CN108769436B - USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone - Google Patents

USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone Download PDF

Info

Publication number
CN108769436B
CN108769436B CN201810551813.8A CN201810551813A CN108769436B CN 108769436 B CN108769436 B CN 108769436B CN 201810551813 A CN201810551813 A CN 201810551813A CN 108769436 B CN108769436 B CN 108769436B
Authority
CN
China
Prior art keywords
code
user
calling
platform
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810551813.8A
Other languages
Chinese (zh)
Other versions
CN108769436A (en
Inventor
刘作
陈杨
陈星辰
王建明
罗一鸣
韦云
张强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Asean Information Harbor Co ltd
Original Assignee
China Asean Information Harbor Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Asean Information Harbor Co ltd filed Critical China Asean Information Harbor Co ltd
Priority to CN201810551813.8A priority Critical patent/CN108769436B/en
Publication of CN108769436A publication Critical patent/CN108769436A/en
Application granted granted Critical
Publication of CN108769436B publication Critical patent/CN108769436B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42382Text-based messaging services in telephone networks such as PSTN/ISDN, e.g. User-to-User Signalling or Short Message Service for fixed networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Toxicology (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a USSD and two-dimensional code based customized protection method for the security and privacy of a user mobile phone, and belongs to the technical field of privacy communication. The method comprises the steps that a user obtains a two-dimensional code and registers through a mobile phone client; the code scanning call front station responds to the client request, generates a two-dimension code, identifies information of the two-dimension code and completes dynamic allocation of the intermediate code number; the intermediate number platform responds to a binding service request from the code scanning calling front stage, generates and stores a code number binding relationship; the intermediate number platform generates and stores a number binding relationship for the calling subscriber number-intermediate number-called subscriber number binding; the calling user number-middle code number, middle code number-called user number are relayed and linked through a telecommunication core network; the USSD service platform is used for responding to a text pushing request sent by the code scanning call front and pushing a text prompt message to the user terminal. The invention can meet the requirement of protecting the privacy of the mobile phone number of the user under different conditions; meanwhile, the service resources can be saved, and the operation cost can be reduced.

Description

USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone
Technical Field
The invention relates to the technical field of privacy communication, in particular to a USSD and two-dimensional code-based customized protection method for the safety and privacy of a user mobile phone.
Background
In the era of mobile internet, with the rapid development of electronic commerce, mobile phone numbers are more and more popular as a trade identity identifier. Unlike the prior art that the mobile phone number only flows between friends and colleagues, the mobile phone number in the electronic commerce needs to be provided for unfamiliar strangers, and the user does not have any knowledge about the strangers who can contact the mobile phone number of the user, so that the user has a great concern about exposing the mobile phone number to other people.
In fact, cases caused by exposure of personal mobile phone numbers are actually reported, and the following are two main types of influences; 1) exposure of sensitive information: because of the online shopping requirement, the information such as the name, the address, the mobile phone number, the Email mailbox and the like of the user is continuously exposed to the network shop, the express company and other third-party organizations, so that the original online shopping protective measures based on the information such as the name, the identification card number, the mobile phone number and the like of the user are weakened, and the potential safety hazard is greatly increased; 2) frequent information disturbance: with the increase of the online shopping times of the users, more and more shops, express delivery and third-party institutions grasp the communication contact way of the users for online shopping, and the users are bombarded with sales promotion information such as telephone calls, short messages, e-mails and the like, so that the daily work and life of the users are seriously affected.
The pain point of the user needs to be solved urgently:
1) individual user pain spots (sensitive information exposure, frequent information disturbance): because of business needs, information such as user mobile phone numbers and the like is continuously exposed to network shops, express companies and other various occasions, and potential safety hazards are greatly increased. As the number of electronic transactions of the user increases, the harassment of the user by calls and short messages increases day by day, and the daily work and life of the user are seriously influenced;
2) industry user pain point (protection of user privacy concerns industry development): service providers applying O2O in express industry, logistics industry and the like can master real hands of users
As personal users pay more attention to privacy, more users will avoid using O2O applications for their privacy protection. Protecting the user's real number from being leaked will become the key for the development of various O2O application services.
The chinese patent cn201711290949.x discloses a conversation method for protecting the privacy of a client, which comprises the following operation steps: the method comprises the following steps: the user A acquires a service two-dimensional code through a mobile phone verification code; step two: the service platform records the user data relation; step three: client B is in voice communication with user a. In the scheme, after the client B scans the code, the user A can be contacted by dialing the platform service number, and after the data relationship is established, the user B can contact the opposite side until the user B scans other users again and binds a new data relationship again. Thus, in actual operation, the platform service number is always occupied by the user A, and if the platform is applied to a large third-party platform, millions of platform service numbers, thousands of platform service numbers or even hundreds of millions of platform service numbers are needed; however, the number of users who carry out communication at the same time is greatly lower than that of users who want to use, so that serious communication service resource waste is caused by setting a large number of platform service numbers; moreover, as a requirement of security and privacy, the service number of the same platform used for a long time can cause invisible secondary leakage, and particularly, unnecessary troubles are caused to users who need to use the service number temporarily.
Disclosure of Invention
The invention aims to provide a customized protection method for the security and privacy of a user mobile phone based on USSD and two-dimensional codes, which is used for safely providing customized protection for application scenes for the mobile phone number of the user based on USSD and the two-dimensional codes in daily life, so that the user can identify the incoming display path in a mode of subjectively setting scene prompt words while protecting the privacy of the mobile phone number in different scenes, such as car-driving, house property, intermediary and the like, in the daily electronic business process.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a customized protection method for the security and privacy of a user mobile phone based on USSD and two-dimensional codes comprises
The client is arranged in the user mobile phone terminal;
the code scanning and calling front desk is used for responding to a request from the client, generating the two-dimension code, identifying the information of the two-dimension code and finishing the dynamic allocation of the intermediate code number; generating a mapping relation between the two-dimensional code and a user mobile phone number and a purpose prompt word;
the middle number platform is linked with the code scanning calling front platform and the telecommunication core network and is used for responding to the binding service request from the code scanning calling front platform; generating a code number binding relationship;
the USSD service platform is used for responding to a text pushing request sent by the code scanning call front and pushing a text prompt message to the user terminal;
the relational database is butted with the code scanning call front platform and the intermediate number platform and is used for storing a mapping relation and a binding relation between the two-dimensional code and the code number;
the customized protection method for the security and privacy of the mobile phone of the user is carried out according to the following steps,
step one, a called user sends a privacy protection request to a code-scanning call front desk through a client and sets a purpose prompt; the code scanning call front desk generates a two-dimensional code according to the request and based on the mobile phone number of the called user; the code scanning calling front desk forms a first mapping relation between the two-dimension code and the mobile phone number of the called user, forms a second mapping relation between the two-dimension code and the use prompting word, and stores the first mapping relation and the second mapping relation into a relational database; the code scanning calling front desk returns the two-dimensional code to the client of the called user; the called user applies the two-dimensional code as a contact way of call, voice or short message to a privacy protection scene;
step two, the calling user acquires the two-dimensional code of the called user, scans and identifies the two-dimensional code, and sends a URL request to a code scanning and calling front desk according to the identification result; after receiving the URL request of the mobile phone of the calling user, the code-scanning calling front desk dynamically allocates an intermediate code number for the calling user according to the home position of the called user; the code scanning calling front desk sends a binding service request to the intermediate number platform;
step three, the intermediate number platform generates a number binding relation based on a calling user number-intermediate number-called user number binding service request sent by a code scanning calling front; storing code number binding relation to a relation database; setting a code number binding relationship and a two-dimensional code validation time limit; the calling user number-middle code number, middle code number-called user number are relayed and linked through a telecommunication core network; the USSD service platform pushes a text prompt message to a calling page of a called party when a speech path between the middle code number and the called party number is accessed;
and step four, after the time limit for the code number binding relationship to be effective is expired, the code number binding relationship is released, and the intermediate code number dialing is forbidden.
Preferably, the client is any one of a webpage client, a public platform service number and a mobile phone application program.
Preferably, the privacy protection scenario includes any one of an express service, a take-out service, a leg-running purchase-for-purchase service, an insurance service, a recommendation service, a temporary privacy service, a media service platform, and a third-party service platform.
Preferably, in the first step, effective time limits are respectively set for the first mapping relation and the second mapping relation; and after the effective time limit is expired, the code scanning calling front desk sends a request for removing the mapping relation to the relational database, and the relational database removes the first mapping relation and the second mapping relation.
Preferably, after the validity time limit expires, the called user scans the two-dimensional code expired by the called user through the client, the code-scanning calling front desk receives the reuse request, regenerates the mapping relationship between the two-dimensional code and the mobile phone number of the called user, and resets the validity time limit of the mapping relationship; and the called user resets the usage prompt words through the client.
Preferably, in step three, after the intermediate number platform successfully generates the code number binding relationship and stores the code number binding relationship in the relationship database, the intermediate number platform feeds back a result to the code scanning call front desk, and the code scanning call front desk sends the intermediate code number to the interface of the mobile phone of the calling party for display, so as to be used for the calling party to dial.
Preferably, in step three, the intermediate number platform sends the ringing message of the called party in the intermediate number-called party number speech path to the code-scanning calling front desk after receiving the ringing message of the called party; the code scanning calling front desk inquires a relational database according to the first mapping relation and the second mapping relation to obtain a purpose prompt language set by the called user; after the code scanning call foreground obtains the purpose prompting words, a user prompting word sending request is sent to the USSD service platform, wherein the user prompting word sending request comprises a target mobile phone number and a pushed text; the USSD service platform finds the position of the called user according to the mobile phone number of the called user, and pushes the user prompt text message to the front end of the calling page of the called user terminal for displaying.
Preferably, in step three, the calling subscriber dials the intermediate number, and the speech path roams to the intermediate number platform through the network of the marketer; after the intermediate number platform receives a calling user request for the intermediate number speech path, the intermediate number platform searches the number binding relationship in the relational database; initiating a request of the intermediate code number to the called user telephone channel; and the intermediate number platform controls the establishment of the speech paths between the calling user number and the intermediate number and between the intermediate number and the called user number, and completes speech path connection.
Preferably, the effective time limit of the first mapping relation, the second mapping relation and the code number binding relation is related to the number of times of voice channel connection between the calling party number and the intermediate code number and between the intermediate code number and the called party number in the third step; and after the number of the penetration times is reached, the effective time limit expires.
Preferably, the first mapping relationship validation time limit is not less than the code number binding relationship validation time limit or the second mapping relationship validation time limit.
Due to the adoption of the technical scheme, the invention has the following beneficial effects:
1. the USSD and the two-dimension code provide customized protection of application scenes for the security of the mobile communication mobile phone number of the user, so that the user can identify the incoming display path in a mode of subjectively setting a scene prompt language while protecting the privacy of the mobile phone number in different scenes (such as car-driving, house property, intermediary and the like) in the daily electronic commerce process. The user generates different two-dimensional codes according to different scene requests, sets purpose prompts for the two-dimensional codes, and can display the purpose prompts set by the user on the front end of the caller identification display when the two-dimensional codes are used for code scanning calling. And (3) real-time binding of code numbers: under the condition that the two-dimension code is not changed when the client applies for, different persons or the same person scan the code at different time periods to call, the numbers of the two parties are different. The user can set the two-dimensional code effective time limit and the set use prompting words through the interface, and the purpose that the user subjectively sets the use and the effective time limit is achieved.
2. The intermediate code number can be multiplexed in a large quantity, and hundreds of code numbers can be realized to serve tens of thousands of users; therefore, communication service resources can be greatly saved, and the operation cost is reduced.
3. The invention can also set the code number binding relation time limit, so that the same person can use the same mobile phone to scan the code calling time to be limited, but the two-dimension code can also continuously take effect at the same time. And the code number binding relationship and the two-dimensional code can be invalid simultaneously according to the time limit, so that the privacy protection is greatly enhanced.
4. The invention can meet the requirement of privacy protection of personal, enterprise and third-party platform mechanisms on the mobile phone number, and the information can avoid the possibility of secondary leakage. Meanwhile, the requirement of two-dimension code management can be met by setting a code scanning calling front desk.
Drawings
FIG. 1 is a functional schematic diagram of the system of the present invention.
Fig. 2 is a two-dimensional code timing diagram of the present invention.
Fig. 3 is a sequence diagram of the calling function based on the two-dimension code of the invention.
Detailed Description
The following further describes the embodiments of the present invention with reference to the drawings.
As shown in fig. 1, the functional diagram of the system of the present invention includes a client installed in a mobile phone terminal of a user. The code scanning and calling front desk is used for responding to a request from the client, generating the two-dimension code, identifying the information of the two-dimension code and finishing the dynamic allocation of the intermediate code number; and generating a mapping relation between the two-dimensional code and the user mobile phone number and the use prompt. The middle number platform is linked with the code scanning calling front platform and the telecommunication core network and is used for responding to the binding service request from the code scanning calling front platform; and generating a code number binding relationship. And the USSD service platform is used for responding to a text pushing request sent by the code scanning call front and pushing a text prompt message to the user terminal. And the relational database is in butt joint with the code scanning calling front platform and the intermediate number platform and is used for storing a mapping relation and a binding relation between the two-dimensional code and the code number.
The client is any one of a webpage client, a public platform service number and a mobile phone application program. The embodiment adopts the form of mobile phone APP software as the client. The client is used for the user to perform real identity registration, personal information setting, password protection setting, application and maintenance, privacy protection two-dimensional codes and the like. The code scanning call foreground is used as a background service system of the client, realizes connection through a network, processes application requirements from the client and contacts a middle number platform.
The privacy protection scene set in the application comprises any one of express service, takeout service, leg running purchase-instead service, insurance service, recommendation service, temporary privacy service, media service platform and third-party service platform. For example, the temporary privacy service is a scene that a mobile phone number needs to be reserved for temporary parking; the recommendation service comprises the situations of house property recommendation service, product exhibition and sales meeting and the like; the media service platform comprises a self media service terminal, a webpage, an APP and the like. The privacy preserving scenario may also be other situations where privacy preservation is required. The invention can set privacy protection scenes by self and is applied.
The code scanning call foreground responsible function is as follows: 1) responding to a two-dimensional code generation request from a client, and attaching a user real number and a user prompt and an access URL request initiated by scanning a two-dimensional code by the client; 2) generating a two-dimensional code based on the real number of the client and returning the two-dimensional code to the client of the user; 3) initiating a storage request to a binding relation database; 4) initiating a query request to a binding relation database; 5) allocating a middle code number for the calling party and the called party; 6) sending a user prompt sending request to the USSD platform, wherein the user prompt sending request comprises a target mobile phone number and a pushed text; 7) a user ringing message is received from the intermediary platform.
The intermediate code number platform comprises a service layer and a network element layer, wherein the service layer is deployed outside a core network, a service layer northbound interface is in butt joint with a third-party internet platform background, and a southbound interface is in butt joint with the core network; the network element layer is deployed in the core network, a north interface of the network element layer is in butt joint with the service layer, and a south interface of the network element layer is in butt joint with the core network; the service layer provides an intermediate code number for calling the third-party Internet platform according to the received binding relation distribution request of the third-party Internet platform, binds the intermediate code number and the calling number and stores the binding relation; the network element layer receives a third-party internet platform call request roamed by the core network; the network element layer inquires interaction scenes between the network element layer pair and the service layer for the service layer, wherein the interaction scenes comprise calling strategy inquiry, short message strategy inquiry, recording push and ticket notification. And calling policy query, wherein when the network element layer receives a call request of a calling number for an intermediate number, the network element layer initiates calling policy query to the service layer according to the calling number and the intermediate number, and the service layer queries and feeds back a binding relationship according to the request. And short message strategy query, wherein when the network element layer receives a short message request of a calling number to an intermediate number, the network element layer initiates short message strategy query to the service layer according to the calling number and the intermediate number, and the service layer queries the binding relation and feeds back the binding relation according to the request. And (4) recording and pushing, wherein the network element layer records the connected speech channel calls and pushes the recorded speech channel calls to the service layer after the calls are finished. And (5) ticket notification, wherein the network element layer generates a ticket for the connected speech path conversation and pushes the ticket to the service layer. And binding relation, namely establishing a communication channel between the intermediate code number and the calling number respectively and continuing.
The middle platform is responsible for the following functions: 1) generating a binding relation based on a calling-intermediate number-called number sent by a code scanning calling front station; 2) storing the binding relation between the two-dimension code ID and the real number of the client in a binding relation database; 3) setting a binding relationship and a two-dimension code effective time limit; 4) a speech path relay linking function; 5) and pushing the ringing message of the called user to the code-scanning calling front desk.
As shown in fig. 1, the method for protecting the security and privacy of the mobile phone of the user is performed according to the following steps;
step one, a called user sends a privacy protection request to a code-scanning call front desk through a client and sets a purpose prompt; the code scanning call front desk generates a two-dimensional code according to the request and based on the mobile phone number of the called user; the code scanning calling front desk forms a first mapping relation between the two-dimension code and the mobile phone number of the called user, forms a second mapping relation between the two-dimension code and the use prompting word, and stores the first mapping relation and the second mapping relation into a relational database; the code scanning calling front desk returns the two-dimensional code to the client of the called user; the called user applies the two-dimensional code as a contact way of conversation, voice or short message to a privacy protection scene. Setting effective time limits for the first mapping relation and the second mapping relation respectively; and after the effective time limit is expired, the code scanning calling front desk sends a request for removing the mapping relation to the relational database, and the relational database removes the first mapping relation and the second mapping relation. In order to repeatedly use the two-dimension code, after the effective time limit expires, the called user scans the two-dimension code expired by the called user through the client, the code scanning and calling front desk receives a reuse request, the mapping relation between the two-dimension code and the mobile phone number of the called user is regenerated, and the effective time limit of the mapping relation is reset; and the called user resets the usage prompt words through the client.
Step two, the calling user acquires the two-dimensional code of the called user, scans and identifies the two-dimensional code, and sends a URL request to a code scanning and calling front desk according to the identification result; after receiving the URL request of the mobile phone of the calling user, the code-scanning calling front desk dynamically allocates an intermediate code number for the calling user according to the home position of the called user; and the code scanning calling front platform sends a binding service request to the intermediate number platform.
Step three, the intermediate number platform generates a number binding relation based on a calling user number-intermediate number-called user number binding service request sent by a code scanning calling front; storing code number binding relation to a relation database; setting a code number binding relationship and a two-dimensional code validation time limit; the calling user number-middle code number, middle code number-called user number are relayed and linked through a telecommunication core network; and the USSD service platform pushes a text prompt message to a calling page of the called user when the speech path between the middle code number and the called user number is accessed.
And as a specific visual scene, after the intermediate number platform successfully generates a code number binding relationship and stores the code number binding relationship in a relational database, the intermediate number platform feeds back a result to a code scanning and calling front desk, and the code scanning and calling front desk sends the intermediate code number to a mobile phone interface of a calling party for display and is used for the calling party to dial.
The specific application process of the usage hint here is as follows: after receiving ringing message of called user in the telephone channel of the intermediate number-called user number, the intermediate number platform sends the ringing message to the code-scanning calling front desk; the code scanning calling front desk inquires a relational database according to the first mapping relation and the second mapping relation to obtain a purpose prompt language set by the called user; after the code scanning call foreground obtains the purpose prompting words, a user prompting word sending request is sent to the USSD service platform, wherein the user prompting word sending request comprises a target mobile phone number and a pushed text; the USSD service platform finds the position of the called user according to the mobile phone number of the called user, and pushes the user prompt text message to the front end of the calling page of the called user terminal for displaying.
Here, the specific connection process of the speech path is as follows: the calling subscriber dials the intermediate number, and the speech path roams to the intermediate number platform through the network of the marketing business; after the intermediate number platform receives a calling user request for the intermediate number speech path, the intermediate number platform searches the number binding relationship in the relational database; initiating a request of the intermediate code number to the called user telephone channel; and the intermediate number platform controls the establishment of the speech paths between the calling user number and the intermediate number and between the intermediate number and the called user number, and completes speech path connection.
And step four, after the time limit for the code number binding relationship to be effective is expired, the code number binding relationship is released, and the intermediate code number dialing is forbidden.
In order to better avoid secondary information leakage caused by the two-dimensional code, the effective time limit of the first mapping relation, the second mapping relation and the code number binding relation is related to the number of the calling party, the intermediate code number and the number of the called party, which are communicated in the third step; and after the number of the penetration times is reached, the effective time limit expires. Certainly, the first mapping relation validation time limit is not less than the code number binding relation validation time limit or the second mapping relation validation time limit; therefore, the service cycle of the two-dimensional code can be guaranteed, and the conversation safety and privacy are protected.
Compared with the prior art, the invention can realize dynamic allocation of the intermediate code number, realize the requirement that hundreds of intermediate code numbers can serve tens of thousands of users, greatly reduce the stock of the intermediate code number and improve the utilization rate; meanwhile, the effective time limit of the mapping relation and the code number binding relation is set, so that secondary information leakage cannot be caused when the contact information is transmitted by using the two-dimensional code, namely the intermediate code number is used as a mobile phone connecting channel for a long time, and the requirement of seeking mobile phone safety and privacy protection in a short time range is not facilitated. The effective time limit is set to the mapping relation and the code number binding relation, so that the intermediate code number is not in the time limit for dialing the called user for a long time, the two-dimensional codes which are not used are invalid in sequence, the two-dimensional codes can be used for a poor time limit but have a time limit for each call, the requirement that the two-dimensional codes are scanned for multiple times in a certain period is met, and the call time for each dialing is limited. Therefore, compared with the prior art, the invention is dynamic, the intermediate code number is also dynamically distributed, and different intermediate code numbers can be used for each call, so that the effect of safety and privacy protection is greatly enhanced.
The following example explanation is made in connection with an actual call and a corresponding timing diagram
As shown in fig. 2, a two-dimensional code timing diagram.
1) A user has a requirement on privacy protection of a user mobile phone number in various scenes of electronic commerce, incoming call distinguishing is needed according to different scenes, then a user subjective intention operation client initiates a two-dimensional code allocation operation request to a code scanning and calling front desk, and a user real number, a use prompt and a two-dimensional code valid event term are attached.
2) After receiving a two-dimensional code request of a user, the code scanning call foreground generates a URL two-dimensional code based on the real mobile phone number of the user, forms the relational mapping between the two-dimensional code and the real mobile phone number of the user, and sets the validity period.
3) And the code scanning and calling front desk stores the generated URL information of the user two-dimensional code and the user prompt words into a platform relational database, and the two-dimensional code and the user prompt words form a mapping relation.
4) After the code scanning and calling foreground successfully stores the two-dimension code information, the two-dimension code is returned to the user client, and the user can directly obtain the two-dimension code associated with the mobile phone number of the user.
5) And the user distributes the two-dimension code to other users by performing subjective operations such as storing and sharing the two-dimension code.
6) And after the binding relation set by the user is valid, the code scanning and calling front desk releases the binding relation.
7) The two-dimensional code is invalid.
Fig. 3 shows a call function sequence diagram based on two-dimensional code.
1) And the calling party B obtains the two-dimensional code associated with the real mobile phone number of the user A.
2) And the calling party B scans the obtained two-dimensional code.
3) And the terminal of the calling user B sends a URL access request to the code scanning calling front desk by scanning the two-dimensional code.
4) After receiving the URL request of the calling user B terminal, the code scanning call front desk temporarily allocates an intermediate number X to the user A according to the home position of the user B to form a mapping relation AX, sets a relation validation time limit, and dynamically allocates the intermediate number again for different numbers to scan the two-dimensional code each time.
5) And after the intermediate code number X is successfully distributed, sending a code number binding request to the intermediate code platform based on the A-X-B code number relation.
6) And after the intermediate number platform generates the binding relationship, storing the relationship into a platform relationship database, returning a successful storage response, and then returning a successful binding response to the code scanning call front platform.
7) Scanning the code and calling back the intermediate number X to the calling party, wherein the user experience of the calling party side is as follows: and after the code is scanned, the intermediate code number is displayed.
8) The calling party B initiates a call to the intermediate code number X.
9) The session roams through the operator network to an intermediary platform.
10) The intermediate number platform queries the number of the called user A from the relational database based on the calling user B and the intermediate number X.
11) The relational database returns the called subscriber a number according to the query.
12) The intermediate number platform initiates the call from the intermediate number X to the called user A, and the user A rings after the call is roamed by the operator network.
13) The intermediate number platform informs the code scanning and calling front platform of the user ringing message.
14) After receiving the ringing message of the user, the code-scanning calling foreground inquires the relational database according to the information of the calling and called two-dimensional codes to obtain the use prompting words set by the user.
15) And after the code scanning call foreground obtains the user prompt, sending a user prompt sending request to the USSD service platform, wherein the user prompt sending request comprises a target mobile phone number and a pushed text.
16) And the USSD service platform finds the position of the user according to the mobile phone number of the user, and pushes the user prompt text message to the front end of the calling page of the user terminal for display.
17) After the user A picks up the phone, the intermediate number platform connects the media speech path from the calling user B to the intermediate number X with the media speech path from the intermediate number X to the user A.
18) The calling user B and the user A communicate through the middle number X.
19) And after the time limit of the binding relationship is expired, removing the binding relationship and acquiring a successful response.
20) After the binding relation is released, the user B can not dial the intermediate number.
The above description is intended to describe in detail the preferred embodiments of the present invention, but the embodiments are not intended to limit the scope of the claims of the present invention, and all equivalent changes and modifications made within the technical spirit of the present invention should fall within the scope of the claims of the present invention.
Description of terms:
ussd (unstructured Supplementary Service data), an unstructured Supplementary Service data platform.

Claims (7)

1. A customized protection method for the security and privacy of a user mobile phone based on USSD and two-dimensional codes is characterized by comprising the following steps: comprises that
The client is arranged in the user mobile phone terminal;
the code scanning and calling front desk is used for responding to a request from the client, generating the two-dimension code, identifying the information of the two-dimension code and finishing the dynamic allocation of the intermediate code number; generating a mapping relation between the two-dimensional code and a user mobile phone number and a purpose prompt word;
the middle number platform is linked with the code scanning calling front platform and the telecommunication core network and is used for responding to the binding service request from the code scanning calling front platform; generating a code number binding relationship;
the USSD service platform is used for responding to a text pushing request sent by the code scanning call front and pushing a text prompt message to the user terminal;
the relational database is butted with the code scanning call front platform and the intermediate number platform and is used for storing a mapping relation and a binding relation between the two-dimensional code and the code number;
the customized protection method for the security and privacy of the mobile phone of the user is carried out according to the following steps,
step one, a called user sends a privacy protection request to a code-scanning call front desk through a client and sets a purpose prompt; the code scanning call front desk generates a two-dimensional code according to the request and based on the mobile phone number of the called user; the code scanning calling front desk forms a first mapping relation between the two-dimension code and the mobile phone number of the called user, forms a second mapping relation between the two-dimension code and the use prompting word, and stores the first mapping relation and the second mapping relation into a relational database; the code scanning calling front desk returns the two-dimensional code to the client of the called user; the called user applies the two-dimensional code as a contact way of call, voice or short message to a privacy protection scene;
step two, the calling user acquires the two-dimensional code of the called user, scans and identifies the two-dimensional code, and sends a URL request to a code scanning and calling front desk according to the identification result; after receiving the URL request of the mobile phone of the calling user, the code-scanning calling front desk dynamically allocates an intermediate code number for the calling user according to the home position of the called user; the code scanning calling front desk sends a binding service request to the intermediate number platform;
step three, the intermediate number platform generates a number binding relation based on a calling user number-intermediate number-called user number binding service request sent by a code scanning calling front; storing code number binding relation to a relation database; setting a code number binding relationship and a two-dimensional code validation time limit; the calling user number-middle code number, middle code number-called user number are relayed and linked through a telecommunication core network; the USSD service platform pushes a text prompt message to a calling page of a called party when a speech path between the middle code number and the called party number is accessed;
step four, after the code number binding relationship is effective and the time limit is expired, the code number binding relationship is released, and the intermediate code number is forbidden to be dialed again;
in step three, the intermediate number platform sends the ringing message of the called user in the intermediate number-called user number speech path to the code-scanning calling front desk; the code scanning calling front desk inquires a relational database according to the first mapping relation and the second mapping relation to obtain a purpose prompt language set by the called user; after the code scanning call foreground obtains the purpose prompting words, a user prompting word sending request is sent to the USSD service platform, wherein the user prompting word sending request comprises a target mobile phone number and a pushed text; the USSD service platform finds the position of the called user according to the mobile phone number of the called user, and pushes a user prompt text message to the front end of a calling page of the called user terminal for displaying;
the effective time limit of the first mapping relation, the second mapping relation and the code number binding relation is related to the voice channel through times of the calling user number-middle code number, middle code number-called user number in the third step; when the number of the through times is reached, the effective time limit expires; the first mapping relation effective time limit is not less than the code number binding relation effective time limit or the second mapping relation effective time limit.
2. The customized protection method for the security and privacy of the user mobile phone based on USSD and two-dimensional code as claimed in claim 1, wherein: the client is any one of a webpage client, a public platform service number and a mobile phone application program.
3. The customized protection method for the security and privacy of the user mobile phone based on USSD and two-dimensional code as claimed in claim 1, wherein: the privacy protection scene comprises any one of express service, takeout service, leg running and purchasing service, insurance service, recommendation service, temporary privacy service, a media service platform and a third-party service platform.
4. The customized protection method for the security and privacy of the user mobile phone based on USSD and two-dimensional code as claimed in claim 1, wherein: in the first step, setting effective time limits for the first mapping relation and the second mapping relation respectively; and after the effective time limit is expired, the code scanning calling front desk sends a request for removing the mapping relation to the relational database, and the relational database removes the first mapping relation and the second mapping relation.
5. The customized protection method for the security and privacy of the user mobile phone based on the USSD and the two-dimensional code as claimed in claim 4, wherein: after the effective time limit expires, the called user scans the expired two-dimensional code through the client, the code scanning calling front desk receives a reuse request, regenerates the mapping relation between the two-dimensional code and the mobile phone number of the called user, and resets the effective time limit of the mapping relation; and the called user resets the usage prompt words through the client.
6. The customized protection method for the security and privacy of the user mobile phone based on USSD and two-dimensional code as claimed in claim 1, wherein: in the third step, after the intermediate number platform successfully generates the code number binding relationship and stores the code number binding relationship in the relational database, the intermediate number platform feeds back a result to the code scanning and calling front desk, and the code scanning and calling front desk sends the intermediate code number to the interface of the mobile phone of the calling user for display and is used for the calling user to dial.
7. The customized protection method for the security and privacy of the user mobile phone based on USSD and two-dimensional code as claimed in claim 1, wherein: in step three, the calling subscriber dials the intermediate number, and the speech path roams to the intermediate number platform through the network of the marketer; after the intermediate number platform receives a calling user request for the intermediate number speech path, the intermediate number platform searches the number binding relationship in the relational database; initiating a request of the intermediate code number to the called user telephone channel; and the intermediate number platform controls the establishment of the speech paths between the calling user number and the intermediate number and between the intermediate number and the called user number, and completes speech path connection.
CN201810551813.8A 2018-05-31 2018-05-31 USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone Active CN108769436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810551813.8A CN108769436B (en) 2018-05-31 2018-05-31 USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810551813.8A CN108769436B (en) 2018-05-31 2018-05-31 USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone

Publications (2)

Publication Number Publication Date
CN108769436A CN108769436A (en) 2018-11-06
CN108769436B true CN108769436B (en) 2020-12-08

Family

ID=64001339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810551813.8A Active CN108769436B (en) 2018-05-31 2018-05-31 USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone

Country Status (1)

Country Link
CN (1) CN108769436B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079258A (en) * 2020-01-04 2021-07-06 华为技术有限公司 Number privacy protection method, network device and computer storage medium
CN115086892B (en) * 2022-05-17 2023-07-07 任峰 Method for dynamically binding calling task and calling and called party numbers based on short message notification

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079706A (en) * 2007-06-08 2007-11-28 黄晖 A 2D code verification method and system
CN101521866A (en) * 2009-03-26 2009-09-02 深圳华为通信技术有限公司 Method and device for forwarding call
CN102724643A (en) * 2012-05-16 2012-10-10 华为软件技术有限公司 Call method, device and communication system
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN105141790A (en) * 2015-08-04 2015-12-09 任峰 Method for keeping calling party number secrete in telephone communication
CN106341234A (en) * 2015-07-17 2017-01-18 华为技术有限公司 Authorization method and device
CN106686268A (en) * 2015-11-06 2017-05-17 中国科学院沈阳计算技术研究所有限公司 Two-way privacy protection vehicle-moving contact system and method based on two-dimensional code
CN107809749A (en) * 2017-10-27 2018-03-16 中国—东盟信息港股份有限公司 A kind of guard method of cell-phone number security privacy and platform based on mobile Internet
CN108040184A (en) * 2017-12-08 2018-05-15 深圳光汇云油电商有限公司 A kind of call method for protecting customer privacy

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079706A (en) * 2007-06-08 2007-11-28 黄晖 A 2D code verification method and system
CN101521866A (en) * 2009-03-26 2009-09-02 深圳华为通信技术有限公司 Method and device for forwarding call
CN102724643A (en) * 2012-05-16 2012-10-10 华为软件技术有限公司 Call method, device and communication system
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN106341234A (en) * 2015-07-17 2017-01-18 华为技术有限公司 Authorization method and device
CN105141790A (en) * 2015-08-04 2015-12-09 任峰 Method for keeping calling party number secrete in telephone communication
CN106686268A (en) * 2015-11-06 2017-05-17 中国科学院沈阳计算技术研究所有限公司 Two-way privacy protection vehicle-moving contact system and method based on two-dimensional code
CN107809749A (en) * 2017-10-27 2018-03-16 中国—东盟信息港股份有限公司 A kind of guard method of cell-phone number security privacy and platform based on mobile Internet
CN108040184A (en) * 2017-12-08 2018-05-15 深圳光汇云油电商有限公司 A kind of call method for protecting customer privacy

Also Published As

Publication number Publication date
CN108769436A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN108777750A (en) A kind of user mobile phone security privacy guard method based on Quick Response Code
CN101034984B (en) Establishing the true identify database of the user with the personal information submitted by the user
US20080319823A1 (en) Communication connectivity via context association, advertising sponsorship, and multiple contact databases
EP2061271B1 (en) Method and system for providing mobile service and management center server therefor
US20070005969A1 (en) Anonymous communication system and method
CN107018504B (en) Communication method, blacklist configuration method and device
US9420118B2 (en) Advertisements in controlled-environment communication systems using tablet computing devices
TW201637422A (en) Communication method and server
JP2008537449A (en) Communication compliance control using DO-NOT-CALL list, existing business relationship list and destination preference
CN110944088A (en) Method, device, storage medium and server for calling based on virtual telephone number
CN108769436B (en) USSD and two-dimensional code based customized protection method for security and privacy of user mobile phone
US10547572B2 (en) Messaging service
CN107046499A (en) A kind of enterprise converged communication system and method for supporting different operators user
CN108366075B (en) Security privacy number protection platform based on core network security protection strategy
CN101686247B (en) Method and system of information processing
CN107708103B (en) Method for realizing number security based on MAP signaling
CN108696864B (en) Virtual number request and transmission method, device and storage medium
CN101120386A (en) Method for electronic transaction by mobile messaging
KR20110018022A (en) Communication service method suing temporary identification number, method of providing service using the same, and system for the same
CN104539869A (en) Video call service method
CN106303105B (en) The method of calling and system of dynamic more voice service number based on client identification module
CN104967605A (en) Privacy protection method and privacy protection device
CN104243613A (en) User information protection system and method
KR101481161B1 (en) Method of providing an advertisement contents before a call and system for performing the method
JP2005056299A (en) Personal identification method and system for www service, computer program, and program storage media

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant