CN109905875B - Communication method and device based on virtual number - Google Patents

Communication method and device based on virtual number Download PDF

Info

Publication number
CN109905875B
CN109905875B CN201811422475.4A CN201811422475A CN109905875B CN 109905875 B CN109905875 B CN 109905875B CN 201811422475 A CN201811422475 A CN 201811422475A CN 109905875 B CN109905875 B CN 109905875B
Authority
CN
China
Prior art keywords
service
virtual number
terminal
communication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811422475.4A
Other languages
Chinese (zh)
Other versions
CN109905875A (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201811422475.4A priority Critical patent/CN109905875B/en
Publication of CN109905875A publication Critical patent/CN109905875A/en
Application granted granted Critical
Publication of CN109905875B publication Critical patent/CN109905875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the application provides a communication method and a communication device based on a virtual number, wherein the method comprises the following steps: receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user; judging whether the first real number and the second virtual number have a preset corresponding relation or not; when the first real number and the second virtual number have a preset corresponding relationship, respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship; and sending the communication information sent by the first virtual number to the second real number. According to the embodiment of the application, the leakage of the personal information of the user is blocked, the safety of the personal information of both communication parties is effectively improved, and the situation that both communication parties receive harassment of other people is avoided.

Description

Communication method and device based on virtual number
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a communication method based on a virtual number and a communication device based on a virtual number.
Background
With the popularization of mobile devices, the mobile devices have been developed to almost one part of human hands, and the usage rate of the mobile devices in various aspects of work, study, daily communication and the like of people is higher and higher, so that the mobile devices are an indispensable part of life of people.
Mobile devices are mostly personal items carrying personal information of the user, such as a telephone number. With the wide application of mobile devices, personal information of users is easily leaked, and security problems are easily caused.
For example, some merchants distribute cheap goods maliciously, and a large number of users need to fill out personal information such as telephone numbers when purchasing, but the merchants do not ship goods after the users purchase the goods, but sell the personal information of the large number of users.
For another example, the article may be sold by a lawbreaker collecting personal information of the user during the express process.
The leakage of the personal information of the user easily causes the receipt of fraud calls, harassing calls and even the attack of the supplementary card (namely, lawless persons forge the personal information of the user, such as an identity card, apply for the supplementary mobile phone card of the user to an operator, and steal the virtual and real property of the user bound with the mobile phone card), and the potential safety hazard is very large.
Therefore, one technical problem that needs to be urgently solved by those skilled in the art is: how to provide a communication mechanism based on virtual numbers, and improve the safety of personal information of users.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present application is to provide a communication method based on a virtual number, so as to improve the security of personal information of a user.
Correspondingly, the embodiment of the application also provides a communication device based on the virtual number, which is used for ensuring the realization and the application of the method.
In order to solve the above problem, an embodiment of the present application discloses a communication method based on a virtual number, including:
receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
judging whether a preset corresponding relation exists between the first real number and the second virtual number or not;
when the first real number and the second virtual number have a preset corresponding relationship, respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
and sending the communication information sent by the first virtual number to the second real number.
Preferably, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Preferably, the correspondence configures a failure identifier; the failure identification is used for identifying the failure of the corresponding relation.
Preferably, the corresponding relationship includes an operation identifier corresponding to the processing operation; the method further comprises the following steps:
and deleting the invalid identifier in the corresponding relation when a recovery request sent by the first user or the second user for the operation identifier is received.
Preferably, the method further comprises the following steps:
when the first real number and the second virtual number do not have a preset corresponding relation, judging whether the communication frequency of the non-credible number of the second user is smaller than a preset communication frequency threshold value or not; the non-credible number is other real numbers which do not have a preset corresponding relation with the second virtual number;
if yes, sending communication information sent by the first real number to the second real number;
if not, rejecting the communication information which is sent by the first user and communicated with the second user.
The embodiment of the application also discloses a communication device based on the virtual number, which comprises:
the communication information receiving module is used for receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
the corresponding relation judging module is used for judging whether a preset corresponding relation exists between the first real number and the second virtual number or not;
the number extraction module is used for respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship when the first real number and the second virtual number have a preset corresponding relationship;
and the first communication information sending module is used for sending the communication information sent by the first virtual number to the second real number.
Preferably, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Preferably, the method further comprises the following steps:
a failure identifier configuration module, configured to configure a failure identifier for the corresponding relationship when the processing operation of the specified service object is finished; the failure identification is used for identifying the failure of the corresponding relation.
Preferably, the corresponding relationship includes an operation identifier corresponding to the processing operation; the device further comprises:
and the invalid identifier deleting module is used for deleting the invalid identifier in the corresponding relation when receiving a recovery request which is sent by the first user or the second user aiming at the operation identifier.
Preferably, the method further comprises the following steps:
the non-credible communication frequency judging module is used for judging whether the communication frequency of the non-credible number of the second user is smaller than a preset communication frequency threshold value or not when the first real number and the second virtual number do not have a preset corresponding relation; if yes, calling a second communication information sending module, and if not, calling a communication rejection module; the non-credible number is other real numbers which do not have a preset corresponding relation with the second virtual number;
the second communication information sending module is used for sending the communication information sent by the first real number to the second real number;
and the communication rejection module is used for rejecting communication information which is sent by the first user and is communicated with the second user.
Compared with the prior art, the embodiment of the application has the following advantages:
when a first real number of a first user and a second virtual number of a second user have a corresponding relation, the real number and the virtual number are considered to be credible numbers, communication information sent by the first virtual number of the first user is sent to the second real number of the second user, so that communication between the first user and the second user is carried out in a closed channel encrypted by the virtual number, the two-way white list mechanism can be regarded as, the first user and the second user cannot acquire real personal information of a communication opposite party, other people cannot acquire real personal information of the communication opposite party, leakage of the personal information of the users is blocked, and safety of the personal information of the communication opposite parties is effectively improved; and the virtual number dialed by other numbers which are not verified by the corresponding relation can be blocked by the server, namely the first user or the second user can not be communicated through the virtual number, so that the two communication parties are prevented from being harassed by others.
According to the embodiment of the application, when the processing operation of the specified business object is finished, the corresponding relation is configured with the failure identification, so that the corresponding relation is failed, the effective time of the virtual number is short, a specific operator for communication between two communication parties can be easily traced in a specific effective time, the crime cost of communication problems such as fraud calls, harassing calls and even being attacked by a card complement is greatly increased, and the safety of the real environment of the two communication parties is effectively improved.
According to the embodiment of the application, when the recovery request sent by the first user or the second user for the operation identifier is received, the failure identifier in the corresponding relationship is deleted to reactivate the corresponding relationship, and the operation flexibility is improved on the basis of the technology of improving the safety of the real environment of the user.
According to the communication method and the communication device, when the communication information of the non-credible number is received, the communication is established or the communication information is rejected according to the number of times of communication of the non-credible number, the problem that communication cannot be carried out when an accident happens is prevented, and the practicability is improved.
Drawings
Fig. 1 is a flowchart illustrating steps of an embodiment 1 of a communication method based on virtual numbers according to the present application;
fig. 2 is a flowchart illustrating steps of an embodiment 2 of a virtual number-based communication method according to the present application;
fig. 3 is a flowchart illustrating steps of embodiment 3 of a virtual number-based communication method according to the present application;
fig. 4 is a block diagram illustrating a virtual number based communication device according to an embodiment 1 of the present application;
fig. 5 is a block diagram illustrating a virtual number based communication device according to embodiment 2 of the present application;
fig. 6 is a block diagram of a virtual number-based communication device according to embodiment 3 of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of embodiment 1 of a communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 101, receiving communication information submitted by a first user and communicated with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
step 102, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
103, when the first real number and the second virtual number have a preset corresponding relationship, extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship respectively;
and 104, sending the communication information sent by the first virtual number to the second real number.
In a communication system, a first terminal device, a second terminal device, and a server may be included.
The first user may have a first terminal device, the second user may have a second terminal device, and the first user may forward communication information for communicating with the second user to the server through the first terminal device, and the second user may receive the communication information sent by the first virtual number through the second terminal device.
The first terminal device and the second terminal device may comprise an electronic computer, a mobile device, a stationary telephone, or the like.
The electronic computer may support a specific application program, and the application program may interact with a server (for example, send and receive communication information) through a network such as the Internet by using a Hypertext transfer Protocol (HTTP), so as to implement a network IP (Internet Protocol, protocol for interconnecting networks) telephone function.
The mobile device may include a mobile phone, a tablet computer, and the like, and the mobile device may interact with the server (e.g., send and receive communication information) through a mobile network by using a WAP (Wireless Application Protocol) Protocol or an HTTP Protocol. The mobile Network may include a second generation mobile communication technology 2G Network, an integrated digital enhanced Network (i.e., 2.5G Network), a third generation mobile communication technology 3G Network, a fourth generation mobile communication technology 4G Network, a Virtual Network Operator (VNO) Network, and so on.
The fixed Telephone can interact with the server (for example, send communication information and receive communication information) through a Public Switched Telephone Network (PSTN) Network.
When the first real number of the first user and the second virtual number of the second user have a corresponding relation, the real number and the virtual number are considered as credible numbers, the credible numbers are sent to the second real number of the second user, and the communication information sent by the first virtual number of the first user enables the communication between the first user and the second user to be carried out in a closed channel encrypted by the virtual number, so that the two-way white list mechanism can be regarded as being formed, the first user and the second user can not obtain the real personal information of the opposite communication party, other people can not obtain the real personal information of the two communication parties, the leakage of the personal information of the users is blocked, and the safety of the personal information of the two communication parties is effectively improved; and the virtual number dialed by other numbers which are not verified by the corresponding relation can be blocked by the server, namely the first user or the second user can not be communicated through the virtual number, so that the two communication parties are prevented from being harassed by others.
Referring to fig. 2, a flowchart of steps of embodiment 2 of the communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 201, receiving communication information which is sent by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
by applying the embodiment of the application, the first user can have the first terminal device, and the second user can have the second terminal device. The first terminal device may have a corresponding first real number and the second terminal device may have a second real number.
By real number, it is possible to refer to a number assigned by a communication carrier in the implementation.
For example, the fixed telephone number of Guangzhou consists of the area code "020" and 8 digits, the number of the mobile operator consists of 11 digits, and each mobile operator may have a specific number segment, and so on.
When the first user and the second user perform the processing operation of the designated service object, in order to protect the real personal information of the user, for example, the real number, a corresponding first virtual number and a corresponding second virtual number may be allocated to the first real number and the second real number.
The virtual number is a virtual number, which is a number corresponding to a real number, but has a communication function of the real number, that is, a user can communicate through the virtual number.
The virtual number may be a number owned by any communication operator, and a virtual number identification rule may be pre-agreed, for example, a number segment rule (a number in a certain number segment is specially used for configuring a virtual number), a null number marking rule (some numbers are null numbers and may be used for configuring a virtual number), and the like.
For different business domains, there may be different business objects, i.e. objects with business domain characteristics.
For example, for the semiconductor industry, business objects may include materials (e.g., silicon wafers); for the news media domain, the business objects may include news data; for the mobile communication field, the service object may include mobile communication data; for the field of Electronic Commerce (EC), a business object may include a commodity.
In order to make the embodiments of the present application better understood by those skilled in the art, in the present specification, a commodity in the field of electronic commerce is described as an example of a business object.
The first user may be a buyer and the second user may be a seller and the processing operation of the business object may be a transaction for goods.
Of course, the first user may be a seller, and the second user may be a buyer, which is not limited in this embodiment of the present application.
When the buyer and the seller transact for the commodity, the server can allocate virtual numbers for the buyer and the seller.
Specifically, when the buyer pays for the goods in the transaction, the server may allocate a first virtual number and a second virtual number to the buyer and the seller, and transmit the first virtual number of the buyer and the second virtual number of the seller to the buyer; and when the seller sends the buyer the goods in the transaction, the server may send the buyer's first virtual number and the seller's second virtual number to the seller.
It should be noted that the server can provide a cloud server, i.e., a service platform for providing comprehensive business capability for various internet users, so that data can be managed in a centralized manner.
Therefore, the buyer and the seller cannot acquire the real telephone number of the opposite party, and other people cannot acquire the real numbers of the two communication parties in the situations of express links and the like, so that the leakage of personal information of the user is effectively prevented.
Of course, the present example may assign the buyer and the seller the primary virtual number and the secondary virtual number at any time of the transaction activity and transmit the primary virtual number of the buyer and the secondary virtual number of the seller to the buyer and the seller.
After the first virtual number and the second virtual number are assigned, the corresponding relationship of the first real number, the first virtual number, the second real number, and the second virtual number may be added to a preset database.
For example, the format of the correspondence relationship may be as shown in the following table:
TABLE 1
Figure GDA0003981584180000081
The correspondence relationship may include a failure flag and an operation flag corresponding to the processing operation.
The failure identifier may be used to identify that the corresponding relationship is failed, and when the corresponding relationship is failed, the corresponding relationship may be considered to be absent; the operation identifier may identify the processing operation, that is, a unique operation identifier may be configured for the processing operations of the first user and the second user to identify the processing operation.
An example of the correspondence relationship may be shown in the following table, taking a transaction of a buyer and a seller as an example:
TABLE 2
Figure GDA0003981584180000082
/>
The failure flag being "0" may indicate that the failure flag does not exist and the current corresponding relationship is valid.
When the first user and the second user perform the processing operation of the designated business object, communication may be performed.
For example, a buyer consults a seller about the performance, price, etc. of a good.
In this case, the first user may submit communication information for communication with the second user to the server through the first terminal device.
For example, as shown in Table 2, the buyer can dial a second virtual number "19087654321" of the seller by mobile phone, and the number "19087654321" being dialed can be displayed on the buyer's mobile phone.
It should be noted that the communication information may be any information interactively transmitted through the real number mark, such as call information, short message information, multimedia message information, and the like, that is, the first user and the second user may perform telephone communication, short message communication, multimedia message communication, and the like based on the virtual number.
The server can receive communication information submitted by a first user through first terminal equipment and communicated with a second user; the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user.
For example, as shown in table 2, when the buyer dials the second virtual number "19087654321" of the seller through the mobile phone, the server may recognize that the first real number of the buyer is "18012345678" and the second virtual number of the seller is "19087654321".
Step 202, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
in a specific implementation, whether the first real number and the second virtual number have a corresponding relationship may be searched in a preset database.
If the first real number and the second virtual number are found, the corresponding relation between the first real number and the second virtual number can be judged.
If not, it can be determined that there is no correspondence between the first real number and the second virtual number.
For example, in the communication information received by the server, it is recognized that the first real number of the buyer is "18012345678" and the second virtual number of the seller is "19087654321", and after finding the corresponding relationship shown in table 2, it can be determined that the first real number "18012345678" and the second virtual number "19087654321" have a corresponding relationship.
Step 203, when the first real number and the second virtual number have a preset corresponding relationship, extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship respectively;
as shown in table 2, the first real number of the buyer is "18012345678", the corresponding first virtual number is "19012345678", the second virtual number of the seller is "19087654321", and the corresponding second real number is "18087654321".
Step 204, sending the communication information sent by the first virtual number to the second real number;
in a specific implementation, the server may dial a second real number in the voice gateway to establish a communication connection between the first user and the second user, but the first real number may be sent to the second user instead of the first virtual number.
For example, as shown in Table 2, a buyer with a first real number of "18012345678" dials a second virtual number of "19087654321" for a seller. After determining that the first real number "18012345678" and the second virtual number "19087654321" have a corresponding relationship, the server may dial the second real number "18087654321" corresponding to the second virtual number "19087654321" in the language gateway to establish a telephone communication connection between the buyer and the seller, and send the first virtual number "19012345678" corresponding to the first real number "18012345678" to the second real number "18087654321", that is, on the mobile phone of the seller, may display that the incoming call with the number "18087654321" is received.
Step 205, when the processing operation of the specified business object is finished, configuring an invalidation identifier for the corresponding relationship;
in the embodiment of the present application, when the processing operation of the specified business object is finished, the corresponding relationship may be configured with the invalidation identifier, and the corresponding relationship is released.
For example, after the commodity transaction is completed, the correspondence relationship between the first real number, the first virtual number, the second real number and the second virtual number of the buyer and the seller may be released, and the first virtual number and the second virtual number may be deactivated.
After the invalidation identifier is configured for the corresponding relationship, the corresponding relationship may be considered to be absent.
At this time, if the first user requests the second virtual number to communicate with the first real number, the server may reject the communication request of the first user.
For example, after configuring the fail flag in table 2, the following table may be used:
TABLE 3
Figure GDA0003981584180000111
Wherein, the failure flag is "1" which may indicate that the failure flag exists and the current corresponding relationship is failed.
At this time, if the buyer requests to communicate with the second virtual number 19087654321 through the first real number 18012345678, the server may reject the communication request of the buyer.
According to the embodiment of the application, when the processing operation of the specified business object is finished, the corresponding relation is configured with the failure identification, so that the corresponding relation is failed, the effective time of the virtual number is short, a specific operator for communication between two communication parties is easy to track within a specific effective time, the crime cost of communication problems such as fraud calls, harassing calls and even being attacked by a card complement is greatly increased, and the safety of the real environment of the two communication parties is effectively improved.
And step 206, deleting the invalid identifier in the corresponding relation when receiving a recovery request sent by the first user or the second user for the operation identifier.
In a specific implementation, for some reasons, the first user or the second user needs to communicate with the other party after the processing operation of the designated service object is finished.
For example, after the transaction of the product is completed, the buyer finds that the product has quality problems and needs to maintain after-sales rights, and therefore needs to communicate with the seller.
In this case, the server may find the corresponding relationship according to the operation identifier, and delete the failure identifier in the corresponding relationship to activate the corresponding relationship.
For example, as shown in table 3, when receiving a recovery request of the buyer for the commodity transaction with the operation identifier "117135", the server may delete the revocation identifier in table 3, that is, set the revocation identifier to "0" to activate the correspondence relationship.
After the invalid identifier is deleted, the corresponding relationship is valid and can be considered to exist, and the first user and the second user can communicate based on the first virtual number and the second virtual number again.
It should be noted that, because the storage capacity of the server is limited and the virtual number is limited, in order to release the storage capacity of the server and the virtual number, the server may delete the correspondence after the correspondence is invalidated for a period of time.
In this case, when the first user or the second user sends a recovery request for the operation identifier, the server may reassign the virtual number to the first user and the second user to allow the first user and the second user to communicate.
According to the embodiment of the application, when the recovery request sent by the first user or the second user for the operation identifier is received, the failure identifier in the corresponding relationship is deleted to reactivate the corresponding relationship, and the operation flexibility is improved on the basis of the technology of improving the safety of the real environment of the user.
Referring to fig. 3, a flowchart illustrating steps of embodiment 3 of the communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 301, receiving communication information submitted by a first user and communicated with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
step 302, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
step 303, when the first real number and the second virtual number do not have a preset corresponding relationship, determining whether the communication frequency of the untrusted number of the second user is smaller than a preset communication frequency threshold value; if yes, go to step 304, otherwise go to step 305;
in order to prevent, for example, a SIM (Subscriber Identity Module) from being damaged when an accident occurs, and thus, communication cannot be performed based on the original real number and the virtual number, in this embodiment of the present application, the first user and the second user may be allowed to perform communication of the untrusted number.
The non-trusted number may be another real number that does not have a preset correspondence with the second virtual number.
For example, the buyer and the seller are assigned corresponding virtual numbers in the commodity transaction, and the correspondence relationship as shown in table 2 is established. However, the SIM card of the buyer is damaged, so that the first real number "18012345678" cannot be used to communicate with the second virtual number "19087654321".
However, the buyer knows the second virtual number "19087654321" of the seller, and the buyer can request to communicate with the seller based on other real numbers, such as "15012345678". On the other hand, the other real number "15012345678" does not have a correspondence relationship with the second virtual number "19087654321" of the seller, and therefore the other real number "15012345678" is an untrusted number for the second virtual number "19087654321".
In a specific implementation, the first user and the second user may set the communication times of the untrusted number in a single direction or in both directions. Namely, the first user can set the communication frequency threshold of the communication of the own non-trusted number and can also set the communication frequency threshold of the communication of the non-trusted number of the second user; correspondingly, the second user may set a communication frequency threshold for the communication of the own untrusted number, or may set a communication frequency threshold for the communication of the untrusted number of the first user.
Of course, the setting manner of the communication time threshold is only used as an example, and other setting manners of the communication time threshold may also be set in the embodiment of the present application, for example, the server limits the highest value and the lowest value of the communication time threshold of the non-signal code communication, and the like, which is not limited in the embodiment of the present application.
It should be noted that, the threshold of the number of times of communication of the untrusted number may be set to 0, i.e., the communication from the untrusted number is not accepted.
Step 304, sending the communication information sent by the first real number to the second real number;
and when the communication times of the non-trusted number are less than the threshold value of the communication times, the second user can still receive the communication from the non-trusted number, and the server can establish communication connection between the first user and the second user.
For example, if the buyer uses the other real number "15012345678" to request communication with the second virtual number "19087654321" of the seller, the number "19087654321" being dialed may be displayed on the buyer's mobile phone. When judging that the other real number "15012345678" and the second virtual number "19087654321" do not have a corresponding relationship, assuming that the number of times of communication of the untrusted number of the seller is 3 and is smaller than a preset threshold value of the number of times of communication 4, the server may dial the second real number "18087654321" corresponding to the second virtual number "19087654321" in the language gateway to establish a communication connection between the buyer and the seller, and send the other real number "15012345678" to the second real number "18087654321", that is, on the mobile phone of the seller, the incoming call with the received number "15012345678" may be displayed.
And 305, rejecting communication information which is sent by the first user and is communicated with the second user.
When the communication times of the untrusted number are equal to the communication time threshold value, the second user does not receive the communication from the untrusted number, and the server may refuse to establish communication connection between the first user and the second user.
According to the communication method and the communication device, when the communication information of the untrusted number is received, communication establishment or communication rejection is selected according to the number of times of communication of the untrusted number, the problem that communication cannot be conducted when an accident happens is prevented, and practicability is improved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 4, a block diagram of a communication device 1 based on a virtual number according to an embodiment of the present application is shown, which may specifically include the following modules:
a communication information receiving module 401, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 402, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
a number extracting module 403, configured to, when a preset correspondence exists between the first real number and the second virtual number, respectively extract a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the correspondence;
a first communication information sending module 404, configured to send the communication information sent by the first virtual number to the second real number.
Referring to fig. 5, a block diagram of a communication device 2 based on a virtual number according to an embodiment of the present disclosure is shown, which may specifically include the following modules:
a communication information receiving module 501, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 502, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
a number extracting module 503, configured to respectively extract, when a preset corresponding relationship exists between the first real number and the second virtual number, a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
a first communication information sending module 504, configured to send the communication information sent by the first virtual number to the second real number.
A failure identifier configuring module 505, configured to configure a failure identifier for the corresponding relationship when the processing operation of the specified service object is finished; the failure identification is used for identifying the failure of the corresponding relation.
A revocation identifier deleting module 506, configured to delete a revocation identifier in the corresponding relationship when a recovery request sent by the first user or the second user for the operation identifier is received.
The correspondence may include an operation identifier corresponding to the processing operation.
In a specific implementation, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Referring to fig. 6, a block diagram of a communication device 3 based on a virtual number according to an embodiment of the present application is shown, which may specifically include the following modules:
a communication information receiving module 601, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 602, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
an untrusted communication frequency determining module 603, configured to determine, when the first real number and the second virtual number do not have a preset correspondence, whether a communication frequency of an untrusted number of a second user is smaller than a preset communication frequency threshold; if yes, a second communication information sending module 604 is called, and if not, a communication rejection module 605 is called;
the non-trusted number can be other real numbers which do not have a preset corresponding relation with the second virtual number;
a second communication information sending module 604, configured to send the communication information sent by the first real number to the second real number;
a communication rejecting module 605, configured to reject communication information sent by the first user and used for communicating with the second user.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In a typical configuration, the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (fransitory media), such as modulated data signals and carrier waves.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the true scope of the embodiments of the present application.
Finally, it should also be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "include", "including" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article, or terminal device including a series of elements includes not only those elements but also other elements not explicitly listed or inherent to such process, method, article, or terminal device. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or terminal apparatus that comprises the element.
The communication method based on the virtual number and the communication device based on the virtual number provided by the application are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the above embodiment is only used to help understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (7)

1. A communication method based on virtual numbers comprises the following steps:
receiving a virtual number which is sent by a server and distributed for a service opposite terminal;
when a communication request facing the service opposite terminal is received, displaying a virtual number of the service opposite terminal, and initiating a communication request to the virtual number based on a real number of a local terminal;
the virtual number is distributed by the service terminal when the service terminal carries out the processing operation of the appointed service object between the service home terminal and the service opposite terminal, and the distributed virtual number is stopped after the service terminal finishes the processing operation of the appointed service object between the service home terminal and the service opposite terminal.
2. The method of claim 1, further comprising:
and after the processing operation of the specified service object is finished, if a communication request facing the service opposite terminal is received, sending a virtual number allocation request to a service terminal so as to request the service terminal to reallocate virtual numbers for the service home terminal and the service opposite terminal.
3. The method of claim 2, further comprising:
and after receiving the virtual number redistributed by the service end for the service opposite end and the service home end, initiating a communication request to the redistributed virtual number based on the real number of the home end.
4. A virtual number based communication device, comprising:
a unit for receiving a virtual number distributed for a service opposite terminal sent by a server terminal;
a unit for displaying the virtual number of the service opposite terminal when receiving the communication request facing the service opposite terminal, and initiating a communication request to the virtual number based on the real number of the local terminal;
and the virtual number is distributed by the service end when the service end carries out the processing operation of the appointed service object between the service home end and the service opposite end, and the distributed virtual number is stopped after the service end finishes the processing operation of the appointed service object between the service home end and the service opposite end.
5. The apparatus of claim 4, further comprising:
and a unit configured to, after the processing operation of the designated service object is completed, if a communication request facing the service opposite end is received, send a virtual number assignment request to the service end to request the service end to reassign the virtual number to the service home end and the service opposite end.
6. The apparatus of claim 5, the apparatus being specifically configured to:
and after receiving the virtual number redistributed by the service end for the service opposite end and the service home end, initiating a communication request to the redistributed virtual number based on the real number of the home end.
7. A virtual number based communication device, comprising:
a processor;
a memory for storing machine executable instructions;
wherein, by reading and executing machine-executable instructions stored by the memory corresponding to virtual number-based communication logic, the processor is caused to:
receiving a virtual number which is sent by a server and distributed for a service opposite terminal;
when a communication request facing the service opposite terminal is received, displaying a virtual number of the service opposite terminal, and initiating a communication request to the virtual number based on a real number of a local terminal;
the virtual number is distributed by the service terminal when the service terminal carries out the processing operation of the appointed service object between the service home terminal and the service opposite terminal, and the distributed virtual number is stopped after the service terminal finishes the processing operation of the appointed service object between the service home terminal and the service opposite terminal.
CN201811422475.4A 2014-06-11 2014-06-11 Communication method and device based on virtual number Active CN109905875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811422475.4A CN109905875B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811422475.4A CN109905875B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number
CN201410258483.5A CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410258483.5A Division CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number

Publications (2)

Publication Number Publication Date
CN109905875A CN109905875A (en) 2019-06-18
CN109905875B true CN109905875B (en) 2023-03-24

Family

ID=54996450

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201811422475.4A Active CN109905875B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number
CN201410258483.5A Active CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number
CN201811431637.0A Active CN110086944B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201410258483.5A Active CN105227786B (en) 2014-06-11 2014-06-11 A kind of means of communication and device based on virtual-number
CN201811431637.0A Active CN110086944B (en) 2014-06-11 2014-06-11 Communication method and device based on virtual number

Country Status (1)

Country Link
CN (3) CN109905875B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026946B (en) * 2016-01-29 2020-01-10 廖致庆 Communication method and system and method for logistics communication
CN107026944B (en) * 2016-01-29 2020-02-07 廖致庆 Communication service platform and method for protecting telephone number and realizing taxi calling communication
CN107770396A (en) * 2016-10-21 2018-03-06 优估(上海)信息科技有限公司 Method of calling, system and server
CN108347403B (en) * 2017-01-23 2020-06-02 腾讯科技(深圳)有限公司 Method and device for distributing intermediate communication identification
CN113115304B (en) * 2017-04-06 2022-12-06 北京嘀嘀无限科技发展有限公司 Virtual number request and transmission method, device and storage medium
CN107749930B (en) * 2017-09-28 2020-07-07 贝壳技术有限公司 Call processing method, server and storage medium for binding virtual numbers for calling and called parties respectively
CN109729601A (en) * 2017-10-30 2019-05-07 北京京东尚科信息技术有限公司 The method and apparatus for establishing call connection
CN107959572A (en) * 2017-11-28 2018-04-24 上海云信留客信息科技有限公司 A kind of cloud call management system and platform
CN108040163A (en) * 2017-12-25 2018-05-15 刘光明 The alternative distribution method of telephone number
CN108882060B (en) * 2018-06-27 2020-10-27 腾讯科技(深圳)有限公司 Mutual dialing method, device and system for public telephone and computer readable storage medium
CN109275135A (en) * 2018-09-27 2019-01-25 惠州Tcl移动通信有限公司 Choosing method, storage medium and the mobile terminal of virtual SIM card resource
CN109274838B (en) * 2018-11-21 2019-12-03 恒宝股份有限公司 Generation and application method and secret communication system based on SIM card virtual-number
CN110769121B (en) * 2018-11-29 2020-11-13 北京嘀嘀无限科技发展有限公司 Virtual number validity period determining method and device, electronic equipment and storage medium
CN109547652A (en) * 2018-12-07 2019-03-29 陈善席 A kind of method and device of telecommunication management
CN109600369A (en) * 2018-12-07 2019-04-09 陈善席 A kind of communication management method and device
CN109587354A (en) * 2018-12-20 2019-04-05 平安科技(深圳)有限公司 Communication hiding number method, apparatus, computer equipment and storage medium
CN109587356B (en) * 2019-02-20 2020-12-29 携程旅游信息技术(上海)有限公司 Virtual number calling method, device, system, electronic equipment and storage medium
CN110113498B (en) * 2019-04-08 2021-01-26 中国联合网络通信集团有限公司 Bidirectional number protection method and device
CN111131633B (en) * 2019-12-18 2021-10-22 华为技术有限公司 Application method of virtual number, communication method and related device
CN111294790A (en) * 2020-02-11 2020-06-16 北京皮尔布莱尼软件有限公司 Communication processing method and device and computing equipment
CN112040071B (en) * 2020-09-09 2021-09-24 北京嘀嘀无限科技发展有限公司 Number protection method, device and system and number calling method and device
CN114143111A (en) * 2021-12-08 2022-03-04 北京中电普华信息技术有限公司 Communication management method and related device in distribution network emergency repair process
CN115150511B (en) * 2022-06-01 2023-12-19 清华大学 Communication system and method based on privacy protection of two communication parties

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6408327B1 (en) * 1998-12-22 2002-06-18 Nortel Networks Limited Synthetic stereo conferencing over LAN/WAN
JP2005500713A (en) * 2001-04-03 2005-01-06 ポリキューブ カンパニー,リミテッド Virtual telephone number service method and system
US20040101123A1 (en) * 2002-11-22 2004-05-27 Garcia Michael C. Method of providing a temporary telephone number
GB2434944B (en) * 2005-12-22 2008-01-23 Intellprop Ltd Telecommunications services apparatus and methods
CN1859594B (en) * 2006-03-20 2010-05-12 华为技术有限公司 Method and device for displaying communication number
CN101175236A (en) * 2007-07-27 2008-05-07 中国移动通信集团福建有限公司 Mobile phone virtual number use method and device
CN101827355A (en) * 2009-03-04 2010-09-08 中兴通讯股份有限公司 Communication method and system using virtual numbers, and mobile terminal
CN101674567B (en) * 2009-10-16 2013-04-03 候万春 Device and method of self-help change of phone number of mobile phone user
US9026084B2 (en) * 2010-07-12 2015-05-05 Telefonaktiebolaget L M Ericsson (Publ) Enhanced privacy protection in a telecommunication network
CN102624995B (en) * 2011-01-27 2016-01-13 中国电信股份有限公司 Be applicable to virtual-number application process, the Apparatus and system of the Internet
CN103841077B (en) * 2012-11-20 2017-12-12 中国电信股份有限公司 Community users method of calling and system, community platform
CN103546652B (en) * 2013-10-17 2016-06-29 青岛海信传媒网络技术有限公司 A kind of Number translation service device and the communication means of telephone number secrecy, system

Also Published As

Publication number Publication date
CN105227786A (en) 2016-01-06
CN110086944A (en) 2019-08-02
CN105227786B (en) 2018-12-21
CN110086944B (en) 2022-01-25
CN109905875A (en) 2019-06-18

Similar Documents

Publication Publication Date Title
CN109905875B (en) Communication method and device based on virtual number
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US20200334673A1 (en) Processing electronic tokens
US10938983B2 (en) Communication method and server
CN107204957B (en) Account binding and service processing method and device
CN106529851B (en) Order data processing method, communication data query method and server
WO2015027781A1 (en) Communication method, data processing platform and communication system
CN104462949B (en) The call method and device of a kind of plug-in unit
CN113067859B (en) Communication method and device based on cloud mobile phone
CN113221165B (en) User element authentication method and device based on block chain
CN105744514B (en) A kind of method and device carrying out terminal room communication
CN106921557B (en) Mail sending method and equipment
CN107230080B (en) Service processing method and device and intelligent terminal
CN105405011A (en) Method, server and system for transaction authentication through mobile terminal
CN110381452B (en) GMS short message sniffing prevention method, terminal and server
CN105427100A (en) Bank card transaction method, apparatus and system
FI130360B (en) Verifying source of text message
FI130520B (en) Verifying source of text message
TWI735514B (en) Order data processing method, communication data query method and server
JP2016057682A (en) Authentication system and authentication method
CN115330529A (en) Identification method, identification device, electronic equipment and computer storage medium
CN106161195B (en) Information pushing and obtaining method and device, and communication method and device
CN117041959A (en) Service processing method, device, electronic equipment and computer readable medium
CN114297701A (en) User data processing method and device
KR101583253B1 (en) Subscriber service system and method using smart-phone Application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant