CN104284031B - Speech communication method, communication terminal and server - Google Patents

Speech communication method, communication terminal and server Download PDF

Info

Publication number
CN104284031B
CN104284031B CN201410617675.0A CN201410617675A CN104284031B CN 104284031 B CN104284031 B CN 104284031B CN 201410617675 A CN201410617675 A CN 201410617675A CN 104284031 B CN104284031 B CN 104284031B
Authority
CN
China
Prior art keywords
user
virtual
call request
communication
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410617675.0A
Other languages
Chinese (zh)
Other versions
CN104284031A (en
Inventor
陈建宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Galaxycore Shanghai Ltd Corp
Original Assignee
Galaxycore Shanghai Ltd Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Galaxycore Shanghai Ltd Corp filed Critical Galaxycore Shanghai Ltd Corp
Priority to CN201410617675.0A priority Critical patent/CN104284031B/en
Publication of CN104284031A publication Critical patent/CN104284031A/en
Application granted granted Critical
Publication of CN104284031B publication Critical patent/CN104284031B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a speech communication method, a communication terminal and a server, wherein the speed communication method comprises the following steps: receiving a call request from a first client via a virtual number; judging whether a second client corresponding to the virtual number calls the first client, and sending the call request to the second client if the second client calls the first client; and refusing the call request from the first client when the second client does not call the first client. According to the scheme, both the information safety of communication clients and communication convenience can be guaranteed.

Description

Voice communication method, communication terminal and server
Technical field
The present invention relates to communication technical field, more particularly to a kind of voice communication method, communication terminal and server.
Background technology
Since GSM is born from the eighties in 20th century, the fashionable whole world is that hundreds of millions cellphone subscribers bring incomparably Facility, hundreds of millions wealth that have been social creativity.But, any technology also brings along some and bears while offering convenience The impact in face.GSM is no exception, and one of negative effect is harassing call.Mobile phone has single deck tape-recorder, double card Mobile phone, i.e., can be inserted into one or two subscriber identification cards (SIM) in a mobile phone, fixed per a card correspondence one Phone number, voice communication is carried out by the phone number with other people.At present, the phone number of user is easy to reveal, After leakage, it is easy to run into harassing call.The typical behavioural characteristic of of harassing call, dials repeatedly or for a long time and works as Thing people's phone disturbs its normal work, life, rest or tells about the content that party is unwilling to receive with phone.
Harassing call brings greatly puzzlement to user, in order to prevent harassing call, has there is many specific aims at present Technology preventing various types of harassing calls.For example, calling subscribe dials other users telephone number by IP phone.This Sample, called subscriber cannot can only see IP (International Protocol, procotol) telephone operator for the master The virtual-number for making user distribute, any other phone number actual with the calling subscribe cannot be got per family, so Can just avoid the actual phone number of the calling subscribe from revealing, protect user information safety.
But, because other users cannot know the actual phone number of the calling subscribe, including called subscriber, and its His user dials the virtual-number and is not turned on to calling subscribe, therefore other users can be caused to use with the caller Householder is dynamic by phone contact, therefore can bring very big inconvenience to the information communication of user.
The content of the invention
The embodiment of the present invention solve or the technical problem that at least partly solves be how to take into account communication user information security and The convenience of communication.
To solve the above problems, a kind of voice communication method is embodiments provided, methods described includes:
Receive the call request via virtual-number from first user;
Judge whether the corresponding second user of the virtual-number once carried out call with the first user;
When call was once carried out, to the second user call request is sent;
When call was not carried out constantly, refuse the call request of the first user.
Optionally, when the reception is from call request of the first user via virtual-number, also include:
Obtain the communication pattern set by the second user;
When the communication pattern set by the second user is secret, then the judgement virtual-number correspondence is performed Second user whether once carried out with the first user operation conversed.
Optionally, the voice communication method also includes:When the communication pattern set by the second user is open, Call request is sent to the second user.
Optionally, when the communication pattern set by the second user is open, also include:Obtain the second user Effective existence time information of the set virtual-number, when it is determined that the virtual-number is in effective existence time section When, perform the operation that call request is sent to the second user.
Optionally, when the communication pattern set by the second user is open, exhaling sending to the second user Before crying request, also include:
Obtain whether the second user opens mask pattern to the first user;
If opening mask pattern to the first user, cancelling described calling to second user transmission please The operation asked;
If not opening mask pattern to the first user, perform it is described send the calling to the second user please The operation asked.
Optionally, the virtual-number is bound with least one telephone number of the second user.
Optionally, the virtual-number includes at least one, each default groups of users of virtual-number correspondence.
To solve the above problems, the embodiment of the present invention additionally provides another kind of voice communication method, and methods described includes:
Receive the call request via virtual-number from first user;
Judge whether second user once carried out call using the virtual-number with the first user;
When it is determined that once carrying out call, the call request of the first user is received;
When it is determined that do not carried out call constantly, refusing the call request of the first user.
Optionally, when receiving from call request of the first user via virtual-number, also include:
Obtain the communication pattern set by the second user;
When the communication pattern set by the second user is secret, then the judgement virtual-number correspondence is performed Second user whether once carried out with the first user operation conversed.
Optionally, the voice communication method also includes:When the communication pattern set by the second user is open, Then perform the operation of the call request for receiving the first user.
Optionally, when the communication pattern set by the second user is open, the reception described first is being performed Before the operation of the call request of user, also include:
Judge whether second user opens mask pattern to the first user;
If opening mask pattern to the first user, refuse the call request of the first user;
If not opening mask pattern to the first user, the call request for receiving the first user is performed Operation.
Optionally, when the communication pattern of the preserved ID is open, also include:Obtain described second to use Effective existence time information of the virtual-number set by family, when it is determined that the virtual-number is in effective existence time section When, perform the operation of the call request for receiving the first user.
Optionally, the virtual-number is bound with least one telephone number of the second user.
Optionally, the virtual-number includes at least one, each default groups of users of virtual-number correspondence.
To solve the above problems, the embodiment of the present invention additionally provides a kind of server, and the server includes:
First receiving unit, is suitable to receive the call request from first user via virtual-number;
First judging unit, is suitable to judge whether the virtual-number correspondence second user is once carried out with the first user Cross call;
First performance element, is suitable to when first judging unit determination once carried out call, to the second user Call request is sent, when call was not carried out, refuses the call request of the first user.
Optionally, the server also includes:First acquisition unit, is suitable to obtain the communication set by the second user Pattern;First judging unit, is suitable to work as the communication set by the second user that the first acquisition unit gets When pattern is secret, the operation for once carrying out conversing is judged whether described in execution.
Optionally, first performance element is further adapted for being got set by the second user in the first acquisition unit When the communication pattern put is open, the operation that call request is sent to the second user is performed.
Optionally, the server also includes:First verification unit, is suitable to the institute got when the first acquisition unit State communication pattern set by second user for it is open when, obtain the effective of the virtual-number set by the second user Existence time;
First performance element is further adapted for determining the virtual-number in the presence of effectively in first verification unit Between in section when, perform the operation that call request is sent to the second user.
Optionally, the server also includes:Second acquisition unit, is suitable to be got in the first acquisition unit described When communication pattern set by second user is open, obtain whether the second user is that the first user opens shielding mould Formula;First performance element is further adapted for getting the second user unlatching for the described first use in the second acquisition unit When mask pattern is opened at family, the operation that call request is sent to the second user is cancelled, obtained described second Unit get the second user not to the first user open mask pattern when, perform it is described to the second user send out Send the operation of the call request.
To solve the above problems, the embodiment of the present invention additionally provides a kind of communication terminal, and the communication terminal includes:
Second receiving unit, is suitable to receive the call request from first user via virtual-number;
Second judging unit, is suitable to judge whether second user is once carried out using the virtual-number with the first user Cross call;
Second performance element, is suitable to when it is determined that once carrying out call using the virtual-number, receive described first and use The call request at family;When it is determined that do not carried out call constantly using the virtual-number, refusing the calling of the first user Request.
Optionally, the communication terminal also includes:3rd acquiring unit, is suitable to obtain logical set by the second user Letter pattern;Second judging unit, is suitable to the 3rd acquiring unit and gets communication mould set by the second user When formula is secret, execution is described to judge whether the second user was once carried out using the virtual-number with the first user The operation of call.
Optionally, second performance element is further adapted for being got set by the second user in the 3rd acquiring unit When the communication pattern put is open, the operation of the call request for receiving the first user is performed.
Optionally, the communication terminal also includes:Second verification unit, is suitable to when the 3rd acquiring unit gets institute State communication pattern set by second user for it is open when, obtain the effective of the virtual-number set by the second user Existence time;Second performance element is further adapted for determining the virtual-number in the presence of effectively in second verification unit Between in section when, perform the operation for receiving the call request that the first user sends.
Optionally, the communication terminal also includes:4th acquiring unit, is suitable to get institute in the 3rd acquiring unit When the communication pattern stated set by second user is open, obtain whether the second user opens shielding to the first user Pattern;Second performance element is further adapted for getting the second user to the first user in the 3rd acquiring unit When opening mask pattern, the operation of the call request of the refusal first user is performed, got in the 3rd acquiring unit When the second user does not open mask pattern to the first user, the behaviour of the call request for receiving the first user is performed Make.
Compared with prior art, the technical scheme of the embodiment of the present invention has advantages below:
When first user calls second user via virtual-number, by judging that the corresponding second user of virtual-number is It is no to carry out call with the first user, when the two carried out call, the call request of the first user is just received, build Vertical call, and if not carried out call, then refuse the call request of the first user, thus such scheme can be realized Once by the clawback of words user, and not by the user of words, even if obtaining the virtual-number, also cannot be with the virtual-number Corresponding second user carries out voice communication, in protection communication user information security, it is to avoid while making nuisance calls, can improve The convenience of communication.
Further, it is secret in the communication pattern set by the second user by arranging different communication patterns When, the user for being just possible to carry out voice communication with the second user is limited to once via the virtual-number by words User, and if communication pattern is open, then any other be with directly calling per family the second user, so that user Can be according to actual different needs, it is allowed to which every other user's calling or the user for being only limitted to call initiate calling, because And the convenience for communicating can be further improved while communication user information security is protected, meet the different needs of user.
Further, by effective existence time of setting virtual-number, after the related needs of user meet, institute is nullified State virtual-number or disable the virtual-number, then other users cannot call the user, thus can be in convenient user While communication, it is to avoid make nuisance calls.
Further, when the communication pattern set by the second user is open, user can select as needed Whether mask pattern is opened, if opening mask pattern to first user, the first user cannot still call described second User, thus while telex network convenience is improved, it is to avoid make nuisance calls.
Additionally, being needed to arrange multiple virtual-numbers according to difference, it is easy to user to be needed using different void according to different Intend number to be communicated from different users so that user can know the calling mesh of calling party according to virtual-number , it is easy to user to carry out telecommunication management.
Description of the drawings
Fig. 1 is a kind of voice communication method flow chart in the embodiment of the present invention;
Fig. 2 is another kind of voice communication method flow chart in the embodiment of the present invention;
Fig. 3 is a kind of voice communication system structural representation in the embodiment of the present invention;
Fig. 4 is a kind of server architecture schematic diagram in the embodiment of the present invention;
Fig. 5 is another kind of server architecture schematic diagram in the embodiment of the present invention;
Fig. 6 is another kind of voice communication method flow chart in the embodiment of the present invention;
Fig. 7 is another voice communication method flow chart in the embodiment of the present invention;
Fig. 8 is a kind of communication terminal structural representation in the embodiment of the present invention;
Fig. 9 is another kind of communication terminal structural representation in the embodiment of the present invention.
Specific embodiment
At present, privacy of user such as telephone number etc. is particularly easy to reveal, and such as user dials after certain telephone number, holds very much Easily just by called subscriber outside the 3rd people obtain, the 3rd people is obtained after the telephone number of the user, calls the user, can The unwanted service of user can be promoted to user is possibly even used for other illegal purposes by the acquired telephone number, gives User causes unnecessary puzzlement.
To protect user information safety, as it was previously stated, in prior art, user can dial other users by IP phone Telephone number, so, called subscriber can only see IP phone operator for calling subscribe distribution virtual-number, any other With the telephone number of the calling subscribe cannot be obtained per family, thus the telephone number of the calling subscribe can be avoided from revealing. However, so, including the every other user including called subscriber, cannot be by dialing the IP phone operator point The virtual-number matched somebody with somebody can bring very big inconvenience carrying out actively contacting with the calling subscribe to the information communication of user.
To solve the above problems, in the embodiment of the present invention, can pre-build telephone number that user actually used with The corresponding relation of virtual-number, for example, second user is that the telephone number that oneself used binds a virtual-number, when receiving From during call request of the first user via virtual-number, judge the corresponding second user of the virtual-number whether once with institute Stating first user carried out call, when call was once carried out, just received the call request of the first user, otherwise, refusal The call request of the first user.Such that it is able to avoid not carrying out making nuisance calls for the third party user of call.
Specifically, if the second user in two telephone subscribers calls first user using the virtual-number, Shown by first user side be then the second user telephone number corresponding to virtual-number.Afterwards, when described first When user calls the second user, the ID of the entrained second user for being called is described second in call request Virtual-number corresponding to the telephone number of user, because before second user once called the first user, then to institute State second user and send call request, realize the call of first user and second user, and if its outside second user His user calls the first user using the virtual-number, then cannot be successful, thus such scheme can be realized using householder The dynamic called subscriber's clawback for calling, and other users then cannot be contacted by the virtual-number and the second user, from And can be in protection communication user information security, it is to avoid while making nuisance calls, improve the convenience of communication.
It should be noted that the first user in the embodiment of the present invention is only used for the different phone of differentiation with second user using Family, described " first " and " second " is not intended to represent order or priority etc. and limits.Described first user and second is used Family two different telephone numbers of correspondence, described two different telephone numbers generally two different communication terminals of correspondence, institute It can be landline telephone to state communication terminal, or mobile phone etc. can realize the mobile communication terminal of voice communication.Correspondingly, The telephone number can be fixed telephone number, or phone number.It is understood that in being embodied as, institute Stating telephone number can also distribute to the number of different voice communication users for other.
It is understandable to enable the above objects, features and advantages of the present invention to become apparent from, below in conjunction with the accompanying drawings to the present invention Specific embodiment be described in detail.
With reference to Fig. 1, the voice communication method employed in the embodiment of the present invention is discussed in detail below by way of concrete steps.
S101, receives the call request via virtual-number from first user.
If first user is communicated with second user, the messenger of the inquiry such as address list second user can be passed through Code, is the virtual-number of the second user for having preserved for example, initiates to exhale to the second user by the virtual-number Cry.
S102, judges whether the corresponding second user of the virtual-number once carried out call with the first user, such as It is really, then execution step S103;If it is not, then execution step S104.
In being embodied as, the second user can on the server be protected with registered in advance and create a virtual-number The corresponding relation of the virtual-number and the telephone number of oneself is deposited, in other words, by the virtual-number and the electricity of oneself reality Words number binding.
For example, message registration, call note can be preserved on the server of voice communication system or in independent database ID of the record comprising calling and called both sides, if by searching matching, the ID for finding the side that there is message registration is The virtual-number of second user, the ID of the opposing party for first user actual phone number or virtual-number, then can be true The fixed first user and the second user are by words.For example, the ID of calling party is second user in message registration Virtual-number, the ID of callee is the actual phone number or virtual-number of first user, then can determine that described the Two users once called the first user, otherwise, then can determine that the second user had not called the first user.
S103, to the second user call request is sent.
In the case where second user and second user once carried out call, then the logical of first user and second user is set up Letter connection, realizes the voice communication of first user and second user.
S104, refuses the call request of the first user.
In the case where second user and first user did not carry out call, then the calling for refusing the first user please Ask.Thus, above-mentioned voice communication method can avoid the third-party electricity outside the user that the second user was once called Words harassing and wrecking.
To more fully understand those skilled in the art and realizing the present invention, below in conjunction with one kind that said method is suitable for Illustrate as a example by voice communication system.As shown in figure 3, voice communication system 300 includes first user 301, second user 302 With server 303.In being embodied as, can preserve on server 303 in advance the telephone number that used of user with it is virtual The corresponding relation of number.For example, the second user 302 uses the second communication terminal and the first use using the first communication terminal Family 301 carries out voice communication.In an embodiment of the present invention, first communication terminal is mobile phone, and the mobile phone can be single Card hand machine, or the mobile telephone with multiple cards such as double card, the second user 302 can be by a mobile phone enabling on the mobile phone Number arranges a corresponding virtual-number, it is also possible to arrange multiple corresponding virtual-numbers.If being enabled on the mobile phone For multiple, the second user 302 can also be that all phone numbers for being enabled or part phone number are distinguished to phone number Corresponding virtual-number is set, is that the virtual-number set by each phone number can be with identical, it is also possible to be different.
Additionally, it will be appreciated by persons skilled in the art that Mobile phone card can be inserted different communication terminals by user, because And telephone number is not unique fixed with the relation of communication terminal, but under normal circumstances, in a longer time section, The usual communication terminal of user uses relatively-stationary telephone number, unless communication terminal is lost or damaged, and renewal is changed For situations such as, just can reconfigure a different communication terminal for the telephone number.Thus, it is under normal conditions, above-mentioned First user 301 and second user 302 in voice communication system corresponds to first user 301 and second user 302 is used Communication terminal, i.e. the first communication terminal and the second communication terminal.
In the examples below, illustrate so that the mobile phone of the second user 302 is as single-card mobile phone as an example.Described second User 302 arranges a corresponding virtual-number for the phone number of the mobile phone.
Second user 302 can be virtual for the phone number application one in advance by the approach such as internet or phone Number, so, the phone number that the second user 302 can be set up on server 303 is corresponding with the virtual-number Relation, will the phone number and virtual-number binding.Afterwards, if second user 302 is by the phone number or virtual During the phone number of number call first user 301, what is shown on the mobile phone of first user 301 is the second user Virtual-number corresponding to 302 phone number, rather than the phone number of second user 302, therefore, first user 301 is only capable of Obtain the virtual-number of the second user 302.Correspondingly, this message registration, message registration can be preserved on server 303 The ID of middle callee can be the phone number of the first user 301, if first user 301 is also the hand of oneself Machine number is provided with if corresponding virtual-number, and the ID of callee can also be the virtual-number of first user 301, And the ID of calling party is then the virtual-number of the second user 302.Afterwards, if first user 301 need actively and Second user 302 carries out voice communication, then can dial the virtual-number of the second user 302, and server 303 is by inquiry The preserved message registration of matching, it is found that second user 302 once called the first user 301, then use to described second Family 302 sends call request, the communication connection set up between the first user 301 and second user 302.And if by looking into Message registration is ask, it is found that second user 302 had not called the first user 301, then refuse the calling of the first user Request.
In being embodied as, above-described embodiment can also be extended or be optimized.For example, in order in protection user profile While safe, preferably facilitate telex network, following embodiment can also be adopted.
Voice communication method flow chart with reference to shown in Fig. 2, is used below in conjunction with Fig. 3 with server and first user and second The information exchange at family is described in detail, it is to be understood that in being embodied as, except server, it would however also be possible to employ other The communication equipment of voice communication in the embodiment of the present invention, such as switch device or base station equipment etc. can be realized.
S201, receives the call request via virtual-number from first user.
The virtual number of the communicating number comprising the first user and the second user for being called in the call request Code.If first user initiates calling by the virtual-number for oneself being created, the communicating number of the first user is institute State virtual-number.
When the virtual-number corresponding to the telephone number that the communicating number of the second user is the second user, hold Row step S202, otherwise, can carry out voice communication, i.e. execution step S204 according to existing voice communication method.
S202, obtains the communication pattern set by the second user, when the communication pattern set by the second user For secret when, execution step S203;When the communication pattern set by the second user for it is open when, then execution step S204.
S203, judges whether the second user once called the first user by the virtual-number;If it is, Then execution step S204;Otherwise, execution step S205.
S204, to the second user call request is sent.
S205, refuses the call request of the first user.
In above-described embodiment, by arranging different communication patterns, it is in the communication pattern set by the second user During secret, the user for being just possible to carry out voice communication with the second user is limited to second user once via described virtual The user that number call is crossed, and if the communication pattern set by the second user is open, then any other is used and per family may be used Directly the second user is called via the virtual-number, so, second user can be according to actual difference needs, Neng Goujie The call request that any user sends is received, or is only limitted to user's initiation calling that the second user was called, thus can While communication user information security is protected, further to improve the convenience of communication, the different needs of user are met.
It has been investigated that, user exists and the demand for obtaining more more opening imformations is wished within a period of time, and upper After stating need satisfaction, user then wishes to avoid being disturbed.For example, user is buying house, renting a house, is selecting school, obtains travel information During, except the advisory organization actively with some intermediaries or specialty is contacted, it is also desirable to which the personnel of related industry can Oneself is actively contacted, oneself to provide more information, or more suitably choice.However, when user buying house, rent a house, School is chosen, or after tourism is come back, then is not desired to answer corresponding promotional information.
Can be that the virtual-number of the user arranges corresponding communication pattern, if institute for such demand of user State communication pattern for secret when, then in addition to the user for once calling, any other is with per family cannot be by the virtual number Code is actively associated, and when the communication pattern is open, then any use for being obtained in that the virtual-number per family may be used Associate.The above embodiment of the present invention can realize protect user information safety while, facilitate user more easily to enter Row voice communication, obtains information openly.
It is to save virtual-number resource in being embodied as, effective existence time can be set for the virtual-number, By the effective existence time information for obtaining the virtual-number set by the second user, when it is determined that the virtual-number When in effective existence time section, the operation that call request is sent to the second user is performed.And if described second User is provided with certain survival period for the virtual-number, or has been logged out the virtual-number, then refuse described first The call request of user.If the 3rd user outside second user selects the virtual-number to bind the telephone number of oneself, In an embodiment of the present invention, for the user that the 3rd user had not called, then cannot be joined by the virtual-number It is tied to the 3rd user.In an alternative embodiment of the invention, the virtual-number is set to privacy mode by the 3rd user, then For the user that the 3rd user had not called, also the 3rd user cannot be related to by the virtual-number.
In an embodiment of the present invention, second user can in the following way configure and enable virtual-number:By beating The application app installed on mobile phone is opened, is that the phone number 1 on the mobile phone arranges a corresponding virtual number by application for registration Code 1, and click enables the virtual-number 1, then the virtual-number 1 can be entered and enable state.Afterwards, second user is to One user initiates call request, then what the communication terminal side in the first user showed is the virtual-number 1, and first uses Family and second user can carry out voice call by the virtual-number.After this time conversing, when the first user is thought again When carrying out voice communication with the second user, you can virtual-number 1 described in clawback, the second user can receive described The call request of first user, and if other users dial the virtual-number 1, and do not carry out with the second user before Call is crossed, then cannot put through the second user.Thus second user can in this way be filtered out and can carry out voice The user of call, reduction is made nuisance calls, protection information safety.
In an alternative embodiment of the invention, can in the following way arrange and enable virtual-number:Mobile phone Default Value In, can carry and be configured with the function that offer virtual-number service is provided, match some virtual-numbers in advance in network, Start corresponding virtual-number in mobile phone is arranged, subsequent user can actively dial the user that can be kept in touch, work as reception During the Client-initiated call request actively dialed to these, you can receive the call request, voice communication is carried out, and such as Fruit is the user that active call is not crossed, then cannot carry out voice communication with the user by the virtual-number.By upper The setting stated and the screening mode of active call, can protect the information security of user, reduction to make nuisance calls.
Make nuisance calls to further reduce, above-described embodiment can also be further expanded.For example, when described second When communication pattern set by user is open, user can also further arrange whether open mask pattern, so, receive To from call request of the first user via the virtual-number when, if getting the communication mould set by the second user Formula is open, then further obtain whether the second user opens mask pattern, and does not open screen in the second user When covering pattern, call request is sent to the second user, and if the second user opens mask pattern, then obtain institute State the communicating number that second user is shielded, the communication that the communicating number of the first user is shielded with the second user Number is compared, and when it is determined that the second user does not shield the first user, then sends to the second user and calls Request, and when it is determined that the second user shields the communicating number of the first user, then cancels described to described Second user sends the operation of call request, namely the call request for refusing the first user.Such that it is able in communication pattern For open mode when, it is also possible to a certain extent reduce make nuisance calls, improve Consumer's Experience.
In an alternative embodiment of the invention, user can be a telephone number or multiple phone numbers according to different demands Code arranges multiple different virtual-numbers, and each virtual-number can be for not being both demand, the default groups of users of correspondence.
For example, user has a double card double standby mobile phone, and two on the double card double standby mobile phone phone number is opened simultaneously With.If two phone numbers are expressed as:Phone number 1, phone number 2.Then user can be arranged virtually for phone number 1 Number 1, virtual-number 2 and virtual-number 3, are respectively used to purchase house property, student's admission choosing in this period of time of user oneself Consultation information and the tourism planning after a period of time when selecting school, or the phone number 1 and phone number 2 are distinguished Simultaneously the virtual-number 1, virtual-number 2 and virtual-number 3 are set, when there is user the virtual-number 1, virtual-number is dialed 2 or during virtual-number 3, according to the setting on the mobile phone phone number 1 or the calling of phone number 2 can be selected to connect, also may be used Connected with randomly choosing phone number 1 or the calling of phone number 2.
If the user dials a telephone number and seeks advice from the information that house property purchases aspect by virtual-number 1, accordingly Called subscriber or its subsequently voice communication can be carried out with the user by virtual-number 1 with dealer, meet user and purchase Demand in terms of house property.Similarly, seek advice from terms of student selects a school if the user dials a telephone number by virtual-number 2 Information, then corresponding advisory organization voice communication can be carried out with it by its disclosed virtual-number 2.The same manner is also suitable The situation of travel information is seeked advice from by virtual-number 3 in user.In being embodied as, user, can be advance before calling Select to initiate call request after corresponding virtual-number again, when call request is received, it is also possible to according to call request institute pin To virtual-number judge the purpose substantially and purpose of the call request, further facilitate user.
It is corresponding to above-mentioned voice communication method below to more fully understand those skilled in the art and realizing the present invention Server architecture describes in detail, and with reference to Fig. 4, server 400 can include following part:
First receiving unit 401, is suitable to receive the call request from first user via virtual-number;
First judging unit 402, is suitable to judge whether the corresponding second user of the virtual-number is once used with described first Family carried out call;
First performance element 403, be suitable to when first judging unit 402 determine once carried out call when, to described Two users send call request, when it is determined that not carrying out call, refuse the call request of the first user.
The user's that can avoid not passed through words with the second user using server 400 makes nuisance calls, and can be real The clawback of the user that the existing second user was once called, thus can improve and use while user information safety is protected The convenience of family communication.
Additionally, when the first judging unit 402 determines that the communicating number of the second user that the first user is called is institute When stating second user physical number, directly can send calling to second user from first performance element 404 please Ask.
In being embodied as, further extension can also be made to the server for realizing voice communication, with reference to Fig. 5 institutes The structural representation of the server for showing, server 500 is with the difference of server 400, in structure shown in server 400 On the basis of, can also include:First acquisition unit 501, is suitable to obtain the communication pattern set by the second user.
Can be that the virtual-number arranges different communication patterns in being embodied as, in an embodiment of the present invention, Communication pattern has secret and discloses two kinds, and in another enforcement of the invention, communication pattern has secret, disclosure and forbids calling three Kind.
First judging unit 402, is suitable to work as set by the second user that the first acquisition unit 501 gets When the communication pattern put is secret, the operation for once carrying out conversing is judged whether described in execution.
In being embodied as, first performance element 403 is further adapted for being got in the first acquisition unit 501 described When communication pattern set by second user is open, the operation that call request is sent to the second user is performed.
And if the communication pattern that gets of the first acquisition unit 501 is to forbid during calling, including called subscriber exists Interior is every other with being contacted with calling subscribe by the virtual-number per family, and correspondingly, described first performs list Unit 403 is suitable to when the first acquisition unit 501 gets the communication pattern set by the second user to forbid calling, Refuse the call request of the first user.
In being embodied as, the server can also include the first memory cell 502, be suitable to preserve set by user Communication mode information.It is understood that the communication mode information set by user can also be not preserved on the server, And be stored on other communication equipments, when needed, server 500 can from it is described save communication mode information other Obtain on communication equipment.
In being embodied as, in order to protect user information safety, server 500 to may also include the first verification unit 503, fit In when the communication pattern set by the second user that the first acquisition unit 501 gets is open, obtain described Effective existence time of the virtual-number set by second user;Correspondingly, first performance element 403 is further adapted for When first verification unit 503 determines that the virtual-number is in effective existence time section, perform and sent out to the second user Send the operation of call request.
User can arrange effective existence time for the virtual-number, when effective existence time is reached, can be by institute State virtual-number to switch to privacy mode from open mode or forbid call model, it is also possible to nullify the virtual-number, use Family can be configured as needed.
In an embodiment of the present invention, as shown in figure 5, server 500 can also include second acquisition unit 504, it is suitable to When it is open that the first acquisition unit 501 gets the communication pattern set by the second user, described second is obtained Whether user opens mask pattern to the first user;
First performance element 403 is further adapted for getting the second user to institute in the second acquisition unit 504 When stating first user unlatching mask pattern, the operation that call request is sent to the second user is cancelled, described Second acquisition unit 504 get the second user not to the first user open mask pattern when, perform it is described to institute State the operation that second user sends the call request.
By arranging mask pattern so that user is when communication pattern is open mode, it is also possible to shield to a certain extent Harassing call is covered, can be in the case of open acquisition information, it is also possible to which reduction is made nuisance calls, and improves Consumer's Experience.
In order to take into account the information security and communication facility of communication user, the embodiment of the present invention additionally provides another kind of voice Communication means, with reference to Fig. 6, specifically may include steps of:
S601, receives the call request via virtual-number from first user.
Communicating number can be divided into physical number and virtual-number corresponding with the physical number.When The communicating number of the first user institute calling party is the virtual-number corresponding to the telephone number that second user is currently enabled Afterwards, can be with execution step S602.
S602, judges whether second user once carried out call using the virtual-number with the first user, if It is, then execution step S603;If it is not, then execution step S604.
S603, receives the call request of the first user.
S604, refuses the call request of the first user.
The present embodiment is can to preserve on communication terminal and itself enable with the difference of aforesaid voice communication method Telephone number and corresponding virtual-number corresponding relation, so, after using the communication terminal calls a certain user excessively, Corresponding message registration information can be equally preserved, the message registration information includes that the communication terminal institute calling party's is logical Signal code (communicating number of the institute calling party can be the actual phone number of the called subscriber, or it is described The corresponding virtual-number of phone number), so, the communication terminal is when call request is received, however, it is determined that in call request During the corresponding virtual-number of the telephone number that enabled comprising the communication terminal, the communication terminal can inquire about call note Whether record, inquiry once called the user, such as first user, if once calling the first user really, received The call request of the first user.
In being embodied as, further extension, the voice with reference to shown in Fig. 7 can also be made to above-mentioned voice communication method Communication means flow chart, comprises the following steps that:
S701, receives the call request via virtual-number from first user.
Communicating number can be divided into physical number and corresponding to the physical number set by user Virtual-number.When the communicating number of the first user institute calling party is the corresponding virtual number of telephone number that currently enables After code, can be with execution step S702, when the communicating number of the first user institute calling party is the telephone number that currently enables When, can direct execution step S705.
First user can dial the virtual-number of second user by communication terminal, and the call request can be by clothes The business intermediary communications device such as device is processed and transmitted, and eventually arrive at that the second user held is inserted with the virtual-number The communication terminal of bound communicating number.
S702, obtains the communication pattern set by second user, judges the communication pattern set by the second user, when When communication pattern set by the second user is secret, then execution step S703;When logical set by the second user When letter pattern is open, execution step S704.
In being embodied as, if acquired communication pattern for it is open, can also first obtain preserved described virtual Effective existence time information of number, when it is determined that the virtual-number is in effective existence time section, then execution step S704.
After the virtual-number in open mode exceedes effective existence time, in being embodied as, can basis User is specifically arranged can switch to privacy mode, or forbid call model, or nullify etc..
S703, judges whether once to call the first user using the virtual-number, if it is, execution step S704;If it is not, then execution step S705.
S704, receives the call request of the first user.
S705, refuses the call request of the first user.
In being embodied as, in order in the case where ensureing that user is obtained in that open information, it is to avoid user is by phone Harassing and wrecking, in the case of communication pattern is disclosed, can also arrange mask pattern, and user can select to be needed under open mode The communicating number of the user of shielding is shielded.It is implemented as follows:When the communication pattern set by the second user is public affairs When opening, judge whether second user opens mask pattern to the first user;If opening shielding mould to the first user Formula, then refuse the call request of the first user;If not opening mask pattern to the first user, the reception is performed The operation of the call request of the first user.
In being embodied as, a telephone number can be only enabled on the communication terminal, it is also possible to while having multiple Telephone number is in upstate.As it was previously stated, user can arrange one or more accordingly virtually for each telephone number Number, or all or part telephone number enabled on the communication terminal is respectively provided with one or more corresponding void Intend number.When the telephone number multiple virtual-numbers of correspondence that the communication terminal is currently enabled, each virtual-number can be right Default groups of users is answered, the different communication requirement of user is met.
The communication terminal that can realize above-mentioned communication means is described in detail below in conjunction with accompanying drawing.
Communication terminal 800 with reference to shown in Fig. 8, can include following part:
Second receiving unit 801, is suitable to receive the call request from first user via virtual-number;
Second judging unit 802, is suitable to judge whether the second user once adopted the virtual-number and described first User carried out call;
Second performance element 803, is suitable to when it is determined that once carrying out call using the virtual-number, receive described first The call request of user, when it is determined that not carrying out call using the virtual-number, refuses the calling of the first user Request.
Communication terminal 900 with reference to shown in Fig. 9, be with the difference of communication terminal 800, in the base of communication terminal 800 On plinth, communication terminal 900 can also include:3rd acquiring unit 901, wherein:
3rd acquiring unit 901, is suitable to obtain the communication pattern set by the second user;
Second judging unit 802, is suitable to set described in the second user when the 3rd acquiring unit 901 be got When the communication pattern put is secret, execution is described to judge whether the second user once adopted the virtual-number and described first User carried out the operation conversed.
In being embodied as, second performance element 803 is further adapted for being got in the 3rd acquiring unit 901 described When communication pattern set by second user is open, the operation of the call request for receiving the first user is performed.
The communication pattern set by the second user in being embodied as, acquired in the 3rd acquiring unit 901 Information can be preserved on communication terminals, it is also possible to be stored on other communication equipments.In an embodiment of the present invention, it is described logical Letter terminal can also include the second memory cell 902, be suitable to preserve the communication mode information of the ID set by user.
Using the communication terminal, the telephone number enabled on the communication terminal is arranged into different communication patterns, can While user information safety is protected, further to improve the convenience of telex network.
In being embodied as, in order to save virtual-number resource, the communication terminal 900 may also include:Second verification is single Unit 903, is suitable to, when it is open that the 3rd acquiring unit 901 gets the communication pattern set by the second user, obtain Take effective existence time of the virtual-number;
Second performance element 803 is further adapted for determining the phone for currently enabling in second verification unit 903 When virtual-number corresponding to number is in effective existence time section, performs and receive the call request that the first user sends Operation.
And when the virtual-number not in effective existence time section when, can be arranged the virtual-number according to user Switch to privacy mode or forbid call model, or nullify the virtual-number to discharge virtual-number resource.
As shown in figure 9, in an embodiment of the present invention, communication terminal 900 may also include the 4th acquiring unit 904, be suitable to When it is open that the 3rd acquiring unit 901 gets the communication pattern set by the second user, described second is obtained Whether user opens mask pattern to the first user;
Second performance element is further adapted for getting the second user to described first in the 3rd acquiring unit When user opens mask pattern, the operation of the call request of the refusal first user is performed, obtained in the 3rd acquiring unit When getting the second user and not opening mask pattern to the first user, the call request for receiving the first user is performed Operation.
In being embodied as, the communication terminal can be the handheld devices such as mobile phone, or other may be inserted into hand The communication terminal of machine card, can also be landline telephone.
It should be noted that in the embodiment of the present invention, for convenience of description, existing and illustrating multiple embodiments with one The combination of the part-structure unit or step in situation, such as accompanying drawing can also be as independent embodiment, wherein using dotted line frame The construction unit of expression, can as needed select which part or all carry out various combination, however it is not limited to one shown in figure Structure is planted, as shown in figs. 5 and 9, is repeated no more.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completed with instructing the hardware of correlation by program, the program can be stored in a computer-readable recording medium, storage Medium can include:ROM, RAM, disk or CD etc..
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art, without departing from this In the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute The scope of restriction is defined.

Claims (12)

1. a kind of voice communication method, it is characterised in that include:
The call request via virtual-number from first user is received, it is logical comprising the first user in the call request The virtual-number of signal code and the second user for being called;
Obtain the communication pattern set by the second user;
When the communication pattern set by the second user is secret, the message registration preserved by match query is judged Whether the corresponding second user of the virtual-number once called the first user by the virtual-number;When described second When user once called the first user by the virtual-number, to the second user call request is sent;When described When second user did not call the first user by the virtual-number, refuse the call request of the first user;
When the communication pattern set by the second user is open, the virtual number set by the second user is obtained Effective existence time information of code;When it is determined that the virtual-number is in effective existence time section, send out to the second user Send call request;When it is determined that the virtual-number not in effective existence time section when, according to user arrange, by the virtual number Code switchs to privacy mode or forbids call model, or nullifies the virtual-number.
2. voice communication method according to claim 1, it is characterised in that when the communication mould set by the second user When formula is open, before call request is sent to the second user, also include:
Obtain whether the second user opens mask pattern to the first user;
If open mask pattern to the first user, cancel and described send call request to the second user Operation;
If not opening mask pattern to the first user, perform and described send the call request to the second user Operation.
3. voice communication method according to claim 1, it is characterised in that the virtual-number and the second user At least one telephone number is bound.
4. voice communication method according to claim 3, it is characterised in that the virtual-number includes at least one, often The corresponding default groups of users of individual virtual-number.
5. a kind of voice communication method, it is characterised in that include:
The call request via virtual-number from first user is received, it is logical comprising the first user in the call request The virtual-number of signal code and the second user for being called;
The communication terminal obtains the communication pattern set by the second user;
When the communication pattern set by the second user is secret, the message registration preserved by match query is judged Whether second user once called the first user using the virtual-number;When it is determined that the second user is once using described When virtual-number called the first user, the call request of the first user is received;When it is determined that the second user not When once calling the first user using the virtual-number, refuse the call request of the first user;
When the communication pattern set by the second user is open, the virtual number set by the second user is obtained Effective existence time information of code;When it is determined that the virtual-number is in effective existence time section, the first user is received Call request;When it is determined that the virtual-number not in effective existence time section when, according to user arrange, by the virtual number Code switchs to privacy mode or forbids call model, or nullifies the virtual-number.
6. voice communication method according to claim 5, it is characterised in that when the communication mould set by the second user When formula is open, before the operation for performing the call request for receiving the first user, also include:
Judge whether second user opens mask pattern to the first user;
If opening mask pattern to the first user, refuse the call request of the first user;
If not opening mask pattern to the first user, the behaviour of the call request for receiving the first user is performed Make.
7. voice communication method according to claim 5, it is characterised in that the virtual-number and the second user At least one telephone number is bound.
8. voice communication method according to claim 7, it is characterised in that the virtual-number includes at least one, often The corresponding default groups of users of individual virtual-number.
9. a kind of server, it is characterised in that include:
First receiving unit, is suitable to receive the call request from first user via virtual-number, wraps in the call request The virtual-number of the communicating number containing the first user and the second user for being called;
First acquisition unit, is suitable to obtain the communication pattern set by the second user;
First judging unit, being suitable to the communication pattern set by the second user that gets when the first acquisition unit is During secret, the message registration preserved by match query judges whether the virtual-number correspondence second user once passed through institute State virtual-number and call the first user;
First verification unit, being suitable to the communication pattern set by the second user that gets when the first acquisition unit is When open, effective existence time of the virtual-number set by the second user is obtained;
First performance element, is suitable to when first judging unit determines that once calling described first by the virtual-number uses During family, call request is sent to the second user, do not exhaled by the virtual-number when first judging unit determines When being the first user, refuse the call request of the first user;First performance element is further adapted in first school When verification certificate unit determines that the virtual-number is in effective existence time section, to the second user call request is sent;When it is determined that The virtual-number not in effective existence time section when, according to user arrange, by the virtual-number switch to privacy mode or Person forbids call model, or nullifies the virtual-number.
10. server according to claim 9, it is characterised in that also include:Second acquisition unit, is suitable to described When one acquiring unit gets the communication pattern set by the second user to disclose,
Obtain whether the second user is that the first user opens mask pattern;
It is described first that first performance element is further adapted for getting the second user and opening in the second acquisition unit When user opens mask pattern, the operation that call request is sent to the second user is cancelled, obtained described second Take unit get the second user not to the first user open mask pattern when, perform it is described to the second user Send the operation of the call request.
11. a kind of communication terminals, it is characterised in that include:
Second receiving unit, is suitable to receive the call request from first user via virtual-number, wraps in the call request The virtual-number of the communicating number containing the first user and the second user for being called;
3rd acquiring unit, is suitable to obtain the communication pattern set by the second user;
Second judging unit, it is private to be suitable to when the 3rd acquiring unit gets the communication pattern set by the second user When close, judge whether second user once called the first user using the virtual-number;
Second verification unit, it is public affairs to be suitable to when the 3rd acquiring unit gets the communication pattern set by the second user When opening, effective existence time of the virtual-number set by the second user is obtained;
Second performance element, is suitable to when the determination second user once called the first user using the virtual-number When, receive the call request of the first user;When it is determined that not calling the first user using the virtual-number, Refuse the call request of the first user;It is further adapted for determining that the virtual-number is effectively present in second verification unit When in the time period, the call request that the first user sends is received, when it is determined that the virtual-number is not in effective existence time When in section, arranged according to user, the virtual-number is switched to into privacy mode or forbids call model, or nullify the void Intend number.
12. communication terminals according to claim 11, it is characterised in that also include:4th acquiring unit, is suitable to described When 3rd acquiring unit gets the communication pattern set by the second user to disclose, whether right the second user is obtained The first user opens mask pattern;
Second performance element is further adapted for getting the second user to the first user in the 3rd acquiring unit When opening mask pattern, the operation of the call request of the refusal first user is performed, got in the 3rd acquiring unit When the second user does not open mask pattern to the first user, the behaviour of the call request for receiving the first user is performed Make.
CN201410617675.0A 2014-11-05 2014-11-05 Speech communication method, communication terminal and server Active CN104284031B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410617675.0A CN104284031B (en) 2014-11-05 2014-11-05 Speech communication method, communication terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410617675.0A CN104284031B (en) 2014-11-05 2014-11-05 Speech communication method, communication terminal and server

Publications (2)

Publication Number Publication Date
CN104284031A CN104284031A (en) 2015-01-14
CN104284031B true CN104284031B (en) 2017-05-17

Family

ID=52258495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410617675.0A Active CN104284031B (en) 2014-11-05 2014-11-05 Speech communication method, communication terminal and server

Country Status (1)

Country Link
CN (1) CN104284031B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106303103B (en) * 2015-06-25 2019-08-16 阿里巴巴集团控股有限公司 A kind of communication means and device for protecting personal information
CN106791232A (en) * 2017-02-27 2017-05-31 成都三六时代科技有限公司 The means of communication of identity-based certification
CN108307034A (en) * 2017-10-27 2018-07-20 努比亚技术有限公司 A kind of urgency traffic connection method, system, mobile terminal and computer readable storage medium
CN108040163A (en) * 2017-12-25 2018-05-15 刘光明 The alternative distribution method of telephone number
CN108769977B (en) * 2018-03-30 2021-05-14 北京五八信息技术有限公司 Call record attribution order determining method and device, electronic equipment and storage medium
CN113114859A (en) * 2018-05-29 2021-07-13 维沃移动通信有限公司 Number interception method and server
CN111756932A (en) * 2019-03-29 2020-10-09 福建省天奕网络科技有限公司 Communication number protection method and storage medium
CN110290281B (en) * 2019-07-19 2020-10-16 携程旅游信息技术(上海)有限公司 Outbound method, system, electronic device and medium
CN111131633B (en) * 2019-12-18 2021-10-22 华为技术有限公司 Application method of virtual number, communication method and related device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI973787A (en) * 1997-09-25 1999-03-26 Nokia Telecommunications Oy Collaboration of intelligent network services
JP5156463B2 (en) * 2008-04-16 2013-03-06 株式会社エヌ・ティ・ティ・ドコモ COMMUNICATION CONTROL METHOD, COMMUNICATION SYSTEM AND COMMUNICATION CONTROL DEVICE
WO2012007018A1 (en) * 2010-07-12 2012-01-19 Telefonaktiebolagt L M Ericsson (Publ) Enhanced privacy protection in a telecommunication network
CN102624995B (en) * 2011-01-27 2016-01-13 中国电信股份有限公司 Be applicable to virtual-number application process, the Apparatus and system of the Internet

Also Published As

Publication number Publication date
CN104284031A (en) 2015-01-14

Similar Documents

Publication Publication Date Title
CN104284031B (en) Speech communication method, communication terminal and server
US11501395B2 (en) System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
US7797379B2 (en) System and method for shared spam call blocking
CN104660809A (en) Answer management method and device for incoming call of private contact person
CN103906067B (en) The recognition methods of false calling number and device
CN102143461A (en) Intelligent call forwarding method and device
CN104038613B (en) The method and apparatus of information security management
CN104822139B (en) A method of communicating number isolation and secret protection are realized based on intermediate number
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
CN107708078A (en) Mobile terminal and its call transferring method, storage device
CN105516084B (en) A kind of method of calling, call server
CN104023323B (en) The method and device that client binding terminal is called
CN1937663A (en) Method, system and device for realizing variable voice telephone business
CN107426708A (en) The switching method and apparatus of intercommunication terminal, call model
CN108271158A (en) Call processing method and system
CN107018240A (en) A kind of call method and system of hiding called number
CN107306395A (en) A kind of call method for building up based on control of authority
CN108200296A (en) A kind of method and device for calling car owner and moving vehicle
CN104202462B (en) Communication control method and system
CN106713591A (en) Method and device for answering incoming call of specific number automatically
CN106507324A (en) Communication method, device and system based on mobile equipment
CN107623768A (en) The method of automatic addition blacklist, the device and communication terminal with store function
CN106791232A (en) The means of communication of identity-based certification
CN108418977B (en) Multifunctional call limiting method for mobile communication company
CN104967605B (en) Privacy protection method and privacy protection device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant