CN108289092A - A kind of system for establishing call connection using safety keyboard - Google Patents

A kind of system for establishing call connection using safety keyboard Download PDF

Info

Publication number
CN108289092A
CN108289092A CN201711463029.3A CN201711463029A CN108289092A CN 108289092 A CN108289092 A CN 108289092A CN 201711463029 A CN201711463029 A CN 201711463029A CN 108289092 A CN108289092 A CN 108289092A
Authority
CN
China
Prior art keywords
called
keyboard
security
communication number
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711463029.3A
Other languages
Chinese (zh)
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201711463029.3A priority Critical patent/CN108289092A/en
Publication of CN108289092A publication Critical patent/CN108289092A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/0202Constructional details or processes of manufacture of the input device
    • G06F3/0219Special purpose keyboards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of system for establishing call connection using safety keyboard, which includes:Caller safety keyboard, called safety keyboard and background server, called safety keyboard is used for after passing through to the authentication of called subscriber, it obtains and is called communicating number, and send the called position record request for carrying called subscriber's location information and called communicating number to background server;Background server, for receiving the record request of called position, and by called communicating number and called subscriber's location information associated storage;Caller safety keyboard is additionally operable to carry out safe handling to the called communicating number dialed, generates safety-oriented data transfer, and send the call request for carrying safety-oriented data transfer to background server;Background server receives call request, obtains and is called communicating number, and according to called communication number acquisition called subscriber location information, and the operation of caller safety keyboard and the call connection of called safety keyboard is executed according to called subscriber's location information.

Description

System for establishing call connection by using security keyboard
Technical Field
The invention relates to the field of communication, in particular to a system for establishing communication connection by using a safety keyboard.
Background
Under the existing call system, the physical port of the fixed telephone is fixed, and other people can only contact the user by contacting the fixed telephone. For example, in an application scenario of using a fixed telephone in an office, when a certain physical port and a telephone number are allocated to a certain user, since the physical port of the fixed telephone is fixed, if the user is not at the telephone location (for example, the office is changed, or a meeting is taken in a meeting room, etc.), other people dialing the telephone number will not find the user any more, so that the user is very inconvenient to contact.
Disclosure of Invention
The present invention aims to solve one of the above problems.
The invention mainly aims to provide a system for establishing call connection by using a safety keyboard.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
one aspect of the present invention provides a system for establishing a call connection using a security keyboard, the system comprising: the system comprises a calling safety keyboard, a called safety keyboard and a background server, wherein the calling safety keyboard is used for accessing a communication network; the called safety keyboard is used for accessing a communication network; the called safety keyboard is further used for acquiring the identity information of the called user, acquiring a called communication number after the identity information of the called user passes authentication, and generating binding information according to the called communication number, wherein the binding information comprises the called communication number or first safety transmission data, the first safety transmission data is generated after the called safety keyboard performs first safety processing on the called communication number, and a called position recording request is sent to a background server, and the called position recording request carries the called user position information and the binding information; the background server is used for receiving the called position recording request and storing the binding information and the called user position information in an associated manner; the calling safety keyboard is further used for acquiring identity information of a calling user, detecting whether a key representing dialing or a function combination key representing dialing is pressed or not after the identity information of the calling user is authenticated, if yes, receiving the called communication number input by the calling user on the calling safety keyboard, performing second safety processing on the called communication number, generating second safety transmission data, and sending a calling request to a background server, wherein the calling request at least comprises the safety transmission data; the background server is also used for receiving the call request; the background server is further used for acquiring the called communication number according to the second safety transmission data when the binding information comprises the called communication number, and acquiring called user position information stored in association with the called communication number according to the called communication number; the background server is further used for acquiring the called user position information stored in association with the second safety transmission data according to the second safety transmission data when the binding information comprises the first safety transmission data, wherein the first safety processing is the same as the second safety processing; the background server is also used for executing the operation of establishing the call connection between the calling safety keyboard and the called safety keyboard according to the position information of the called user and sending a call response to the calling safety keyboard; the calling safety keyboard is also used for receiving a calling response, establishing communication connection with the called safety keyboard and communicating with the called safety keyboard; the calling safety keyboard is also used for carrying out safety processing or decryption on the call data; the called safety keyboard is also used for carrying out safety processing or decryption on the call data.
In addition, when the binding information includes the first secure transmission data: the called safety keyboard performs first safety processing on the called communication number and comprises the following steps: the called safety keyboard encrypts the called communication number; the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keyboard encrypts the called communication number; or, the first security processing of the called communication number by the called security keyboard comprises: the called safety keyboard processes the called communication number according to the mapping rule; the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keyboard processes the called communication number according to the mapping rule.
In addition, when the binding information includes the called communication number: the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keyboard encrypts the called communication number; the background server obtaining the called communication number according to the second safety transmission data comprises the following steps: the calling security keyboard decrypts the second security transmission data to obtain a called communication number; or, the second security processing of the called communication number by the calling security keyboard comprises: the calling safety keyboard processes the called communication number according to the mapping rule; the background server acquires the called communication number according to the second safety transmission data, and the method comprises the following steps: and the background server maps the second safety transmission data into a called communication number.
In addition, the identity information includes: biometric images, identification card information, employee card information, and/or PIN codes.
In addition, the called security keyboard is further used for acquiring the called communication number, and comprises: the called safety keyboard is also used for searching a called communication number which is stored corresponding to the identity information in the called safety keyboard; or the called security keyboard is also used for sending the identity information to the cloud server; the cloud server is used for searching the called communication number stored corresponding to the identity information and sending the called communication number to the called safety keyboard; the called safety keyboard is also used for receiving a called communication number; or the called security keyboard is also used for acquiring the called communication number which is stored corresponding to the identity information from the external storage equipment.
In addition, the background server is also used for sending a signature verification request to the called safe keyboard after receiving the call request, wherein the signature verification request at least carries data to be signed; the called safe keyboard is also used for receiving the data to be signed, signing the data to be signed to obtain signature result data and sending the signature result data to the background server; and the background server is also used for receiving the signature result data, checking the signature of the signature result data, and sending a call response to the calling security keyboard after the signature passes the checking.
Compared with the defect that the telephone number of a user can only be fixed on one terminal in the prior art, the system for establishing the call connection by using the safety keyboard realizes the association of the called communication number and different called safety keyboards, namely realizes the flexible movement of the telephone number. Different users can answer the phone through the same called safe keyboard, so that the utilization rate of the keyboard phone is improved. In addition, when the calling user dials the called communication number, the safety transmission data is sent, so that illegal users can be prevented from tampering the called communication number, and the called user is falsely used for communicating with the calling user, and the calling safety is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a system in which a calling security keyboard and a called security keyboard provided in embodiment 1 of the present invention directly access a communication network and are connected to a background server.
Fig. 2 is a schematic structural diagram of a system in which a calling security keyboard and a called security keyboard provided in embodiment 1 of the present invention are connected to a background server through a communication network accessed by a calling terminal and a called terminal, respectively;
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "up", "down", "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or quantity or location.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
Example 1
The embodiment provides a system for establishing call connection by using a security keyboard. Fig. 1 is a schematic structural diagram of a system for establishing a call connection by using a security keyboard according to this embodiment, and as shown in fig. 1, the system according to the embodiment of the present invention includes: the system comprises a calling safety keyboard, a called safety keyboard and a background server, wherein the calling safety keyboard is used for accessing a communication network; the called safety keyboard is used for accessing a communication network; the called safety keyboard is further used for acquiring the identity information of the called user, detecting whether a key representing dialing or a function combination key representing dialing is pressed or not after the identity information of the called user is authenticated, if so, receiving the called communication number input by the calling user on the calling safety keyboard, generating binding information according to the called communication number, wherein the binding information comprises the called communication number or first safety transmission data, the first safety transmission data is generated after the called safety keyboard performs first safety processing on the called communication number, and sending a called position recording request to a background server, and the called position recording request carries the called user position information and the binding information; the background server is used for receiving the called position recording request and storing the binding information and the called user position information in an associated manner; the calling security keyboard is further used for acquiring identity information of a calling user, acquiring a called communication number dialed by the calling user after the identity information of the calling user passes authentication, performing second security processing on the called communication number, generating second security transmission data, and sending a call request to the background server, wherein the call request at least comprises the security transmission data; the background server is also used for receiving the call request; the background server is further used for acquiring the called communication number according to the second safety transmission data when the binding information comprises the called communication number, and acquiring called user position information stored in association with the called communication number according to the called communication number; the background server is further used for acquiring the called user position information stored in association with the second safety transmission data according to the second safety transmission data when the binding information comprises the first safety transmission data, wherein the first safety processing is the same as the second safety processing; the background server is also used for executing the operation of establishing the call connection between the calling safety keyboard and the called safety keyboard according to the position information of the called user and sending a call response to the calling safety keyboard; the calling safety keyboard is also used for receiving a calling response, establishing communication connection with the called safety keyboard and communicating with the called safety keyboard; the calling safety keyboard is also used for carrying out safety processing or decryption on the call data; the called safety keyboard is also used for carrying out safety processing or decryption on the call data.
In this embodiment, the calling security keypad and the called security keypad are keypads with a call function.
In this embodiment, the communication network may be a fixed telephone communication network, a mobile communication network, or the internet, and this embodiment is not particularly limited.
In this embodiment, the called security keyboard may directly access the communication network, for example, may directly access the communication network through wifi. As shown in fig. 1, the called security keyboard in this embodiment directly accesses to the communication network and is connected to the background server, so that the called terminal can make and receive calls through the called security keyboard even when the called terminal is powered off.
In this embodiment, the called security keyboard may also access the communication network through a called terminal (e.g., a PC), and the access mode may be wireless (e.g., bluetooth, etc.) or wired (e.g., a USB interface), which is not specifically limited in this embodiment. As shown in fig. 2, the called security keyboard is connected to the background server through the called terminal access communication network, and the calling security keyboard is connected to the background server through the calling terminal access communication network.
In this embodiment, the identity information includes: the biometric image, the identification card information, the employee card information, and/or the PIN code, which may be other forms of identification information, and this embodiment is not particularly limited.
As an optional implementation manner of this embodiment, when the identity information of the called user acquired by the called security keyboard is a biometric image (e.g., a face image, a fingerprint, an iris, or the like), the called security keyboard may perform identity information authentication on the called user, or an authentication server in communication connection with the called security keyboard may perform identity information authentication on the called user. Two authentication methods are specifically described below: the authentication of the identity information of the called user comprises the following steps: and the called safety keyboard performs image processing on the biological characteristic image, extracts a first biological characteristic value, searches whether a second biological characteristic value which is the same as the first biological characteristic value is stored in the first biological characteristic value, and if so, authenticates the identity information of the called user. As another optional mode, the authenticating identity information of the called user includes: the called security keyboard performs image processing on the biological characteristic image, extracts a first biological characteristic value and sends the first biological characteristic value to the authentication server; the authentication server searches whether a second biological characteristic value which is the same as the first biological characteristic value is stored in the authentication server, and if the second biological characteristic value is stored in the authentication server, the identity authentication of the called user is passed. In this embodiment, by authenticating the identity of the user, an unauthorized user can be prevented from using the called security keypad.
As an optional implementation manner of this embodiment, the identity information of the called user acquired by the called security keyboard is identity card information, and the identity card information is identity information that uniquely identifies the identity of the called user, such as an identity card number or a face image. In specific application, the called security keyboard can integrate a card reading module, and the identity card information can be read through the card reading module, so that the called security keyboard can conveniently acquire the identity information of the called user. Optionally, the identity card information of the called user may also be obtained through an electronic signature device connected to the electronic signature device, which is not specifically limited in this embodiment.
As an optional implementation manner of this embodiment, the authentication of the identity information of the called user is authentication of the identity card information of the called user, and the authentication of the identity information of the called user includes: the called safety keyboard searches whether the identity card information of the called user is stored in the called safety keyboard, and if the identity card information of the called user is stored in the called safety keyboard, the identity information of the called user is authenticated to pass. As another optional mode, the authenticating identity information of the called user includes: the called security keyboard sends the identity card information of the called user to the authentication server, the authentication server searches whether the identity card information of the called user is stored in the authentication server, and if the identity card information of the called user is stored in the authentication server, the authentication of the identity card information of the called user is passed. In this embodiment, through authentication of the user identification card, an unauthorized user can be prevented from using the security keyboard.
As an optional implementation manner of this embodiment, before authenticating the identity card information of the called user, the method further includes: the called safety keyboard collects the face information of the called user through the camera, compares the face information collected by the camera with the face image in the identity card read by the card reading module, and if the face information is consistent with the face image, the called safety keyboard performs authentication operation on the identity information of the called user. Before the identity information of the called user is authenticated, whether the face information acquired by the camera is the same as the face image of the used identity card or not is verified, and therefore other users falsely use the called user to use the called safety keyboard under the condition that the identity card of the called user is prevented from being lost.
As an optional implementation manner of this embodiment, the identity information of the called user acquired by the called security keyboard is employee card information, and a specific authentication manner is the same as the authentication manner for the identity card information, which is not described in detail in this embodiment.
As an optional implementation manner of this embodiment, the identity information acquired by the called user is a PIN code, and only the called user who inputs the correct PIN code can use the called security keypad.
In the embodiment of the present invention, the called communication number uniquely identifies the called user, and the called communication number may be a phone number, a micro signal or another communication number, which is not specifically limited in this embodiment.
In this embodiment, the step of obtaining the called communication number further includes: the called safety keyboard is also used for searching a called communication number which is stored corresponding to the identity information in the called safety keyboard; or the called security keyboard is also used for sending the identity information to the cloud server; the cloud server is used for searching the called communication number stored corresponding to the identity information and sending the called communication number to the called safety keyboard; the called safety keyboard is also used for receiving a called communication number; or the called security keyboard is also used for acquiring the called communication number which is stored corresponding to the identity information from the external storage equipment. In a specific application, the external storage device may be a storage device such as an electronic signature device, and the embodiment is not particularly limited. The called communication number is stored in a called safety keyboard, a cloud server or external equipment, and the corresponding called communication number is searched according to the identity information of the user, so that the flexible movement of the telephone number is realized.
As an optional implementation manner of this embodiment, the called security keyboard, the cloud server, or the external device may store communication numbers of multiple users and multiple pieces of identity information stored in correspondence with the communication numbers. Therefore, different users can answer the phone through the same called safe keyboard, and the utilization rate of the keyboard phone is improved.
In this embodiment, the called security keyboard directly accesses the communication network through wifi, and the location information of the called user is the network location information of the called security keyboard, where the network location information may be an IP address, a network port, or location information of other called security keyboards.
In this embodiment, when the called security keypad is accessed to the communication network through the called terminal, the location information of the called user is the network location information of the called terminal, where the network location information may be an IP address, a network port or the location information of other called terminals, as long as the network side can establish a connection with the called security keypad through the location information of the called user, and the specific embodiment of the present invention is not particularly limited.
In the embodiment of the present invention, the binding information stored in association with the called user location information may be a called communication number, or may be first safety transmission data generated after performing first safety processing on the called communication number, and this embodiment is not particularly limited.
In this embodiment, when the binding information includes the first secure transmission data, the called secure keyboard is further configured to perform a first secure processing on the called communication number to generate the first secure transmission data, after acquiring the called communication number, before sending the called location record request to the background server. The position record request carries the position information of the called user and first safety transmission data; and after receiving the called position recording request, the background server stores the first safety transmission data and the position information of the called user in a correlation manner. In this embodiment, the called security keyboard performs first security processing on the called communication number and then sends the first security transmission data to the background server, so that the called communication number associated with the position information of the called user can be prevented from being tampered by an illegal party, and the illegal party is prevented from pretending to be the called user to perform a call.
As an optional implementation manner, when the binding information includes the first secure transmission data, the performing, by the called secure keypad, the first secure processing on the called communication number includes: the called security keyboard encrypts the called communication number; the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keypad encrypts the called communication number. The encryption algorithm used in this embodiment is not limited, and for example, the encryption algorithm may be DES, AES, or the like. That is, the first security process is the same as the second security process in that the called communication number is encrypted. In this embodiment, the first secure transmission data is a called communication number ciphertext, and the called communication number is encrypted to prevent an illegal user from tampering the called communication number, falsely use a called user to communicate with a calling user, so that the security of a call is ensured.
As another optional implementation, when the binding information includes the first secure transmission data, the performing, by the called secure keypad, the first secure processing on the called communication number includes: the called safety keyboard processes the called communication number according to a mapping rule; the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: and the calling security keyboard processes the called communication number according to a mapping rule. In this embodiment, the first security process and the second security process are the same and both mapping processes are performed on the called communication number. In this embodiment, the first secure transmission data is a mask obtained by mapping the called communication number, and the called communication number is mapped as the mask, so that an illegal user can be prevented from tampering the called communication number, and a called user is falsely used to communicate with a calling user, thereby ensuring the security of a call.
In this embodiment, when the binding information includes the first security transmission data, the background server obtains the location information of the called user associated with the binding information according to the second security transmission data, so that the calling user can find the location information of the called user and communicate with the called user no matter what called security keyboard the called user uses, as long as the association relationship between the location information of the called user and the binding information is stored in the background server.
As another implementation manner of this embodiment, when the binding information includes a called communication number, the performing, by the calling security keyboard, a second security process on the called communication number includes: the calling security keyboard encrypts the called communication number; the background server obtaining the called communication number according to the second safety transmission data comprises the following steps: and the calling safety keyboard decrypts the second safety transmission data to acquire the called communication number. In specific application, the second safety transmission data is called communication number ciphertext, the called communication number is encrypted, so that an illegal user can be prevented from tampering the called communication number, a called user is falsely used for communicating with a calling user, and the calling safety is ensured.
As an optional implementation manner of this embodiment, when the binding information includes a called communication number, the performing, by the calling security keyboard, a second security process on the called communication number includes: the calling safety keyboard processes the called communication number according to the mapping rule; the background server obtaining the called communication number according to the safety transmission data comprises the following steps: and the background server maps the safe transmission data into a called communication number. For example, the calling security keyboard may transform the called communication number based on time and dialing times, the security transmission data is a value of the changed called communication number, the background server receives the transformed value, and maps the transformed value to the called communication number based on the same mapping rule. In this embodiment, the called user is not limited to the fixed called security keypad, and as long as the called user has a use right (i.e., passes the identity authentication) and the called security keypad capable of acquiring the called communication number can send the binding information and the location information of the called user to the background server, and the background server stores the binding information and the location information of the called user in association, the location information of the called user can be conveniently determined, so as to contact the called user.
As an optional implementation manner of this embodiment, after the background server stores the called communication number and the called user location information in an associated manner, the background server is further configured to release the association relationship between the called communication number and the called user location information. In the specific implementation process, the disassociation may be initiated by the background server or initiated by the called secure keyboard. For example, the background server may release the association relationship between the called communication number and the called user location information after a certain user is not received as a called call within a predetermined period of time; or the called user can also send a release request to the background server through the terminal to request the background server to release the association relationship between the called communication number and the position information of the called user. Through the optional embodiment, the user can release the association relationship between the called communication number and the called user position information when not using a certain called safety keyboard, so that other users can use the called safety keyboard, and the utilization rate of the called safety keyboard is improved.
In this embodiment, the calling security keyboard may also serve as a called security keyboard, and the calling security keyboard has all functions of the called security keyboard, and the description of the calling security keyboard is not repeated in this embodiment.
As an optional implementation manner of this embodiment, the background server is further configured to send an authentication request to the called secure keyboard after receiving the call request, where the authentication request at least carries data to be signed; the called safe keyboard is also used for receiving the data to be signed, signing the data to be signed to obtain signature result data and sending the signature result data to the background server; and the background server is also used for receiving the signature result data, checking the signature of the signature result data, and sending a call response to the calling security keyboard after the signature passes the checking. By the optional implementation mode, the identity of the current called user can be ensured, the call is prevented from being answered by an illegal user, and the call safety is ensured.
In this embodiment, after receiving the call request, the background server decrypts the communication number ciphertext to obtain the called communication number, and obtains the called party location information according to the association relationship between the called communication number and the called party location information, and the background server determines the location of the called security keyboard according to the called party location information and performs call connection between the calling security keyboard and the called security keyboard according to the called party location information. Therefore, even if the called user leaves the work station of the called user, the calling user can conveniently contact the called user as long as the called user sends the position record request to the server on the called safety keyboard of the company.
In this embodiment, after the calling security keyboard and the called security keyboard establish a call connection, the calling security keyboard is further configured to perform security processing on the first call data, generate a first call data ciphertext, and send the first call data ciphertext to the background server; the background server is also used for sending a first call data cipher text to the called secure keyboard; the called security keyboard is also used for receiving the first call data ciphertext and decrypting the first call data ciphertext to acquire the first call data. In this embodiment, the calling security keyboard sends the call data through the ciphertext, so that the security of the call data is ensured.
In this embodiment, after the calling security keyboard and the called security keyboard establish a call connection, the called security keyboard is further configured to perform security processing on the second call data, generate a second call data ciphertext, and send the second call data ciphertext to the background server; the calling security keyboard is also used for receiving the second communication data ciphertext and decrypting the second communication data ciphertext to acquire the second communication data. In this embodiment, the called security keyboard sends the call data through the ciphertext, so that the security of the call data is ensured.
Compared with the defect that the telephone number of a user can only be fixed on one terminal in the prior art, the system for establishing the call connection by using the safety keyboard realizes the association of the called communication number and different called safety keyboards, namely realizes the flexible movement of the telephone number. Different users can answer the phone through the same called safe keyboard, so that the utilization rate of the keyboard phone is improved. In addition, when the calling user dials the called communication number, the safety transmission data is sent, so that illegal users can be prevented from tampering the called communication number, and the called user is falsely used for communicating with the calling user, and the calling safety is ensured.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (6)

1. A system for establishing a call connection using a secure keyboard, the system comprising: a calling security keyboard, a called security keyboard and a background server, wherein,
the calling security keyboard is used for accessing a communication network;
the called safety keyboard is used for accessing a communication network;
the called security keyboard is further configured to acquire identity information of the called user, acquire a called communication number after the identity information of the called user is authenticated, generate binding information according to the called communication number, where the binding information includes the called communication number or first security transmission data, the first security transmission data is generated after the called security keyboard performs first security processing on the called communication number, and send a called location recording request to a background server, where the called location recording request carries called user location information and the binding information;
the background server is used for receiving the called position recording request and storing the binding information and the called user position information in an associated manner;
the calling security keyboard is further configured to acquire identity information of the calling user, detect whether a key representing dialing or a function combination key representing dialing is pressed after the identity information of the calling user is authenticated, if yes, receive the called communication number input by the calling user on the calling security keyboard, perform second security processing on the called communication number, generate second security transmission data, and send a call request to the background server, where the call request at least includes the security transmission data;
the background server is also used for receiving the call request;
the background server is further configured to acquire the called communication number according to the second secure transmission data when the binding information includes the called communication number, and acquire the called user location information stored in association with the called communication number according to the called communication number;
the background server is further configured to, when the binding information includes the first security transmission data, obtain, according to the second security transmission data, the called user location information stored in association with the second security transmission data, where the first security processing is the same as the second security processing;
the background server is further used for executing the operation of establishing the call connection between the calling safety keyboard and the called safety keyboard according to the position information of the called user and sending a call response to the calling safety keyboard;
the calling security keyboard is also used for receiving the call response, establishing communication connection with the called security keyboard and communicating with the called security keyboard;
the calling security keyboard is also used for carrying out security processing or decryption on the call data;
the called safe keyboard is also used for carrying out safe processing or decryption on the call data.
2. The system of claim 1,
when the binding information comprises the first safety transmission data:
the called security keyboard performs first security processing on the called communication number, and the first security processing comprises the following steps: the called security keyboard encrypts the called communication number; the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keyboard encrypts the called communication number; or,
the called security keyboard performs first security processing on the called communication number, and the first security processing comprises the following steps: the called safety keyboard processes the called communication number according to a mapping rule; the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: and the calling security keyboard processes the called communication number according to a mapping rule.
3. The system of claim 1, wherein:
when the binding information includes the called communication number:
the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keyboard encrypts the called communication number; the obtaining, by the background server, the called communication number according to the second secure transmission data includes: the calling security keyboard decrypts the second security transmission data to acquire the called communication number; or,
the second safety processing of the called communication number by the calling safety keyboard comprises the following steps: the calling security keyboard processes the called communication number according to a mapping rule; the background server acquires the called communication number according to the second safety transmission data, and the method comprises the following steps: and the background server maps the second safety transmission data into the called communication number.
4. The system according to any one of claims 1 to 3, wherein the identity information comprises: biometric images, identification card information, employee card information, and/or PIN codes.
5. The system according to any one of claims 1 to 4,
the called security keypad is further configured to acquire a called communication number including:
the called security keyboard is also used for searching the called communication number which is stored corresponding to the identity information in the called security keyboard; or,
the called safety keyboard is also used for sending the identity information to a cloud server; the cloud server is used for searching the called communication number stored corresponding to the identity information and sending the called communication number to the called safety keyboard; the called safety keyboard is also used for receiving the called communication number; or,
the called security keyboard is also used for acquiring the called communication number which is stored corresponding to the identity information from an external storage device.
6. The system according to any one of claims 1 to 5,
the background server is further used for sending a signature verification request to the called secure keyboard after receiving the call request, wherein the signature verification request at least carries data to be signed;
the called safe keyboard is also used for receiving the data to be signed, signing the data to be signed to obtain signature result data and sending the signature result data to the background server;
and the background server is also used for receiving the signature result data, checking the signature of the signature result data, and sending the call response to the calling security keyboard after the signature passes the checking.
CN201711463029.3A 2017-12-28 2017-12-28 A kind of system for establishing call connection using safety keyboard Pending CN108289092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711463029.3A CN108289092A (en) 2017-12-28 2017-12-28 A kind of system for establishing call connection using safety keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711463029.3A CN108289092A (en) 2017-12-28 2017-12-28 A kind of system for establishing call connection using safety keyboard

Publications (1)

Publication Number Publication Date
CN108289092A true CN108289092A (en) 2018-07-17

Family

ID=62832593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711463029.3A Pending CN108289092A (en) 2017-12-28 2017-12-28 A kind of system for establishing call connection using safety keyboard

Country Status (1)

Country Link
CN (1) CN108289092A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2896363Y (en) * 2005-12-14 2007-05-02 李伟高 Multifunction network game keyboard
US20070127652A1 (en) * 2005-12-01 2007-06-07 Divine Abha S Method and system for processing calls
CN1983126A (en) * 2005-12-14 2007-06-20 李伟高 Multifunctional keyboard for network games
CN201037927Y (en) * 2007-05-08 2008-03-19 尹雪华 Multimedia keyboard
WO2009010944A2 (en) * 2007-07-17 2009-01-22 Alcatel Lucent On-demand authentication of call session party information during a telephone call
CN202257446U (en) * 2011-08-09 2012-05-30 武汉钢铁(集团)公司 IP (Internet Protocol)-based scheduling keyboard
CN202939563U (en) * 2012-11-23 2013-05-15 黑河学院 Computer keyboard facilitating video and voice communication
CN203054734U (en) * 2012-12-30 2013-07-10 梅超 Multiple-combination keyboard
CN203520307U (en) * 2013-05-22 2014-04-02 河南铭视安防工程有限公司 Keyboard with functions of voicing and camera shooting
CN104935432A (en) * 2015-03-13 2015-09-23 天地融科技股份有限公司 Multiparty communication calling method, multiparty communication calling device, server and system
CN104935758A (en) * 2014-12-31 2015-09-23 天地融科技股份有限公司 Calling method, calling device and system

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070127652A1 (en) * 2005-12-01 2007-06-07 Divine Abha S Method and system for processing calls
CN2896363Y (en) * 2005-12-14 2007-05-02 李伟高 Multifunction network game keyboard
CN1983126A (en) * 2005-12-14 2007-06-20 李伟高 Multifunctional keyboard for network games
CN201037927Y (en) * 2007-05-08 2008-03-19 尹雪华 Multimedia keyboard
WO2009010944A2 (en) * 2007-07-17 2009-01-22 Alcatel Lucent On-demand authentication of call session party information during a telephone call
CN202257446U (en) * 2011-08-09 2012-05-30 武汉钢铁(集团)公司 IP (Internet Protocol)-based scheduling keyboard
CN202939563U (en) * 2012-11-23 2013-05-15 黑河学院 Computer keyboard facilitating video and voice communication
CN203054734U (en) * 2012-12-30 2013-07-10 梅超 Multiple-combination keyboard
CN203520307U (en) * 2013-05-22 2014-04-02 河南铭视安防工程有限公司 Keyboard with functions of voicing and camera shooting
CN104935758A (en) * 2014-12-31 2015-09-23 天地融科技股份有限公司 Calling method, calling device and system
CN104994244A (en) * 2014-12-31 2015-10-21 天地融科技股份有限公司 Sign in methods and systems, and fixed telephones
CN105007379A (en) * 2014-12-31 2015-10-28 天地融科技股份有限公司 Calling method and system, and fixed-line telephone
CN105007575A (en) * 2014-12-31 2015-10-28 天地融科技股份有限公司 Calling method and system
CN105025469A (en) * 2014-12-31 2015-11-04 天地融科技股份有限公司 Sign-in method and system
CN105119889A (en) * 2014-12-31 2015-12-02 天地融科技股份有限公司 Calling method and calling system
CN105119887A (en) * 2014-12-31 2015-12-02 天地融科技股份有限公司 Calling method and system and fixed telephone set
CN104935432A (en) * 2015-03-13 2015-09-23 天地融科技股份有限公司 Multiparty communication calling method, multiparty communication calling device, server and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁家政,张敬尊,梁爱华: "《计算机网络》", 31 July 2016, 西安电子科技大学出版社 *

Similar Documents

Publication Publication Date Title
CN106487511B (en) Identity authentication method and device
CN107251477B (en) System and method for securely managing biometric data
CN103971435B (en) Method for unlocking, server, mobile terminal, electronic lock and unlocking system
CN104125055B (en) Encryption and decryption method and electronic equipment
CN105939197B (en) A kind of identity identifying method and system
JP2009510644A (en) Method and configuration for secure authentication
CN103634477A (en) Method and system for preventing thievery of mobile phone with fingerprint device
CN106022081B (en) A kind of card reading method of identity card card-reading terminal, identity card card-reading terminal and system
CN105007575A (en) Calling method and system
CN107563712A (en) A kind of mobile terminal punch card method, device, equipment and system
US20120047566A1 (en) Password protected secure device
JP7151928B2 (en) AUTHENTICATION SERVER, AUTHENTICATION SERVER CONTROL METHOD AND PROGRAM
JP6397046B2 (en) Address book protection method, apparatus and communication system
JP2021519966A (en) Remote biometric identification
EP2391967A1 (en) Password protected secure device
WO2018137309A1 (en) Wireless communication processing method and device
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN108322440B (en) Card reading login method and security login system by using security equipment
CN108337385A (en) A kind of system for establishing call connection using safety equipment
US20220408252A1 (en) Method for authenticating a user on a network slice
JP7124988B2 (en) AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, AUTHENTICATION SERVER CONTROL METHOD AND PROGRAM
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
KR20190045486A (en) Method for Managing Distributed Commuting Record
CN108391323A (en) Equipment interconnected method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180717

RJ01 Rejection of invention patent application after publication