A kind of method of setting up safely contact relationship
Technical field
The present invention relates to the communications field in the mobile Internet, particularly in communication software, set up the method for contact relationship.
Background technology
The fast development of smart mobile phone and mobile Internet is so that the communication software on the mobile phone has also obtained cellphone subscriber's popular welcome.Compare with instant communication software such as MSN, Skype etc. on the computer, mobile communication software can take full advantage of the existing associated person information in the telephonic communication record, thus correspondence network that can the Rapid Establishment acquaintance.For example, the rice of millet mobile phone (referring to http://www.xiaomi.com/) merely software (referring to http://www.miliao.com/) just can utilize the telephonic communication record of having stored in the mobile phone, sets up corresponding contact relationship in the software for the user chats at rice.
But, this class software requirement cellphone subscriber in the mobile phone (chats the mobile communication software of little letter software and so on of software, company of Tengxun to communication software such as rice, referring to http://weixin.qq.com) server upload local phone associated person information, which contact person has also used the communication software of same service provider in its telephonic communication record so that the help user searches, thereby sets up the contact relation.This means that server will grasp all registered users' telephonic communication record content, will be very large personal secrets hidden danger for the user.For example, the staff of server might reveal user's address list information in violation of rules and regulations, betray and make profit, thus the infringement user benefit.
Summary of the invention
In view of this, the invention provides and a kind ofly set up the method for contact relationship with anonymous information, both can directly utilize the telephonic communication in the mobile phone to record to set up contact relationship, can avoid again uploading and disclosure risk of I and associated person information.
Concrete methods of realizing is divided into user's registration and contact relationship is set up two steps, wherein:
User's registration: the user carries out irreversible scrambled with my contact details, encodes with this and registers to the communication software server, does not directly register my actual contact details;
Contact relationship is set up: the user is with the some or all of contact person in my the telephonic communication record, according to carrying out irreversible scrambled with the same method of registration process, coding result is committed to the communication server, whether the communication server exists the identical registrant that encodes therewith by coded query, if exist then set up correspondence between user and the registrant that inquires.
Described my contact details, for the general contacts information field according to predetermined format combination.
Described in person contact details comprise name and telephone number, can also comprise the personal information such as Email, address.
Described irreversible scrambled can be hash algorithm (such as MD5), can also be other algorithms, such as CRC32, and SHA, HMAC.
Describedly between user and the registrant that inquires, set up correspondence, can comprise both sides' request and reception process.Either party can be used as the initiator, and the opposing party is as reciever.Wherein, initiator coding is sent to reciever, and reciever is encrypted coding with the contact person in the local communication record, by with initiator's coding relatively come the query originator identity.
In order to improve the speed of query originator identity, can in advance the associated person information in the local communication record be encrypted coding and preservation.
According to an aspect of the present invention, a kind of method of setting up the secure communication association between mobile device is provided, identical mobile device communication application program all has been installed in the described mobile device, and described mobile device communication application program is used for communicating at mobile communications network;
Described method comprises the steps:
Described mobile device sends user's registration information to the communication server of supporting described mobile device communication application program, and described user's registration information carries out transcoding, coding transform with the first information in the described mobile device with the first coded system and produces;
The described communication server receives described user's registration information, and described user's registration information is registered in the described communication server as the account of described mobile device;
Described mobile device carries out transcoding, coding transform with the some or all of associated person information in the local communication record according to described the first coded system, generates and encrypts associated person information, then described encryption associated person information is sent to the described communication server;
The described communication server receives after the described encryption associated person information, described encryption associated person information is inquired about, if inquire and store the registrant information identical with encrypting associated person information in the described communication server, then to user's mobile device and the registrant's identical with encrypting associated person information who has inquired the mobile device message of giving notice;
Described each mobile device with identical encryption associated person information receives after the described notification message that the described communication server sends, and determines whether set up correspondence with other each mobile device with identical encryption associated person information.
According to an embodiment of the invention, described the first coded system is the irreversible coding mapping algorithm.
According to an embodiment of the invention, described the first coded system is to adopt hash algorithm or CRC32 algorithm or SHA algorithm or hmac algorithm to encode.
According to an embodiment of the invention, the described first information comprises user's contact details.
According to an embodiment of the invention, described contact details are one or more information in user's the name, telephone number, contact email addresses, contact person address.
According to an embodiment of the invention, the first mobile device in the described mobile device with identical encryption associated person information, send the request of setting up correspondence to the second mobile device with identical encryption associated person information, comprise the user's registration information of the first mobile device in the described request.
According to an embodiment of the invention, described the second mobile device receives after the described request, associated person information in the local communication record in the second mobile device is carried out conversion according to the first coded system, obtain the second mobile device local linkages people enciphered message.
According to an embodiment of the invention, in advance the associated person information in the local communication record of described first, second mobile device is carried out conversion according to described the first coded system, obtain respectively the local linkages people enciphered message in first, second mobile device, and the local linkages people enciphered message that obtains is kept at respectively in described first, second mobile device.
According to an embodiment of the invention, user's registration information and the second mobile device local linkages people enciphered message of the first mobile device of comprising in the described request are compared, if identical, then determine whether allow to set up correspondence with the first mobile device by the second mobile device.
Description of drawings
Fig. 1 is a kind of method flow diagram of setting up safely contact relationship.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, referring to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
Embodiment 1
The mobile communication software that present embodiment hypothesis user uses is little letter software.The irreversible encryption that the user registers employing is encoded to the MD5 algorithm.
According to embodiments of the invention, the user is when using little letter, to register first, during registration, at first user profile (including but not limited to address name+phone number) is encrypted coding by irreversible hash algorithm, be " Zhang San " such as address name, cell-phone number is 186xxxx1122, then user profile is " Zhang San 186xxxx1122 ", encrypt generation 16 bit encryption results " 4422F5D085BEABF9 " by the MD5 hash algorithm, the user registers as account by this encrypted result.
After registration was finished, the user logined little letter with above-mentioned 16 bit encryption results " 4422F5D085BEABF9 ".For convenient on little letter with people's communication exchanges of being familiar with, the registered user can be with the some or all of contact person in my the telephonic communication record, according to carrying out irreversible scrambled with the same method of registration process, coding result is committed to little telecommunications services device.Such as, such as the people Li Si that is related in Zhang San's cell phone address book (Zhang San and the Li Si contact person for being familiar with, both sides all have the other side's phone), Li Si's phone is 189xxxx2311, then adopts the scrambled value of contact person Li Si behind the same cipher mode scrambled to be " 50DACB873D1691E1 ".
Same, if Li Si also uses little letter, the cipher mode during according to registration, then Li Si's account value of registering little letter also is " 50DACB873D1691E1 ".After Zhang San submits address book contact to, little telecommunications services device can be inquired about one by one by these scrambled tabulations of uploading, whether inquiry exists the identical registrant that encodes therewith, if find identical registrant (as found registration artificial " 50DACB873D1691E1 "), then between user and the registrant that finds, set up correspondence.Concrete steps are as follows:
When whois lookup when the registrant of same-code is arranged, server to the user (such as register account number is: 4422F5D085BEABF9, be Zhang San, call Zhang San in the following text) and the registrant who finds (such as register account number be: 50DACB873D1691E1, be Li Si, call Li Si in the following text) send simultaneously message, inform to have the contact person who is familiar with in the little letter of both sides, and whether inquiry sets up correspondence (as showing the contact list information that finds by the window dialog box).
2. among the both sides either party sends the request set up correspondence to the opposing party, sends request such as Zhang San to Li Si, can be that Zhang San's coding (being register account number 4422F5D085BEABF9) sends to Li Si with the initiator in the request of sending.
3. recipient Li Si receives the coding (4422F5D085BEABF9) that initiator Zhang San sends, and the contact person in recording with local communication compares one by one.During comparison, same cipher mode generates scrambled when first the contact person in the local communication record being adopted with registration, and then, the scrambled that the Zhang San's that receives encoded radio and local communication are recorded the contact person compares.When two encoded radios are identical, be expressed as same people, then Li Si can determine that the other side's identity is (as knowing Zhang San's essential information according to comparative result, name, phone etc.), Li Si can be on little letter remarks contact person's name, by set up acquaintance's correspondence with upper type.
Embodiment 2
The mobile communication software that present embodiment hypothesis user uses is chatted as rice, and the irreversible algorithm that the user registers employing is the SHA algorithm.
When the user uses rice to chat software, register first.During registration, by the SHA algorithm user profile (name+cell-phone number) being encrypted the end value that generates uses as register account number, after registration is finished, exchange for convenient people with being familiar with merely communicates at rice, identical cipher mode was encrypted coding when the user can adopt the some or all of contact person in the local communication record with registration.In order to improve the speed of query originator identity, the scrambled tabulation of generation is preserved in this locality, submit to simultaneously encrypted result tabulation to rice to chat server.
After the submission, rice merely server can be inquired about according to the value in the scrambled tabulation, and whether inquiry exists the registrant information identical with value in this tabulation.If have, then send message to both sides, notify both sides at rice familiar contact person merely to be arranged, any one party among the both sides can send communication request to the opposing party, the register account number of transmit leg can be sent to the recipient in the described communication request.
After the recipient receives the register account number of transmit leg, this account and contact person's encrypted list of local storage are compared item by item, if identical account is arranged, then the recipient can determine the identity of transmit leg, and then sets up the correspondence network of being familiar with the contact person.
The above is preferred embodiment of the present invention only, is not for limiting protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of doing, be equal to and replace and improvement etc., all should be included within protection scope of the present invention.