Fig. 7 is anonymous server embodiment bis-structural representations provided by the invention;
Fig. 8 is anonymous server embodiment tri-structural representations provided by the invention;
Fig. 9 is anonymous server embodiment tetra-structural representations provided by the invention;
Figure 10 is anonymous server embodiment five structural representations provided by the invention;
Figure 11 is anonymous service system embodiment one structural representation provided by the invention;
Figure 12 is anonymous service system embodiment two structural representations provided by the invention.
Embodiment
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is anonymous method for processing business embodiment mono-flow chart provided by the invention.The present embodiment mainly illustrates that non-anonymity side is as calling party during to anonymity side's initiating business request, the processing method of non-anonymity side subordinate server and anonymous server.Anonymity side, for adopting anonymous communication to identify a side who communicates, that is to say that its actual communication sign is concealed, and non-anonymity side is for adopting actual communication to identify a side who communicates.Below actual communication is identified referred to as true identity, anonymous communication is identified referred to as anonymous identification.In the present embodiment, anonymity can be various types of communication instrument, correspondingly anonymous side's subordinate server can be affiliated (the Mobile Switching Center of mobile switching centre in anonymity side, be called for short MSC), short message service (Short Message Service, be called for short SMS), multimedia short message service (Multimedia Message Service, be called for short MMS), Email server, IP Multimedia System (IP Multimedia Subsystem is called for short IMS) or WEB server.In addition, in the present embodiment, anonymity side and non-anonymity can be positioned at same communication network, also can be positioned at different communication networks.
As shown in Figure 1, the present embodiment comprises:
Step 10: the service request that non-anonymity side subordinate server sends according to the non-anonymous direction anonymity side receiving, to anonymous server transmission, obtain the true identity of anonymous side's true identity and obtain request; The true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification.
Wherein service request comprises that call request, short message service request, EMAIL send request etc.
Step 11: anonymous server receives the true identity for obtaining anonymous side's true identity of non-anonymity side subordinate server transmission and obtains request; The true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification.
The non-anonymity side of anonymous direction initiates after caller anonymity call, and non-anonymity side gets the anonymous identification of anonymity side.Follow-up non-anonymity can, by anonymous side's anonymous identification to anonymity side's initiating business request, be called called anonymity call request in embodiments of the present invention in this service request.Non-anonymity side subordinate server receive that non-anonymity side initiates for calling out after the called anonymous service request of anonymity side, for obtaining anonymous side's true identity, to anonymous server, send and obtain request for the true identity of obtaining anonymous side's true identity, to obtain anonymous side's true identity by non-anonymity side true identity and anonymous side's anonymous identification.The true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification, and called anonymous service request comprises non-anonymity side true identity and anonymous side's anonymous identification.
Step 12: anonymous server is searched the anonymity side's true identity being associated with non-anonymity side true identity and anonymous side's anonymous identification, sends the anonymity side's true identity being associated with non-anonymity side true identity and anonymous side's anonymous identification finding to non-anonymity side subordinate server.
Corresponding informance take non-anonymity side true identity and anonymous side's true identity and anonymous side's anonymous identification is stored in anonymous service table as example, anonymous server receives the true identity of non-anonymity side subordinate server transmission and obtains after request, in anonymous service table, search and non-anonymity side true identity and the unique associated anonymity side of anonymous side's anonymous identification true identity, when finding, to non-anonymity side subordinate server, return to the anonymity side's true identity finding.In anonymous service table, the only corresponding anonymity side's true identity of non-anonymity side true identity and anonymous side's anonymous identification.
Step 13: non-anonymity side subordinate server replaces anonymous side's anonymous identification by anonymous side's true identity, to anonymity side's initiation business.
That non-anonymity side subordinate server receives is that anonymous server sends, with after non-anonymity side true identity and the unique associated anonymity side of anonymous side's anonymous identification true identity, to anonymity side's subordinate server, send called anonymity call and set up request, the request of setting up of called anonymity call comprises anonymous side's true identity and non-anonymity side true identity.Anonymity side's subordinate server receives called anonymity call and sets up after request, by anonymity side's true identity, connects with anonymity side.
Further, if when anonymous server does not find associated with non-anonymity side true identity and anonymous side's anonymous identification anonymity side true identity, anonymous server is returned to anonymous side's true identity to non-anonymity side subordinate server and is obtained failure information, and then non-anonymity side subordinate server returns to called service request failure information to non-anonymity side, with callee's anonymous identification of notifying this service request of non-anonymity side, do not exist.
The embodiment of the present invention, in non-anonymity side as requesting party during to anonymity side's initiating business request, non-anonymity side subordinate server need to be searched by anonymity side's anonymous identification and non-anonymity side true identity anonymity side's true identity of unique correspondence in anonymous service table, only, when finding anonymous side's true identity, anonymity can receive the service request that non-anonymity side initiates just now.Therefore, anonymity side receives only the service request that specific requesting party (side that once called out as requesting party anonymity side) initiates, thereby has reached the object that anonymous side and non-anonymity side carry out two-way communication.And, due to anonymity side's anonymous identification right and wrong anonymity side true identity and the unique correspondence of anonymous side's true identity, therefore third party also cannot communicate with anonymity side.Thereby avoided third-party harassing and wrecking, protected anonymous side's safety.The embodiment of the present invention can effectively reduce the possibility that contact method leaks, and can also effectively reduce the possibility of harassing call, harassing and wrecking note, spam and phone swindle.
Fig. 2 is anonymous method for processing business embodiment bis-flow charts provided by the invention.The present embodiment mainly illustrates that anonymity side is as calling party during to non-anonymity side initiating business request, the processing method of anonymous side's subordinate server and anonymous server.As shown in Figure 2, the present embodiment comprises:
Step 21: anonymous side's subordinate server is according to the service request of being initiated by the non-anonymity side of anonymous direction receiving, and the anonymous identification sending for obtaining anonymous side's anonymous identification to anonymous server is obtained request; The anonymous identification request of obtaining comprises non-anonymity side true identity and anonymous side's true identity.
Wherein service request comprises call request, short message service request, EMAIL and sends request etc.For example, anonymous direction anonymity side subordinate server is initiated the caller anonymity call request for calling out non-anonymity side.The request of caller anonymity call comprises non-anonymity side true identity and anonymous side's true identity.The call request that calling party initiates as the non-anonymity side of anonymous direction is called the request of caller anonymity call.Anonymity side's subordinate server receives after the caller anonymity call request of anonymity side's transmission, for obtaining anonymous side's anonymous identification, the anonymous identification sending for obtaining anonymous side's anonymous identification to anonymous server is obtained request, to obtain anonymous side's anonymous identification by non-anonymity side true identity and anonymous side's true identity.
Step 22: anonymous server is searched the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, sends the anonymity side's anonymous identification finding to anonymity side's subordinate server.
Anonymous server receives the anonymous identification of anonymous side's subordinate server transmission and obtains after request, search the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, and to anonymity side's subordinate server, return to the anonymity side's anonymous identification finding.Wherein, anonymity side this three's of anonymous identification of non-anonymity side true identity, anonymous side's true identity and association corresponding informance (also can be called: anonymous side's true identity and information corresponding to non-anonymity side true identity) is kept in anonymous server, can be in the anonymous service table being kept in anonymous server, being certainly also not limited to be anonymous service table.In anonymous service table, the only corresponding anonymity side's anonymous identification of non-anonymity side true identity and anonymous side's true identity.
Step 23: anonymous side's subordinate server replaces anonymous side's true identity by anonymous side's anonymous identification, to non-anonymity side's initiation business.
Further, if while not finding associated with non-anonymity side true identity and anonymous side's true identity anonymity side anonymous identification, anonymous server is that non-anonymity side true identity and anonymous side's true identity create after anonymous side's anonymous identification, preserves the anonymity side's anonymous identification creating.And the anonymity side's anonymous identification creating to the transmission of anonymity side's subordinate server.
Obtain after the true identity of anonymity side, anonymous side's subordinate server sends caller anonymity call by non-anonymity side true identity to non-anonymity side subordinate server and sets up request, and caller anonymity call is set up the anonymous identification that is designated of calling party in request.Non-anonymity side subordinate server receives caller anonymity call and sets up after request, by the non-anonymity side true identity of wherein carrying, connects non-anonymity side.After calling party and callee's call connection is set up, caller-marking is anonymous identification, and the caller-marking that non-anonymity side gets is anonymous identification but not calling party's true identity.
The anonymous method for processing business of the embodiment of the present invention, in anonymity side as requesting party during to non-anonymity side initiating business request, anonymous server receives the anonymous identification of anonymous side's subordinate server transmission and obtains after request, search the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, and to anonymity side's subordinate server, return to the anonymity side's anonymous identification finding.Anonymity side's subordinate server obtains after anonymous side's anonymous identification, and what the caller anonymity call of initiating to non-anonymity side subordinate server was set up calling party in request is designated anonymous identification.Therefore, after the service connection of requesting party and Requested Party is set up, the requesting party who obtains as the non-anonymity side of Requested Party is designated anonymous identification, is not requesting party's true identity, has played the effect of protection requesting party true identity.This non-anonymity side obtains after anonymous side's anonymous identification, (for example: non-anonymity side can pass through the embodiment shown in Fig. 1 to anonymity side's initiating business request) can make a call to anonymity side by anonymity side's anonymous identification, when other non-anonymity side adopts this anonymity side's anonymous identification to anonymity side's initiating business request, because association can not connect with anonymity side less than anonymity side's true identity.Thereby reached the object that anonymous side and non-anonymity side carry out two-way communication.
Fig. 3 is anonymous method for processing business embodiment tri-flow charts provided by the invention.The call request that the present embodiment is initiated to non-anonymity side as calling party take anonymity side is example, and the processing method of anonymous side's subordinate server and anonymous server is described.In the present embodiment, anonymous side A and non-anonymity side B are positioned at different communication networks, and anonymous side A subordinate server is caller MSC, and non-anonymity side B subordinate server is called MS C.As shown in Figure 3, the present embodiment comprises:
Step 31: anonymous side A is to the make a call anonymity call request of non-anonymity side B of caller MSC, and this call request comprises non-anonymity side B true identity and caller anonymous service number.
Step 32: caller MSC determines that this call request is anonymous side A caller anonymity call request to the non-anonymity side B initiation as callee as calling party, carries non-anonymity side B true identity and anonymous side A true identity and obtains request to anonymous server transmission anonymous identification.
When anonymity side A is added non-anonymity side B true identity and made a call by caller anonymous service number, this calling is used as anonymity call.For example, anonymity side A, when dialing non-anonymity side true identity, adds and dials caller anonymous service number 17111 before non-anonymity side true identity, after under anonymous side A, MSC receives, by caller anonymous service number 17111, can know that this calls out is the caller anonymity call request that anonymous side A initiates.
In addition, anonymity side A also can be by signing anonymous service mode or the service of Portal means application anonymity call, after anonymity side A application anonymity call service success, the caller that anonymity side A initiates and calling the called of anonymous side A can be set to anonymity call, that is to say, anonymity side A calls out any one callee and is used as anonymity call processing, and any one caller calls anonymity side A is also used as anonymity call processing simultaneously.After the caller that the anonymity side A that caller MSC receives initiates, by the anonymity side A CAMEL-Subscription-Information obtaining from HLR, can know that anonymous side A is the calling party that need to hide its true identity.In addition, can be also subscribed services of other customization forms, as provided certain user's true identity when signing, after subscribed services, when communicating, contract party and these designated users adopt anonymity call.
The present embodiment mainly illustrates to be crossed and adds the handling process of dialling the caller anonymous service number mode anonymity call of initiating anonymous square tube.Anonymity side A by signing mode or Portal mode application anonymity call after, similar to the anonymous caller handler flow process of its initiation, difference is only that caller that caller MSC determines that anonymous side A initiates is that the mode of caller anonymity call request is different.
Step 33a: anonymous server finds and non-anonymity side B true identity and anonymous side A true identity unique associated anonymity side A anonymous identification AB, returns to anonymous side A anonymous identification AB to caller MSC.
Take non-anonymity side true identity, anonymous side's true identity and associated anonymity side anonymous identification three's corresponding informance, be as example illustrates in the anonymous service table being kept in anonymous server below.
At anonymity side A, by adding, dial for the first time the mode of anonymous service number and initiate the request of caller anonymity call, or after the anonymous service of the non-anonymity side B of anonymity call that contracted, anonymous server in anonymous service table, create one with anonymous side A true identity and non-anonymity side B unique associated anonymity side A anonymous identification.In anonymous service table as shown at table 1, set up a list item for representing anonymous side A anonymous identification and anonymous side A true identity and the unique associated incidence relation of non-anonymity side B.
Table 1 is anonymous service table
The true identity of anonymity side The true identity of non-anonymity side The anonymous identification of anonymity side
A true identity B true identity An anonymous identification AB of A
C true identity B true identity An anonymous identification CB of C
A true identity D true identity Another anonymous identification AD of A
B true identity A true identity An anonymous identification BA of B
As shown in table 1, in anonymous service table, the anonymous side A true identity anonymity side A anonymous identification corresponding with non-anonymity side B true identity is AB, the anonymity side A true identity anonymous identification corresponding with non-anonymity side D true identity is AD, therefore, anonymous side A has different anonymous identification for different non-anonymity sides.In addition, the anonymous side B true identity anonymity side B anonymous identification corresponding with non-anonymity side A true identity is BA, therefore, and for a pair of true identity: A true identity and B true identity, when not identical in anonymity side, anonymous identification is not identical yet.In addition, the called anonymous service number in the time of can including non-anonymous party call anonymity side in anonymity side's anonymous identification.
Step 33b: anonymous server does not find the anonymity side A anonymous identification associated with non-anonymity side B true identity and anonymous side A true identity, for non-anonymity side B true identity and anonymous side A true identity create associated anonymity side A anonymous identification AB, and return to anonymous side A anonymous identification AB to caller MSC.
Step 34: caller MSC initiates to carry the setup requests of anonymous side A anonymous identification AB to called MS C by non-anonymity side B true identity.
Step 35: called MS C connects non-anonymity side B.
When non-anonymity side B has opened caller identification business, that in the terminal of non-anonymity side B, show is the anonymous identification AB of anonymous side A.The non-anonymity side B of follow-up non-anonymity side B can initiate called anonymity call request to anonymity side A by the anonymous identification AB of anonymous side A, and detailed process refers in the corresponding embodiment of Fig. 4 to be described.
In the present embodiment, non-anonymity side B only has the calling of initiatively initiating by anonymity side A just can learn the anonymous identification of anonymous side A, can be when demand by anonymity side A anonymous identification initiatively to the anonymity side A request of making a call.
Fig. 4 is anonymous method for processing business embodiment tetra-flow charts provided by the invention.On the corresponding embodiment of Fig. 3 basis, the present embodiment request of making a call as calling party to anonymity side take non-anonymity side, as example, illustrates the processing method of non-anonymity side subordinate server and anonymous server.In the present embodiment, anonymous side A and non-anonymity side B are positioned at different communication networks, and under non-anonymity side B, MSC is called caller MSC in the present embodiment, and under anonymous side A, MSC is called called MS C in the present embodiment.As shown in Figure 4, the present embodiment comprises:
Step 41: non-anonymity side B is to the make a call call request of anonymous side A of affiliated MSC.This call request comprises non-anonymity side B true identity and anonymous side A anonymous identification AB and called anonymous service number.
In the corresponding embodiment of Fig. 3, non-anonymity side B receives after the anonymity call request of anonymous side A, has obtained anonymous side's anonymous identification, during follow-up non-anonymity side B active call anonymity side A, by the request that makes a call to anonymity side of this anonymous identification.
Step 42: caller MSC determines that by call request this call request is called anonymity call request, sends and comprises that the true identity of non-anonymity side B true identity and anonymous side A anonymous identification AB obtains request to anonymous server.
Called anonymous service number while including non-anonymous party call anonymity side in anonymity side's anonymous identification.For example, non-anonymity side B dials anonymous side A anonymous identification AB, caller MSC can get called anonymous service number 17112 by anonymity side A anonymous identification, determine that the calling that non-anonymity side B initiates is called anonymity call, to anonymous server, send true identity and obtain request, obtain anonymous side A true identity.
Step 43a: anonymous server finds and non-anonymity side B true identity and anonymous side A anonymous identification AB unique associated anonymity side A true identity, returns to anonymous side A true identity to caller MSC.
For example, anonymous server, in anonymous service table as shown in table 1, is searched and non-anonymity side B true identity and anonymous side A anonymous identification AB unique associated anonymity side A true identity.When anonymous server does not find with non-anonymity side B true identity and anonymous side A anonymous identification AB unique associated anonymity side A true identity, execution step 43b and step 44b.
Step 44a: caller MSC initiates to carry the setup requests of anonymous side A true identity to called MS C.
Step 45: called MS C connects anonymous side A.
Step 43b: anonymous server does not find the anonymity side A true identity associated with non-anonymity side B true identity and anonymous side A anonymous identification AB, returns to anonymous side A true identity obtain failure information to caller MSC.
Step 44b: caller MSC sends called anonymity call failure information to non-anonymity side B, to notify B anonymity side A anonymous number in non-anonymity side not exist.
Even if third party gets anonymous side A anonymous identification AB, owing to there is no the corresponding informance of third party's true identity, anonymous side's true identity and anonymous side's anonymous identification in anonymous server, third party cannot get anonymous side's true identity, and therefore third party also cannot communicate with anonymity side.Thereby avoided third-party harassing and wrecking, protected anonymous side's safety.The embodiment of the present invention can effectively reduce the possibility that contact method leaks, and can also effectively reduce the possibility of harassing call, harassing and wrecking note, spam and phone swindle.
Fig. 5 is anonymous method for processing business embodiment five flow charts provided by the invention.The present embodiment is cancelled anonymity call business as example take anonymity side A, and anonymous business canceling method is described.As shown in Figure 5, the present embodiment comprises:
Step 50: anonymous side's subordinate server receives the anonymous service of initiating anonymity side to be cancelled after request, forwards described anonymous service cancel request to described anonymous server; Anonymous service is cancelled request and is comprised anonymous side's true identity and non-anonymity side true identity.
Anonymous direction subordinate server sends anonymous service and cancels request, to cancel the anonymity side anonymous identification associated with anonymous side's true identity and non-anonymity side true identity.
Step 51: anonymous server receives the anonymous service cancellation request that anonymous side's subordinate server sends.
Anonymity side's subordinate server receives the anonymous service of anonymity side's transmission to be cancelled after request, by the anonymous service of carrying in request, cancel number and determine that this request is cancel and specify anonymity side's anonymous identification associated between non-anonymity side, thereby send this request to anonymous server.For example, anonymous side A added group anonymous service and cancels number 17113 before dialing non-anonymity side B true identity, anonymous side's subordinate server, and for example MSC, can determine that by 17113 anonymous side A asks to cancel the anonymous service between non-anonymity side B.
Step 52: when anonymous server finds with anonymity side's true identity and the unique associated anonymity side of true identity, non-anonymity side anonymous identification, delete the corresponding informance of anonymous side's true identity, non-anonymity side true identity and anonymous side's anonymous identification.
Anonymity side's true identity, non-anonymity side true identity and anonymous side's anonymous identification corresponding informance are: anonymous side's true identity, non-anonymity side true identity, and the anonymity side anonymous identification associated with anonymity side's true identity and non-anonymity side true identity.
With anonymity side's true identity, it is example that the corresponding informance of non-anonymity side true identity and anonymous side's anonymous identification is stored in anonymous service table, anonymous server receives the anonymous service of anonymous side's subordinate server transmission and cancels after request, in anonymous service table, search and anonymity side's true identity and the unique associated anonymity side of true identity, non-anonymity side anonymous identification, when finding, delete anonymous side's true identity and list item corresponding to non-anonymity side true identity in anonymous service table, in anonymous service table, cancel the anonymity side's anonymous identification being associated with anonymous side's true identity and non-anonymity side true identity.
Step 53: anonymous server is returned to anonymous service to anonymity side's subordinate server and cancelled successful information.
Deleting after information corresponding to anonymous side's true identity and non-anonymity side true identity, to anonymity side's subordinate server, return to anonymous service and cancel successful information, anonymous side's subordinate server receives backward anonymity side and forwards.If anonymous side's true identity and non-anonymity side information corresponding to true identity are to be stored in anonymous service table, what delete is anonymous side's true identity and list item corresponding to non-anonymity side true identity in anonymous service table.
Further, when anonymous server does not find associated with anonymity side's true identity and non-anonymity side true identity anonymity side anonymous identification, to anonymity side's subordinate server, return to anonymous service and cancel failure information, to notify anonymous side's anonymous identification not exist.
Embodiment of the present invention anonymity side can cancel anonymous identification association, and no longer the non-anonymity side associated with once setting up anonymous identification communicates.If non-anonymity side still, cannot communicate with this anonymity side during to this anonymity side initiating business request by the anonymity side's anonymous identification after cancelling again, until that this anonymity side and this non-anonymity side have carried out new anonymous identification in anonymous service table is associated.
Flow process shown in this embodiment can to Fig. 4, the embodiment shown in any one combines use with Fig. 1.
Fig. 6 is anonymous server embodiment mono-structural representation provided by the invention.As shown in Figure 6, the present embodiment comprises: preserve module 60, the first receiver module 61, first is searched module 62 and the first sending module 63.
Preserve module 60, for preserving the corresponding informance of non-anonymity side true identity and anonymous side's true identity and anonymous side's anonymous identification, the unique corresponding anonymity side's anonymous identification of non-anonymity side true identity and anonymous side's true identity.
The first receiver module 61, obtains request for the true identity for obtaining anonymous side's true identity that receives the subordinate server transmission of non-anonymity side; The true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification.
First searches module 62, for preserving module 60, searches anonymity side's true identity that the non-anonymity side true identity that receives with the first receiver module 61 and anonymous side's anonymous identification are associated.
The first sending module 63, for when described first search module searches to be associated with described non-anonymity side true identity and described anonymity side anonymous identification anonymity side true identity time, to non-anonymity side subordinate server, send the anonymity side's true identity finding.
Further, as shown in Figure 7, the present embodiment also comprises the second sending module 64.
The second sending module 64, for searching module 62 while not finding the anonymity side true identity that comprises with the true identity request of obtaining that non-anonymity side true identity and anonymous side's anonymous identification be associated when first, to the anonymous side's true identity of non-anonymity side subordinate server transmission, obtain failure information.
The working mechanism of above-mentioned each module, referring to the description of Fig. 1 and the corresponding embodiment of Fig. 4, does not repeat them here.
The embodiment of the present invention in non-anonymity side as requesting party during to anonymity side's initiating business request, non-anonymity side subordinate server is searched anonymity side's true identity of unique correspondence in anonymous service table by anonymity side's anonymous identification and non-anonymity side true identity, only, when finding anonymous side's true identity, anonymity can receive the service request that non-anonymity side initiates just now.Therefore, anonymity side receives only the service request that specific requesting party (side that once called out as requesting party anonymity side) initiates, thereby has reached the object that anonymous side and non-anonymity side carry out two-way communication.
Fig. 8 is anonymous server embodiment tri-structural representations provided by the invention.As shown in Figure 8, on the basis of the corresponding embodiment of Fig. 6 or Fig. 7, the present embodiment comprises: the second receiver module 65, second is searched module 66 and the 3rd sending module 67.
The second receiver module 65, obtains request for the anonymous identification for obtaining anonymous side's anonymous identification that receives anonymous side's subordinate server transmission; The anonymous identification request of obtaining comprises non-anonymity side true identity and anonymous side's true identity;
Second searches module 66, for searching in preservation module 60 the non-anonymity side true identity and the associated anonymity side's anonymous identification of anonymous side's true identity that receive with the second receiver module 65.
The 3rd sending module 67, search module 66 while finding the non-anonymity side true identity that receives with the second receiver module 65 and the associated anonymity side anonymous identification of anonymous side's true identity for second, to anonymity side's subordinate server, send second and search anonymity side's anonymous identification that module 66 finds.
Further, the present embodiment also comprises as shown in Figure 9: creation module 68.
Creation module 68, for second, search module 66 while not finding associated with non-anonymity side true identity and anonymous side's true identity anonymity side anonymous identification, create the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, and anonymity side's anonymous identification is saved to and preserves module 60; And by the 3rd sending module 67, anonymity side's anonymous identification is sent to anonymous side's subordinate server.
The working mechanism of above-mentioned each module, referring to the description of Fig. 2 and the corresponding embodiment of Fig. 3, does not repeat them here.
The present embodiment anonymity side is as requesting party during to non-anonymity side initiating business request, anonymous server receives the anonymous identification of anonymous side's subordinate server transmission and obtains after request, search the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, and to anonymity side's subordinate server, return to the anonymity side's anonymous identification finding.Anonymity side's subordinate server obtains after anonymous side's anonymous identification, and what the caller anonymity call of initiating to non-anonymity side subordinate server was set up calling party in request is designated anonymous identification.Therefore, after the service connection of requesting party and Requested Party is set up, the requesting party who obtains as the non-anonymity side of Requested Party is designated anonymous identification, is not requesting party's true identity, has played the effect of protection requesting party true identity.This non-anonymity side obtains after anonymous side's anonymous identification, can to anonymity side, make a call by anonymity side's anonymous identification, when other non-anonymity side adopts this anonymity side's anonymous identification to anonymity side's initiating business request, because association can not connect with anonymity side less than anonymity side's true identity.Thereby reached the object that anonymous side and non-anonymity side carry out two-way communication.
Figure 10 is anonymous server embodiment tetra-structural representations provided by the invention.As shown in figure 10, on the basis of the corresponding embodiment of Fig. 6 to 8, the present embodiment also comprises: the 3rd receiver module 69, the 3rd is searched module 610, removing module 611 and the 4th sending module 612.
The 3rd receiver module 69, the anonymous service cancellation request sending for receiving anonymous side's subordinate server; Anonymous service is cancelled request and is comprised anonymous side's true identity and non-anonymity side true identity.
The 3rd searches module 610, for searching in preservation module 60 the anonymity side's true identity and the unique associated anonymity side of true identity, the non-anonymity side anonymous identification that receive with the 3rd receiver module 69.
Removing module 611, for searching module 610 while finding associated with anonymity side's true identity and non-anonymity side true identity anonymity side anonymous identification the 3rd, deletes anonymous side's true identity and information corresponding to non-anonymity side true identity preserving in module 60.
The 4th sending module 612, for cancelling successful information to anonymity side's subordinate server return service.
Further, the 4th sending module 612 also, for searching module 610 while not finding associated with anonymity side's true identity and non-anonymity side true identity anonymity side anonymous identification the 3rd, returns to anonymous service to anonymity side's subordinate server and cancels failure information.
The working mechanism of above-mentioned each module, referring to the description of the corresponding embodiment of Fig. 5, does not repeat them here.
The present embodiment anonymity side can cancel anonymous number-associated, and no longer the non-anonymity side associated with once setting up anonymous identification communicates.If this anonymity side is still called out by the anonymity side's anonymous identification after cancelling by non-anonymity side, cannot communicate with this anonymity side again, until that this anonymity side and this non-anonymity side have carried out new anonymous identification in anonymous service table is associated.
Figure 11 is anonymous service system embodiment one structural representation provided by the invention.As shown in figure 11, the present embodiment comprises non-anonymity side subordinate server 111 and anonymous server 112.
Non-anonymity side subordinate server 111, for the service request sending according to the non-anonymous direction anonymity side receiving, obtains the true identity of anonymous side's true identity and obtains request to anonymous server transmission; The true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification.
Anonymous server 112, for searching the anonymity side's true identity being associated with non-anonymity side true identity and anonymous side's anonymous identification, to non-anonymity side subordinate server, send the anonymity side's true identity being associated with non-anonymity side true identity and anonymous side's anonymous identification finding.
Non-anonymity side subordinate server 111, also for replacing anonymous side's anonymous identification by anonymous side's true identity, to anonymity side's initiation business.
Further, anonymous server 112, also, for when the anonymity side true identity that does not find that the non-anonymity side true identity that comprises with the true identity request of obtaining and anonymous side's anonymous identification be associated, to non-anonymity side subordinate server, send anonymous side's true identity and obtain failure information.
The embodiment of the present invention, in non-anonymity side as requesting party during to anonymity side's initiating business request, non-anonymity side subordinate server need to be searched by anonymity side's anonymous identification and non-anonymity side true identity anonymity side's true identity of unique correspondence in anonymous service table, only, when finding anonymous side's true identity, anonymity can receive the service request that non-anonymity side initiates just now.Therefore, anonymity side receives only the service request that specific requesting party (side that once called out as requesting party anonymity side) initiates, thereby has reached the object that anonymous side and non-anonymity side carry out two-way communication.
Figure 12 is anonymous service system embodiment two structural representations provided by the invention.As shown in figure 12, on Figure 11 basis, the present embodiment also comprises: anonymous side's subordinate server 113.
Anonymity side's subordinate server 113, for according to the service request of being initiated by the non-anonymity side of anonymous direction receiving, obtains request to anonymous server transmission for the anonymous identification of obtaining anonymous side's anonymous identification; The anonymous identification request of obtaining comprises non-anonymity side true identity and anonymous side's true identity.
Anonymous server 112, also, for searching the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, sends the anonymity side's anonymous identification finding to anonymity side's subordinate server.
Anonymity side's subordinate server 113, also for replacing anonymous side's true identity by anonymous side's anonymous identification, to non-anonymity side's initiation business.
Further, anonymous server 112, also, for when not finding associated with non-anonymity side true identity and anonymous side's true identity anonymity side anonymous identification, create the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, and preserve anonymous side's anonymous identification; Anonymity side's anonymous identification is sent to anonymous side's subordinate server.
The anonymous method for processing business of the embodiment of the present invention, in anonymity side as requesting party during to non-anonymity side initiating business request, anonymous server receives the anonymous identification of anonymous side's subordinate server transmission and obtains after request, search the anonymity side anonymous identification associated with non-anonymity side true identity and anonymous side's true identity, and to anonymity side's subordinate server, return to the anonymity side's anonymous identification finding.Anonymity side's subordinate server obtains after anonymous side's anonymous identification, and what the caller anonymity call of initiating to non-anonymity side subordinate server was set up calling party in request is designated anonymous identification.Therefore, after the service connection of requesting party and Requested Party is set up, the requesting party who obtains as the non-anonymity side of Requested Party is designated anonymous identification, is not requesting party's true identity, has played the effect of protection requesting party true identity.This non-anonymity side obtains after anonymous side's anonymous identification, can to anonymity side, make a call by anonymity side's anonymous identification, when other non-anonymity side adopts this anonymity side's anonymous identification to anonymity side's initiating business request, because association can not connect with anonymity side less than anonymity side's true identity.Thereby reached the object that anonymous side and non-anonymity side carry out two-way communication.
Further, when associated anonymous identification is cancelled in the request of anonymity side, anonymous side's subordinate server 113 is cancelled request by the anonymous service receiving and is transmitted to anonymous server 112, is processed the deletion action of anonymous identification by anonymous server 112.Specific as follows:
Anonymity side's subordinate server 113, also cancels after request for receiving the anonymous service of initiating anonymity side, forwards anonymous service cancel request to anonymous server; Anonymous service is cancelled request and is comprised anonymous side's true identity and non-anonymity side true identity.
Anonymous server 112, also when finding associated with anonymity side's true identity and non-anonymity side true identity anonymity side anonymous identification, delete anonymous side's true identity and information corresponding to non-anonymity side true identity, and to anonymity side's subordinate server, return to anonymous service and cancel successful information.
Anonymous server 112, also when not finding associated with anonymity side's true identity and non-anonymity side true identity anonymity side anonymous identification, returns to anonymous service to anonymity side's subordinate server and cancels failure information.
The embodiment of the present invention, anonymity side can cancel anonymous identification association, and no longer the non-anonymity side associated with once setting up anonymous identification communicates.If non-anonymity side still, cannot communicate with this anonymity side during to this anonymity side initiating business request by the anonymity side's anonymous identification after cancelling again, until that this anonymity side and this non-anonymity side have carried out new anonymous identification in anonymous service table is associated.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can complete by the relevant hardware of program command, aforesaid program can be stored in a computer read/write memory medium, this program, when carrying out, is carried out the step that comprises said method embodiment; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: above embodiment only, in order to technical scheme of the present invention to be described, is not intended to limit; Although the present invention is had been described in detail with reference to previous embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or part technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (16)

1. an anonymous method for processing business, is characterized in that, comprising:
The service request that non-anonymity side subordinate server sends according to the non-anonymous direction anonymity side receiving, obtains the true identity of anonymous side's true identity and obtains request to anonymous server transmission; The described true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification;
Described anonymous server is searched the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification, sends the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification finding to described non-anonymity side subordinate server; The described anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification of searching is specially: in anonymous service table, search and non-anonymity side true identity and the unique associated anonymity side of anonymous side's anonymous identification true identity, in described anonymous service table, the only corresponding anonymity side's true identity of non-anonymity side true identity and anonymous side's anonymous identification;
Described non-anonymity side subordinate server replaces described anonymity side anonymous identification by described anonymity side true identity, to described anonymity side's initiation business.
2. anonymous method for processing business according to claim 1, is characterized in that, also comprises:
Anonymity side's subordinate server is according to the service request of being initiated by the non-anonymity side of anonymous direction receiving, and the anonymous identification sending for obtaining anonymous side's anonymous identification to described anonymous server is obtained request; The described anonymous identification request of obtaining comprises described non-anonymity side true identity and described anonymity side true identity;
Described anonymous server is searched the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, sends the anonymity side's anonymous identification finding to described anonymity side subordinate server;
Described anonymity side subordinate server replaces described anonymity side true identity by described anonymity side anonymous identification, to described non-anonymity side's initiation business.
3. anonymous method for processing business according to claim 2, is characterized in that, also comprises:
If described anonymous server does not find the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, create the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, and preserve described anonymity side anonymous identification; Described anonymity side anonymous identification is sent to described anonymity side subordinate server.
4. anonymous method for processing business according to claim 1, is characterized in that, also comprises:
If during described anonymous server does not find that the non-anonymity side true identity that comprises with the described true identity request of obtaining and anonymous side's anonymous identification be associated anonymity side true identity, send anonymous side's true identity to described non-anonymity side subordinate server and obtain failure information.
5. according to the anonymous method for processing business described in claim 1 to 4 any one, it is characterized in that, also comprise:
Described anonymity side subordinate server receives the anonymous service of initiating anonymity side to be cancelled after request, forwards described anonymous service cancel request to described anonymous server; Described anonymous service is cancelled request and is comprised described anonymity side true identity and described non-anonymity side true identity;
Described anonymous server receives the anonymous service cancellation request that described anonymity side subordinate server sends;
When described anonymous server finds associated with described anonymity side true identity and described non-anonymity side true identity anonymity side anonymous identification, delete described anonymity side true identity and information corresponding to described non-anonymity side true identity, and to described anonymity side subordinate server, return to anonymous service and cancel successful information.
6. anonymous method for processing business according to claim 5, is characterized in that, also comprises:
If described anonymous server does not find the anonymity side anonymous identification associated with described anonymity side true identity and described non-anonymity side true identity, to described anonymity side subordinate server, return to anonymous service and cancel failure information.
7. an anonymous server, is characterized in that, comprising:
The first receiver module, obtains request for the true identity for obtaining anonymous side's true identity that receives the subordinate server transmission of non-anonymity side; The described true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification;
First searches module, for searching the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification; The described anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification of searching is specially: in anonymous service table, search and non-anonymity side true identity and the unique associated anonymity side of anonymous side's anonymous identification true identity, in described anonymous service table, the only corresponding anonymity side's true identity of non-anonymity side true identity and anonymous side's anonymous identification;
The first sending module, for when described first search module searches to be associated with described non-anonymity side true identity and described anonymity side anonymous identification anonymity side true identity time, to described non-anonymity side subordinate server, send the anonymity side's true identity finding;
Preserve module, for preserving the corresponding informance of non-anonymity side true identity and anonymous side's true identity and anonymous side's anonymous identification, the unique corresponding anonymity side's anonymous identification of described non-anonymity side true identity and described anonymity side true identity.
8. anonymous server according to claim 7, is characterized in that, also comprises:
The second sending module, for searching module while not finding the anonymity side true identity that comprises with the described true identity request of obtaining that non-anonymity side true identity and anonymous side's anonymous identification be associated when described first, to the anonymous side's true identity of described non-anonymity side subordinate server transmission, obtain failure information.
9. according to anonymous server described in claim 7 or 8, it is characterized in that, also comprise:
The second receiver module, obtains request for the anonymous identification for obtaining anonymous side's anonymous identification that receives anonymous side's subordinate server transmission; The described anonymous identification request of obtaining comprises non-anonymity side true identity and anonymous side's true identity;
Second searches module, for searching the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity;
The 3rd sending module, while searching module searches to associated with described non-anonymity side true identity and described anonymity side true identity anonymity side anonymous identification for second, to described anonymity side subordinate server, send described second and search anonymity side's anonymous identification that module searches arrives.
10. anonymous server according to claim 9, is characterized in that, also comprises:
Creation module, for searching module while not finding associated with described non-anonymity side true identity and described anonymity side true identity anonymity side anonymous identification when described second, create the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, and preserve described anonymity side anonymous identification; Described anonymity side anonymous identification is sent to described anonymity side subordinate server.
11. according to anonymous server described in claim 7 or 8, it is characterized in that, also comprises:
The 3rd receiver module, the anonymous service cancellation request sending for receiving described anonymity side subordinate server; Described anonymous service is cancelled request and is comprised anonymous side's true identity and non-anonymity side true identity;
The 3rd searches module, for searching and anonymity side's true identity and the unique associated anonymity side of true identity, non-anonymity side anonymous identification;
Removing module, for when the described the 3rd searches module searches to associated with described anonymity side true identity and described non-anonymity side true identity anonymity side anonymous identification, deletes described anonymity side true identity and information corresponding to described non-anonymity side true identity;
The 4th sending module, for cancelling successful information to described anonymity side subordinate server return service.
12. according to anonymous server described in claim 11, it is characterized in that, described the 4th sending module also, for searching module while not finding associated with anonymity side's true identity and non-anonymity side true identity anonymity side anonymous identification when the described the 3rd, returns to anonymous service to anonymity side's subordinate server and cancels failure information.
13. 1 kinds of anonymous service systems, is characterized in that, comprise anonymous server and non-anonymity side subordinate server;
Described non-anonymity side subordinate server, for the service request sending according to the non-anonymous direction anonymity side receiving, obtains the true identity of anonymous side's true identity and obtains request to anonymous server transmission; The described true identity request of obtaining comprises non-anonymity side true identity and anonymous side's anonymous identification; Replace described anonymity side anonymous identification by described anonymity side true identity, to described anonymity side's initiation business;
Described anonymous server, for searching the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification, to described non-anonymity side subordinate server, send the anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification finding;
The described anonymity side's true identity being associated with described non-anonymity side true identity and described anonymity side anonymous identification of searching is specially: in anonymous service table, search and non-anonymity side true identity and the unique associated anonymity side of anonymous side's anonymous identification true identity, in described anonymous service table, the only corresponding anonymity side's true identity of non-anonymity side true identity and anonymous side's anonymous identification.
14. according to anonymous service system described in claim 13, it is characterized in that, also comprises: anonymous side's subordinate server;
Described anonymity side subordinate server, for according to the service request of being initiated by the non-anonymity side of anonymous direction receiving, obtains request to described anonymous server transmission for the anonymous identification of obtaining anonymous side's anonymous identification; The described anonymous identification request of obtaining comprises described non-anonymity side true identity and described anonymity side true identity; Replace described anonymity side true identity by described anonymity side anonymous identification, to described non-anonymity side's initiation business;
Described anonymous server, also, for searching the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, sends the anonymity side's anonymous identification finding to described anonymity side subordinate server.
15. according to anonymous service system described in claim 13, it is characterized in that, described anonymous server, also, for when the anonymity side true identity that does not find that the non-anonymity side true identity that comprises with the described true identity request of obtaining and anonymous side's anonymous identification be associated, to described non-anonymity side subordinate server, send anonymous side's true identity and obtain failure information.
16. according to anonymous service system described in claim 14, it is characterized in that, described anonymous server, also for not finding the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, create the anonymity side anonymous identification associated with described non-anonymity side true identity and described anonymity side true identity, and preserve described anonymity side anonymous identification; Described anonymity side anonymous identification is sent to described anonymity side subordinate server.
CN201010604732.3A 2010-12-23 2010-12-23 Anonymous service processing method as well as anonymous server and system Active CN102137196B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201010604732.3A CN102137196B (en) 2010-12-23 2010-12-23 Anonymous service processing method as well as anonymous server and system
PCT/CN2011/075339 WO2011147360A1 (en) 2010-12-23 2011-06-03 Anonymous service processing method, anonymous server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010604732.3A CN102137196B (en) 2010-12-23 2010-12-23 Anonymous service processing method as well as anonymous server and system

Publications (2)

Publication Number Publication Date
CN102137196A CN102137196A (en) 2011-07-27
CN102137196B true CN102137196B (en) 2014-04-16

Family

ID=44296846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010604732.3A Active CN102137196B (en) 2010-12-23 2010-12-23 Anonymous service processing method as well as anonymous server and system

Country Status (2)

Country Link
CN (1) CN102137196B (en)
WO (1) WO2011147360A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717376B (en) * 2013-12-16 2018-06-15 中国移动通信集团公司 Caller ID display control method and system, relevant device
CN104507060A (en) * 2014-12-23 2015-04-08 广州市久邦数码科技有限公司 Anonymous short message realization method
CN104796563B (en) * 2015-03-18 2018-01-12 百度在线网络技术(北京)有限公司 A kind of method and apparatus for being used to provide session services for user and service side

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592474A (en) * 2003-08-27 2005-03-09 华为技术有限公司 Method for speech anonymous chat by cell phone
CN1848874A (en) * 2005-04-13 2006-10-18 华为技术有限公司 Anonymous calling method in next generation network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521569B (en) * 2008-02-28 2013-04-24 华为技术有限公司 Method, equipment and system for realizing service access

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592474A (en) * 2003-08-27 2005-03-09 华为技术有限公司 Method for speech anonymous chat by cell phone
CN1848874A (en) * 2005-04-13 2006-10-18 华为技术有限公司 Anonymous calling method in next generation network

Also Published As

Publication number Publication date
WO2011147360A1 (en) 2011-12-01
CN102137196A (en) 2011-07-27

Similar Documents

Publication Publication Date Title
CN100471309C (en) Mobile one-machine multiple numbers service system and its application
CN101563944A (en) IMSI handling system
CN101677474B (en) Method, system and device for realizing service of one card with multiple numbers
CN100527873C (en) Method, system and vision location register for obtaining the communication status of the called terminal
JPH07509594A (en) Method for handling calls to unregistered mobile subscribers in a mobile telephone system
CN105141790A (en) Method for keeping calling party number secrete in telephone communication
CN103874056A (en) Multi-number one-card implementation method and multi-number one-card implementation system
CN102137196B (en) Anonymous service processing method as well as anonymous server and system
CN108737975A (en) Communication control method
CN101123746B (en) method for forwarding MMS by multiple-in-one system
US10547572B2 (en) Messaging service
CN101841788A (en) Method, device and system for forwarding call
CN102457610A (en) One-card-to-multiple-number service contact matching device and method
CN102131171A (en) Method and device for realizing cross-regional virtual private network service
CN101083842A (en) Incoming call filtering method and method, equipment and system for setting incoming identification
GB2454886A (en) Maintaining privacy of primary telephone number by use of secondary number
CN101119591A (en) Method of implementing classification calling forward shifting and home location register
CN102355669A (en) Call service processing method and device
CN100562043C (en) The number that display of calling is called out and the method for clawback
CN107708103B (en) Method for realizing number security based on MAP signaling
CN100455118C (en) Method and system for implementing call recording management in communication system
CN101568099B (en) Method for realizing intelligent business and communication system
CN102811430A (en) Realization method and system of call forwarding
CN109756847A (en) The number of taking turns net method of calling, equipment and computer readable storage medium
CN108769436A (en) It is a kind of that guard method is customized based on the user mobile phone security privacy of USSD and Quick Response Code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant