CN109274838A - Generation and application method and secret communication system based on SIM card virtual-number - Google Patents
Generation and application method and secret communication system based on SIM card virtual-number Download PDFInfo
- Publication number
- CN109274838A CN109274838A CN201811390334.9A CN201811390334A CN109274838A CN 109274838 A CN109274838 A CN 109274838A CN 201811390334 A CN201811390334 A CN 201811390334A CN 109274838 A CN109274838 A CN 109274838A
- Authority
- CN
- China
- Prior art keywords
- user
- virtual
- sim card
- cell phone
- operator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The application provides a kind of generation based on SIM card virtual-number and application method and secret communication system, the generation method of virtual-number includes S1, the constraint requirements of virtual-number are generated in user's A cell phone application, comprising: the validity period of virtual-number, the type of service for determining user B and user's A cell phone application is selected to generate cipher key index and parameter reference;The constraint requirements of virtual-number are sent to SIM card A by S2, user A cell phone application;S3, SIM card A generate the virtual-number of characterization user A according to the true number of constraint requirements and user A;Virtual-number is returned to user's A cell phone application by S4, SIM card A.In the application, user A actively generates virtual-number and is shared with user B, and user B is made a phone call using virtual-number to user A, and the true number of user A is prevented to be leaked, user B is not necessarily to connect generation virtual-number in internet before making a phone call every time, reduces the pressure to operator's platform.
Description
Technical field
This application involves mobile communication technology field more particularly to a kind of generations and use based on SIM card virtual-number
Method and secret communication system.
Background technique
Currently, mobile terminal of mobile telephone is more more and more universal, consequent is the abundant of mobile phone application APP, current society
Meeting, telephone number is leaked, various harassing calls, these are all that everybody can't bear the sore spot that it is disturbed.Existing mobile telephone equipment
When mutually being called, telephone number can be directly displayed, or telephone number is marked, show mark information and phone number
Code, but individual and company for information security with high standards, however it remains the security risk of telephone number leakage.
Currently, drop drop is called a taxi in order to which the privacy of passenger opens safe dialing, passenger and driver link are virtual numbers
Code will not provide the true number of passenger, and order is completed, and the virtual-number just fails after passenger's payment.Drip the number of drop not
It is to encrypt the phone number of passenger, but when driver calls passenger, first calling is virtual to transport to virtual operator there
Battalion quotient is relayed to passenger.Drop drop software knows the true number of both sides, and in software when click-to-dial, drop drop backstage chooses one
Reserved vacant number in a local default number section is matched to be shown to calling terminal, then passes through and operators in co-operation, matching are true
Number reserves vacant number call diversion to this.This scheme, platform know between taxi hitcher and driver about calling a taxi
After business association, the two is linked together, but when business association is not set up, user does not have corresponding virtual-number, also without
The number of oneself is actively shared with others by method, and user is passive operation.
Currently, operator's platform can be requested according to individual, some virtual-numbers are established for everyone, virtual-number is effective
Time limit system.User is made a phone call using virtual-number, and operator's platform is responsible for for virtual-number being converted into true number, then carries out
Closing of the circuit.In this scheme, all virtual-numbers will be generated from operator's platform, and application will connect interconnection every time
Net, from operator's platform application.If internet sometimes, cannot be connected, then virtual-number just can not be applied.And
And operator's platform wants a large amount of virtual-number data of storage and management, and makees a large amount of legitimacy verifies, to the pressure of platform
It is required with concurrency too high.
Summary of the invention
The application's is designed to provide a kind of generation based on SIM card virtual-number and application method and secure communication system
System, user A actively generates virtual-number, and is actively shared with user B, and user B is according to the user based on SIM card virtual-number
Method is made a phone call to user A, and user A judges whether it is harassing call according to the virtual-number of B in incoming information, to shield interference
Phone;It is multiple that the virtual-number can be used to make a call for mobile phone user, more convenient to use without reacquiring, and saves the time, drop
The pressure of low operator's platform and to the requirement of the concurrency of operator's platform.
In order to achieve the above objectives, the application provides a kind of generation method based on SIM card virtual-number, this method comprises:
Step S1 generates the constraint requirements of virtual-number, comprising: select the effective of virtual-number in user's A cell phone application
Phase, the type of service for determining user B and generation cipher key index and parameter reference in user's A cell phone application;
The constraint requirements of virtual-number are sent to SIM card A by step S2, user A cell phone application;
Step S3, SIM card A generate the virtual number of characterization user A according to the true number of the constraint requirements and user A
Code;
Virtual-number is returned to user's A cell phone application by step S4, SIM card A.
As above, wherein in step S1, if user B is fixed people, generate the constraint requirements of virtual-number further include:
Cipher key index and parameter reference are sent to user B by step a1, user A cell phone application, and are requested user B to generate and used
Family B coding;
Step a2, user B select the key stored on SIM card B and ginseng according to the cipher key index and parameter reference respectively
Number, SIM card B parameter described in the key pair carry out operation and generate user B coding;
User B is encoded and is sent to user's A mobile phone as the constraint requirements of virtual-number by step a3, user B cell phone application
APP。
As above, wherein in step S3, if user B is unfixed people,
SIM card A selectes the key stored on SIM card A and parameter according to the cipher key index and the parameter reference;
User A is transported with the parameter stored on the true number and SIM card A of the key pair user A stored on SIM card A
It calculates and obtains character string, the character string is for forming the virtual-number.
A kind of application method based on SIM card virtual-number characterized by comprising
Step b1, user B are made a phone call using virtual-number to user A;
Step b2, user B cell phone application carry out validity period verification to virtual-number, if before the deadline, executing step
Otherwise b3 terminates the process;
Step b3, user B cell phone application are requested to operator's platform Sending dialled number;
Virtual-number is sent to operator's platform by step b4;
Virtual-number is converted to the true number of user A by step b5, operator's platform;
Step b6, operator's platform put through the true number of user A;
Step b7, the intercepting and capturing of user's A cell phone application are often taken on the telephone, and whether judge virtual-number according to the information in incoming information
It is leaked, chooses whether to connect phone.
As above, wherein further include step c1 between step b2 and step b3 if user B is fixed people:
User B judges whether each field in the virtual-number is legal, if legal, thens follow the steps b3, otherwise, terminates
The process.
As above, wherein further include step c2 between step b5 and b6 if user B is fixed people: operator's platform is raw
At the coding of user B;It further include step c3 in step b6: while putting through user A true number, by the coding and void of user B
Quasi- local number portability is into the incoming information of user A.
As above, wherein in step b2, the method for the validity period verification includes: that user's B cell phone application obtains current net
Network time, SIM card B check whether the validity period identified in the virtual-number exceeds the time limit, and whether use time meets the requirements, if
It meets the requirements, then operator's platform is requested to put through the phone of user A.
As above, wherein include step b0 before step b1: user B passes through the two dimensional code in scanning user A cell phone application
It obtains virtual-number or user B and virtual-number is read from SIM card A by NFC transmission mode.
The application also provides a kind of secret communication system, which is characterized in that including user A, user B and operator's platform,
It is preinstalled with user A cell phone application and SIM card A in user A, user B cell phone application and SIM card B are preinstalled in user B, feature exists
In,
User A is for generating virtual-number;
User B obtains the virtual-number and is communicated by operator's platform and user A;Operator's platform is used for will
The virtual-number is converted into true called number;
The key and parameter of user A are stored on SIM card A;
The key and parameter of user B are stored on SIM card B.
As above, wherein database is stored on operator's platform, the databases are contained corresponding to every
The unique data of SIM card after operator's platform receives the virtual-number, carries out key operation to the virtual-number
The corresponding true number of the virtual-number is obtained, and generates the coding of user B, operator's platform true number
The mobile phone of user A is put through, and shows the coding of the virtual-number and the user B in the incoming information of user A.
What the application realized has the beneficial effect that:
(1) actively share virtual-number between mobile phone user, and use virtual number communication, prevent true number from being let out
Dew;
(2) mobile phone user the virtual-number can be used to make a call multiple, reacquire without connecting internet, using more
It is convenient, the time is saved, the pressure of operator's platform and the concurrency requirement to operator's platform are reduced;
(3) main validity judgement and incoming call statistics etc. all operate in APP client and SIM card, significantly reduce
Requirement to operator's platform reduces the pressure to operator's platform;
(4) user A can be according to the user's B encoding statistics incoming call number carried in incoming information, and can mask school
Test illegal phone.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in application can also be obtained according to these attached drawings other attached for those skilled in the art
Figure.
Fig. 1 is a kind of flow chart of the generation method based on SIM card virtual-number of the present invention.
Fig. 2 is a kind of flow chart of the application method based on SIM card virtual-number of the present invention.
Fig. 3 is a kind of schematic diagram of secret communication system of the present invention.
Appended drawing reference: 1- user A, 2- user B, 3- operator platform, 11- user's A cell phone application, 12-SIM card A, 21- use
Family B cell phone application, 22-SIM card B.
Specific embodiment
Below with reference to the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Ground description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the application
In embodiment, those skilled in the art's every other embodiment obtained without making creative work, all
Belong to the range of the application protection.
As shown in Figure 1, application provides a kind of generation method based on SIM card virtual-number, this method comprises:
Step S1 generates the constraint requirements of virtual-number, comprising: select the effective of virtual-number in user's A cell phone application
Phase, the type of service for determining user B and generation cipher key index and parameter reference in user's A cell phone application;
The constraint requirements of virtual-number are sent to SIM card A by step S2, user A cell phone application;
Step S3, the SIM card A generate the virtual of characterization user A according to the true number of the constraint requirements and user A
Number;
Virtual-number is returned to user's A cell phone application by step S4, SIM card A.
As above, wherein in step S1, if user B is fixed people, generate the constraint requirements of virtual-number further include:
Cipher key index and parameter reference are sent to user B by step a1, user A cell phone application, and are requested user B to generate and used
Family B coding;
Step a2, user B select the key stored on SIM card B and ginseng according to the cipher key index and parameter reference respectively
Number, SIM card B parameter described in the key pair carry out operation and generate user B coding;
User B is encoded and is sent to user's A mobile phone as the constraint requirements of virtual-number by step a3, user B cell phone application
APP。
As above, wherein in step S3, if user B is unfixed people,
The SIM card A selectes the key stored on SIM card A and parameter according to the cipher key index and the parameter reference;
User A is transported with the parameter stored on the true number and SIM card A of the key pair user A stored on SIM card A
It calculates and obtains character string, the character string is for forming the virtual-number.
As shown in Fig. 2, a kind of application method based on SIM card virtual-number, comprising:
Step b1, user B are made a phone call using virtual-number to user A;
Step b2, user B cell phone application carry out validity period verification to virtual-number, if before the deadline, executing step
Otherwise b3 terminates the process;
Step b3, user B cell phone application are requested to operator's platform Sending dialled number;
Virtual-number is sent to operator's platform by step b4;
Virtual-number is converted to the true number of user A by step b5, operator's platform;
Step b6, operator's platform put through the true number of user A;
User's A cell phone application intercepting and capturing of step b7, user A are often taken on the telephone, and judge virtual number according to the information in incoming information
Whether code is leaked, and chooses whether to connect phone.
As above, wherein if user B is fixed people, further include step c1 between step b2 and step b3: user B sentences
Whether each field broken in the virtual-number is legal, if legal, thens follow the steps b3, otherwise, terminates the process.
As above, wherein further include step c2 between step b5 and step b6 if user B is fixed people: operator is flat
The coding of platform generation user B;Step b6 further includes step c3: while putting through the true number of user A, by the coding of user B
It is carried to virtual-number in the incoming information of user A.
As above, wherein in step b2, the method for the validity period verification includes: that the user B cell phone application acquisition is worked as
Preceding network time, the SIM card B check whether the validity period identified in the virtual-number exceeds the time limit, and whether use time meets
It is required that requesting operator's platform to put through the phone of user A if met the requirements.
As above, wherein include step b0 before step b1: user B passes through the two dimensional code in scanning user A cell phone application
It obtains virtual-number or user B and virtual-number is read from SIM card A by NFC transmission mode.
As shown in figure 3, the application also provides a kind of secret communication system, including user A1, user B2 and operator's platform
It is preinstalled with user A cell phone application 11 and SIM card A 12 in 3, the user A1, user's B mobile phone is preinstalled in the user B 2
APP 21 and SIM card B 22, which is characterized in that
The user A 1 is for generating virtual-number;
The user B 2 obtains the virtual-number and is communicated by operator's platform 3 and user A 1;The operator
Platform 3 is used to the virtual-number being converted into true called number;
The key and parameter of user A 1 are stored on the SIM card A 12;
The key and parameter of user B 2 are stored on the SIM card B 22.
As above, wherein database is stored on operator's platform 3, the databases, which contain, to be corresponded to often
The unique data of SIM card after operator's platform 3 receives the virtual-number, carries out key to the virtual-number
Operation obtains the corresponding true number of the virtual-number, and generates the coding of user B 2, passes through what is stored in selected SIM card
Unique key and parameter, SIM card carry out the coding that operation generates user B2, operator's platform 3 with the key pair parameter
The mobile phone of user A 1 is put through with the true number, and shows in the incoming information of user A 1 virtual-number and described
The coding of user B 2.
Table 1
Reference table 1, a specific embodiment according to the present invention, if user A 1 wishes to be shared with virtual-number admittedly
When fixed user B 2, the coding of user B 2 is obtained by the mobile phone and 22 communication interaction operation of SIM card B of user B, SIM card B 22
With the unique parameter of the whole network and some keys, one or more password strings can be calculated, in the present solution, user B 2 is encoded
Generation method is first to calculate a string of password strings with the key in SIM card B 22, this password string is supplied to user A 1, is used
Family A 1 obtains string of code (user B to the validity period operation of its 4th bit digital, the number of user A 1 and number to this password string
2 codings), this string code is filled into the 5-16 number of virtual-number, and the 1st digital representation is shared with fixed user, and the 2nd number is
The random number that user A 1 is generated, user inform which key of user B 2 exports password string, and the 3-4 number is to generate user B
The parameter of 2 codings, the 3rd number are the random numbers that user A 1 is generated, for indicating which parameter participates in password in SIM card B 22
The generation of string, the 4th number are encrypted 3rd numbers, and the 2-3 number is plaintext transmission, and the 4-16 number is encrypted transmission, most
Afterwards, digital 1-16 is the virtual-number that user A 1 is finally shared with user B 2, for indicating the significant number of user A 1.
Table 2
Reference table 2, a specific embodiment according to the present invention, if virtual-number is shared with not by the hope of user A 1
When fixed user B 2, the 1st digital representation is shared with and is not fixed user, the cipher key index word that the 2-3 number is user A 1
Section use two numbers as cipher key index, the key of the preservation in SIM card A 12 of user A 1, to the number of user A 1 with
Validity period does operation, can deposit ten group keys in card, so that it may ten general numbers for not limiting user is generated, in this word
Duan Zhong separates one section to indicate which group key in SIM card A 12, such as the 2nd digital representation which group key, the 3rd number
The character string that word expression is obtained with the number of key pair user A 1 and validity period operation, number that the 4-13 number is user A 1
Code field, the 14-16 number are the check value of 1 number of user A, wherein the 4-13 digital plaintext transmission, finally, digital
1-16 is the virtual-number that user A1 is finally shared with user B 2, for indicating the significant number of user A 1.
A specific embodiment according to the present invention, if the mobile phone of user A 1 supports NFC transmission, and SIM card A 12
SWP agreement is held, then virtual number can also be read from SIM card A 12 by NFC transmission mode with the mobile phone of user B 2
Code.
A specific embodiment according to the present invention, user A cell phone application 11 may determine that whether virtual-number is leaked,
And the information of harassing call is counted according to the coding of user B 2 in incoming information.
What the application realized has the beneficial effect that:
(1) actively share virtual-number between mobile phone user, and use virtual number communication, prevent true number from being let out
Dew;
(2) mobile phone user the virtual-number can be used to make a call multiple, more convenient to use without reacquiring, and save
Time reduces the pressure of operator's platform and the concurrency requirement to operator's platform;
(3) main validity judgement and incoming call statistics etc. all operate in APP client and SIM card, significantly reduce
Requirement to operator's platform reduces the pressure to operator's platform;
(4) user A can be according to the user's B encoding statistics incoming call number carried in incoming information, and can mask school
Test illegal phone.
Claims (10)
1. a kind of generation method based on SIM card virtual-number, which is characterized in that this method comprises:
Step S1, in user's A cell phone application generate virtual-number constraint requirements, comprising: select virtual-number validity period,
It determines the type of service of user B and generates cipher key index and parameter reference in user's A cell phone application;
The constraint requirements of virtual-number are sent to SIM card A by step S2, user A cell phone application;
Step S3, SIM card A generate the virtual-number of characterization user A according to the true number of the constraint requirements and user A;
Virtual-number is returned to user's A cell phone application by step S4, SIM card A.
2. the generation method according to claim 1 based on SIM card virtual-number, which is characterized in that in step S1, if with
Family B is fixed people, generates the constraint requirements of virtual-number further include:
Cipher key index and parameter reference are sent to user B by step a1, user A cell phone application, and are requested user B to generate user B and compiled
Code;
Step a2, user B select the key stored on SIM card B and parameter according to the cipher key index and parameter reference respectively,
SIM card B parameter described in the key pair carries out operation and generates user B coding;
User B is encoded and is sent to user's A cell phone application as the constraint requirements of virtual-number by step a3, user B cell phone application.
3. the generation method according to claim 1 based on SIM card virtual-number, which is characterized in that in step S3, if with
Family B is unfixed people,
SIM card A selectes the key stored on SIM card A and parameter according to the cipher key index and the parameter reference;
User A carries out operation with the parameter stored on the true number and SIM card A of the key pair user A stored on SIM card A and obtains
Character string is taken, the character string is for forming the virtual-number.
4. a kind of application method based on SIM card virtual-number characterized by comprising
Step b1, user B are made a phone call using virtual-number to user A;
Step b2, user B cell phone application carry out validity period verification to virtual-number, no if before the deadline, executing step b3
Then, terminate the process;
Step b3, user B cell phone application are requested to operator's platform Sending dialled number;
Virtual-number is sent to operator's platform by step b4;
Virtual-number is converted to the true number of user A by step b5, operator's platform;
Step b6, operator's platform put through the true number of user A;
Step b7, the intercepting and capturing of user's A cell phone application are often taken on the telephone, and judge whether virtual-number is let out according to the information in incoming information
Dew chooses whether to connect phone.
5. the application method according to claim 4 based on SIM card virtual-number, which is characterized in that if user B is to fix
People, further include step c1 between step b2 and step b3:
User B judges whether each field in the virtual-number is legal, if legal, thens follow the steps b3, otherwise, terminates the stream
Journey.
6. the application method according to claim 4 or 5 based on SIM card virtual-number, which is characterized in that if user B is
Fixed people further includes step c2 between step b5 and b6: the coding of operator's platform generation user B;
Further include step c3 in step b6: while putting through user A true number, the coding of user B and virtual-number being carried
Into the incoming information of user A.
7. the application method according to claim 4 based on SIM card virtual-number, which is characterized in that in step b2, effectively
The method of phase verification includes: that user B cell phone application obtains current network time, and SIM card B is checked to be identified in the virtual-number
Whether validity period exceeds the time limit, and whether use time meets the requirements, if met the requirements, operator's platform is requested to put through user A's
Phone.
8. the application method according to claim 4 based on SIM card virtual-number, which is characterized in that wherein, step b1 it
It is preceding include step b0: user B by scanning user A cell phone application on two dimensional code acquisition virtual-number or user B pass through NFC
Transmission mode reads virtual-number from SIM card A.
9. a kind of secret communication system, which is characterized in that including user A, user B and operator's platform, pre-installed in user A useful
Family A cell phone application and SIM card A are preinstalled with user B cell phone application and SIM card B in user B, which is characterized in that
User A is for generating virtual-number;
User B obtains the virtual-number and is communicated by operator's platform and user A;Operator's platform is used for will be described
Virtual-number is converted into true called number;
The key and parameter of user A are stored on SIM card A;
The key and parameter of user B are stored on SIM card B.
10. secret communication system according to claim 9, which is characterized in that be stored with data on operator's platform
Library, the databases contain the unique data corresponding to every SIM card, and operator's platform receives the virtual number
After code, key operation is carried out to the virtual-number and obtains the corresponding true number of the virtual-number, and generates the volume of user B
Code, operator's platform put through the mobile phone of user A with the true number, and in the incoming information of user A described in display
The coding of virtual-number and the user B.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811390334.9A CN109274838B (en) | 2018-11-21 | 2018-11-21 | Generation and application method and secret communication system based on SIM card virtual-number |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811390334.9A CN109274838B (en) | 2018-11-21 | 2018-11-21 | Generation and application method and secret communication system based on SIM card virtual-number |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274838A true CN109274838A (en) | 2019-01-25 |
CN109274838B CN109274838B (en) | 2019-12-03 |
Family
ID=65191194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811390334.9A Active CN109274838B (en) | 2018-11-21 | 2018-11-21 | Generation and application method and secret communication system based on SIM card virtual-number |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274838B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110691170A (en) * | 2019-08-29 | 2020-01-14 | 深圳市珍爱捷云信息技术有限公司 | Method, device, computer equipment and storage medium for realizing virtual number calling |
CN110880974A (en) * | 2019-12-04 | 2020-03-13 | 腾讯科技(深圳)有限公司 | Data communication method and device based on block chain network |
CN113992800A (en) * | 2021-10-22 | 2022-01-28 | 深圳市宝尔爱迪科技有限公司 | Number privacy protection method and device and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150072670A1 (en) * | 2013-09-12 | 2015-03-12 | Microsoft Corporation | Dummy phone numbers to manage states on mobile phones |
CN105227786A (en) * | 2014-06-11 | 2016-01-06 | 阿里巴巴集团控股有限公司 | A kind of means of communication based on virtual-number and device |
KR20160036471A (en) * | 2014-08-27 | 2016-04-04 | 유한회사 실릭스 | Payment method, computer readable recording medium and system using virtual number based on otp |
CN105721720A (en) * | 2014-12-03 | 2016-06-29 | 中国电信股份有限公司 | Method for displaying virtual number, and virtual number distribution platform and system |
CN106341558A (en) * | 2016-08-30 | 2017-01-18 | 五八同城信息技术有限公司 | Virtual number processing method and device and server |
-
2018
- 2018-11-21 CN CN201811390334.9A patent/CN109274838B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150072670A1 (en) * | 2013-09-12 | 2015-03-12 | Microsoft Corporation | Dummy phone numbers to manage states on mobile phones |
CN105227786A (en) * | 2014-06-11 | 2016-01-06 | 阿里巴巴集团控股有限公司 | A kind of means of communication based on virtual-number and device |
KR20160036471A (en) * | 2014-08-27 | 2016-04-04 | 유한회사 실릭스 | Payment method, computer readable recording medium and system using virtual number based on otp |
CN105721720A (en) * | 2014-12-03 | 2016-06-29 | 中国电信股份有限公司 | Method for displaying virtual number, and virtual number distribution platform and system |
CN106341558A (en) * | 2016-08-30 | 2017-01-18 | 五八同城信息技术有限公司 | Virtual number processing method and device and server |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110691170A (en) * | 2019-08-29 | 2020-01-14 | 深圳市珍爱捷云信息技术有限公司 | Method, device, computer equipment and storage medium for realizing virtual number calling |
CN110880974A (en) * | 2019-12-04 | 2020-03-13 | 腾讯科技(深圳)有限公司 | Data communication method and device based on block chain network |
CN110880974B (en) * | 2019-12-04 | 2022-06-14 | 腾讯科技(深圳)有限公司 | Data communication method and device based on block chain network |
CN113992800A (en) * | 2021-10-22 | 2022-01-28 | 深圳市宝尔爱迪科技有限公司 | Number privacy protection method and device and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109274838B (en) | 2019-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274838B (en) | Generation and application method and secret communication system based on SIM card virtual-number | |
RU2415470C2 (en) | Method of creating security code, method of using said code, programmable device for realising said method | |
CN1331371C (en) | Method for delocking mobile phone radio communication terminal | |
CN101496344B (en) | Method and system having self-setting authentication formula for webs bank payment and identification confirmation | |
RU2411670C2 (en) | Method to create and verify authenticity of electronic signature | |
EP1804418A1 (en) | A dynamic password authentication system and the method thereof | |
CN103428699A (en) | Registration binding and identity authentication method based on mobile phone hardware feature information | |
FR2977418A1 (en) | AUTHENTICATION SYSTEM VIA TWO COMMUNICATION DEVICES | |
CN104168557A (en) | Upgrading method for operating systems and upgrading device for operating systems | |
CN104683357B (en) | A kind of dynamic password authentication method and system based on software token | |
CN106572076A (en) | Web service access method, client side and server side | |
CN101146305A (en) | Configuration method of secure policy | |
CN107018240A (en) | A kind of call method and system of hiding called number | |
US20030046246A1 (en) | Blocking server | |
CN102984335A (en) | Identity authentication method, equipment and system for making fixed-line call | |
CN106778178A (en) | The call method and device of fingerprint business card | |
CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
CN107315934A (en) | Communication message processing method, mobile terminal and storage device | |
CN100361436C (en) | System and method for performing mutual authentication between mobile terminal and server | |
CN104935755A (en) | Display method and device of incoming call card | |
CN104335619B (en) | The remote de-locking of telecommunication apparatus function | |
CN102202291B (en) | Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF) | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN106686196A (en) | Personal mobile phone safety management method | |
CN103581202B (en) | The trade company of identity-based authentication platform makes board cross-certification method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20191106 Address after: 212355 Zhenjiang city of Jiangsu province Danyang City Heng Tang Industrial Zone Applicant after: Hengbao Corp. Address before: 212355 Hengtang Industrial Park, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province Applicant before: Jiangsu Hengbao Intelligent System Technology Co. Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |