Summary of the invention
The technical problem to be solved in the embodiments of the present application is that a kind of means of communication based on virtual-number are provided, to mention
The safety of high userspersonal information.
Correspondingly, the embodiment of the present application also provides a kind of communication devices based on virtual-number, to guarantee above-mentioned side
The realization and application of method.
To solve the above-mentioned problems, the embodiment of the present application discloses a kind of means of communication based on virtual-number, comprising:
Receive what the first user submitted, the communication information communicated with second user;It include institute in the communication information
State the corresponding first true number of the first user and corresponding second virtual-number of the second user;
Judge the described first true number and second virtual-number with the presence or absence of preset corresponding relationship;
When the described first true number and second virtual-number are there are when preset corresponding relationship, corresponding closed from described
It is corresponding second true that corresponding first virtual-number of the described first true number, second virtual-number are extracted in system respectively
Number;
It is sent to the described second true number, the communication information issued by first virtual-number.
Preferably, first virtual-number and second virtual-number are in first user and the second user
Carry out distribution when the processing operation of specified business object.
Preferably, the corresponding relationship loss of configuration mark;The failure indication is for identifying the corresponding relationship failure.
It preferably, include the corresponding operation mark of the processing operation in the corresponding relationship;The method also includes:
When receiving the recovery request that the first user or second user are sent for the operation mark, it is described right to delete
Failure indication in should being related to.
Preferably, further includes:
When preset corresponding relationship is not present in the described first true number and second virtual-number, the second use is judged
Whether the communication number of the untrusted number at family is less than preset communication frequency threshold value;The untrusted number be and described second
Other true numbers of preset corresponding relationship are not present in virtual-number;
If so, being sent to the described second true number, the communication information issued by the described first true number;
If it is not, then refuse what first user sent, the communication information communicated with second user.
The embodiment of the present application also discloses a kind of communication device based on virtual-number, comprising:
Communication information receiving module, for receiving the first user submission, the communication information communicated with second user;
It include corresponding second void of the corresponding first true number of first user and the second user in the communication information
Quasi- number;
Corresponding relationship judgment module, for judging the described first true number and second virtual-number with the presence or absence of pre-
The corresponding relationship set;
Number retention module, for there are preset corresponding passes with second virtual-number in the described first true number
When being, corresponding first virtual-number of the described first true number, described second virtual is extracted respectively from the corresponding relationship
The corresponding second true number of number;
The first sending module of communication information is sent out for sending to the described second true number by first virtual-number
Communication information out.
Preferably, first virtual-number and second virtual-number are in first user and the second user
Carry out distribution when the processing operation of specified business object.
Preferably, further includes:
Failure indication configuration module, at the end of the processing operation of the specified business object, to the correspondence
Relationship loss of configuration mark;The failure indication is for identifying the corresponding relationship failure.
It preferably, include the corresponding operation mark of the processing operation in the corresponding relationship;Described device further include:
Failure indication removing module, for receiving what the first user or second user were sent for the operation mark
When recovery request, the failure indication in the corresponding relationship is deleted.
Preferably, further includes:
Untrusted communicates number judgment module, for being not present in the described first true number and second virtual-number
When preset corresponding relationship, judge whether the communication number of the untrusted number of second user is less than preset communication number threshold
Value;If so, the second sending module of communication information is called, if it is not, then calling communication refusal module;The untrusted number be with
Other true numbers of preset corresponding relationship are not present in second virtual-number;
The second sending module of communication information is sent out for sending to the described second true number by the described first true number
Communication information out;
Communication refusal module, for refusing the first user transmission, the communication information communicated with second user.
Compared with prior art, the embodiment of the present application includes the following advantages:
There are corresponding with the second virtual-number of second user in the first true number of the first user for the embodiment of the present application
When relationship, it is believed that true number and virtual-number credible number each other are sent to the second true number of second user by first
The communication information that the first virtual-number of user issues, so that the communication between the first user and second user is at one by empty
It is carried out in the closed channel of quasi- number encryption, two-way white list mechanism can be regarded as, so that the first user, second user can not obtain
The true personal information of communication other side is taken, other people can not obtain the true personal information of communication two party, block user
The leakage of people's information effectively improves the safety of communication two party personal information;And other numbers without corresponding relationship verifying
Code, which dials virtual-number, to be blocked by server, i.e., can not be communicated, be avoided by virtual-number and the first user or second user
Communication two party receives other people and harasses.
The embodiment of the present application identifies corresponding relationship loss of configuration at the end of the processing operation of specified business object,
So that corresponding relationship fails, virtual-number effective time is short, is easy to trace communication two party progress within specific effective time
The concrete operations people of communication, so that fraudulent call, harassing call are even mended the crime cost of the Communications such as card attack significantly
Increase, effectively improves the safety of communication two party true environment.
The embodiment of the present application is deleted when receiving the recovery request that the first user or second user are sent for operation mark
Except the failure indication in corresponding relationship, to reactivate corresponding relationship, in the technology for improving the safety of user's true environment, mention
High operating flexibility.
The embodiment of the present application is when receiving the communication information of untrusted number, according to untrusted number communication selection of times
Communication or refusal communication information are established, the problem of can not being communicated at the time of emergency is prevented, improves practicability
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.
Referring to Fig.1, a kind of step flow chart of means of communication embodiment 1 based on virtual-number of the application is shown,
It can specifically include following steps:
Step 101, receive what the first user submitted, the communication information communicated with second user;
It may include the corresponding first true number of first user and the second user pair in the communication information
The second virtual-number answered;
Step 102, judge the described first true number and second virtual-number with the presence or absence of preset corresponding relationship;
Step 103, when the described first true number and second virtual-number are there are when preset corresponding relationship, from institute
State that extract corresponding first virtual-number of the described first true number, second virtual-number in corresponding relationship respectively corresponding
Second true number;
Step 104, the true number of Xiang Suoshu second is sent, the communication information issued by first virtual-number.
It may include first terminal equipment in a communication system, second terminal equipment, and, server.
Wherein, the first user can have first terminal equipment, and second user can have second terminal equipment, then and first
User can submit the communication information communicated with second user to server by first terminal equipment, and second user can be with
The communication information issued by the first virtual-number is received by second terminal equipment.
First terminal equipment and second terminal equipment may include electronic computer, mobile device, fixed-line telephone etc..
Electronic computer can support specified application program, which can use HTTP (Hypertext
Transfer protocol, hypertext transfer protocol) agreement, it is carried out by the networks such as Internet (internet) and server
Interaction (such as send communication information, receive communication information) realizes that (Internet Protocol is interconnected between network network IP
Agreement) telephony feature.
Mobile device may include mobile phone, tablet computer etc., which can use WAP (Wireless
Application Protocol is Wireless Application Protocol) agreement or http protocol, pass through mobile network and server carries out
Interaction (such as send communication information, receive communication information).The mobile network may include second generation mobile communication technology 2G net
Network, integrated digital enhanced network (i.e. 2.5G network), third generation mobile technology 3G network, forth generation mobile communication technology 4G
Network, virtual operator (Virtual Network Operator, VNO) network etc..
Fixed-line telephone can pass through PSTN (Public Switched Telephone Network, public switch telephone network
Network) network and server interact (such as send communication information, receive communication information).
There are corresponding with the second virtual-number of second user in the first true number of the first user for the embodiment of the present application
When relationship, it is believed that true number and virtual-number credible number each other are sent to the second true number of second user, by first
The communication information that the first virtual-number of user issues, so that the communication between the first user and second user is at one by empty
It is carried out in the closed channel of quasi- number encryption, two-way white list mechanism can be regarded as, so that the first user, second user can not obtain
The true personal information of communication other side is taken, other people can not obtain the true personal information of communication two party, block user
The leakage of people's information effectively improves the safety of communication two party personal information;And other numbers without corresponding relationship verifying
Code, which dials virtual-number, to be blocked by server, i.e., can not be communicated, be avoided by virtual-number and the first user or second user
Communication two party receives other people and harasses.
Referring to Fig. 2, a kind of step flow chart of means of communication embodiment 2 based on virtual-number of the application is shown,
It can specifically include following steps:
Step 201, receive what the first user sent, the communication information communicated with second user;The communication information
In include the corresponding first true number of first user and corresponding second virtual-number of the second user;
Using the embodiment of the present application, the first user can have first terminal equipment, and second user can have second eventually
End equipment.The first terminal equipment can have corresponding first true number, and it is true which can have second
Real number.
So-called true number can refer to the number distributed in realizing by communicating operator.
For example, the fixed telephone number in Guangzhou is made of area code " 020 " and 8 numbers, the number of mobile operator is by 11
Bit digital composition, and each mobile operator can have specific number section, etc..
First user and second user are when carrying out the processing operation of specified business object, in order to protect user true
Personal information, such as true number can be the first true number and corresponding first virtual-number of the second true number assignment
With the second virtual-number.
So-called virtual-number, be it is opposite with true number, can refer to imaginary number, but logical with true number
Communication function, i.e. user can be communicated by virtual-number.
Virtual-number can be arbitrary the number that communication operator is possessed, the virtual-number that can make an appointment identification rule
Then, such as number section rule (number of some number section is used exclusively for configuration virtual-number), spacing code labeling are (certain numbers regular
Code is spacing, can be used for configuring virtual-number) etc., in virtual-number in application, server can pass through the virtual of agreement
Number Reorganization rule identifies virtual-number.
For different business field, different business objects can have, i.e., with the object of business scope feature.
For example, business object may include material (such as silicon wafer) for semiconductor field;For news media field
For, business object may include news data;For field of mobile communication, business object may include mobile communication number
According to;For the field e-commerce (Electronic Commerce, EC), business object may include commodity.
To make those skilled in the art more fully understand the embodiment of the present application, in the present specification, by e-commerce field
Commodity be illustrated as a kind of example of business object.
Then the first user can be buyer, and second user can be seller, and the processing operation of business object can be commodity
Transaction.
Certainly, the first user can be seller, and second user can be buyer, and the embodiment of the present application does not limit this
System.
When buyer and seller trade for commodity, server can distribute virtual-number for buyer and seller.
Specifically, server can be empty for buyer and seller's distribution first when buyer pays the bill in transaction for commodity
Quasi- number and the second virtual-number, and the second virtual-number of the first virtual-number of buyer and seller is sent to buyer;And
When seller sends commodity to buyer in transaction, server can be virtual by the second of the first virtual-number of buyer and seller
Number is sent to seller.
It should be noted that the server can be Cloud Server, i.e., integrated service is provided towards all kinds of Internet users
The service platform of ability, enables data to manage concentratedly.
Therefore, buyer and seller are the actual telephone numbers that can not know other side, other people also can not be in express delivery link etc.
Under scene, knows the true number of communication two party, effectively prevent the leakage of userspersonal information.
Certainly, this example can be that buyer and seller distribute the first virtual-number and second in any time of trading activity
Virtual-number, and the second virtual-number of the first virtual-number of buyer and seller is sent to buyer and seller.
After distributing the first virtual-number and the second virtual-number, it is true that first can be added in preset database
Number, the first virtual number, the second true number, the second virtual-number corresponding relationship.
For example, the format of the corresponding relationship can be as shown in the table:
Table 1
It wherein, may include failure indication and the corresponding operation mark of the processing operation in the corresponding relationship.
Failure indication can be used for identifying the corresponding relationship failure, when corresponding relationship failure, it is believed that the correspondence
Relationship is not present;The operation mark can identify processing operation, it can the processing for the first user and second user is grasped
Make to configure unique operation mark, to carry out the identification of processing operation.
By taking the primary transaction of buyer and seller as an example, the example of the corresponding relationship can be as shown in the table:
Table 2
Wherein, failure indication is that " 0 " can indicate that failure indication is not present, and current corresponding relationship is effective.
In the first user and second user when carrying out the processing operation of specified business object, exchange may be will do it.
For example, buyer seeks advice from the performance of commodity, price etc. to seller.
Under such situation, the first user can be submitted to server by first terminal equipment and be communicated with second user
Communication information.
For example, as shown in table 2, buyer can dial the second virtual-number " 19087654321 " of seller by mobile phone, then
It can be shown on the mobile phone of buyer just in dialing numbers " 19087654321 ".
It should be noted that the communication information can be arbitrary the information by the interaction transmitting of true number mark, example
Such as call-information, short message, multimedia message information, i.e. the first user and second user can carry out phone based on virtual-number
Communication, SMS communication, multimedia message communication etc..
Server can receive what the first user was submitted by first terminal equipment, the communication communicated with second user
Information;It may include that the corresponding first true number of first user and the second user are corresponding in the communication information
Second virtual-number.
For example, as shown in table 2, when buyer can dial the second virtual-number " 19087654321 " of seller by mobile phone,
Server can identify that the first true number of buyer is " 18012345678 ", and the second virtual-number of seller is
“19087654321”。
Step 202, judge the described first true number and second virtual-number with the presence or absence of preset corresponding relationship;
In the concrete realization, it can search whether the first true number is deposited with the second virtual-number in preset database
In corresponding relationship.
If finding, it may determine that there are corresponding relationships for the first true number and the second virtual-number.
If not finding, may determine that the first true number and the second virtual-number, there is no corresponding relationships.
For example, identifying that the first true number of buyer is in the communication information that server receives
Second virtual-number of " 18012345678 ", seller is " 19087654321 ", is finding corresponding relationship as shown in Table 2
Afterwards, then it may determine that there are corresponding passes for the first true number " 18012345678 " and the second virtual-number " 19087654321 "
System.
Step 203, when the described first true number and second virtual-number are there are when preset corresponding relationship, from institute
State that extract corresponding first virtual-number of the described first true number, second virtual-number in corresponding relationship respectively corresponding
Second true number;
As shown in table 2, the first of buyer the true number is " 18012345678 ", and corresponding first virtual-number is
Second virtual-number of " 19012345678 ", seller is " 19087654321 ", and corresponding second true number is
“18087654321”。
Step 204, the true number of Xiang Suoshu second is sent, the communication information issued by first virtual-number;
In the concrete realization, server can dial the second true number in voice gateways, establish the first user and
The communication connection of two users, but the first true number can be replaced being sent to second user by the first virtual-number.
For example, as shown in table 2, the first true number is the buyer of " 18012345678 ", the second virtual number of seller is dialed
Code is " 19087654321 ".Determining the first true number " 18012345678 " and the second virtual-number " 19087654321 "
There are after corresponding relationship, server can dial the second virtual-number " 19087654321 " corresponding second in language gateway
True number " 18087654321 ", is connected with establishing buyer with the telephonic communication of seller, and by the first true number
" 18012345678 " corresponding first virtual-number " 19012345678 " is sent to the second true number " 18087654321 ",
I.e. on the mobile phone of seller, the incoming call for receiving that number is " 18087654321 " can be shown.
Step 205, at the end of the processing operation of the specified business object, to the corresponding relationship loss of configuration mark
Know;
In the embodiment of the present application, at the end of the processing operation of specified business object, corresponding relationship can be configured and be lost
Criterion is known, and corresponding relationship is released.
For example, after the completion of commodity transaction, can release the first true number of buyer and seller, the first virtual-number,
Corresponding relationship between second true number and the second virtual-number deactivates the first virtual-number and the second virtual-number.
After corresponding relationship loss of configuration mark, corresponding relationship, which can consider, to be not present.
At this point, if the first user is communicated with the second virtual-number using the first true number request, server can be with
Refuse the communication request of the first user.
For example, in table 2 after loss of configuration mark, it can be as shown in the table:
Wherein, failure indication is that " 1 " can indicate that failure indication exists, current corresponding relationship failure.
At this point, if buyer passes through the first true number " 18012345678 " request and the second virtual-number
" 19087654321 " are communicated, and server can refuse the communication request of buyer.
The embodiment of the present application identifies corresponding relationship loss of configuration at the end of the processing operation of specified business object,
So that corresponding relationship fails, virtual-number effective time is short, is easy to trace communication two party progress within specific effective time
The concrete operations people of communication, so that fraudulent call, harassing call are even mended the crime cost of the Communications such as card attack significantly
Increase, effectively improves the safety of communication two party true environment.
Step 206, it when receiving the recovery request that the first user or second user are sent for the operation mark, deletes
Except the failure indication in the corresponding relationship.
In the concrete realization, for some reason, the first user or second user need at the place of specified business object
After reason operation, communicated with other side.
For example, buyer has found that commodity are defective in quality after the completion of commodity transaction, need to carry out right-safeguarding after sale, therefore need
It to be exchanged with seller.
In which case, server can find the corresponding relationship according to operation mark, delete in the corresponding relationship
Failure indication, to activate corresponding relationship.
For example, as shown in table 3, server is receiving recovery of the buyer for operation mark for " 117135 " commodity transaction
When request, the failure indication in table 3 can be deleted, i.e., " 0 " be set by failure indication, to activate corresponding relationship.
After failure indication deletion, then the corresponding relationship is effective, it is believed that is existing, the first user and second user
The first virtual-number can be again based on and the second virtual-number is communicated.
It should be noted that holding since server memory capacity is limited, virtual-number is limited in order to discharge server storage
Amount and virtual-number, server can delete the corresponding relationship after corresponding relationship fails a period of time.
In which case, when the first user or second user send recovery request for operation mark, server can
Think that the first user and second user redistribute virtual-number, to allow the first user and second user to communicate.
The embodiment of the present application is deleted when receiving the recovery request that the first user or second user are sent for operation mark
Except the failure indication in corresponding relationship, to reactivate corresponding relationship, in the technology for improving the safety of user's true environment, mention
High operating flexibility.
Referring to Fig. 3, a kind of step flow chart of means of communication embodiment 3 based on virtual-number of the application is shown,
It can specifically include following steps:
Step 301, receive what the first user submitted, the communication information communicated with second user;
It may include the corresponding first true number of first user and the second user in the communication information
Corresponding second virtual-number;
Step 302, judge the described first true number and second virtual-number with the presence or absence of preset corresponding relationship;
Step 303, when preset corresponding relationship is not present in the described first true number and second virtual-number, sentence
Whether the communication number of the untrusted number of disconnected second user is less than preset communication frequency threshold value;If so, thening follow the steps
304, if it is not, thening follow the steps 305;
In order to prevent when drop-in, such as SIM card (Subscriber Identity Module, client identification module)
Damage leads to not be communicated based on original true number and virtual-number, therefore, in the embodiment of the present application, can be with
The first user and second user is allowed to carry out the communication of untrusted number.
Wherein, the untrusted number can be other that preset corresponding relationship is not present with second virtual-number
True number.
For example, buyer and seller are assigned with corresponding virtual-number in commodity transaction, and establish it is as shown in Table 2 right
It should be related to.But the SIM card of buyer is damaged, therefore is not available the first true number " 18012345678 " and second virtually
Number " 19087654321 " is communicated.
But buyer is the second virtual-number " 19087654321 " for knowing seller, buyer can be true based on other
Number, such as " 15012345678 ", request are communicated with seller.And due to other true numbers " 15012345678 " and seller
The second virtual-number " 19087654321 " be not present corresponding relationship, therefore, other true numbers " 15012345678 " for
It is non-credible number for second virtual-number " 19087654321 ".
In the concrete realization, the first user and second user can one-way or bi-directional communications that untrusted number is arranged time
Number.That is the communication frequency threshold value of the untrusted number communication of oneself can be set in the first user, and second user also can be set
The communication frequency threshold value of untrusted number communication;Corresponding, the untrusted number communication of oneself can be set in second user
Frequency threshold value is communicated, the communication frequency threshold value of the untrusted number communication of the first user also can be set.
Certainly, the set-up mode of above-mentioned communication frequency threshold value is used merely as example, it can also be arranged in the embodiment of the present application
He interrogates the set-up mode of frequency threshold value, for example, server limitation untrusted number communication communication frequency threshold value peak with
Minimum etc., the embodiment of the present application are without restriction to this.
It should be noted that the communication frequency threshold value of untrusted number communication can be set to 0, i.e., do not receive from it is non-can
The communication of signal code.
Step 304, the true number of Xiang Suoshu second is sent, the communication information issued by the described first true number;
When the communication number of untrusted number is less than communication frequency threshold value, indicate that second user still can receive from non-
The communication of credible number, then server can establish the communication connection of the first user and second user.
For example, second virtual-number of the buyer using other true number " 15012345678 " requests and seller
" 19087654321 " are communicated, then can be shown on the mobile phone of buyer just in dialing numbers " 19087654321 ".Sentencing
Breaking, there is no when corresponding relationship for other true numbers " 15012345678 " and the second virtual-number " 19087654321 ", it is assumed that sells
The communication number of the untrusted number of family is 3, and less than preset communication frequency threshold value 4, then server can be in language gateway
The corresponding second true number " 18087654321 " of the second virtual-number " 19087654321 " is dialed, to establish buyer and seller
Communication connection, and other true numbers " 15012345678 " are sent to the second true number " 18087654321 ", that is, existed
On the mobile phone of seller, the incoming call for receiving that number is " 15012345678 " can be shown.
Step 305, refuse what first user sent, the communication information communicated with second user.
When the communication number of untrusted number is equal to communication frequency threshold value, indicate that second user does not receive from untrusted
The communication of number, then server can be refused to establish the communication connection of the first user and second user.
The embodiment of the present application is when receiving the communication information of untrusted number, according to untrusted number communication selection of times
Communication or refusal communication information are established, the problem of can not being communicated at the time of emergency is prevented, improves practicability.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
Referring to Fig. 4, a kind of structural block diagram of the communication device embodiment 1 based on virtual-number of the application is shown, specifically
May include following module:
Communication information receiving module 401 is believed for receiving the first user submission with the communication that second user is communicated
Breath;
It may include the corresponding first true number of first user and the second user in the communication information
Corresponding second virtual-number;
Corresponding relationship judgment module 402, for judging whether the described first true number is deposited with second virtual-number
In preset corresponding relationship;
Number retention module 403, for there are preset pairs with second virtual-number in the described first true number
When should be related to, corresponding first virtual-number of the described first true number, described second are extracted respectively from the corresponding relationship
The corresponding second true number of virtual-number;
The first sending module of communication information 404, for being sent to the described second true number, by first virtual-number
The communication information of sending.
Referring to Fig. 5, a kind of structural block diagram of the communication device embodiment 2 based on virtual-number of the application is shown, specifically
May include following module:
Communication information receiving module 501 is believed for receiving the first user submission with the communication that second user is communicated
Breath;
It may include the corresponding first true number of first user and the second user in the communication information
Corresponding second virtual-number;
Corresponding relationship judgment module 502, for judging whether the described first true number is deposited with second virtual-number
In preset corresponding relationship;
Number retention module 503, for there are preset pairs with second virtual-number in the described first true number
When should be related to, corresponding first virtual-number of the described first true number, described second are extracted respectively from the corresponding relationship
The corresponding second true number of virtual-number;
The first sending module of communication information 504, for being sent to the described second true number, by first virtual-number
The communication information of sending.
Failure indication configuration module 505, at the end of the processing operation of the specified business object, to described right
It should be related to that loss of configuration identifies;The failure indication is for identifying the corresponding relationship failure.
Failure indication removing module 506, for receiving the first user or second user for operation mark hair
When the recovery request sent, the failure indication in the corresponding relationship is deleted.
It may include the corresponding operation mark of the processing operation in the corresponding relationship.
In the concrete realization, first virtual-number and second virtual-number fall in first user with it is described
Second user carries out distribution when the processing operation of specified business object.
Referring to Fig. 6, a kind of structural block diagram of the communication device embodiment 3 based on virtual-number of the application is shown, specifically
May include following module:
Communication information receiving module 601 is believed for receiving the first user submission with the communication that second user is communicated
Breath;
It may include the corresponding first true number of first user and the second user in the communication information
Corresponding second virtual-number;
Corresponding relationship judgment module 602, for judging whether the described first true number is deposited with second virtual-number
In preset corresponding relationship;
Untrusted communicates number judgment module 603, for the described first true number and second virtual-number not
There are the communication numbers for when preset corresponding relationship, judging the untrusted number of second user whether to be less than preset communication number
Threshold value;If so, the second sending module of communication information 604 is called, if it is not, then calling communication refusal module 605;
The untrusted number can for second virtual-number there is no preset corresponding relationship other are true
Number;
The second sending module of communication information 604, for being sent to the described second true number, by the described first true number
The communication information of sending;
Communication refusal module 605 is believed for refusing the first user transmission with the communication that second user is communicated
Breath.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating
Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output
Interface, network interface and memory.Memory may include the non-volatile memory in computer-readable medium, random access memory
The forms such as device (RAM) and/or Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is to calculate
The example of machine readable medium.Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be with
Realize that information is stored by any method or technique.Information can be computer readable instructions, data structure, the module of program or
Other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include non-persistent computer readable media (transitory media), such as
The data-signal and carrier wave of modulation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to a kind of means of communication based on virtual-number provided herein and a kind of leading to based on virtual-number
Device is interrogated, is described in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application,
The description of the example is only used to help understand the method for the present application and its core ideas;Meanwhile for the one of this field
As technical staff, according to the thought of the application, there will be changes in the specific implementation manner and application range, to sum up institute
It states, the contents of this specification should not be construed as limiting the present application.