CN109274838A - Generation and application method and secret communication system based on SIM card virtual-number - Google Patents

Generation and application method and secret communication system based on SIM card virtual-number Download PDF

Info

Publication number
CN109274838A
CN109274838A CN201811390334.9A CN201811390334A CN109274838A CN 109274838 A CN109274838 A CN 109274838A CN 201811390334 A CN201811390334 A CN 201811390334A CN 109274838 A CN109274838 A CN 109274838A
Authority
CN
China
Prior art keywords
user
virtual
sim card
cell phone
operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811390334.9A
Other languages
Chinese (zh)
Other versions
CN109274838B (en
Inventor
高岚
陆道如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201811390334.9A priority Critical patent/CN109274838B/en
Publication of CN109274838A publication Critical patent/CN109274838A/en
Application granted granted Critical
Publication of CN109274838B publication Critical patent/CN109274838B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a kind of generation based on SIM card virtual-number and application method and secret communication system, the generation method of virtual-number includes S1, the constraint requirements of virtual-number are generated in user's A cell phone application, comprising: the validity period of virtual-number, the type of service for determining user B and user's A cell phone application is selected to generate cipher key index and parameter reference;The constraint requirements of virtual-number are sent to SIM card A by S2, user A cell phone application;S3, SIM card A generate the virtual-number of characterization user A according to the true number of constraint requirements and user A;Virtual-number is returned to user's A cell phone application by S4, SIM card A.In the application, user A actively generates virtual-number and is shared with user B, and user B is made a phone call using virtual-number to user A, and the true number of user A is prevented to be leaked, user B is not necessarily to connect generation virtual-number in internet before making a phone call every time, reduces the pressure to operator's platform.

Description

Generation and application method and secret communication system based on SIM card virtual-number
Technical field
This application involves mobile communication technology field more particularly to a kind of generations and use based on SIM card virtual-number Method and secret communication system.
Background technique
Currently, mobile terminal of mobile telephone is more more and more universal, consequent is the abundant of mobile phone application APP, current society Meeting, telephone number is leaked, various harassing calls, these are all that everybody can't bear the sore spot that it is disturbed.Existing mobile telephone equipment When mutually being called, telephone number can be directly displayed, or telephone number is marked, show mark information and phone number Code, but individual and company for information security with high standards, however it remains the security risk of telephone number leakage.
Currently, drop drop is called a taxi in order to which the privacy of passenger opens safe dialing, passenger and driver link are virtual numbers Code will not provide the true number of passenger, and order is completed, and the virtual-number just fails after passenger's payment.Drip the number of drop not It is to encrypt the phone number of passenger, but when driver calls passenger, first calling is virtual to transport to virtual operator there Battalion quotient is relayed to passenger.Drop drop software knows the true number of both sides, and in software when click-to-dial, drop drop backstage chooses one Reserved vacant number in a local default number section is matched to be shown to calling terminal, then passes through and operators in co-operation, matching are true Number reserves vacant number call diversion to this.This scheme, platform know between taxi hitcher and driver about calling a taxi After business association, the two is linked together, but when business association is not set up, user does not have corresponding virtual-number, also without The number of oneself is actively shared with others by method, and user is passive operation.
Currently, operator's platform can be requested according to individual, some virtual-numbers are established for everyone, virtual-number is effective Time limit system.User is made a phone call using virtual-number, and operator's platform is responsible for for virtual-number being converted into true number, then carries out Closing of the circuit.In this scheme, all virtual-numbers will be generated from operator's platform, and application will connect interconnection every time Net, from operator's platform application.If internet sometimes, cannot be connected, then virtual-number just can not be applied.And And operator's platform wants a large amount of virtual-number data of storage and management, and makees a large amount of legitimacy verifies, to the pressure of platform It is required with concurrency too high.
Summary of the invention
The application's is designed to provide a kind of generation based on SIM card virtual-number and application method and secure communication system System, user A actively generates virtual-number, and is actively shared with user B, and user B is according to the user based on SIM card virtual-number Method is made a phone call to user A, and user A judges whether it is harassing call according to the virtual-number of B in incoming information, to shield interference Phone;It is multiple that the virtual-number can be used to make a call for mobile phone user, more convenient to use without reacquiring, and saves the time, drop The pressure of low operator's platform and to the requirement of the concurrency of operator's platform.
In order to achieve the above objectives, the application provides a kind of generation method based on SIM card virtual-number, this method comprises:
Step S1 generates the constraint requirements of virtual-number, comprising: select the effective of virtual-number in user's A cell phone application Phase, the type of service for determining user B and generation cipher key index and parameter reference in user's A cell phone application;
The constraint requirements of virtual-number are sent to SIM card A by step S2, user A cell phone application;
Step S3, SIM card A generate the virtual number of characterization user A according to the true number of the constraint requirements and user A Code;
Virtual-number is returned to user's A cell phone application by step S4, SIM card A.
As above, wherein in step S1, if user B is fixed people, generate the constraint requirements of virtual-number further include:
Cipher key index and parameter reference are sent to user B by step a1, user A cell phone application, and are requested user B to generate and used Family B coding;
Step a2, user B select the key stored on SIM card B and ginseng according to the cipher key index and parameter reference respectively Number, SIM card B parameter described in the key pair carry out operation and generate user B coding;
User B is encoded and is sent to user's A mobile phone as the constraint requirements of virtual-number by step a3, user B cell phone application APP。
As above, wherein in step S3, if user B is unfixed people,
SIM card A selectes the key stored on SIM card A and parameter according to the cipher key index and the parameter reference;
User A is transported with the parameter stored on the true number and SIM card A of the key pair user A stored on SIM card A It calculates and obtains character string, the character string is for forming the virtual-number.
A kind of application method based on SIM card virtual-number characterized by comprising
Step b1, user B are made a phone call using virtual-number to user A;
Step b2, user B cell phone application carry out validity period verification to virtual-number, if before the deadline, executing step Otherwise b3 terminates the process;
Step b3, user B cell phone application are requested to operator's platform Sending dialled number;
Virtual-number is sent to operator's platform by step b4;
Virtual-number is converted to the true number of user A by step b5, operator's platform;
Step b6, operator's platform put through the true number of user A;
Step b7, the intercepting and capturing of user's A cell phone application are often taken on the telephone, and whether judge virtual-number according to the information in incoming information It is leaked, chooses whether to connect phone.
As above, wherein further include step c1 between step b2 and step b3 if user B is fixed people:
User B judges whether each field in the virtual-number is legal, if legal, thens follow the steps b3, otherwise, terminates The process.
As above, wherein further include step c2 between step b5 and b6 if user B is fixed people: operator's platform is raw At the coding of user B;It further include step c3 in step b6: while putting through user A true number, by the coding and void of user B Quasi- local number portability is into the incoming information of user A.
As above, wherein in step b2, the method for the validity period verification includes: that user's B cell phone application obtains current net Network time, SIM card B check whether the validity period identified in the virtual-number exceeds the time limit, and whether use time meets the requirements, if It meets the requirements, then operator's platform is requested to put through the phone of user A.
As above, wherein include step b0 before step b1: user B passes through the two dimensional code in scanning user A cell phone application It obtains virtual-number or user B and virtual-number is read from SIM card A by NFC transmission mode.
The application also provides a kind of secret communication system, which is characterized in that including user A, user B and operator's platform, It is preinstalled with user A cell phone application and SIM card A in user A, user B cell phone application and SIM card B are preinstalled in user B, feature exists In,
User A is for generating virtual-number;
User B obtains the virtual-number and is communicated by operator's platform and user A;Operator's platform is used for will The virtual-number is converted into true called number;
The key and parameter of user A are stored on SIM card A;
The key and parameter of user B are stored on SIM card B.
As above, wherein database is stored on operator's platform, the databases are contained corresponding to every The unique data of SIM card after operator's platform receives the virtual-number, carries out key operation to the virtual-number The corresponding true number of the virtual-number is obtained, and generates the coding of user B, operator's platform true number The mobile phone of user A is put through, and shows the coding of the virtual-number and the user B in the incoming information of user A.
What the application realized has the beneficial effect that:
(1) actively share virtual-number between mobile phone user, and use virtual number communication, prevent true number from being let out Dew;
(2) mobile phone user the virtual-number can be used to make a call multiple, reacquire without connecting internet, using more It is convenient, the time is saved, the pressure of operator's platform and the concurrency requirement to operator's platform are reduced;
(3) main validity judgement and incoming call statistics etc. all operate in APP client and SIM card, significantly reduce Requirement to operator's platform reduces the pressure to operator's platform;
(4) user A can be according to the user's B encoding statistics incoming call number carried in incoming information, and can mask school Test illegal phone.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application can also be obtained according to these attached drawings other attached for those skilled in the art Figure.
Fig. 1 is a kind of flow chart of the generation method based on SIM card virtual-number of the present invention.
Fig. 2 is a kind of flow chart of the application method based on SIM card virtual-number of the present invention.
Fig. 3 is a kind of schematic diagram of secret communication system of the present invention.
Appended drawing reference: 1- user A, 2- user B, 3- operator platform, 11- user's A cell phone application, 12-SIM card A, 21- use Family B cell phone application, 22-SIM card B.
Specific embodiment
Below with reference to the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Ground description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the application In embodiment, those skilled in the art's every other embodiment obtained without making creative work, all Belong to the range of the application protection.
As shown in Figure 1, application provides a kind of generation method based on SIM card virtual-number, this method comprises:
Step S1 generates the constraint requirements of virtual-number, comprising: select the effective of virtual-number in user's A cell phone application Phase, the type of service for determining user B and generation cipher key index and parameter reference in user's A cell phone application;
The constraint requirements of virtual-number are sent to SIM card A by step S2, user A cell phone application;
Step S3, the SIM card A generate the virtual of characterization user A according to the true number of the constraint requirements and user A Number;
Virtual-number is returned to user's A cell phone application by step S4, SIM card A.
As above, wherein in step S1, if user B is fixed people, generate the constraint requirements of virtual-number further include:
Cipher key index and parameter reference are sent to user B by step a1, user A cell phone application, and are requested user B to generate and used Family B coding;
Step a2, user B select the key stored on SIM card B and ginseng according to the cipher key index and parameter reference respectively Number, SIM card B parameter described in the key pair carry out operation and generate user B coding;
User B is encoded and is sent to user's A mobile phone as the constraint requirements of virtual-number by step a3, user B cell phone application APP。
As above, wherein in step S3, if user B is unfixed people,
The SIM card A selectes the key stored on SIM card A and parameter according to the cipher key index and the parameter reference;
User A is transported with the parameter stored on the true number and SIM card A of the key pair user A stored on SIM card A It calculates and obtains character string, the character string is for forming the virtual-number.
As shown in Fig. 2, a kind of application method based on SIM card virtual-number, comprising:
Step b1, user B are made a phone call using virtual-number to user A;
Step b2, user B cell phone application carry out validity period verification to virtual-number, if before the deadline, executing step Otherwise b3 terminates the process;
Step b3, user B cell phone application are requested to operator's platform Sending dialled number;
Virtual-number is sent to operator's platform by step b4;
Virtual-number is converted to the true number of user A by step b5, operator's platform;
Step b6, operator's platform put through the true number of user A;
User's A cell phone application intercepting and capturing of step b7, user A are often taken on the telephone, and judge virtual number according to the information in incoming information Whether code is leaked, and chooses whether to connect phone.
As above, wherein if user B is fixed people, further include step c1 between step b2 and step b3: user B sentences Whether each field broken in the virtual-number is legal, if legal, thens follow the steps b3, otherwise, terminates the process.
As above, wherein further include step c2 between step b5 and step b6 if user B is fixed people: operator is flat The coding of platform generation user B;Step b6 further includes step c3: while putting through the true number of user A, by the coding of user B It is carried to virtual-number in the incoming information of user A.
As above, wherein in step b2, the method for the validity period verification includes: that the user B cell phone application acquisition is worked as Preceding network time, the SIM card B check whether the validity period identified in the virtual-number exceeds the time limit, and whether use time meets It is required that requesting operator's platform to put through the phone of user A if met the requirements.
As above, wherein include step b0 before step b1: user B passes through the two dimensional code in scanning user A cell phone application It obtains virtual-number or user B and virtual-number is read from SIM card A by NFC transmission mode.
As shown in figure 3, the application also provides a kind of secret communication system, including user A1, user B2 and operator's platform It is preinstalled with user A cell phone application 11 and SIM card A 12 in 3, the user A1, user's B mobile phone is preinstalled in the user B 2 APP 21 and SIM card B 22, which is characterized in that
The user A 1 is for generating virtual-number;
The user B 2 obtains the virtual-number and is communicated by operator's platform 3 and user A 1;The operator Platform 3 is used to the virtual-number being converted into true called number;
The key and parameter of user A 1 are stored on the SIM card A 12;
The key and parameter of user B 2 are stored on the SIM card B 22.
As above, wherein database is stored on operator's platform 3, the databases, which contain, to be corresponded to often The unique data of SIM card after operator's platform 3 receives the virtual-number, carries out key to the virtual-number Operation obtains the corresponding true number of the virtual-number, and generates the coding of user B 2, passes through what is stored in selected SIM card Unique key and parameter, SIM card carry out the coding that operation generates user B2, operator's platform 3 with the key pair parameter The mobile phone of user A 1 is put through with the true number, and shows in the incoming information of user A 1 virtual-number and described The coding of user B 2.
Table 1
Reference table 1, a specific embodiment according to the present invention, if user A 1 wishes to be shared with virtual-number admittedly When fixed user B 2, the coding of user B 2 is obtained by the mobile phone and 22 communication interaction operation of SIM card B of user B, SIM card B 22 With the unique parameter of the whole network and some keys, one or more password strings can be calculated, in the present solution, user B 2 is encoded Generation method is first to calculate a string of password strings with the key in SIM card B 22, this password string is supplied to user A 1, is used Family A 1 obtains string of code (user B to the validity period operation of its 4th bit digital, the number of user A 1 and number to this password string 2 codings), this string code is filled into the 5-16 number of virtual-number, and the 1st digital representation is shared with fixed user, and the 2nd number is The random number that user A 1 is generated, user inform which key of user B 2 exports password string, and the 3-4 number is to generate user B The parameter of 2 codings, the 3rd number are the random numbers that user A 1 is generated, for indicating which parameter participates in password in SIM card B 22 The generation of string, the 4th number are encrypted 3rd numbers, and the 2-3 number is plaintext transmission, and the 4-16 number is encrypted transmission, most Afterwards, digital 1-16 is the virtual-number that user A 1 is finally shared with user B 2, for indicating the significant number of user A 1.
Table 2
Reference table 2, a specific embodiment according to the present invention, if virtual-number is shared with not by the hope of user A 1 When fixed user B 2, the 1st digital representation is shared with and is not fixed user, the cipher key index word that the 2-3 number is user A 1 Section use two numbers as cipher key index, the key of the preservation in SIM card A 12 of user A 1, to the number of user A 1 with Validity period does operation, can deposit ten group keys in card, so that it may ten general numbers for not limiting user is generated, in this word Duan Zhong separates one section to indicate which group key in SIM card A 12, such as the 2nd digital representation which group key, the 3rd number The character string that word expression is obtained with the number of key pair user A 1 and validity period operation, number that the 4-13 number is user A 1 Code field, the 14-16 number are the check value of 1 number of user A, wherein the 4-13 digital plaintext transmission, finally, digital 1-16 is the virtual-number that user A1 is finally shared with user B 2, for indicating the significant number of user A 1.
A specific embodiment according to the present invention, if the mobile phone of user A 1 supports NFC transmission, and SIM card A 12 SWP agreement is held, then virtual number can also be read from SIM card A 12 by NFC transmission mode with the mobile phone of user B 2 Code.
A specific embodiment according to the present invention, user A cell phone application 11 may determine that whether virtual-number is leaked, And the information of harassing call is counted according to the coding of user B 2 in incoming information.
What the application realized has the beneficial effect that:
(1) actively share virtual-number between mobile phone user, and use virtual number communication, prevent true number from being let out Dew;
(2) mobile phone user the virtual-number can be used to make a call multiple, more convenient to use without reacquiring, and save Time reduces the pressure of operator's platform and the concurrency requirement to operator's platform;
(3) main validity judgement and incoming call statistics etc. all operate in APP client and SIM card, significantly reduce Requirement to operator's platform reduces the pressure to operator's platform;
(4) user A can be according to the user's B encoding statistics incoming call number carried in incoming information, and can mask school Test illegal phone.

Claims (10)

1. a kind of generation method based on SIM card virtual-number, which is characterized in that this method comprises:
Step S1, in user's A cell phone application generate virtual-number constraint requirements, comprising: select virtual-number validity period, It determines the type of service of user B and generates cipher key index and parameter reference in user's A cell phone application;
The constraint requirements of virtual-number are sent to SIM card A by step S2, user A cell phone application;
Step S3, SIM card A generate the virtual-number of characterization user A according to the true number of the constraint requirements and user A;
Virtual-number is returned to user's A cell phone application by step S4, SIM card A.
2. the generation method according to claim 1 based on SIM card virtual-number, which is characterized in that in step S1, if with Family B is fixed people, generates the constraint requirements of virtual-number further include:
Cipher key index and parameter reference are sent to user B by step a1, user A cell phone application, and are requested user B to generate user B and compiled Code;
Step a2, user B select the key stored on SIM card B and parameter according to the cipher key index and parameter reference respectively, SIM card B parameter described in the key pair carries out operation and generates user B coding;
User B is encoded and is sent to user's A cell phone application as the constraint requirements of virtual-number by step a3, user B cell phone application.
3. the generation method according to claim 1 based on SIM card virtual-number, which is characterized in that in step S3, if with Family B is unfixed people,
SIM card A selectes the key stored on SIM card A and parameter according to the cipher key index and the parameter reference;
User A carries out operation with the parameter stored on the true number and SIM card A of the key pair user A stored on SIM card A and obtains Character string is taken, the character string is for forming the virtual-number.
4. a kind of application method based on SIM card virtual-number characterized by comprising
Step b1, user B are made a phone call using virtual-number to user A;
Step b2, user B cell phone application carry out validity period verification to virtual-number, no if before the deadline, executing step b3 Then, terminate the process;
Step b3, user B cell phone application are requested to operator's platform Sending dialled number;
Virtual-number is sent to operator's platform by step b4;
Virtual-number is converted to the true number of user A by step b5, operator's platform;
Step b6, operator's platform put through the true number of user A;
Step b7, the intercepting and capturing of user's A cell phone application are often taken on the telephone, and judge whether virtual-number is let out according to the information in incoming information Dew chooses whether to connect phone.
5. the application method according to claim 4 based on SIM card virtual-number, which is characterized in that if user B is to fix People, further include step c1 between step b2 and step b3:
User B judges whether each field in the virtual-number is legal, if legal, thens follow the steps b3, otherwise, terminates the stream Journey.
6. the application method according to claim 4 or 5 based on SIM card virtual-number, which is characterized in that if user B is Fixed people further includes step c2 between step b5 and b6: the coding of operator's platform generation user B;
Further include step c3 in step b6: while putting through user A true number, the coding of user B and virtual-number being carried Into the incoming information of user A.
7. the application method according to claim 4 based on SIM card virtual-number, which is characterized in that in step b2, effectively The method of phase verification includes: that user B cell phone application obtains current network time, and SIM card B is checked to be identified in the virtual-number Whether validity period exceeds the time limit, and whether use time meets the requirements, if met the requirements, operator's platform is requested to put through user A's Phone.
8. the application method according to claim 4 based on SIM card virtual-number, which is characterized in that wherein, step b1 it It is preceding include step b0: user B by scanning user A cell phone application on two dimensional code acquisition virtual-number or user B pass through NFC Transmission mode reads virtual-number from SIM card A.
9. a kind of secret communication system, which is characterized in that including user A, user B and operator's platform, pre-installed in user A useful Family A cell phone application and SIM card A are preinstalled with user B cell phone application and SIM card B in user B, which is characterized in that
User A is for generating virtual-number;
User B obtains the virtual-number and is communicated by operator's platform and user A;Operator's platform is used for will be described Virtual-number is converted into true called number;
The key and parameter of user A are stored on SIM card A;
The key and parameter of user B are stored on SIM card B.
10. secret communication system according to claim 9, which is characterized in that be stored with data on operator's platform Library, the databases contain the unique data corresponding to every SIM card, and operator's platform receives the virtual number After code, key operation is carried out to the virtual-number and obtains the corresponding true number of the virtual-number, and generates the volume of user B Code, operator's platform put through the mobile phone of user A with the true number, and in the incoming information of user A described in display The coding of virtual-number and the user B.
CN201811390334.9A 2018-11-21 2018-11-21 Generation and application method and secret communication system based on SIM card virtual-number Active CN109274838B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811390334.9A CN109274838B (en) 2018-11-21 2018-11-21 Generation and application method and secret communication system based on SIM card virtual-number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811390334.9A CN109274838B (en) 2018-11-21 2018-11-21 Generation and application method and secret communication system based on SIM card virtual-number

Publications (2)

Publication Number Publication Date
CN109274838A true CN109274838A (en) 2019-01-25
CN109274838B CN109274838B (en) 2019-12-03

Family

ID=65191194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811390334.9A Active CN109274838B (en) 2018-11-21 2018-11-21 Generation and application method and secret communication system based on SIM card virtual-number

Country Status (1)

Country Link
CN (1) CN109274838B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691170A (en) * 2019-08-29 2020-01-14 深圳市珍爱捷云信息技术有限公司 Method, device, computer equipment and storage medium for realizing virtual number calling
CN110880974A (en) * 2019-12-04 2020-03-13 腾讯科技(深圳)有限公司 Data communication method and device based on block chain network
CN113992800A (en) * 2021-10-22 2022-01-28 深圳市宝尔爱迪科技有限公司 Number privacy protection method and device and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150072670A1 (en) * 2013-09-12 2015-03-12 Microsoft Corporation Dummy phone numbers to manage states on mobile phones
CN105227786A (en) * 2014-06-11 2016-01-06 阿里巴巴集团控股有限公司 A kind of means of communication based on virtual-number and device
KR20160036471A (en) * 2014-08-27 2016-04-04 유한회사 실릭스 Payment method, computer readable recording medium and system using virtual number based on otp
CN105721720A (en) * 2014-12-03 2016-06-29 中国电信股份有限公司 Method for displaying virtual number, and virtual number distribution platform and system
CN106341558A (en) * 2016-08-30 2017-01-18 五八同城信息技术有限公司 Virtual number processing method and device and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150072670A1 (en) * 2013-09-12 2015-03-12 Microsoft Corporation Dummy phone numbers to manage states on mobile phones
CN105227786A (en) * 2014-06-11 2016-01-06 阿里巴巴集团控股有限公司 A kind of means of communication based on virtual-number and device
KR20160036471A (en) * 2014-08-27 2016-04-04 유한회사 실릭스 Payment method, computer readable recording medium and system using virtual number based on otp
CN105721720A (en) * 2014-12-03 2016-06-29 中国电信股份有限公司 Method for displaying virtual number, and virtual number distribution platform and system
CN106341558A (en) * 2016-08-30 2017-01-18 五八同城信息技术有限公司 Virtual number processing method and device and server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110691170A (en) * 2019-08-29 2020-01-14 深圳市珍爱捷云信息技术有限公司 Method, device, computer equipment and storage medium for realizing virtual number calling
CN110880974A (en) * 2019-12-04 2020-03-13 腾讯科技(深圳)有限公司 Data communication method and device based on block chain network
CN110880974B (en) * 2019-12-04 2022-06-14 腾讯科技(深圳)有限公司 Data communication method and device based on block chain network
CN113992800A (en) * 2021-10-22 2022-01-28 深圳市宝尔爱迪科技有限公司 Number privacy protection method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN109274838B (en) 2019-12-03

Similar Documents

Publication Publication Date Title
CN109274838B (en) Generation and application method and secret communication system based on SIM card virtual-number
RU2415470C2 (en) Method of creating security code, method of using said code, programmable device for realising said method
CN1331371C (en) Method for delocking mobile phone radio communication terminal
CN101496344B (en) Method and system having self-setting authentication formula for webs bank payment and identification confirmation
RU2411670C2 (en) Method to create and verify authenticity of electronic signature
EP1804418A1 (en) A dynamic password authentication system and the method thereof
CN103428699A (en) Registration binding and identity authentication method based on mobile phone hardware feature information
FR2977418A1 (en) AUTHENTICATION SYSTEM VIA TWO COMMUNICATION DEVICES
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN104683357B (en) A kind of dynamic password authentication method and system based on software token
CN106572076A (en) Web service access method, client side and server side
CN101146305A (en) Configuration method of secure policy
CN107018240A (en) A kind of call method and system of hiding called number
US20030046246A1 (en) Blocking server
CN102984335A (en) Identity authentication method, equipment and system for making fixed-line call
CN106778178A (en) The call method and device of fingerprint business card
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN100361436C (en) System and method for performing mutual authentication between mobile terminal and server
CN104935755A (en) Display method and device of incoming call card
CN104335619B (en) The remote de-locking of telecommunication apparatus function
CN102202291B (en) Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF)
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN106686196A (en) Personal mobile phone safety management method
CN103581202B (en) The trade company of identity-based authentication platform makes board cross-certification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20191106

Address after: 212355 Zhenjiang city of Jiangsu province Danyang City Heng Tang Industrial Zone

Applicant after: Hengbao Corp.

Address before: 212355 Hengtang Industrial Park, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province

Applicant before: Jiangsu Hengbao Intelligent System Technology Co. Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant