Disclosure of Invention
The technical problem to be solved by the embodiments of the present application is to provide a communication method based on a virtual number, so as to improve the security of personal information of a user.
Correspondingly, the embodiment of the application also provides a communication device based on the virtual number, which is used for ensuring the realization and the application of the method.
In order to solve the above problem, an embodiment of the present application discloses a communication method based on a virtual number, including:
receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
judging whether a preset corresponding relation exists between the first real number and the second virtual number or not;
when the first real number and the second virtual number have a preset corresponding relationship, respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
and sending the communication information sent by the first virtual number to the second real number.
Preferably, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Preferably, the correspondence configures a failure identifier; the failure identification is used for identifying the failure of the corresponding relation.
Preferably, the corresponding relationship includes an operation identifier corresponding to the processing operation; the method further comprises the following steps:
and deleting the invalid identifier in the corresponding relation when a recovery request sent by the first user or the second user for the operation identifier is received.
Preferably, the method further comprises the following steps:
when the first real number and the second virtual number do not have a preset corresponding relation, judging whether the communication frequency of the non-credible number of the second user is smaller than a preset communication frequency threshold value or not; the non-credible number is other real numbers which do not have a preset corresponding relation with the second virtual number;
if yes, sending communication information sent by the first real number to the second real number;
if not, rejecting the communication information which is sent by the first user and communicated with the second user.
The embodiment of the application also discloses a communication device based on the virtual number, which comprises:
the communication information receiving module is used for receiving communication information submitted by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
the corresponding relation judging module is used for judging whether a preset corresponding relation exists between the first real number and the second virtual number or not;
the number extraction module is used for respectively extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship when the first real number and the second virtual number have a preset corresponding relationship;
and the first communication information sending module is used for sending the communication information sent by the first virtual number to the second real number.
Preferably, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Preferably, the method further comprises the following steps:
a failure identifier configuration module, configured to configure a failure identifier for the corresponding relationship when the processing operation of the specified service object is finished; the failure identification is used for identifying the failure of the corresponding relation.
Preferably, the corresponding relationship includes an operation identifier corresponding to the processing operation; the device further comprises:
and the invalid identifier deleting module is used for deleting the invalid identifier in the corresponding relation when receiving a recovery request which is sent by the first user or the second user aiming at the operation identifier.
Preferably, the method further comprises the following steps:
the non-credible communication frequency judging module is used for judging whether the communication frequency of the non-credible number of the second user is smaller than a preset communication frequency threshold value or not when the first real number and the second virtual number do not have a preset corresponding relation; if yes, calling a second communication information sending module, and if not, calling a communication rejection module; the non-credible number is other real numbers which do not have a preset corresponding relation with the second virtual number;
the second communication information sending module is used for sending the communication information sent by the first real number to the second real number;
and the communication rejection module is used for rejecting communication information which is sent by the first user and is communicated with the second user.
Compared with the prior art, the embodiment of the application has the following advantages:
when a first real number of a first user and a second virtual number of a second user have a corresponding relation, the real number and the virtual number are considered to be credible numbers, communication information sent by the first virtual number of the first user is sent to the second real number of the second user, so that communication between the first user and the second user is carried out in a closed channel encrypted by the virtual number, the two-way white list mechanism can be regarded as, the first user and the second user cannot acquire real personal information of a communication opposite party, other people cannot acquire real personal information of the communication opposite party, leakage of the personal information of the users is blocked, and safety of the personal information of the communication opposite parties is effectively improved; and the virtual number dialed by other numbers which are not verified by the corresponding relation can be blocked by the server, namely the first user or the second user can not be communicated through the virtual number, so that the two communication parties are prevented from being harassed by others.
According to the embodiment of the application, when the processing operation of the specified business object is finished, the corresponding relation is configured with the failure identification, so that the corresponding relation is failed, the effective time of the virtual number is short, a specific operator for communication between two communication parties can be easily traced in a specific effective time, the crime cost of communication problems such as fraud calls, harassing calls and even being attacked by a card complement is greatly increased, and the safety of the real environment of the two communication parties is effectively improved.
According to the embodiment of the application, when the recovery request sent by the first user or the second user for the operation identifier is received, the failure identifier in the corresponding relationship is deleted to reactivate the corresponding relationship, and the operation flexibility is improved on the basis of the technology of improving the safety of the real environment of the user.
According to the communication method and the communication device, when the communication information of the non-credible number is received, the communication is established or the communication information is rejected according to the number of times of communication of the non-credible number, the problem that communication cannot be carried out when an accident happens is prevented, and the practicability is improved.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of embodiment 1 of a communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 101, receiving communication information submitted by a first user and communicated with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
step 102, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
103, when the first real number and the second virtual number have a preset corresponding relationship, extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship respectively;
and 104, sending the communication information sent by the first virtual number to the second real number.
In a communication system, a first terminal device, a second terminal device, and a server may be included.
The first user may have a first terminal device, the second user may have a second terminal device, and the first user may forward communication information for communicating with the second user to the server through the first terminal device, and the second user may receive the communication information sent by the first virtual number through the second terminal device.
The first terminal device and the second terminal device may comprise an electronic computer, a mobile device, a stationary telephone, or the like.
The electronic computer may support a specific application program, and the application program may interact with a server (for example, send and receive communication information) through a network such as the Internet by using a Hypertext transfer Protocol (HTTP), so as to implement a network IP (Internet Protocol, protocol for interconnecting networks) telephone function.
The mobile device may include a mobile phone, a tablet computer, and the like, and the mobile device may interact with the server (e.g., send and receive communication information) through a mobile network by using a WAP (Wireless Application Protocol) Protocol or an HTTP Protocol. The mobile Network may include a second generation mobile communication technology 2G Network, an integrated digital enhanced Network (i.e., 2.5G Network), a third generation mobile communication technology 3G Network, a fourth generation mobile communication technology 4G Network, a Virtual Network Operator (VNO) Network, and so on.
The fixed Telephone can interact with the server (for example, send communication information and receive communication information) through a Public Switched Telephone Network (PSTN) Network.
When the first real number of the first user and the second virtual number of the second user have a corresponding relation, the real number and the virtual number are considered as credible numbers, the credible numbers are sent to the second real number of the second user, and the communication information sent by the first virtual number of the first user enables the communication between the first user and the second user to be carried out in a closed channel encrypted by the virtual number, so that the two-way white list mechanism can be regarded as being formed, the first user and the second user can not obtain the real personal information of the opposite communication party, other people can not obtain the real personal information of the two communication parties, the leakage of the personal information of the users is blocked, and the safety of the personal information of the two communication parties is effectively improved; and the virtual number dialed by other numbers which are not verified by the corresponding relation can be blocked by the server, namely the first user or the second user can not be communicated through the virtual number, so that the two communication parties are prevented from being harassed by others.
Referring to fig. 2, a flowchart of steps of embodiment 2 of the communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 201, receiving communication information which is sent by a first user and communicated with a second user; the communication information comprises a first real number corresponding to the first user and a second virtual number corresponding to the second user;
by applying the embodiment of the application, the first user can have the first terminal device, and the second user can have the second terminal device. The first terminal device may have a corresponding first real number and the second terminal device may have a second real number.
By real number, it is possible to refer to a number assigned by a communication carrier in the implementation.
For example, the fixed telephone number of Guangzhou consists of the area code "020" and 8 digits, the number of the mobile operator consists of 11 digits, and each mobile operator may have a specific number segment, and so on.
When the first user and the second user perform the processing operation of the designated service object, in order to protect the real personal information of the user, for example, the real number, a corresponding first virtual number and a corresponding second virtual number may be allocated to the first real number and the second real number.
The virtual number is a virtual number, which is a number corresponding to a real number, but has a communication function of the real number, that is, a user can communicate through the virtual number.
The virtual number may be a number owned by any communication operator, and a virtual number identification rule may be pre-agreed, for example, a number segment rule (a number in a certain number segment is specially used for configuring a virtual number), a null number marking rule (some numbers are null numbers and may be used for configuring a virtual number), and the like.
For different business domains, there may be different business objects, i.e. objects with business domain characteristics.
For example, for the semiconductor industry, business objects may include materials (e.g., silicon wafers); for the news media domain, the business objects may include news data; for the mobile communication field, the service object may include mobile communication data; for the field of Electronic Commerce (EC), a business object may include a commodity.
In order to make the embodiments of the present application better understood by those skilled in the art, in the present specification, a commodity in the field of electronic commerce is described as an example of a business object.
The first user may be a buyer and the second user may be a seller and the processing operation of the business object may be a transaction for goods.
Of course, the first user may be a seller, and the second user may be a buyer, which is not limited in this embodiment of the present application.
When the buyer and the seller transact for the commodity, the server can allocate virtual numbers for the buyer and the seller.
Specifically, when the buyer pays for the goods in the transaction, the server may allocate a first virtual number and a second virtual number to the buyer and the seller, and transmit the first virtual number of the buyer and the second virtual number of the seller to the buyer; and when the seller sends the buyer the goods in the transaction, the server may send the buyer's first virtual number and the seller's second virtual number to the seller.
It should be noted that the server can provide a cloud server, i.e., a service platform for providing comprehensive business capability for various internet users, so that data can be managed in a centralized manner.
Therefore, the buyer and the seller cannot acquire the real telephone number of the opposite party, and other people cannot acquire the real numbers of the two communication parties in the situations of express links and the like, so that the leakage of personal information of the user is effectively prevented.
Of course, the present example may assign the buyer and the seller the primary virtual number and the secondary virtual number at any time of the transaction activity and transmit the primary virtual number of the buyer and the secondary virtual number of the seller to the buyer and the seller.
After the first virtual number and the second virtual number are assigned, the corresponding relationship of the first real number, the first virtual number, the second real number, and the second virtual number may be added to a preset database.
For example, the format of the correspondence relationship may be as shown in the following table:
TABLE 1
The correspondence relationship may include a failure flag and an operation flag corresponding to the processing operation.
The failure identifier may be used to identify that the corresponding relationship is failed, and when the corresponding relationship is failed, the corresponding relationship may be considered to be absent; the operation identifier may identify the processing operation, that is, a unique operation identifier may be configured for the processing operations of the first user and the second user to identify the processing operation.
An example of the correspondence relationship may be shown in the following table, taking a transaction of a buyer and a seller as an example:
TABLE 2
The failure flag being "0" may indicate that the failure flag does not exist and the current corresponding relationship is valid.
When the first user and the second user perform the processing operation of the designated business object, communication may be performed.
For example, a buyer consults a seller about the performance, price, etc. of a good.
In this case, the first user may submit communication information for communication with the second user to the server through the first terminal device.
For example, as shown in Table 2, the buyer can dial a second virtual number "19087654321" of the seller by mobile phone, and the number "19087654321" being dialed can be displayed on the buyer's mobile phone.
It should be noted that the communication information may be any information interactively transmitted through the real number mark, such as call information, short message information, multimedia message information, and the like, that is, the first user and the second user may perform telephone communication, short message communication, multimedia message communication, and the like based on the virtual number.
The server can receive communication information submitted by a first user through first terminal equipment and communicated with a second user; the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user.
For example, as shown in table 2, when the buyer dials the second virtual number "19087654321" of the seller through the mobile phone, the server may recognize that the first real number of the buyer is "18012345678" and the second virtual number of the seller is "19087654321".
Step 202, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
in a specific implementation, whether the first real number and the second virtual number have a corresponding relationship may be searched in a preset database.
If the first real number and the second virtual number are found, the corresponding relation between the first real number and the second virtual number can be judged.
If not, it can be determined that there is no correspondence between the first real number and the second virtual number.
For example, in the communication information received by the server, it is recognized that the first real number of the buyer is "18012345678" and the second virtual number of the seller is "19087654321", and after finding the corresponding relationship shown in table 2, it can be determined that the first real number "18012345678" and the second virtual number "19087654321" have a corresponding relationship.
Step 203, when the first real number and the second virtual number have a preset corresponding relationship, extracting a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship respectively;
as shown in table 2, the first real number of the buyer is "18012345678", the corresponding first virtual number is "19012345678", the second virtual number of the seller is "19087654321", and the corresponding second real number is "18087654321".
Step 204, sending the communication information sent by the first virtual number to the second real number;
in a specific implementation, the server may dial a second real number in the voice gateway to establish a communication connection between the first user and the second user, but the first real number may be sent to the second user instead of the first virtual number.
For example, as shown in Table 2, a buyer with a first real number of "18012345678" dials a second virtual number of "19087654321" for a seller. After determining that the first real number "18012345678" and the second virtual number "19087654321" have a corresponding relationship, the server may dial the second real number "18087654321" corresponding to the second virtual number "19087654321" in the language gateway to establish a telephone communication connection between the buyer and the seller, and send the first virtual number "19012345678" corresponding to the first real number "18012345678" to the second real number "18087654321", that is, on the mobile phone of the seller, may display that the incoming call with the number "18087654321" is received.
Step 205, when the processing operation of the specified business object is finished, configuring an invalidation identifier for the corresponding relationship;
in the embodiment of the present application, when the processing operation of the specified business object is finished, the corresponding relationship may be configured with the invalidation identifier, and the corresponding relationship is released.
For example, after the commodity transaction is completed, the correspondence relationship between the first real number, the first virtual number, the second real number and the second virtual number of the buyer and the seller may be released, and the first virtual number and the second virtual number may be deactivated.
After the invalidation identifier is configured for the corresponding relationship, the corresponding relationship may be considered to be absent.
At this time, if the first user requests the second virtual number to communicate with the first real number, the server may reject the communication request of the first user.
For example, after configuring the fail flag in table 2, the following table may be used:
TABLE 3
Wherein, the failure flag is "1" which may indicate that the failure flag exists and the current corresponding relationship is failed.
At this time, if the buyer requests to communicate with the second virtual number 19087654321 through the first real number 18012345678, the server may reject the communication request of the buyer.
According to the embodiment of the application, when the processing operation of the specified business object is finished, the corresponding relation is configured with the failure identification, so that the corresponding relation is failed, the effective time of the virtual number is short, a specific operator for communication between two communication parties is easy to track within a specific effective time, the crime cost of communication problems such as fraud calls, harassing calls and even being attacked by a card complement is greatly increased, and the safety of the real environment of the two communication parties is effectively improved.
And step 206, deleting the invalid identifier in the corresponding relation when receiving a recovery request sent by the first user or the second user for the operation identifier.
In a specific implementation, for some reasons, the first user or the second user needs to communicate with the other party after the processing operation of the designated service object is finished.
For example, after the transaction of the product is completed, the buyer finds that the product has quality problems and needs to maintain after-sales rights, and therefore needs to communicate with the seller.
In this case, the server may find the corresponding relationship according to the operation identifier, and delete the failure identifier in the corresponding relationship to activate the corresponding relationship.
For example, as shown in table 3, when receiving a recovery request of the buyer for the commodity transaction with the operation identifier "117135", the server may delete the revocation identifier in table 3, that is, set the revocation identifier to "0" to activate the correspondence relationship.
After the invalid identifier is deleted, the corresponding relationship is valid and can be considered to exist, and the first user and the second user can communicate based on the first virtual number and the second virtual number again.
It should be noted that, because the storage capacity of the server is limited and the virtual number is limited, in order to release the storage capacity of the server and the virtual number, the server may delete the correspondence after the correspondence is invalidated for a period of time.
In this case, when the first user or the second user sends a recovery request for the operation identifier, the server may reassign the virtual number to the first user and the second user to allow the first user and the second user to communicate.
According to the embodiment of the application, when the recovery request sent by the first user or the second user for the operation identifier is received, the failure identifier in the corresponding relationship is deleted to reactivate the corresponding relationship, and the operation flexibility is improved on the basis of the technology of improving the safety of the real environment of the user.
Referring to fig. 3, a flowchart illustrating steps of embodiment 3 of the communication method based on a virtual number according to the present application is shown, which may specifically include the following steps:
step 301, receiving communication information submitted by a first user and communicated with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
step 302, judging whether a preset corresponding relation exists between the first real number and the second virtual number;
step 303, when the first real number and the second virtual number do not have a preset corresponding relationship, determining whether the communication frequency of the untrusted number of the second user is smaller than a preset communication frequency threshold value; if yes, go to step 304, otherwise go to step 305;
in order to prevent, for example, a SIM (Subscriber Identity Module) from being damaged when an accident occurs, and thus, communication cannot be performed based on the original real number and the virtual number, in this embodiment of the present application, the first user and the second user may be allowed to perform communication of the untrusted number.
The non-trusted number may be another real number that does not have a preset correspondence with the second virtual number.
For example, the buyer and the seller are assigned corresponding virtual numbers in the commodity transaction, and the correspondence relationship as shown in table 2 is established. However, the SIM card of the buyer is damaged, so that the first real number "18012345678" cannot be used to communicate with the second virtual number "19087654321".
However, the buyer knows the second virtual number "19087654321" of the seller, and the buyer can request to communicate with the seller based on other real numbers, such as "15012345678". On the other hand, the other real number "15012345678" does not have a correspondence relationship with the second virtual number "19087654321" of the seller, and therefore the other real number "15012345678" is an untrusted number for the second virtual number "19087654321".
In a specific implementation, the first user and the second user may set the communication times of the untrusted number in a single direction or in both directions. Namely, the first user can set the communication frequency threshold of the communication of the own non-trusted number and can also set the communication frequency threshold of the communication of the non-trusted number of the second user; correspondingly, the second user may set a communication frequency threshold for the communication of the own untrusted number, or may set a communication frequency threshold for the communication of the untrusted number of the first user.
Of course, the setting manner of the communication time threshold is only used as an example, and other setting manners of the communication time threshold may also be set in the embodiment of the present application, for example, the server limits the highest value and the lowest value of the communication time threshold of the non-signal code communication, and the like, which is not limited in the embodiment of the present application.
It should be noted that, the threshold of the number of times of communication of the untrusted number may be set to 0, i.e., the communication from the untrusted number is not accepted.
Step 304, sending the communication information sent by the first real number to the second real number;
and when the communication times of the non-trusted number are less than the threshold value of the communication times, the second user can still receive the communication from the non-trusted number, and the server can establish communication connection between the first user and the second user.
For example, if the buyer uses the other real number "15012345678" to request communication with the second virtual number "19087654321" of the seller, the number "19087654321" being dialed may be displayed on the buyer's mobile phone. When judging that the other real number "15012345678" and the second virtual number "19087654321" do not have a corresponding relationship, assuming that the number of times of communication of the untrusted number of the seller is 3 and is smaller than a preset threshold value of the number of times of communication 4, the server may dial the second real number "18087654321" corresponding to the second virtual number "19087654321" in the language gateway to establish a communication connection between the buyer and the seller, and send the other real number "15012345678" to the second real number "18087654321", that is, on the mobile phone of the seller, the incoming call with the received number "15012345678" may be displayed.
And 305, rejecting communication information which is sent by the first user and is communicated with the second user.
When the communication times of the untrusted number are equal to the communication time threshold value, the second user does not receive the communication from the untrusted number, and the server may refuse to establish communication connection between the first user and the second user.
According to the communication method and the communication device, when the communication information of the untrusted number is received, communication establishment or communication rejection is selected according to the number of times of communication of the untrusted number, the problem that communication cannot be conducted when an accident happens is prevented, and practicability is improved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 4, a block diagram of a communication device 1 based on a virtual number according to an embodiment of the present application is shown, which may specifically include the following modules:
a communication information receiving module 401, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 402, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
a number extracting module 403, configured to, when a preset correspondence exists between the first real number and the second virtual number, respectively extract a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the correspondence;
a first communication information sending module 404, configured to send the communication information sent by the first virtual number to the second real number.
Referring to fig. 5, a block diagram of a communication device 2 based on a virtual number according to an embodiment of the present disclosure is shown, which may specifically include the following modules:
a communication information receiving module 501, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 502, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
a number extracting module 503, configured to respectively extract, when a preset corresponding relationship exists between the first real number and the second virtual number, a first virtual number corresponding to the first real number and a second real number corresponding to the second virtual number from the corresponding relationship;
a first communication information sending module 504, configured to send the communication information sent by the first virtual number to the second real number.
A failure identifier configuring module 505, configured to configure a failure identifier for the corresponding relationship when the processing operation of the specified service object is finished; the failure identification is used for identifying the failure of the corresponding relation.
A revocation identifier deleting module 506, configured to delete a revocation identifier in the corresponding relationship when a recovery request sent by the first user or the second user for the operation identifier is received.
The correspondence may include an operation identifier corresponding to the processing operation.
In a specific implementation, the first virtual number and the second virtual number are allocated when the first user and the second user perform a processing operation of a designated service object.
Referring to fig. 6, a block diagram of a communication device 3 based on a virtual number according to an embodiment of the present application is shown, which may specifically include the following modules:
a communication information receiving module 601, configured to receive communication information submitted by a first user and used for communicating with a second user;
the communication information may include a first real number corresponding to the first user and a second virtual number corresponding to the second user;
a correspondence determining module 602, configured to determine whether a preset correspondence exists between the first real number and the second virtual number;
an untrusted communication frequency determining module 603, configured to determine, when the first real number and the second virtual number do not have a preset correspondence, whether a communication frequency of an untrusted number of a second user is smaller than a preset communication frequency threshold; if yes, a second communication information sending module 604 is called, and if not, a communication rejection module 605 is called;
the non-trusted number can be other real numbers which do not have a preset corresponding relation with the second virtual number;
a second communication information sending module 604, configured to send the communication information sent by the first real number to the second real number;
a communication rejecting module 605, configured to reject communication information sent by the first user and used for communicating with the second user.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In a typical configuration, the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (fransitory media), such as modulated data signals and carrier waves.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the true scope of the embodiments of the present application.
Finally, it should also be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "include", "including" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article, or terminal device including a series of elements includes not only those elements but also other elements not explicitly listed or inherent to such process, method, article, or terminal device. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or terminal apparatus that comprises the element.
The communication method based on the virtual number and the communication device based on the virtual number provided by the application are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the above embodiment is only used to help understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.