CN102802150B - phone number verification method, system and terminal - Google Patents

phone number verification method, system and terminal Download PDF

Info

Publication number
CN102802150B
CN102802150B CN201210256806.8A CN201210256806A CN102802150B CN 102802150 B CN102802150 B CN 102802150B CN 201210256806 A CN201210256806 A CN 201210256806A CN 102802150 B CN102802150 B CN 102802150B
Authority
CN
China
Prior art keywords
terminal
authorization information
calling
calling number
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210256806.8A
Other languages
Chinese (zh)
Other versions
CN102802150A (en
Inventor
田新雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201210256806.8A priority Critical patent/CN102802150B/en
Publication of CN102802150A publication Critical patent/CN102802150A/en
Application granted granted Critical
Publication of CN102802150B publication Critical patent/CN102802150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of phone number verification method, system and terminal, wherein, the method comprises: terminal called receives the communication interaction request that calling terminal is initiated by calling number, whether identical to verify that whether calling number is legal according to the first authorization information and the second authorization information, if it is legal to verify, then carry out communication interaction with calling terminal, wherein, first authorization information is that network authentication center stores according to locality, the KI corresponding with calling number and authentication arithmetic carry out calculating to a random sequence code and generate, the second authorization information KI that to be calling terminal store according to locality and authentication arithmetic carry out calculating to random sequence code and generate, achieve terminal called mutual to calling terminal initiating communication time calling number used reliability verify, ensure that the communication security of called subscriber.

Description

Phone number verification method, system and terminal
Technical field
The embodiment of the present invention relates to communication technical field, particularly relates to a kind of phone number verification method, system and terminal.
Background technology
Along with the development of the Internet and the communication technology, VoIP(VoiceoverInternetProtocol) technology arises at the historic moment, is exactly by the digitlization of simulated sound signal in brief, does real-time transmission with the form of data packet on IP data network.The maximum advantage of VoIP is the environment that can adopt internet and global ip interconnection widely, there is provided more than traditional business, better serve, specifically comprise: VoIP can transmit the business such as voice, video and data on ip networks, can realize the business such as virtual telephony, virtual speech, video conference and ecommerce.
At present, lawless person utilizes the open characteristics of network and voip technology to forge the phone number harassing and wrecking user of public institution or friends and family to carry out unlawful profit-making.Therefore, when user receives the note that the phone number of friends and family that lawless person forges sends or the phone made, and cannot differentiate the authenticity of this telephone number, easily having dust thrown into the eyes causes damage.
Summary of the invention
For the above-mentioned defect of prior art, the embodiment of the present invention provides a kind of phone number verification method, system and terminal.
One aspect of the present invention provides a kind of phone number verification method, comprising:
Terminal called receives the communication interaction request that calling terminal is initiated by calling number;
Whether described terminal called is identical to verify that whether described calling number is legal according to the first authorization information and the second authorization information, if it is legal to verify, then carry out communication interaction with described calling terminal, wherein, to be network authentication center store according to locality described first authorization information, the KI corresponding with described calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the described second authorization information KI that to be described calling terminal store according to locality and authentication arithmetic carry out calculating generation to described random sequence code.
If it is legal that described terminal called is verified, then carry out communication interaction with described calling terminal.
The present invention provides a kind of terminal on the other hand, comprising:
Receiver module, for receiving the communication interaction request that calling terminal is initiated by calling number;
Authentication module, for whether identical to verify that whether described calling number is legal according to the first authorization information and the second authorization information, wherein, to be network authentication center store according to locality described first authorization information, the KI corresponding with described calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the described second authorization information KI that to be described calling terminal store according to locality and authentication arithmetic carry out calculating generation to described random sequence code;
Communication module, if legal for verifying, then carries out communication interaction with described calling terminal.
Another aspect of the invention provides a kind of phone number verification system, comprising: calling terminal, terminal called and network authentication center, and wherein, described terminal called is above-mentioned terminal.
The phone number verification method that the embodiment of the present invention provides, system and terminal, when after the communication interaction request that terminal called reception calling terminal is initiated by calling number, whether identical to verify that whether calling number is legal according to the first authorization information and the second authorization information, wherein, first authorization information is that network authentication center stores according to locality, the KI corresponding with calling number and authentication arithmetic carry out calculating to a random sequence code and generate, the second authorization information KI that to be calling terminal store according to locality and authentication arithmetic carry out calculating to random sequence code and generate, if it is legal to verify, then carry out communication interaction with calling terminal, thus achieve terminal called mutual to calling terminal initiating communication time calling number used reliability verify, ensure that the communication security of called subscriber.
Accompanying drawing explanation
Fig. 1 is the flow chart of a phone number verification method of the present invention embodiment;
Fig. 2 is the flow chart of another embodiment of phone number verification method of the present invention;
Fig. 3 is the flow chart of the another embodiment of phone number verification method of the present invention;
Fig. 4 is the structural representation of a terminal of the present invention embodiment;
Fig. 5 is the structural representation of another embodiment of terminal of the present invention;
Fig. 6 is the structural representation of the another embodiment of mobile terminal of the present invention;
Fig. 7 is the structural representation of a phone number verification system of the present invention embodiment.
Embodiment
Fig. 1 is the flow chart of a phone number verification method of the present invention embodiment, and as shown in Figure 1, the method comprises:
Step 100, terminal called receives the communication interaction request that calling terminal is initiated by calling number;
Step 101, whether described terminal called is identical to verify that whether described calling number is legal according to the first authorization information and the second authorization information, if it is legal to verify, then carry out communication interaction wherein with described calling terminal, to be network authentication center store according to locality described first authorization information, the KI corresponding with described calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the described second authorization information KI that to be described calling terminal store according to locality and authentication arithmetic carry out calculating generation to described random sequence code;
When terminal called receives the communication interaction request that calling terminal initiated by calling number, whether identical with the second authorization information that calling terminal generates to verify that whether this calling number is legal according to the first authorization information that network authentication center generates, wherein, obtain the KI corresponding with calling number and authentication arithmetic the corresponding relation of the first authorization information phone number that to be network authentication center store from locality and KI and authentication arithmetic, and apply this KI and authentication arithmetic and carry out calculating to a random sequence code and generate.The second authorization information KI that to be calling terminal store according to locality and authentication arithmetic carry out calculating to a random sequence code and generate, and it should be noted that the first authorization information is identical with random sequence code used in the second authorization information generative process.
If the first authorization information is identical with the second authorization information, then illustrate that the KI stored in calling terminal is identical with authentication arithmetic with the KI corresponding with calling number of network authentication central store with authentication arithmetic, therefore, calling number used when illustrating that calling terminal request and terminal called carry out communication interaction is reliable, it is legal to verify, be not the number that lawless person utilizes network and voip technology forgery, thus terminal called and calling terminal carry out communication interaction.If the first authorization information is not identical with the second authorization information, then illustrate that the KI stored in calling terminal is not identical with authentication arithmetic with the KI corresponding with calling number of network authentication central store with authentication arithmetic, therefore, calling number used when illustrating that calling terminal request and terminal called carry out communication interaction is unreliable, verify illegal, may be the number that lawless person utilizes network and voip technology forgery, thus terminal called refusal carry out communication interaction with calling terminal.
The phone number verification method that the present embodiment provides, when after the communication interaction request that terminal called reception calling terminal is initiated by calling number, whether identical to verify that whether calling number is legal according to the first authorization information and the second authorization information, wherein, first authorization information is that network authentication center stores according to locality, the KI corresponding with calling number and authentication arithmetic carry out calculating to a random sequence code and generate, the second authorization information KI that to be calling terminal store according to locality and authentication arithmetic carry out calculating to random sequence code and generate, if it is legal to verify, then carry out communication interaction with calling terminal, thus achieve terminal called mutual to calling terminal initiating communication time calling number used reliability verify, ensure that the communication security of called subscriber.
Based on above-described embodiment, further, after the communication interaction request that terminal called reception calling terminal is initiated by calling number, described method also comprises: terminal called sends mark to calling terminal and obtains request message; Terminal called receives the international mobile subscriber identity that calling terminal returns, and sends the mark authentication request message comprising international mobile subscriber identity and calling number to network authentication center; Terminal called receives the mark authentication response message that network authentication center returns, and determines whether to verify the legitimacy of calling number.
Based on above-described embodiment, further, after the communication interaction request that terminal called reception calling terminal is initiated by calling number, described method also comprises: according to the number information pre-set, terminal called judges whether calling number is credible number, to determine whether to verify the legitimacy of calling number.
Particularly, according to the first authorization information and the second authorization information, whether identical to verify calling number, whether legal specific implementation is explained detailedly by the specific embodiment shown in Fig. 2 and Fig. 3 terminal called.
Fig. 2 is the flow chart of another embodiment of phone number verification method of the present invention, and as shown in Figure 2, the method comprises:
Step 200, terminal called receives the communication interaction request that calling terminal is initiated by calling number, then send mark to calling terminal and obtain request message;
When terminal called receives the communication interaction request that calling terminal initiated by calling number, then send mark to calling terminal and obtain request message to obtain the calling terminal identification for identifying calling terminal uniqueness.
Step 201, terminal called receives the international mobile subscriber identity that described calling terminal returns, and sends the mark authentication request message comprising described international mobile subscriber identity and described calling number to described network authentication center;
The mark receiving terminal called transmission when calling terminal obtains request message, then the international mobile subscriber identity that locality stores is returned to terminal called, thus terminal called receives the international mobile subscriber identity that calling terminal returns, and mark authentication request message is sent to network authentication center, this mark authentication request message comprises international mobile subscriber identity and calling number, thus parsing acquisition international mobile subscriber identity and calling number are carried out to the authentication request message received in network authentication center, and according to this locality store international mobile subscriber identity and phone number corresponding relation determination terminal called send international mobile subscriber identity and calling number whether mate, and return mark authentication response message according to matching result to terminal called.
Step 202, terminal called receives the mark authentication response message that network authentication center returns, and determines whether to verify the legitimacy of calling number, if not, performs step 203, if so, performs step 204;
Terminal called receives the mark authentication response message that network authentication center returns, if mark authentication response message shows international mobile subscriber identity and the calling number coupling of calling terminal, then perform step 204, the legitimacy of calling number is verified, if do not mate, then illustrate that calling number is unreliable, may be the number that lawless person utilizes network and voip technology forgery, perform step 203.
Step 203, terminal called refusal carries out communication interaction with calling terminal.
Step 204, described terminal called sends the authentication request message comprising described calling number to described network authentication center, store according to locality for described network authentication center, the KI corresponding with described calling number and authentication arithmetic carry out calculating generation first authorization information to a random sequence code;
Terminal called sends authentication request message to network authentication center, this authentication request message comprises calling number, thus parsing acquisition calling number is carried out to the authentication request message received in network authentication center, obtain the KI corresponding with calling number and authentication arithmetic the corresponding relation of the then phone number that stores from locality of network authentication center and KI and authentication arithmetic, and apply this KI and authentication arithmetic carries out calculating generation first authorization information to a random sequence code.
Step 205, described terminal called receives authentication response message that described network authentication center returns, that comprise described first authorization information and described random sequence code;
Network authentication center returns the authentication response message comprising this first authorization information and this random sequence code to terminal called.
Step 206, described terminal called sends the identification authentication request message comprising described random sequence code to described calling terminal, the KI stored according to locality for described calling terminal and authentication arithmetic carry out calculating generation second authorization information to described random sequence code;
Terminal called sends identification authentication request message to calling terminal, this identification authentication request message comprises the random sequence code that network authentication center returns, calling terminal carries out parsing to the identification authentication request message received and obtains this random sequence code, and then the KI that stores according to this locality of calling terminal and authentication arithmetic carry out calculating generation second authorization information to the random sequence code of resolving acquisition.
Step 207, described terminal called receives identification authentication response message that described calling terminal returns, that comprise described second authorization information;
Calling terminal comprises the identification authentication response message of the second authorization information by returning to terminal called.
Step 208, described terminal called judges that whether described first authorization information is identical with described second authorization information to verify that whether described calling number is legal, if verify legal, then carries out communication interaction with described calling terminal.
The first authorization information that network authentication center generates by terminal called and the second authorization information that calling terminal generates compare judge whether identical, if the first authorization information is identical with the second authorization information, then illustrate that the KI stored in calling terminal is identical with authentication arithmetic with the KI corresponding with calling number of network authentication central store with authentication arithmetic, therefore, calling number used when illustrating that calling terminal request and terminal called carry out communication interaction is reliable, it is not the number that lawless person utilizes network and voip technology forgery, thus terminal called and calling terminal carry out communication interaction.If the first authorization information is not identical with the second authorization information, then illustrate that the KI stored in calling terminal is not identical with authentication arithmetic with the KI corresponding with calling number of network authentication central store with authentication arithmetic, therefore, calling number used when illustrating that calling terminal request and terminal called carry out communication interaction is unreliable, may be the number that lawless person utilizes network and voip technology forgery, thus terminal called refusal carry out communication interaction with calling terminal.
The phone number verification method that the present embodiment provides, when after the communication interaction request that terminal called reception calling terminal is initiated by calling number, first international mobile subscriber identity is obtained by calling terminal, and determine whether this international mobile subscriber identity mates with calling number by network authentication center, if coupling, whether identical to verify that whether calling number is legal according to the first authorization information and the second authorization information further again, wherein, first authorization information is that network authentication center stores according to locality, the KI corresponding with calling number and authentication arithmetic carry out calculating to a random sequence code and generate, the second authorization information KI that to be calling terminal store according to locality and authentication arithmetic carry out calculating to random sequence code and generate, if it is legal to verify, then carry out communication interaction with calling terminal, thus the reliability of calling number used when furthermore achieved that terminal called is mutual to calling terminal initiating communication is verified, ensure that the communication security of called subscriber.
Fig. 3 is the flow chart of the another embodiment of phone number verification method of the present invention, and as shown in Figure 3, the method comprises:
Step 300, if terminal called receives the communication interaction request that calling terminal is initiated by calling number;
Step 301, according to the number information pre-set, terminal called judges whether calling number is credible number, if not, perform step 302, if so, perform step 303;
When terminal called receives the communication interaction request that calling terminal initiated by calling number, judge whether this calling number is credible number according to the number information pre-set, to determine whether to verify the legitimacy of calling number.It should be noted that, the number information that terminal called pre-sets comprises white list and blacklist, illustrate with blacklist, if terminal called judges to know that the number information in this blacklist comprises this calling number according to the blacklist pre-set, then illustrate that this calling number is insincere, then perform step 302, know that the number information in this blacklist does not comprise this calling number if judge, then illustrate that this calling number is credible, then perform step 303.
Step 302, the communication interaction request of terminal called refusal calling terminal.
Step 303, described terminal called sends the identification authentication request message comprising a random sequence code to described calling terminal, the KI stored according to locality for described calling terminal and authentication arithmetic carry out calculating generation second authorization information to described random sequence code;
Terminal called sends identification authentication request message to calling terminal, this identification authentication request message comprises a random sequence code, calling terminal carries out parsing to the identification authentication request message received and obtains random sequence code, and the KI then stored according to locality and authentication arithmetic carry out calculating generation second authorization information to this random sequence code.
Step 304, described terminal called receives identification authentication response message that described calling terminal returns, that comprise described second authorization information;
Calling terminal returns the identification authentication response message comprising the second authorization information to terminal called.
Step 305, described terminal called sends verification process request message to described network authentication center, described verification process request message comprises: described second authorization information, described random sequence code and described calling number, store according to locality for described network authentication center, the KI corresponding with described calling number and authentication arithmetic carry out calculating generation first authorization information to described random sequence code;
After the second authorization information that terminal called acquisition calling terminal returns, verification process request message is sent to network authentication center, this verification process request message comprises: the second authorization information that calling terminal returns, send to random sequence code and the calling number of calling terminal before, thus network authentication center parses verification process request message obtains calling number, random sequence code and the second authorization information, the phone number that network authentication center stores according to this locality obtains the KI corresponding with calling number and authentication arithmetic with the corresponding relation of KI and authentication arithmetic, and apply this KI and authentication arithmetic calculating generation first authorization information is carried out to the random sequence code obtained.
Step 306, described terminal called receives described network authentication center and judges described first authorization information fed back with described main frame number corresponding the result whether identical with described second authorization information, if the result shows legal, then carry out communication interaction with described calling terminal.
Network authentication center again by generate the first authorization information and the second authorization information that terminal called sends compare judge whether identical, if the first authorization information is identical with the second authorization information, then illustrate that the KI stored in calling terminal is identical with authentication arithmetic with the KI corresponding with calling number of network authentication central store with authentication arithmetic, therefore, calling number used when illustrating that calling terminal request and terminal called carry out communication interaction is reliable, it is not the number that lawless person utilizes network and voip technology forgery, now return to terminal called and show that calling number verifies legal the result, thus terminal called carries out communication interaction according to this result and calling terminal.If the first authorization information is not identical with the second authorization information, then illustrate that the KI stored in calling terminal is not identical with authentication arithmetic with the KI corresponding with calling number of network authentication central store with authentication arithmetic, therefore, calling number used when illustrating that calling terminal request and terminal called carry out communication interaction is unreliable, it may be the number that lawless person utilizes network and voip technology forgery, now return to terminal called and show that calling number verifies illegal the result, thus terminal called carries out communication interaction according to this result refusal with calling terminal.
The phone number verification method that the present embodiment provides, when after the communication interaction request that terminal called reception calling terminal is initiated by calling number, first judge that whether calling number is credible, if credible, whether identical to verify that whether calling number is legal according to the first authorization information and the second authorization information further again, wherein, first authorization information is that network authentication center stores according to locality, the KI corresponding with calling number and authentication arithmetic carry out calculating to a random sequence code and generate, the second authorization information KI that to be calling terminal store according to locality and authentication arithmetic carry out calculating to random sequence code and generate, if it is legal to verify, then carry out communication interaction with calling terminal, thus the reliability of calling number used when furthermore achieved that terminal called is mutual to calling terminal initiating communication is verified, ensure that the communication security of called subscriber.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that program command is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Fig. 4 is the structural representation of a terminal of the present invention embodiment, and as shown in Figure 4, this terminal comprises: receiver module 11, authentication module 12 and communication module 13, wherein, and the communication interaction request that receiver module 11 is initiated by calling number for receiving calling terminal;
Whether authentication module 12 is for identical to verify that whether calling number is legal according to the first authorization information and the second authorization information, wherein, to be network authentication center store according to locality first authorization information, the KI corresponding with calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the second authorization information KI that to be calling terminal stores according to locality and authentication arithmetic carry out calculating generation to random sequence code; If communication module 13 is legal for verifying, then carry out communication interaction with calling terminal.
The function of each module and handling process in the terminal that the present embodiment provides, can see the embodiment of the method shown in above-mentioned Fig. 1, and it realizes principle and technique effect is similar, repeats no more herein.
Based on above-described embodiment, further, this terminal also comprises: sending module, obtains request message for sending mark to calling terminal; Processing module, for receiving the international mobile subscriber identity that calling terminal returns, and sends the mark authentication request message comprising international mobile subscriber identity and calling number to network authentication center; Judge module, for receiving the mark authentication response message that network authentication center returns, determines whether to verify the legitimacy of calling number.
Based on above-described embodiment, further, this terminal also comprises: authentication module, after receiving the communication interaction request initiated by calling number of calling terminal at terminal called, judge whether calling number is credible number according to the number information pre-set, to determine whether to verify the legitimacy of calling number.
Particularly, the specific implementation of authentication module is explained detailedly by the specific embodiment shown in Fig. 5 and Fig. 6.
Fig. 5 is the structural representation of another embodiment of terminal of the present invention, as shown in Figure 5, based on embodiment illustrated in fig. 4, this terminal also comprises: sending module 14, processing module 15 and judge module 16, wherein, sending module 14 obtains request message for sending mark to calling terminal; The international mobile subscriber identity that processing module 15 returns for receiving calling terminal, and the mark authentication request message comprising international mobile subscriber identity and calling number is sent to network authentication center; The mark authentication response message that judge module 16 returns for receiving network authentication center, determines whether to verify the legitimacy of calling number.
Authentication module 12 comprises: the first transmitting element 121, first receiving element 122 and the first judging unit 123, wherein, first transmitting element 121 is for sending the authentication request message comprising calling number to network authentication center, that store according to locality for network authentication center, corresponding with calling number KI and authentication arithmetic carry out calculating generation first authorization information to a random sequence code; First receiving element 122 is for receiving authentication response message that network authentication center returns, that comprise the first authorization information and random sequence code; First transmitting element 121 also comprises the identification authentication request message of random sequence code for sending to calling terminal, and the KI stored according to locality for calling terminal and authentication arithmetic carry out calculating generation second authorization information to described random sequence code; First receiving element 122 is also for receiving identification authentication response message that calling terminal returns, that comprise the second authorization information; First judging unit 123 is for judging that whether the first authorization information and the second authorization information be identical to verify that whether calling number is legal.
The function of each module and handling process in the terminal that the present embodiment provides, can see the embodiment of the method shown in above-mentioned Fig. 2, and it realizes principle and technique effect is similar, repeats no more herein.
Fig. 6 is the structural representation of the another embodiment of mobile terminal of the present invention, as shown in Figure 6, based on embodiment illustrated in fig. 4, authentication module 12 specifically comprises: the second transmitting element 124, second receiving element 125, request unit 126 and the second judging unit 127, wherein, second transmitting element 124 comprises the identification authentication request message of a random sequence code for sending to calling terminal, and the KI stored according to locality for calling terminal and authentication arithmetic carry out calculating generation second authorization information to random sequence code; Second receiving element 125 is for receiving identification authentication response message that calling terminal returns, that comprise the second authorization information; Request unit 126 is for sending verification process request message to network authentication center, verification process request message comprises: the second authorization information, random sequence code and calling number, and that store according to locality for network authentication center, corresponding with calling number KI and authentication arithmetic carry out calculating generation first authorization information to random sequence code; Second judging unit 127 judges whether identical the fed back the result corresponding with main frame number of the first authorization information and the second authorization information for receiving network authentication center.
Further, this terminal also comprises: authentication module 17, after receiving the communication interaction request initiated by calling number of calling terminal at terminal called, judge whether described calling number is credible number according to the number information pre-set, to determine whether to verify the legitimacy of calling number.
The function of each module and handling process in the terminal that the present embodiment provides, can see the embodiment of the method shown in above-mentioned Fig. 3, and it realizes principle and technique effect is similar, repeats no more herein.
Fig. 7 is the structural representation of a phone number verification system of the present invention embodiment, as shown in Figure 7, this system comprises: calling terminal 1, terminal called 2 and network authentication center 3, wherein, terminal called 2 can adopt the terminal provided in the embodiment of the present invention, and calling terminal 1 and network authentication center 3 are the calling terminal and network authentication center that relate in illustrated embodiment of the present invention.
The function of each module and handling process in the phone number verification system that the present embodiment provides, can see the embodiment of the method shown in above-mentioned, and it realizes principle and technique effect is similar, repeats no more herein.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (7)

1. a phone number verification method, is characterized in that, comprising:
Terminal called receives the communication interaction request that calling terminal is initiated by calling number;
Whether described terminal called is identical to verify that whether described calling number is legal according to the first authorization information and the second authorization information, if it is legal to verify, then carry out communication interaction with described calling terminal, wherein, to be network authentication center store according to locality described first authorization information, the KI corresponding with described calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the described second authorization information KI that to be described calling terminal store according to locality and authentication arithmetic carry out calculating generation to described random sequence code;
Described whether identical to verify that whether described calling number is legal according to the first authorization information and the second authorization information, wherein, to be network authentication center store according to locality described first authorization information, the KI corresponding with described calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the described second authorization information KI that to be described calling terminal store according to locality and authentication arithmetic carry out comprising of calculating generation to described random sequence code:
Described terminal called sends the identification authentication request message comprising a random sequence code to described calling terminal, the KI stored according to locality for described calling terminal and authentication arithmetic carry out calculating generation second authorization information to described random sequence code;
Described terminal called receives identification authentication response message that described calling terminal returns, that comprise described second authorization information;
Described terminal called sends verification process request message to described network authentication center, described verification process request message comprises: described second authorization information, described random sequence code and described calling number, store according to locality for described network authentication center, the KI corresponding with described calling number and authentication arithmetic carry out calculating generation first authorization information to described random sequence code;
Described terminal called receives described network authentication center and judges described first authorization information fed back with described calling number corresponding the result whether identical with described second authorization information.
2. phone number verification method according to claim 1, is characterized in that, after the communication interaction request that described terminal called reception calling terminal is initiated by calling number, described method also comprises:
Described terminal called sends mark to described calling terminal and obtains request message;
Described terminal called receives the international mobile subscriber identity that described calling terminal returns, and sends the mark authentication request message comprising described international mobile subscriber identity and described calling number to described network authentication center;
Described terminal called receives the mark authentication response message that described network authentication center returns, and determines whether to verify the legitimacy of described calling number.
3. phone number verification method according to claim 1, is characterized in that, after the communication interaction request that described terminal called reception calling terminal is initiated by calling number, described method also comprises:
According to the number information pre-set, described terminal called judges whether described calling number is credible number, to determine whether to verify the legitimacy of described calling number.
4. a terminal, is characterized in that, comprising:
Receiver module, for receiving the communication interaction request that calling terminal is initiated by calling number;
Authentication module, for whether identical to verify that whether described calling number is legal according to the first authorization information and the second authorization information, wherein, to be network authentication center store according to locality described first authorization information, the KI corresponding with described calling number and authentication arithmetic carry out calculating to a random sequence code and generate, and the described second authorization information KI that to be described calling terminal store according to locality and authentication arithmetic carry out calculating generation to described random sequence code;
Communication module, if legal for verifying, then carries out communication interaction with described calling terminal;
Described authentication module comprises:
Second transmitting element, for sending the identification authentication request message comprising a random sequence code to described calling terminal, the KI stored according to locality for described calling terminal and authentication arithmetic carry out calculating generation second authorization information to described random sequence code;
Second receiving element, for receiving identification authentication response message that described calling terminal returns, that comprise described second authorization information;
Request unit, for sending verification process request message to described network authentication center, described verification process request message comprises: described second authorization information, described random sequence code and described calling number, store according to locality for described network authentication center, the KI corresponding with described calling number and authentication arithmetic carry out calculating generation first authorization information to described random sequence code;
Second judging unit, judges described first authorization information fed back with described calling number corresponding the result whether identical with described second authorization information for receiving described network authentication center.
5. terminal according to claim 4, is characterized in that, also comprises:
Sending module, obtains request message for sending mark to described calling terminal;
Processing module, for receiving the international mobile subscriber identity that described calling terminal returns, and sends the mark authentication request message comprising described international mobile subscriber identity and described calling number to described network authentication center;
Judge module, for receiving the mark authentication response message that described network authentication center returns, determines whether to verify the legitimacy of described calling number.
6. terminal according to claim 4, is characterized in that, also comprises:
Authentication module, after receiving the communication interaction request initiated by calling number of calling terminal at terminal called, judge whether described calling number is credible number according to the number information pre-set, to determine whether to verify the legitimacy of described calling number.
7. a phone number verification system, is characterized in that, comprising: calling terminal, terminal called and network authentication center, wherein, described terminal called be as arbitrary in claim 4-6 as described in terminal.
CN201210256806.8A 2012-07-23 2012-07-23 phone number verification method, system and terminal Active CN102802150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210256806.8A CN102802150B (en) 2012-07-23 2012-07-23 phone number verification method, system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210256806.8A CN102802150B (en) 2012-07-23 2012-07-23 phone number verification method, system and terminal

Publications (2)

Publication Number Publication Date
CN102802150A CN102802150A (en) 2012-11-28
CN102802150B true CN102802150B (en) 2015-11-25

Family

ID=47201094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210256806.8A Active CN102802150B (en) 2012-07-23 2012-07-23 phone number verification method, system and terminal

Country Status (1)

Country Link
CN (1) CN102802150B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486761A (en) * 2014-12-04 2015-04-01 深圳市中兴移动通信有限公司 Terminal communication method and device
CN105790942A (en) * 2014-12-17 2016-07-20 中兴通讯股份有限公司 Method and system for secure call and terminals
CN104601783A (en) * 2015-01-27 2015-05-06 深圳市中兴移动通信有限公司 Communication processing method based on subjective judgment, mobile terminal and system
CN111328073B (en) * 2018-12-14 2023-08-15 中国移动通信集团广西有限公司 Method and device for defending risk of No. seven signaling
CN110460610A (en) * 2019-08-19 2019-11-15 中国联合网络通信集团有限公司 Verification method, device, equipment and the storage medium of communicating number
CN114172674B (en) * 2020-08-21 2023-11-10 中国移动通信集团重庆有限公司 Abnormal data detection method, device, equipment and computer medium
CN114599033B (en) * 2022-05-10 2022-08-16 中移(上海)信息通信科技有限公司 Communication authentication processing method and device
CN115086489A (en) * 2022-06-30 2022-09-20 深圳电器公司 Terminal identity identification method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021464A2 (en) * 2000-09-11 2002-03-14 Nokia Corporation System and method of bootstrapping a temporary public -key infrastructure from a cellular telecommunication authentication and billing infrastructure
CN1835626A (en) * 2005-03-15 2006-09-20 北京信威通信技术股份有限公司 Power authentication system and method of SCDMA communicating system
CN1867186A (en) * 2006-02-14 2006-11-22 华为技术有限公司 Method and apparatus for realizing user admittance control in wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002021464A2 (en) * 2000-09-11 2002-03-14 Nokia Corporation System and method of bootstrapping a temporary public -key infrastructure from a cellular telecommunication authentication and billing infrastructure
CN1835626A (en) * 2005-03-15 2006-09-20 北京信威通信技术股份有限公司 Power authentication system and method of SCDMA communicating system
CN1867186A (en) * 2006-02-14 2006-11-22 华为技术有限公司 Method and apparatus for realizing user admittance control in wireless communication system

Also Published As

Publication number Publication date
CN102802150A (en) 2012-11-28

Similar Documents

Publication Publication Date Title
CN102802150B (en) phone number verification method, system and terminal
CN107733852B (en) A kind of auth method and device, electronic equipment
WO2015158114A1 (en) Intelligent communication method, terminal and system
CN109345245B (en) Short message verification method, device, network and storage medium based on block chain
TW201719475A (en) Identity authentication method, system, business server and authentication server
CN103260140B (en) A kind of information filtering method and system
JP6880055B2 (en) Message anti-counterfeiting implementation method and device
US20070201443A1 (en) VoIP caller authentication by voice signature continuity
CN103905194B (en) Identity traceability authentication method and system
CN105119877A (en) Voice verification method, device and system
CN111949958B (en) Authorization authentication method and device in Oauth protocol
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN111404695B (en) Token request verification method and device
CN111931209B (en) Contract information verification method and device based on zero knowledge proof
US20200220837A1 (en) System and method to use a mobile number in conjunction with a non-telephony internet connected device
US20090305669A1 (en) Transaction method between two servers including a prior validating step using two mobile telephones
CN104980899A (en) Communication method and system for mobile terminal, mobile terminal and server
US20150180851A1 (en) Method, device, and system for registering terminal application
CN104901808A (en) Voiceprint authentication system and method based on time type dynamic password
CN102984335A (en) Identity authentication method, equipment and system for making fixed-line call
CN103428376B (en) Junk call preventing method, device and system
CN106878280A (en) The method and apparatus of user authentication, the method and apparatus for obtaining user number information
KR20120061022A (en) Method and System for Authenticating Caller of Voice Network using Data Network, Caller Side Device, Receiver Device and Program
KR20220038704A (en) Techniques for Call Authentication
CN109327475B (en) Multi-layer identity authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant