CN104284031B - Speech communication method, communication terminal and server - Google Patents
Speech communication method, communication terminal and server Download PDFInfo
- Publication number
- CN104284031B CN104284031B CN201410617675.0A CN201410617675A CN104284031B CN 104284031 B CN104284031 B CN 104284031B CN 201410617675 A CN201410617675 A CN 201410617675A CN 104284031 B CN104284031 B CN 104284031B
- Authority
- CN
- China
- Prior art keywords
- user
- virtual
- call request
- communication
- call
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a speech communication method, a communication terminal and a server, wherein the speed communication method comprises the following steps: receiving a call request from a first client via a virtual number; judging whether a second client corresponding to the virtual number calls the first client, and sending the call request to the second client if the second client calls the first client; and refusing the call request from the first client when the second client does not call the first client. According to the scheme, both the information safety of communication clients and communication convenience can be guaranteed.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of voice communication method, communication terminal and server.
Background technology
Since GSM is born from the eighties in 20th century, the fashionable whole world is that hundreds of millions cellphone subscribers bring incomparably
Facility, hundreds of millions wealth that have been social creativity.But, any technology also brings along some and bears while offering convenience
The impact in face.GSM is no exception, and one of negative effect is harassing call.Mobile phone has single deck tape-recorder, double card
Mobile phone, i.e., can be inserted into one or two subscriber identification cards (SIM) in a mobile phone, fixed per a card correspondence one
Phone number, voice communication is carried out by the phone number with other people.At present, the phone number of user is easy to reveal,
After leakage, it is easy to run into harassing call.The typical behavioural characteristic of of harassing call, dials repeatedly or for a long time and works as
Thing people's phone disturbs its normal work, life, rest or tells about the content that party is unwilling to receive with phone.
Harassing call brings greatly puzzlement to user, in order to prevent harassing call, has there is many specific aims at present
Technology preventing various types of harassing calls.For example, calling subscribe dials other users telephone number by IP phone.This
Sample, called subscriber cannot can only see IP (International Protocol, procotol) telephone operator for the master
The virtual-number for making user distribute, any other phone number actual with the calling subscribe cannot be got per family, so
Can just avoid the actual phone number of the calling subscribe from revealing, protect user information safety.
But, because other users cannot know the actual phone number of the calling subscribe, including called subscriber, and its
His user dials the virtual-number and is not turned on to calling subscribe, therefore other users can be caused to use with the caller
Householder is dynamic by phone contact, therefore can bring very big inconvenience to the information communication of user.
The content of the invention
The embodiment of the present invention solve or the technical problem that at least partly solves be how to take into account communication user information security and
The convenience of communication.
To solve the above problems, a kind of voice communication method is embodiments provided, methods described includes:
Receive the call request via virtual-number from first user;
Judge whether the corresponding second user of the virtual-number once carried out call with the first user;
When call was once carried out, to the second user call request is sent;
When call was not carried out constantly, refuse the call request of the first user.
Optionally, when the reception is from call request of the first user via virtual-number, also include:
Obtain the communication pattern set by the second user;
When the communication pattern set by the second user is secret, then the judgement virtual-number correspondence is performed
Second user whether once carried out with the first user operation conversed.
Optionally, the voice communication method also includes:When the communication pattern set by the second user is open,
Call request is sent to the second user.
Optionally, when the communication pattern set by the second user is open, also include:Obtain the second user
Effective existence time information of the set virtual-number, when it is determined that the virtual-number is in effective existence time section
When, perform the operation that call request is sent to the second user.
Optionally, when the communication pattern set by the second user is open, exhaling sending to the second user
Before crying request, also include:
Obtain whether the second user opens mask pattern to the first user;
If opening mask pattern to the first user, cancelling described calling to second user transmission please
The operation asked;
If not opening mask pattern to the first user, perform it is described send the calling to the second user please
The operation asked.
Optionally, the virtual-number is bound with least one telephone number of the second user.
Optionally, the virtual-number includes at least one, each default groups of users of virtual-number correspondence.
To solve the above problems, the embodiment of the present invention additionally provides another kind of voice communication method, and methods described includes:
Receive the call request via virtual-number from first user;
Judge whether second user once carried out call using the virtual-number with the first user;
When it is determined that once carrying out call, the call request of the first user is received;
When it is determined that do not carried out call constantly, refusing the call request of the first user.
Optionally, when receiving from call request of the first user via virtual-number, also include:
Obtain the communication pattern set by the second user;
When the communication pattern set by the second user is secret, then the judgement virtual-number correspondence is performed
Second user whether once carried out with the first user operation conversed.
Optionally, the voice communication method also includes:When the communication pattern set by the second user is open,
Then perform the operation of the call request for receiving the first user.
Optionally, when the communication pattern set by the second user is open, the reception described first is being performed
Before the operation of the call request of user, also include:
Judge whether second user opens mask pattern to the first user;
If opening mask pattern to the first user, refuse the call request of the first user;
If not opening mask pattern to the first user, the call request for receiving the first user is performed
Operation.
Optionally, when the communication pattern of the preserved ID is open, also include:Obtain described second to use
Effective existence time information of the virtual-number set by family, when it is determined that the virtual-number is in effective existence time section
When, perform the operation of the call request for receiving the first user.
Optionally, the virtual-number is bound with least one telephone number of the second user.
Optionally, the virtual-number includes at least one, each default groups of users of virtual-number correspondence.
To solve the above problems, the embodiment of the present invention additionally provides a kind of server, and the server includes:
First receiving unit, is suitable to receive the call request from first user via virtual-number;
First judging unit, is suitable to judge whether the virtual-number correspondence second user is once carried out with the first user
Cross call;
First performance element, is suitable to when first judging unit determination once carried out call, to the second user
Call request is sent, when call was not carried out, refuses the call request of the first user.
Optionally, the server also includes:First acquisition unit, is suitable to obtain the communication set by the second user
Pattern;First judging unit, is suitable to work as the communication set by the second user that the first acquisition unit gets
When pattern is secret, the operation for once carrying out conversing is judged whether described in execution.
Optionally, first performance element is further adapted for being got set by the second user in the first acquisition unit
When the communication pattern put is open, the operation that call request is sent to the second user is performed.
Optionally, the server also includes:First verification unit, is suitable to the institute got when the first acquisition unit
State communication pattern set by second user for it is open when, obtain the effective of the virtual-number set by the second user
Existence time;
First performance element is further adapted for determining the virtual-number in the presence of effectively in first verification unit
Between in section when, perform the operation that call request is sent to the second user.
Optionally, the server also includes:Second acquisition unit, is suitable to be got in the first acquisition unit described
When communication pattern set by second user is open, obtain whether the second user is that the first user opens shielding mould
Formula;First performance element is further adapted for getting the second user unlatching for the described first use in the second acquisition unit
When mask pattern is opened at family, the operation that call request is sent to the second user is cancelled, obtained described second
Unit get the second user not to the first user open mask pattern when, perform it is described to the second user send out
Send the operation of the call request.
To solve the above problems, the embodiment of the present invention additionally provides a kind of communication terminal, and the communication terminal includes:
Second receiving unit, is suitable to receive the call request from first user via virtual-number;
Second judging unit, is suitable to judge whether second user is once carried out using the virtual-number with the first user
Cross call;
Second performance element, is suitable to when it is determined that once carrying out call using the virtual-number, receive described first and use
The call request at family;When it is determined that do not carried out call constantly using the virtual-number, refusing the calling of the first user
Request.
Optionally, the communication terminal also includes:3rd acquiring unit, is suitable to obtain logical set by the second user
Letter pattern;Second judging unit, is suitable to the 3rd acquiring unit and gets communication mould set by the second user
When formula is secret, execution is described to judge whether the second user was once carried out using the virtual-number with the first user
The operation of call.
Optionally, second performance element is further adapted for being got set by the second user in the 3rd acquiring unit
When the communication pattern put is open, the operation of the call request for receiving the first user is performed.
Optionally, the communication terminal also includes:Second verification unit, is suitable to when the 3rd acquiring unit gets institute
State communication pattern set by second user for it is open when, obtain the effective of the virtual-number set by the second user
Existence time;Second performance element is further adapted for determining the virtual-number in the presence of effectively in second verification unit
Between in section when, perform the operation for receiving the call request that the first user sends.
Optionally, the communication terminal also includes:4th acquiring unit, is suitable to get institute in the 3rd acquiring unit
When the communication pattern stated set by second user is open, obtain whether the second user opens shielding to the first user
Pattern;Second performance element is further adapted for getting the second user to the first user in the 3rd acquiring unit
When opening mask pattern, the operation of the call request of the refusal first user is performed, got in the 3rd acquiring unit
When the second user does not open mask pattern to the first user, the behaviour of the call request for receiving the first user is performed
Make.
Compared with prior art, the technical scheme of the embodiment of the present invention has advantages below:
When first user calls second user via virtual-number, by judging that the corresponding second user of virtual-number is
It is no to carry out call with the first user, when the two carried out call, the call request of the first user is just received, build
Vertical call, and if not carried out call, then refuse the call request of the first user, thus such scheme can be realized
Once by the clawback of words user, and not by the user of words, even if obtaining the virtual-number, also cannot be with the virtual-number
Corresponding second user carries out voice communication, in protection communication user information security, it is to avoid while making nuisance calls, can improve
The convenience of communication.
Further, it is secret in the communication pattern set by the second user by arranging different communication patterns
When, the user for being just possible to carry out voice communication with the second user is limited to once via the virtual-number by words
User, and if communication pattern is open, then any other be with directly calling per family the second user, so that user
Can be according to actual different needs, it is allowed to which every other user's calling or the user for being only limitted to call initiate calling, because
And the convenience for communicating can be further improved while communication user information security is protected, meet the different needs of user.
Further, by effective existence time of setting virtual-number, after the related needs of user meet, institute is nullified
State virtual-number or disable the virtual-number, then other users cannot call the user, thus can be in convenient user
While communication, it is to avoid make nuisance calls.
Further, when the communication pattern set by the second user is open, user can select as needed
Whether mask pattern is opened, if opening mask pattern to first user, the first user cannot still call described second
User, thus while telex network convenience is improved, it is to avoid make nuisance calls.
Additionally, being needed to arrange multiple virtual-numbers according to difference, it is easy to user to be needed using different void according to different
Intend number to be communicated from different users so that user can know the calling mesh of calling party according to virtual-number
, it is easy to user to carry out telecommunication management.
Description of the drawings
Fig. 1 is a kind of voice communication method flow chart in the embodiment of the present invention;
Fig. 2 is another kind of voice communication method flow chart in the embodiment of the present invention;
Fig. 3 is a kind of voice communication system structural representation in the embodiment of the present invention;
Fig. 4 is a kind of server architecture schematic diagram in the embodiment of the present invention;
Fig. 5 is another kind of server architecture schematic diagram in the embodiment of the present invention;
Fig. 6 is another kind of voice communication method flow chart in the embodiment of the present invention;
Fig. 7 is another voice communication method flow chart in the embodiment of the present invention;
Fig. 8 is a kind of communication terminal structural representation in the embodiment of the present invention;
Fig. 9 is another kind of communication terminal structural representation in the embodiment of the present invention.
Specific embodiment
At present, privacy of user such as telephone number etc. is particularly easy to reveal, and such as user dials after certain telephone number, holds very much
Easily just by called subscriber outside the 3rd people obtain, the 3rd people is obtained after the telephone number of the user, calls the user, can
The unwanted service of user can be promoted to user is possibly even used for other illegal purposes by the acquired telephone number, gives
User causes unnecessary puzzlement.
To protect user information safety, as it was previously stated, in prior art, user can dial other users by IP phone
Telephone number, so, called subscriber can only see IP phone operator for calling subscribe distribution virtual-number, any other
With the telephone number of the calling subscribe cannot be obtained per family, thus the telephone number of the calling subscribe can be avoided from revealing.
However, so, including the every other user including called subscriber, cannot be by dialing the IP phone operator point
The virtual-number matched somebody with somebody can bring very big inconvenience carrying out actively contacting with the calling subscribe to the information communication of user.
To solve the above problems, in the embodiment of the present invention, can pre-build telephone number that user actually used with
The corresponding relation of virtual-number, for example, second user is that the telephone number that oneself used binds a virtual-number, when receiving
From during call request of the first user via virtual-number, judge the corresponding second user of the virtual-number whether once with institute
Stating first user carried out call, when call was once carried out, just received the call request of the first user, otherwise, refusal
The call request of the first user.Such that it is able to avoid not carrying out making nuisance calls for the third party user of call.
Specifically, if the second user in two telephone subscribers calls first user using the virtual-number,
Shown by first user side be then the second user telephone number corresponding to virtual-number.Afterwards, when described first
When user calls the second user, the ID of the entrained second user for being called is described second in call request
Virtual-number corresponding to the telephone number of user, because before second user once called the first user, then to institute
State second user and send call request, realize the call of first user and second user, and if its outside second user
His user calls the first user using the virtual-number, then cannot be successful, thus such scheme can be realized using householder
The dynamic called subscriber's clawback for calling, and other users then cannot be contacted by the virtual-number and the second user, from
And can be in protection communication user information security, it is to avoid while making nuisance calls, improve the convenience of communication.
It should be noted that the first user in the embodiment of the present invention is only used for the different phone of differentiation with second user using
Family, described " first " and " second " is not intended to represent order or priority etc. and limits.Described first user and second is used
Family two different telephone numbers of correspondence, described two different telephone numbers generally two different communication terminals of correspondence, institute
It can be landline telephone to state communication terminal, or mobile phone etc. can realize the mobile communication terminal of voice communication.Correspondingly,
The telephone number can be fixed telephone number, or phone number.It is understood that in being embodied as, institute
Stating telephone number can also distribute to the number of different voice communication users for other.
It is understandable to enable the above objects, features and advantages of the present invention to become apparent from, below in conjunction with the accompanying drawings to the present invention
Specific embodiment be described in detail.
With reference to Fig. 1, the voice communication method employed in the embodiment of the present invention is discussed in detail below by way of concrete steps.
S101, receives the call request via virtual-number from first user.
If first user is communicated with second user, the messenger of the inquiry such as address list second user can be passed through
Code, is the virtual-number of the second user for having preserved for example, initiates to exhale to the second user by the virtual-number
Cry.
S102, judges whether the corresponding second user of the virtual-number once carried out call with the first user, such as
It is really, then execution step S103;If it is not, then execution step S104.
In being embodied as, the second user can on the server be protected with registered in advance and create a virtual-number
The corresponding relation of the virtual-number and the telephone number of oneself is deposited, in other words, by the virtual-number and the electricity of oneself reality
Words number binding.
For example, message registration, call note can be preserved on the server of voice communication system or in independent database
ID of the record comprising calling and called both sides, if by searching matching, the ID for finding the side that there is message registration is
The virtual-number of second user, the ID of the opposing party for first user actual phone number or virtual-number, then can be true
The fixed first user and the second user are by words.For example, the ID of calling party is second user in message registration
Virtual-number, the ID of callee is the actual phone number or virtual-number of first user, then can determine that described the
Two users once called the first user, otherwise, then can determine that the second user had not called the first user.
S103, to the second user call request is sent.
In the case where second user and second user once carried out call, then the logical of first user and second user is set up
Letter connection, realizes the voice communication of first user and second user.
S104, refuses the call request of the first user.
In the case where second user and first user did not carry out call, then the calling for refusing the first user please
Ask.Thus, above-mentioned voice communication method can avoid the third-party electricity outside the user that the second user was once called
Words harassing and wrecking.
To more fully understand those skilled in the art and realizing the present invention, below in conjunction with one kind that said method is suitable for
Illustrate as a example by voice communication system.As shown in figure 3, voice communication system 300 includes first user 301, second user 302
With server 303.In being embodied as, can preserve on server 303 in advance the telephone number that used of user with it is virtual
The corresponding relation of number.For example, the second user 302 uses the second communication terminal and the first use using the first communication terminal
Family 301 carries out voice communication.In an embodiment of the present invention, first communication terminal is mobile phone, and the mobile phone can be single
Card hand machine, or the mobile telephone with multiple cards such as double card, the second user 302 can be by a mobile phone enabling on the mobile phone
Number arranges a corresponding virtual-number, it is also possible to arrange multiple corresponding virtual-numbers.If being enabled on the mobile phone
For multiple, the second user 302 can also be that all phone numbers for being enabled or part phone number are distinguished to phone number
Corresponding virtual-number is set, is that the virtual-number set by each phone number can be with identical, it is also possible to be different.
Additionally, it will be appreciated by persons skilled in the art that Mobile phone card can be inserted different communication terminals by user, because
And telephone number is not unique fixed with the relation of communication terminal, but under normal circumstances, in a longer time section,
The usual communication terminal of user uses relatively-stationary telephone number, unless communication terminal is lost or damaged, and renewal is changed
For situations such as, just can reconfigure a different communication terminal for the telephone number.Thus, it is under normal conditions, above-mentioned
First user 301 and second user 302 in voice communication system corresponds to first user 301 and second user 302 is used
Communication terminal, i.e. the first communication terminal and the second communication terminal.
In the examples below, illustrate so that the mobile phone of the second user 302 is as single-card mobile phone as an example.Described second
User 302 arranges a corresponding virtual-number for the phone number of the mobile phone.
Second user 302 can be virtual for the phone number application one in advance by the approach such as internet or phone
Number, so, the phone number that the second user 302 can be set up on server 303 is corresponding with the virtual-number
Relation, will the phone number and virtual-number binding.Afterwards, if second user 302 is by the phone number or virtual
During the phone number of number call first user 301, what is shown on the mobile phone of first user 301 is the second user
Virtual-number corresponding to 302 phone number, rather than the phone number of second user 302, therefore, first user 301 is only capable of
Obtain the virtual-number of the second user 302.Correspondingly, this message registration, message registration can be preserved on server 303
The ID of middle callee can be the phone number of the first user 301, if first user 301 is also the hand of oneself
Machine number is provided with if corresponding virtual-number, and the ID of callee can also be the virtual-number of first user 301,
And the ID of calling party is then the virtual-number of the second user 302.Afterwards, if first user 301 need actively and
Second user 302 carries out voice communication, then can dial the virtual-number of the second user 302, and server 303 is by inquiry
The preserved message registration of matching, it is found that second user 302 once called the first user 301, then use to described second
Family 302 sends call request, the communication connection set up between the first user 301 and second user 302.And if by looking into
Message registration is ask, it is found that second user 302 had not called the first user 301, then refuse the calling of the first user
Request.
In being embodied as, above-described embodiment can also be extended or be optimized.For example, in order in protection user profile
While safe, preferably facilitate telex network, following embodiment can also be adopted.
Voice communication method flow chart with reference to shown in Fig. 2, is used below in conjunction with Fig. 3 with server and first user and second
The information exchange at family is described in detail, it is to be understood that in being embodied as, except server, it would however also be possible to employ other
The communication equipment of voice communication in the embodiment of the present invention, such as switch device or base station equipment etc. can be realized.
S201, receives the call request via virtual-number from first user.
The virtual number of the communicating number comprising the first user and the second user for being called in the call request
Code.If first user initiates calling by the virtual-number for oneself being created, the communicating number of the first user is institute
State virtual-number.
When the virtual-number corresponding to the telephone number that the communicating number of the second user is the second user, hold
Row step S202, otherwise, can carry out voice communication, i.e. execution step S204 according to existing voice communication method.
S202, obtains the communication pattern set by the second user, when the communication pattern set by the second user
For secret when, execution step S203;When the communication pattern set by the second user for it is open when, then execution step S204.
S203, judges whether the second user once called the first user by the virtual-number;If it is,
Then execution step S204;Otherwise, execution step S205.
S204, to the second user call request is sent.
S205, refuses the call request of the first user.
In above-described embodiment, by arranging different communication patterns, it is in the communication pattern set by the second user
During secret, the user for being just possible to carry out voice communication with the second user is limited to second user once via described virtual
The user that number call is crossed, and if the communication pattern set by the second user is open, then any other is used and per family may be used
Directly the second user is called via the virtual-number, so, second user can be according to actual difference needs, Neng Goujie
The call request that any user sends is received, or is only limitted to user's initiation calling that the second user was called, thus can
While communication user information security is protected, further to improve the convenience of communication, the different needs of user are met.
It has been investigated that, user exists and the demand for obtaining more more opening imformations is wished within a period of time, and upper
After stating need satisfaction, user then wishes to avoid being disturbed.For example, user is buying house, renting a house, is selecting school, obtains travel information
During, except the advisory organization actively with some intermediaries or specialty is contacted, it is also desirable to which the personnel of related industry can
Oneself is actively contacted, oneself to provide more information, or more suitably choice.However, when user buying house, rent a house,
School is chosen, or after tourism is come back, then is not desired to answer corresponding promotional information.
Can be that the virtual-number of the user arranges corresponding communication pattern, if institute for such demand of user
State communication pattern for secret when, then in addition to the user for once calling, any other is with per family cannot be by the virtual number
Code is actively associated, and when the communication pattern is open, then any use for being obtained in that the virtual-number per family may be used
Associate.The above embodiment of the present invention can realize protect user information safety while, facilitate user more easily to enter
Row voice communication, obtains information openly.
It is to save virtual-number resource in being embodied as, effective existence time can be set for the virtual-number,
By the effective existence time information for obtaining the virtual-number set by the second user, when it is determined that the virtual-number
When in effective existence time section, the operation that call request is sent to the second user is performed.And if described second
User is provided with certain survival period for the virtual-number, or has been logged out the virtual-number, then refuse described first
The call request of user.If the 3rd user outside second user selects the virtual-number to bind the telephone number of oneself,
In an embodiment of the present invention, for the user that the 3rd user had not called, then cannot be joined by the virtual-number
It is tied to the 3rd user.In an alternative embodiment of the invention, the virtual-number is set to privacy mode by the 3rd user, then
For the user that the 3rd user had not called, also the 3rd user cannot be related to by the virtual-number.
In an embodiment of the present invention, second user can in the following way configure and enable virtual-number:By beating
The application app installed on mobile phone is opened, is that the phone number 1 on the mobile phone arranges a corresponding virtual number by application for registration
Code 1, and click enables the virtual-number 1, then the virtual-number 1 can be entered and enable state.Afterwards, second user is to
One user initiates call request, then what the communication terminal side in the first user showed is the virtual-number 1, and first uses
Family and second user can carry out voice call by the virtual-number.After this time conversing, when the first user is thought again
When carrying out voice communication with the second user, you can virtual-number 1 described in clawback, the second user can receive described
The call request of first user, and if other users dial the virtual-number 1, and do not carry out with the second user before
Call is crossed, then cannot put through the second user.Thus second user can in this way be filtered out and can carry out voice
The user of call, reduction is made nuisance calls, protection information safety.
In an alternative embodiment of the invention, can in the following way arrange and enable virtual-number:Mobile phone Default Value
In, can carry and be configured with the function that offer virtual-number service is provided, match some virtual-numbers in advance in network,
Start corresponding virtual-number in mobile phone is arranged, subsequent user can actively dial the user that can be kept in touch, work as reception
During the Client-initiated call request actively dialed to these, you can receive the call request, voice communication is carried out, and such as
Fruit is the user that active call is not crossed, then cannot carry out voice communication with the user by the virtual-number.By upper
The setting stated and the screening mode of active call, can protect the information security of user, reduction to make nuisance calls.
Make nuisance calls to further reduce, above-described embodiment can also be further expanded.For example, when described second
When communication pattern set by user is open, user can also further arrange whether open mask pattern, so, receive
To from call request of the first user via the virtual-number when, if getting the communication mould set by the second user
Formula is open, then further obtain whether the second user opens mask pattern, and does not open screen in the second user
When covering pattern, call request is sent to the second user, and if the second user opens mask pattern, then obtain institute
State the communicating number that second user is shielded, the communication that the communicating number of the first user is shielded with the second user
Number is compared, and when it is determined that the second user does not shield the first user, then sends to the second user and calls
Request, and when it is determined that the second user shields the communicating number of the first user, then cancels described to described
Second user sends the operation of call request, namely the call request for refusing the first user.Such that it is able in communication pattern
For open mode when, it is also possible to a certain extent reduce make nuisance calls, improve Consumer's Experience.
In an alternative embodiment of the invention, user can be a telephone number or multiple phone numbers according to different demands
Code arranges multiple different virtual-numbers, and each virtual-number can be for not being both demand, the default groups of users of correspondence.
For example, user has a double card double standby mobile phone, and two on the double card double standby mobile phone phone number is opened simultaneously
With.If two phone numbers are expressed as:Phone number 1, phone number 2.Then user can be arranged virtually for phone number 1
Number 1, virtual-number 2 and virtual-number 3, are respectively used to purchase house property, student's admission choosing in this period of time of user oneself
Consultation information and the tourism planning after a period of time when selecting school, or the phone number 1 and phone number 2 are distinguished
Simultaneously the virtual-number 1, virtual-number 2 and virtual-number 3 are set, when there is user the virtual-number 1, virtual-number is dialed
2 or during virtual-number 3, according to the setting on the mobile phone phone number 1 or the calling of phone number 2 can be selected to connect, also may be used
Connected with randomly choosing phone number 1 or the calling of phone number 2.
If the user dials a telephone number and seeks advice from the information that house property purchases aspect by virtual-number 1, accordingly
Called subscriber or its subsequently voice communication can be carried out with the user by virtual-number 1 with dealer, meet user and purchase
Demand in terms of house property.Similarly, seek advice from terms of student selects a school if the user dials a telephone number by virtual-number 2
Information, then corresponding advisory organization voice communication can be carried out with it by its disclosed virtual-number 2.The same manner is also suitable
The situation of travel information is seeked advice from by virtual-number 3 in user.In being embodied as, user, can be advance before calling
Select to initiate call request after corresponding virtual-number again, when call request is received, it is also possible to according to call request institute pin
To virtual-number judge the purpose substantially and purpose of the call request, further facilitate user.
It is corresponding to above-mentioned voice communication method below to more fully understand those skilled in the art and realizing the present invention
Server architecture describes in detail, and with reference to Fig. 4, server 400 can include following part:
First receiving unit 401, is suitable to receive the call request from first user via virtual-number;
First judging unit 402, is suitable to judge whether the corresponding second user of the virtual-number is once used with described first
Family carried out call;
First performance element 403, be suitable to when first judging unit 402 determine once carried out call when, to described
Two users send call request, when it is determined that not carrying out call, refuse the call request of the first user.
The user's that can avoid not passed through words with the second user using server 400 makes nuisance calls, and can be real
The clawback of the user that the existing second user was once called, thus can improve and use while user information safety is protected
The convenience of family communication.
Additionally, when the first judging unit 402 determines that the communicating number of the second user that the first user is called is institute
When stating second user physical number, directly can send calling to second user from first performance element 404 please
Ask.
In being embodied as, further extension can also be made to the server for realizing voice communication, with reference to Fig. 5 institutes
The structural representation of the server for showing, server 500 is with the difference of server 400, in structure shown in server 400
On the basis of, can also include:First acquisition unit 501, is suitable to obtain the communication pattern set by the second user.
Can be that the virtual-number arranges different communication patterns in being embodied as, in an embodiment of the present invention,
Communication pattern has secret and discloses two kinds, and in another enforcement of the invention, communication pattern has secret, disclosure and forbids calling three
Kind.
First judging unit 402, is suitable to work as set by the second user that the first acquisition unit 501 gets
When the communication pattern put is secret, the operation for once carrying out conversing is judged whether described in execution.
In being embodied as, first performance element 403 is further adapted for being got in the first acquisition unit 501 described
When communication pattern set by second user is open, the operation that call request is sent to the second user is performed.
And if the communication pattern that gets of the first acquisition unit 501 is to forbid during calling, including called subscriber exists
Interior is every other with being contacted with calling subscribe by the virtual-number per family, and correspondingly, described first performs list
Unit 403 is suitable to when the first acquisition unit 501 gets the communication pattern set by the second user to forbid calling,
Refuse the call request of the first user.
In being embodied as, the server can also include the first memory cell 502, be suitable to preserve set by user
Communication mode information.It is understood that the communication mode information set by user can also be not preserved on the server,
And be stored on other communication equipments, when needed, server 500 can from it is described save communication mode information other
Obtain on communication equipment.
In being embodied as, in order to protect user information safety, server 500 to may also include the first verification unit 503, fit
In when the communication pattern set by the second user that the first acquisition unit 501 gets is open, obtain described
Effective existence time of the virtual-number set by second user;Correspondingly, first performance element 403 is further adapted for
When first verification unit 503 determines that the virtual-number is in effective existence time section, perform and sent out to the second user
Send the operation of call request.
User can arrange effective existence time for the virtual-number, when effective existence time is reached, can be by institute
State virtual-number to switch to privacy mode from open mode or forbid call model, it is also possible to nullify the virtual-number, use
Family can be configured as needed.
In an embodiment of the present invention, as shown in figure 5, server 500 can also include second acquisition unit 504, it is suitable to
When it is open that the first acquisition unit 501 gets the communication pattern set by the second user, described second is obtained
Whether user opens mask pattern to the first user;
First performance element 403 is further adapted for getting the second user to institute in the second acquisition unit 504
When stating first user unlatching mask pattern, the operation that call request is sent to the second user is cancelled, described
Second acquisition unit 504 get the second user not to the first user open mask pattern when, perform it is described to institute
State the operation that second user sends the call request.
By arranging mask pattern so that user is when communication pattern is open mode, it is also possible to shield to a certain extent
Harassing call is covered, can be in the case of open acquisition information, it is also possible to which reduction is made nuisance calls, and improves Consumer's Experience.
In order to take into account the information security and communication facility of communication user, the embodiment of the present invention additionally provides another kind of voice
Communication means, with reference to Fig. 6, specifically may include steps of:
S601, receives the call request via virtual-number from first user.
Communicating number can be divided into physical number and virtual-number corresponding with the physical number.When
The communicating number of the first user institute calling party is the virtual-number corresponding to the telephone number that second user is currently enabled
Afterwards, can be with execution step S602.
S602, judges whether second user once carried out call using the virtual-number with the first user, if
It is, then execution step S603;If it is not, then execution step S604.
S603, receives the call request of the first user.
S604, refuses the call request of the first user.
The present embodiment is can to preserve on communication terminal and itself enable with the difference of aforesaid voice communication method
Telephone number and corresponding virtual-number corresponding relation, so, after using the communication terminal calls a certain user excessively,
Corresponding message registration information can be equally preserved, the message registration information includes that the communication terminal institute calling party's is logical
Signal code (communicating number of the institute calling party can be the actual phone number of the called subscriber, or it is described
The corresponding virtual-number of phone number), so, the communication terminal is when call request is received, however, it is determined that in call request
During the corresponding virtual-number of the telephone number that enabled comprising the communication terminal, the communication terminal can inquire about call note
Whether record, inquiry once called the user, such as first user, if once calling the first user really, received
The call request of the first user.
In being embodied as, further extension, the voice with reference to shown in Fig. 7 can also be made to above-mentioned voice communication method
Communication means flow chart, comprises the following steps that:
S701, receives the call request via virtual-number from first user.
Communicating number can be divided into physical number and corresponding to the physical number set by user
Virtual-number.When the communicating number of the first user institute calling party is the corresponding virtual number of telephone number that currently enables
After code, can be with execution step S702, when the communicating number of the first user institute calling party is the telephone number that currently enables
When, can direct execution step S705.
First user can dial the virtual-number of second user by communication terminal, and the call request can be by clothes
The business intermediary communications device such as device is processed and transmitted, and eventually arrive at that the second user held is inserted with the virtual-number
The communication terminal of bound communicating number.
S702, obtains the communication pattern set by second user, judges the communication pattern set by the second user, when
When communication pattern set by the second user is secret, then execution step S703;When logical set by the second user
When letter pattern is open, execution step S704.
In being embodied as, if acquired communication pattern for it is open, can also first obtain preserved described virtual
Effective existence time information of number, when it is determined that the virtual-number is in effective existence time section, then execution step S704.
After the virtual-number in open mode exceedes effective existence time, in being embodied as, can basis
User is specifically arranged can switch to privacy mode, or forbid call model, or nullify etc..
S703, judges whether once to call the first user using the virtual-number, if it is, execution step
S704;If it is not, then execution step S705.
S704, receives the call request of the first user.
S705, refuses the call request of the first user.
In being embodied as, in order in the case where ensureing that user is obtained in that open information, it is to avoid user is by phone
Harassing and wrecking, in the case of communication pattern is disclosed, can also arrange mask pattern, and user can select to be needed under open mode
The communicating number of the user of shielding is shielded.It is implemented as follows:When the communication pattern set by the second user is public affairs
When opening, judge whether second user opens mask pattern to the first user;If opening shielding mould to the first user
Formula, then refuse the call request of the first user;If not opening mask pattern to the first user, the reception is performed
The operation of the call request of the first user.
In being embodied as, a telephone number can be only enabled on the communication terminal, it is also possible to while having multiple
Telephone number is in upstate.As it was previously stated, user can arrange one or more accordingly virtually for each telephone number
Number, or all or part telephone number enabled on the communication terminal is respectively provided with one or more corresponding void
Intend number.When the telephone number multiple virtual-numbers of correspondence that the communication terminal is currently enabled, each virtual-number can be right
Default groups of users is answered, the different communication requirement of user is met.
The communication terminal that can realize above-mentioned communication means is described in detail below in conjunction with accompanying drawing.
Communication terminal 800 with reference to shown in Fig. 8, can include following part:
Second receiving unit 801, is suitable to receive the call request from first user via virtual-number;
Second judging unit 802, is suitable to judge whether the second user once adopted the virtual-number and described first
User carried out call;
Second performance element 803, is suitable to when it is determined that once carrying out call using the virtual-number, receive described first
The call request of user, when it is determined that not carrying out call using the virtual-number, refuses the calling of the first user
Request.
Communication terminal 900 with reference to shown in Fig. 9, be with the difference of communication terminal 800, in the base of communication terminal 800
On plinth, communication terminal 900 can also include:3rd acquiring unit 901, wherein:
3rd acquiring unit 901, is suitable to obtain the communication pattern set by the second user;
Second judging unit 802, is suitable to set described in the second user when the 3rd acquiring unit 901 be got
When the communication pattern put is secret, execution is described to judge whether the second user once adopted the virtual-number and described first
User carried out the operation conversed.
In being embodied as, second performance element 803 is further adapted for being got in the 3rd acquiring unit 901 described
When communication pattern set by second user is open, the operation of the call request for receiving the first user is performed.
The communication pattern set by the second user in being embodied as, acquired in the 3rd acquiring unit 901
Information can be preserved on communication terminals, it is also possible to be stored on other communication equipments.In an embodiment of the present invention, it is described logical
Letter terminal can also include the second memory cell 902, be suitable to preserve the communication mode information of the ID set by user.
Using the communication terminal, the telephone number enabled on the communication terminal is arranged into different communication patterns, can
While user information safety is protected, further to improve the convenience of telex network.
In being embodied as, in order to save virtual-number resource, the communication terminal 900 may also include:Second verification is single
Unit 903, is suitable to, when it is open that the 3rd acquiring unit 901 gets the communication pattern set by the second user, obtain
Take effective existence time of the virtual-number;
Second performance element 803 is further adapted for determining the phone for currently enabling in second verification unit 903
When virtual-number corresponding to number is in effective existence time section, performs and receive the call request that the first user sends
Operation.
And when the virtual-number not in effective existence time section when, can be arranged the virtual-number according to user
Switch to privacy mode or forbid call model, or nullify the virtual-number to discharge virtual-number resource.
As shown in figure 9, in an embodiment of the present invention, communication terminal 900 may also include the 4th acquiring unit 904, be suitable to
When it is open that the 3rd acquiring unit 901 gets the communication pattern set by the second user, described second is obtained
Whether user opens mask pattern to the first user;
Second performance element is further adapted for getting the second user to described first in the 3rd acquiring unit
When user opens mask pattern, the operation of the call request of the refusal first user is performed, obtained in the 3rd acquiring unit
When getting the second user and not opening mask pattern to the first user, the call request for receiving the first user is performed
Operation.
In being embodied as, the communication terminal can be the handheld devices such as mobile phone, or other may be inserted into hand
The communication terminal of machine card, can also be landline telephone.
It should be noted that in the embodiment of the present invention, for convenience of description, existing and illustrating multiple embodiments with one
The combination of the part-structure unit or step in situation, such as accompanying drawing can also be as independent embodiment, wherein using dotted line frame
The construction unit of expression, can as needed select which part or all carry out various combination, however it is not limited to one shown in figure
Structure is planted, as shown in figs. 5 and 9, is repeated no more.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
Completed with instructing the hardware of correlation by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:ROM, RAM, disk or CD etc..
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art, without departing from this
In the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute
The scope of restriction is defined.
Claims (12)
1. a kind of voice communication method, it is characterised in that include:
The call request via virtual-number from first user is received, it is logical comprising the first user in the call request
The virtual-number of signal code and the second user for being called;
Obtain the communication pattern set by the second user;
When the communication pattern set by the second user is secret, the message registration preserved by match query is judged
Whether the corresponding second user of the virtual-number once called the first user by the virtual-number;When described second
When user once called the first user by the virtual-number, to the second user call request is sent;When described
When second user did not call the first user by the virtual-number, refuse the call request of the first user;
When the communication pattern set by the second user is open, the virtual number set by the second user is obtained
Effective existence time information of code;When it is determined that the virtual-number is in effective existence time section, send out to the second user
Send call request;When it is determined that the virtual-number not in effective existence time section when, according to user arrange, by the virtual number
Code switchs to privacy mode or forbids call model, or nullifies the virtual-number.
2. voice communication method according to claim 1, it is characterised in that when the communication mould set by the second user
When formula is open, before call request is sent to the second user, also include:
Obtain whether the second user opens mask pattern to the first user;
If open mask pattern to the first user, cancel and described send call request to the second user
Operation;
If not opening mask pattern to the first user, perform and described send the call request to the second user
Operation.
3. voice communication method according to claim 1, it is characterised in that the virtual-number and the second user
At least one telephone number is bound.
4. voice communication method according to claim 3, it is characterised in that the virtual-number includes at least one, often
The corresponding default groups of users of individual virtual-number.
5. a kind of voice communication method, it is characterised in that include:
The call request via virtual-number from first user is received, it is logical comprising the first user in the call request
The virtual-number of signal code and the second user for being called;
The communication terminal obtains the communication pattern set by the second user;
When the communication pattern set by the second user is secret, the message registration preserved by match query is judged
Whether second user once called the first user using the virtual-number;When it is determined that the second user is once using described
When virtual-number called the first user, the call request of the first user is received;When it is determined that the second user not
When once calling the first user using the virtual-number, refuse the call request of the first user;
When the communication pattern set by the second user is open, the virtual number set by the second user is obtained
Effective existence time information of code;When it is determined that the virtual-number is in effective existence time section, the first user is received
Call request;When it is determined that the virtual-number not in effective existence time section when, according to user arrange, by the virtual number
Code switchs to privacy mode or forbids call model, or nullifies the virtual-number.
6. voice communication method according to claim 5, it is characterised in that when the communication mould set by the second user
When formula is open, before the operation for performing the call request for receiving the first user, also include:
Judge whether second user opens mask pattern to the first user;
If opening mask pattern to the first user, refuse the call request of the first user;
If not opening mask pattern to the first user, the behaviour of the call request for receiving the first user is performed
Make.
7. voice communication method according to claim 5, it is characterised in that the virtual-number and the second user
At least one telephone number is bound.
8. voice communication method according to claim 7, it is characterised in that the virtual-number includes at least one, often
The corresponding default groups of users of individual virtual-number.
9. a kind of server, it is characterised in that include:
First receiving unit, is suitable to receive the call request from first user via virtual-number, wraps in the call request
The virtual-number of the communicating number containing the first user and the second user for being called;
First acquisition unit, is suitable to obtain the communication pattern set by the second user;
First judging unit, being suitable to the communication pattern set by the second user that gets when the first acquisition unit is
During secret, the message registration preserved by match query judges whether the virtual-number correspondence second user once passed through institute
State virtual-number and call the first user;
First verification unit, being suitable to the communication pattern set by the second user that gets when the first acquisition unit is
When open, effective existence time of the virtual-number set by the second user is obtained;
First performance element, is suitable to when first judging unit determines that once calling described first by the virtual-number uses
During family, call request is sent to the second user, do not exhaled by the virtual-number when first judging unit determines
When being the first user, refuse the call request of the first user;First performance element is further adapted in first school
When verification certificate unit determines that the virtual-number is in effective existence time section, to the second user call request is sent;When it is determined that
The virtual-number not in effective existence time section when, according to user arrange, by the virtual-number switch to privacy mode or
Person forbids call model, or nullifies the virtual-number.
10. server according to claim 9, it is characterised in that also include:Second acquisition unit, is suitable to described
When one acquiring unit gets the communication pattern set by the second user to disclose,
Obtain whether the second user is that the first user opens mask pattern;
It is described first that first performance element is further adapted for getting the second user and opening in the second acquisition unit
When user opens mask pattern, the operation that call request is sent to the second user is cancelled, obtained described second
Take unit get the second user not to the first user open mask pattern when, perform it is described to the second user
Send the operation of the call request.
11. a kind of communication terminals, it is characterised in that include:
Second receiving unit, is suitable to receive the call request from first user via virtual-number, wraps in the call request
The virtual-number of the communicating number containing the first user and the second user for being called;
3rd acquiring unit, is suitable to obtain the communication pattern set by the second user;
Second judging unit, it is private to be suitable to when the 3rd acquiring unit gets the communication pattern set by the second user
When close, judge whether second user once called the first user using the virtual-number;
Second verification unit, it is public affairs to be suitable to when the 3rd acquiring unit gets the communication pattern set by the second user
When opening, effective existence time of the virtual-number set by the second user is obtained;
Second performance element, is suitable to when the determination second user once called the first user using the virtual-number
When, receive the call request of the first user;When it is determined that not calling the first user using the virtual-number,
Refuse the call request of the first user;It is further adapted for determining that the virtual-number is effectively present in second verification unit
When in the time period, the call request that the first user sends is received, when it is determined that the virtual-number is not in effective existence time
When in section, arranged according to user, the virtual-number is switched to into privacy mode or forbids call model, or nullify the void
Intend number.
12. communication terminals according to claim 11, it is characterised in that also include:4th acquiring unit, is suitable to described
When 3rd acquiring unit gets the communication pattern set by the second user to disclose, whether right the second user is obtained
The first user opens mask pattern;
Second performance element is further adapted for getting the second user to the first user in the 3rd acquiring unit
When opening mask pattern, the operation of the call request of the refusal first user is performed, got in the 3rd acquiring unit
When the second user does not open mask pattern to the first user, the behaviour of the call request for receiving the first user is performed
Make.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410617675.0A CN104284031B (en) | 2014-11-05 | 2014-11-05 | Speech communication method, communication terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410617675.0A CN104284031B (en) | 2014-11-05 | 2014-11-05 | Speech communication method, communication terminal and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104284031A CN104284031A (en) | 2015-01-14 |
CN104284031B true CN104284031B (en) | 2017-05-17 |
Family
ID=52258495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410617675.0A Active CN104284031B (en) | 2014-11-05 | 2014-11-05 | Speech communication method, communication terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104284031B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106303103B (en) * | 2015-06-25 | 2019-08-16 | 阿里巴巴集团控股有限公司 | A kind of communication means and device for protecting personal information |
CN106791232A (en) * | 2017-02-27 | 2017-05-31 | 成都三六时代科技有限公司 | The means of communication of identity-based certification |
CN108307034A (en) * | 2017-10-27 | 2018-07-20 | 努比亚技术有限公司 | A kind of urgency traffic connection method, system, mobile terminal and computer readable storage medium |
CN108040163A (en) * | 2017-12-25 | 2018-05-15 | 刘光明 | The alternative distribution method of telephone number |
CN108769977B (en) * | 2018-03-30 | 2021-05-14 | 北京五八信息技术有限公司 | Call record attribution order determining method and device, electronic equipment and storage medium |
CN113114859A (en) * | 2018-05-29 | 2021-07-13 | 维沃移动通信有限公司 | Number interception method and server |
CN111756932A (en) * | 2019-03-29 | 2020-10-09 | 福建省天奕网络科技有限公司 | Communication number protection method and storage medium |
CN110290281B (en) * | 2019-07-19 | 2020-10-16 | 携程旅游信息技术(上海)有限公司 | Outbound method, system, electronic device and medium |
CN111131633B (en) * | 2019-12-18 | 2021-10-22 | 华为技术有限公司 | Application method of virtual number, communication method and related device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI973787A (en) * | 1997-09-25 | 1999-03-26 | Nokia Telecommunications Oy | Collaboration of intelligent network services |
JP5156463B2 (en) * | 2008-04-16 | 2013-03-06 | 株式会社エヌ・ティ・ティ・ドコモ | COMMUNICATION CONTROL METHOD, COMMUNICATION SYSTEM AND COMMUNICATION CONTROL DEVICE |
WO2012007018A1 (en) * | 2010-07-12 | 2012-01-19 | Telefonaktiebolagt L M Ericsson (Publ) | Enhanced privacy protection in a telecommunication network |
CN102624995B (en) * | 2011-01-27 | 2016-01-13 | 中国电信股份有限公司 | Be applicable to virtual-number application process, the Apparatus and system of the Internet |
-
2014
- 2014-11-05 CN CN201410617675.0A patent/CN104284031B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN104284031A (en) | 2015-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104284031B (en) | Speech communication method, communication terminal and server | |
US11501395B2 (en) | System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions | |
US7797379B2 (en) | System and method for shared spam call blocking | |
CN104660809A (en) | Answer management method and device for incoming call of private contact person | |
CN103906067B (en) | The recognition methods of false calling number and device | |
CN102143461A (en) | Intelligent call forwarding method and device | |
CN104038613B (en) | The method and apparatus of information security management | |
CN104822139B (en) | A method of communicating number isolation and secret protection are realized based on intermediate number | |
CN105472093B (en) | Mobile terminal call answers method for authenticating and mobile terminal | |
CN107708078A (en) | Mobile terminal and its call transferring method, storage device | |
CN105516084B (en) | A kind of method of calling, call server | |
CN104023323B (en) | The method and device that client binding terminal is called | |
CN1937663A (en) | Method, system and device for realizing variable voice telephone business | |
CN107426708A (en) | The switching method and apparatus of intercommunication terminal, call model | |
CN108271158A (en) | Call processing method and system | |
CN107018240A (en) | A kind of call method and system of hiding called number | |
CN107306395A (en) | A kind of call method for building up based on control of authority | |
CN108200296A (en) | A kind of method and device for calling car owner and moving vehicle | |
CN104202462B (en) | Communication control method and system | |
CN106713591A (en) | Method and device for answering incoming call of specific number automatically | |
CN106507324A (en) | Communication method, device and system based on mobile equipment | |
CN107623768A (en) | The method of automatic addition blacklist, the device and communication terminal with store function | |
CN106791232A (en) | The means of communication of identity-based certification | |
CN108418977B (en) | Multifunctional call limiting method for mobile communication company | |
CN104967605B (en) | Privacy protection method and privacy protection device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |