CN110545360B - Communication privacy protection method, device, equipment and computer readable storage medium - Google Patents

Communication privacy protection method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110545360B
CN110545360B CN201810523760.9A CN201810523760A CN110545360B CN 110545360 B CN110545360 B CN 110545360B CN 201810523760 A CN201810523760 A CN 201810523760A CN 110545360 B CN110545360 B CN 110545360B
Authority
CN
China
Prior art keywords
called
binding agent
party
binding
called party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810523760.9A
Other languages
Chinese (zh)
Other versions
CN110545360A (en
Inventor
胡立亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rajax Network Technology Co Ltd
Original Assignee
Rajax Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rajax Network Technology Co Ltd filed Critical Rajax Network Technology Co Ltd
Priority to CN201810523760.9A priority Critical patent/CN110545360B/en
Publication of CN110545360A publication Critical patent/CN110545360A/en
Application granted granted Critical
Publication of CN110545360B publication Critical patent/CN110545360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure

Abstract

The embodiment of the disclosure provides a communication privacy protection method, a communication privacy protection device, communication privacy protection equipment and a computer readable storage medium. The communication privacy protection method comprises the following steps: binding the called binding agent number to a called party, wherein the called party number acquired by the calling party in communication is the called binding agent number; binding the bidirectional binding agent number to a calling party and a called party, wherein the number of the calling party and the called party, which is obtained in the communication, of the opposite party is the bidirectional binding agent number; when a calling party initiates a call to a called party, the call is initiated preferentially through the bidirectional binding agent number, so that number privacy protection can be preferentially provided for the calling party and the called party without being customized in advance. In the embodiment of the disclosure, by binding the called binding agent number and the bidirectional binding agent number, the user information security in communication can be ensured, privacy disputes are avoided, and personal information leakage is prevented.

Description

Communication privacy protection method, device, equipment and computer readable storage medium
Technical Field
The disclosed embodiments relate to the field of communication application technologies, and in particular, to a communication privacy protection method, apparatus, device, and computer-readable storage medium.
Background
In the field of communications, when communicating between users, the communication between them may face privacy protection issues. For example, in the business field, when a commodity or service provider needs to communicate with a user, the commodity or service provider and the user generally use a telephone, which is a communication mode requiring timely confirmation of communication between the two parties. There is a problem in that privacy of the individual of the user, the goods or the service provider is leaked. For example, some privacy disputes may occur such as a product or service provider dialing a user's real number for harassment. Due to the consideration of confidentiality of public data, privacy leakage can be avoided on the premise that two communication parties can normally communicate through anonymous trumpet and information privacy removal processing.
Disclosure of Invention
In practical applications, the inventors found that: the communication privacy protection technology in the related art has the following problems: the communication privacy protection method in the related art is generally bound for individual or fixed numbers, and belongs to services which need to be customized in advance. But the applicability to large-scale, non-personal data such as public data, and scenes such as business fields that need timely confirmation and temporary relationships is lacking.
In order to solve the technical problem, a first aspect of the present disclosure provides a communication privacy protection method, including:
binding the called binding agent number to a called party, wherein the called party number acquired by the calling party in communication is the called binding agent number;
binding the bidirectional binding agent number to a calling party and a called party, wherein the number of the calling party and the called party, which is obtained in the communication, of the opposite party is the bidirectional binding agent number;
when the calling party initiates a call to the called party, the calling party initiates the call through the bidirectional binding agent number preferentially.
With reference to the first aspect, in a first implementation manner of the first aspect, the present disclosure further includes:
when the calling party fails to initiate the call to the called party through the bidirectional binding agent number, the call is initiated to the called party through the called binding agent number.
With reference to the first aspect, in a second implementation manner of the first aspect, the present disclosure further includes:
the tasks performed by the calling party on the called party are detected,
wherein, the binding the called binding agent number to the called party comprises:
when detecting the task executed by the calling party to the called party, binding the called binding agent number to the called party while detecting the occurrence of the task.
With reference to the second implementation manner of the first aspect, in a third implementation manner of the first aspect, the binding the bidirectional binding agent number to the calling party and the called party includes:
binding the bidirectional binding agent number to the calling party and the called party before detecting that the task performed by the calling party on the called party is finished.
With reference to the second implementation manner or the third implementation manner of the first aspect, in a fourth implementation manner of the first aspect, the present disclosure further includes:
detecting whether a task executed by a calling party to a called party is abnormal or not;
and when detecting that the task executed by the calling party to the called party is abnormal, removing the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number.
With reference to the fourth implementation manner of the first aspect, in a fifth implementation manner of the first aspect, the task exception that the calling party performs on the called party is one of task ending, task switching to another calling party for execution, and task timeout.
With reference to the first aspect, in a sixth implementation manner of the first aspect, the binding the called binding agent number to the called party includes:
polling in a pool of called binding agent numbers having a plurality of called binding agent numbers to select an available called binding agent number;
and binding the selected available called binding agent number to the called party.
With reference to the first aspect, in a seventh implementation manner of the first aspect, the binding the bidirectional binding agent number to the calling party and the called party includes:
polling in a pool of bidirectional binding agent numbers having a plurality of bidirectional binding agent numbers to select an available bidirectional binding agent number;
and binding the selected bidirectional binding agent number to the calling party and the called party.
A second aspect of the present disclosure provides a communication privacy protecting apparatus, including:
the first binding module is configured to bind the called binding agent number to the called party, wherein the called binding agent number is the called binding agent number, and the called binding agent number is acquired by the calling party in communication;
the second binding module is configured to bind the bidirectional binding agent number to the calling party and the called party, wherein the opposite party number acquired by the calling party and the called party in communication is the bidirectional binding agent number;
and the call initiating module is configured to preferentially initiate a call through the bidirectional binding agent number when a calling party initiates a call to a called party.
With reference to the second aspect, in a first implementation manner of the second aspect, the call initiation module is configured to:
when the calling party fails to initiate the call to the called party through the bidirectional binding agent number, the call is initiated to the called party through the called binding agent number.
With reference to the second aspect, in a second implementation manner of the second aspect, the present disclosure further includes:
a first detection module configured to detect a task performed by a calling party on a called party,
wherein the first binding module is configured to:
when detecting the task executed by the calling party to the called party, binding the called binding agent number to the called party while detecting the occurrence of the task.
With reference to the second implementation manner of the second aspect, in a third implementation manner of the second aspect, the second binding module is configured to:
binding the bidirectional binding agent number to the calling party and the called party before detecting that the task performed by the calling party on the called party is finished.
With reference to the second implementation manner or the third implementation manner of the second aspect, in a fourth implementation manner of the second aspect, the present disclosure further includes:
the second detection module is configured to detect whether the task executed by the calling party on the called party is abnormal;
and the unbinding module is configured to unbind the current bidirectional binding agent number and/or the called binding agent number when detecting that the task executed by the calling party on the called party is abnormal.
With reference to the fourth implementation manner of the second aspect, in a fifth implementation manner of the second aspect, the task exception that the calling party performs on the called party is one of task ending, task switching to another calling party for execution, and task timeout.
With reference to the second aspect, in a sixth implementation manner of the second aspect, the first binding module includes:
a first selection submodule configured to poll in a pool of called binding agent numbers having a plurality of called binding agent numbers to select an available called binding agent number;
a first binding submodule configured to bind the selected available called binding agent number to the called party.
With reference to the second aspect, in a seventh implementation manner of the second aspect, the second binding module includes:
a second selection submodule configured to poll in a pool of bidirectional binding agent numbers having a plurality of bidirectional binding agent numbers to select an available bidirectional binding agent number;
a second binding submodule configured to bind the selected bidirectional binding agent number to the calling party and the called party.
A third aspect of the present disclosure provides an electronic device comprising a memory and a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement the method as described in the first aspect, the first implementation of the first aspect to the seventh implementation.
A fourth aspect of the present disclosure provides a computer-readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the method according to any one of the first aspect, the first implementation manner to the seventh implementation manner of the first aspect.
In the embodiment of the disclosure, a called binding agent number is bound to a called party, wherein the called binding agent number is the called binding agent number acquired by a calling party in communication; binding the bidirectional binding agent number to a calling party and a called party, wherein the number of the calling party and the called party, which is obtained in the communication, of the opposite party is the bidirectional binding agent number; when a calling party initiates a call to a called party, the call is initiated preferentially through the bidirectional binding agent number, so that number privacy protection can be preferentially provided for the calling party and the called party without being customized in advance. In the embodiment of the disclosure, by binding the called binding agent number and the bidirectional binding agent number, the user information security in communication can be ensured, privacy disputes are avoided, and personal information leakage is prevented.
These and other aspects of the disclosure will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or technical solutions in the related art, the drawings needed to be used in the description of the exemplary embodiments or the related art will be briefly described below, and it is obvious that the drawings in the following description are some exemplary embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without inventive labor.
Fig. 1 illustrates a flow diagram of a communication privacy preserving method according to an embodiment of the present disclosure;
FIG. 2 illustrates a flow diagram of a communication privacy preserving method according to another embodiment of the present disclosure;
FIG. 3 illustrates a flow diagram of a communication privacy preserving method according to yet another embodiment of the present disclosure;
FIG. 4 illustrates a flow diagram of a communication privacy preserving method according to yet another embodiment of the present disclosure;
fig. 5 shows a flowchart of step S101 in the communication privacy protecting method according to the embodiment of the present disclosure shown in fig. 1;
fig. 6 shows a flowchart of step S102 in the communication privacy protecting method according to the embodiment of the present disclosure shown in fig. 1;
fig. 7 shows a block diagram of a communication privacy securing apparatus according to an embodiment of the present disclosure;
fig. 8 shows a block diagram of a communication privacy securing apparatus according to another embodiment of the present disclosure;
fig. 9 shows a block diagram of a communication privacy securing apparatus according to still another embodiment of the present disclosure;
fig. 10 is a block diagram illustrating a structure of a first binding module 701 in the communication privacy protecting apparatus according to the embodiment of the disclosure illustrated in fig. 7;
fig. 11 is a block diagram illustrating a second binding module 702 in the communication privacy protecting apparatus according to the embodiment of the disclosure illustrated in fig. 7;
FIG. 12 shows a block diagram of an apparatus according to an embodiment of the present disclosure;
fig. 13 is a schematic structural diagram of a computer system suitable for implementing a communication privacy protection method according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the technical solutions of the exemplary embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the exemplary embodiments of the present disclosure.
In some of the flows described in the specification and claims of this disclosure and in the above-described figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, the order of the operations being 101, 102, etc. merely to distinguish between various operations, and the order of the operations by themselves does not represent any order of performance. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The application mode of the embodiment of the disclosure can solve the following problems of the related art: the communication privacy protection method in the related art is generally bound for individual or fixed numbers, and belongs to services which need to be customized in advance. But the applicability to large-scale, non-personal data such as public data, and scenes such as business fields that need timely confirmation and temporary relationships is lacking.
Technical solutions in exemplary embodiments of the present disclosure will be described clearly and completely with reference to the accompanying drawings in the exemplary embodiments of the present disclosure, and it is apparent that the described exemplary embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
Fig. 1 shows a flow diagram of a communication privacy protection method according to an embodiment of the present disclosure. The method may comprise steps S101, S102 and S103.
In step S101, binding a called binding agent number to a called party, where a called party number acquired by a calling party in communication is the called binding agent number;
in step S102, binding a bidirectional binding agent number to a calling party and a called party, wherein a number of the calling party and the called party, which is obtained in communication, is the bidirectional binding agent number;
in step S103, when the calling party initiates a call to the called party, the call is preferentially initiated through the bidirectional binding agent number.
In one embodiment, the called binding agent number may also be referred to as the primary station trombone. For example, the master site trumpet belongs to a pool of regional numbers provided by the communications carrier. This number is used only to bind the real number of the called party (e.g., the user in the online shopping order) in one way, similar to call forwarding. In this case, dialing the called binding agent number by the calling party (e.g., a vendor for online shopping, a distributor, etc.) will reveal the called binding agent number and reach the called party (user), who can not see the real number of the called party, but the called party can see the real number of the calling party. In this case, at least the communication privacy of the called party (user) can be protected.
In one embodiment, the bidirectional binding agent number may also be referred to as a transit trombone. For example, a transit trumpet belongs to a pool of regional numbers provided by a communications carrier. The number can be used for temporarily binding a dialing relationship, namely, the number is used as a transfer number of a calling party and a called party, and the two parties can only see that the other party is the temporary transfer number when dialing. In embodiments of the present disclosure, a bi-directional binding agent number may be considered to bind a dialing relationship between a calling party and a called party, i.e., a calling and called party pair. In this case, the privacy of communication of both the calling party and the called party can be protected. In one embodiment, this number has a binding number limit.
In one embodiment, the binding of the called binding agent number to the called party and the binding of the bidirectional binding agent number to the calling party and the called party may be performed simultaneously, or any binding operation may be performed first. That is, the above description of binding the binding agent number to the called party first, and the description of binding the bidirectional binding agent number to the calling party and the called party later does not indicate that the binding operation must have a precedence order.
In one embodiment, calls are preferably initiated through a two-way binding agent number. That is, both the calling party and the called party cannot see the number of the other party in communication but can see only the bidirectional binding agent number. This may allow privacy of both the calling and called parties to be protected.
In the embodiment of the disclosure, a called binding agent number is bound to a called party, wherein the called binding agent number is the called binding agent number acquired by a calling party in communication; binding the bidirectional binding agent number to a calling party and a called party, wherein the number of the calling party and the called party, which is obtained in the communication, of the opposite party is the bidirectional binding agent number; when a calling party initiates a call to a called party, the call is initiated preferentially through the bidirectional binding agent number, so that number privacy protection can be preferentially provided for the calling party and the called party without being customized in advance. In the embodiment of the disclosure, by binding the called binding agent number and the bidirectional binding agent number, the user information security in communication can be ensured, privacy disputes are avoided, and personal information leakage is prevented.
Fig. 2 shows a flow diagram of a communication privacy preserving method according to another embodiment of the present disclosure. This embodiment includes step S201 in addition to steps S101, S102, and S103 which are the same as those in fig. 1.
In step S201, when the calling party fails to initiate a call to the called party through the bidirectional binding proxy number, a call is initiated to the called party through the called binding proxy number.
In one embodiment, calls are initiated preferentially through the two-way binding proxy number, but when initiating a call to the called party through the two-way binding proxy number fails for various reasons, a call may be initiated to the called party through the called binding proxy number. At this time, the calling party can not see the number of the called party but only the called binding agent number, and the called party can see the number of the calling party, so that the privacy of the called party can be ensured. Since in embodiments of the present disclosure, initiating a call through a two-way binding agent number has a higher priority than initiating a call through a called binding agent number, initiating a call by a calling party to a called party over a called binding agent number may also be considered "downgraded" in a sense.
In one embodiment, the called binding agent number (main station small number) does not need to bind the dialing relation between the calling party and the called party, but only performs call forwarding on the called number, and therefore, the availability is very high. In this case, the called binding agent number is used as a downgrade bottom solution for the two-way binding agent number (transit minor) failure in the order. Therefore, the privacy of the real number of the mobile phone of the called party can be firstly ensured, and the normal conversation between the calling party and the called party is ensured.
In the embodiment of the disclosure, when a calling party fails to initiate a call to a called party through a bidirectional binding proxy number, the called party initiates the call to the called party through the called binding proxy number, so that number privacy protection can be provided for the called party at least without pre-customization. In the embodiment of the disclosure, by binding the called binding agent number and the bidirectional binding agent number, the user information security in communication can be ensured, privacy disputes are avoided, and personal information leakage is prevented.
Fig. 3 shows a flow diagram of a communication privacy preserving method according to yet another embodiment of the present disclosure. As shown in fig. 3, the method further comprises steps S301, S101, S102, wherein step S101 in fig. 3 differs from step S101 in fig. 1 by comprising step S302, and step S102 in fig. 3 differs from step S102 in fig. 1 by comprising step S303.
In step S301, a task performed by the calling party to the called party is detected.
In step S302, when the occurrence of a task performed by the calling party to the called party is detected, the called binding agent number is bound to the called party while the occurrence of the task is detected.
In step S303, the bidirectional binding agent number is bound to the calling party and the called party before detecting that the task performed by the calling party on the called party is ended.
In one embodiment, the reason for the strange communication between the calling party and the called party is because the calling party needs to perform a task on the called party. For example, a task may refer to the caller verifying sales information to the called party, the caller shipping the called party, the caller marketing a product to the called party, the caller conducting a telephone survey to the called party, etc. In one embodiment, an event requiring a caller to initiate communication to a called party may be considered a task performed by the caller on the called party.
In one embodiment, whether to privacy protect communications is determined based on a detection of a task performed by a calling party on a called party. That is, in the case where it is detected that there is an event that the calling party initiates communication to the called party, it is necessary to establish privacy protection for the communication between the calling party and the called party. Therefore, the privacy protection can be effectively and pertinently carried out on the calling party and the called party.
In one embodiment, when the occurrence of a task performed by a calling party to a called party is detected, a called binding agent number is bound to the called party at the same time as the occurrence of the task is detected. This binding may be considered a binding that is synchronized with the detection of the task. In this case, since binding the called binding agent number to the called party is a call forwarding, the occupation of the number and communication resources is smaller than that of binding the bidirectional binding agent number to the numbers and communication resources of the calling party and the called party, and thus the called binding agent number can be bound for the called party when detecting the occurrence of the task performed by the calling party to the called party. In this way, communication privacy protection can be provided for the called party by using smaller numbers and communication resources in the whole task process.
In another embodiment, the called binding agent number may be bound to the called party after detecting the occurrence of a task performed by the calling party to the called party, before the task is completed. I.e. binding the called binding agent number to the called party in an asynchronous manner to the task detected.
In one embodiment, binding a bidirectional binding agent number to a calling party and a called party before detecting the end of a task performed by the calling party on the called party is an asynchronous binding to the detection of the task. Since the bidirectional binding agent number is bound to the numbers of the calling party and the called party and the occupation of communication resources is larger than that of the called binding agent number, in order to reduce the occupation time of the numbers and the communication resources, the bidirectional binding agent number is bound to the calling party and the called party after the task executed by the calling party on the called party is detected and before the task is finished. For example, after detecting that a task performed by the calling party on the called party occurs, the bidirectional binding agent number is not bound to the calling party and the called party until the behavior occurs that the calling party dials the called party phone. Therefore, under the condition of protecting the communication privacy of the calling party and the called party, the number and the communication resource are less occupied.
In another embodiment, the bi-directional binding agent number may be bound to the calling party and the called party at the same time as the end of the task performed by the calling party on the called party is detected, which is a binding synchronized with the detection of the occurrence of the task. In this case, the communication privacy protection of the calling party and the called party is the best, but the number and communication resources are more occupied.
In the embodiment of the disclosure, the task executed by the called party by the calling party is detected; when detecting that a task executed by a calling party to a called party occurs, binding a called binding agent number to the called party while detecting that the task occurs; the bidirectional binding agent number is bound to the calling party and the called party before the completion of the task executed by the calling party on the called party is detected, so that the called binding agent number can be bound to the called party when the task occurs, and the number is bound to the calling party and the called party before the completion of the task, so that the communication privacy protection can be performed on the calling party and the called party as much as possible under the condition that the number and communication resources are less occupied, and at least the communication privacy protection can be performed on the called party.
Fig. 4 shows a flow diagram of a communication privacy preserving method according to yet another embodiment of the present disclosure. The method comprises steps S401 and S402.
In step S401, it is detected whether a task performed by the calling party to the called party is abnormal.
In step S402, when detecting that the task executed by the calling party to the called party is abnormal, the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number is released.
In one embodiment, the task exception performed by the calling party to the called party is one of task ending, task switching to another calling party for execution, and task timeout. For example, when the task performed by the calling party to the called party is a delivery task, if one of the cases that the delivery task is ended, the calling party (delivery party) becomes another calling party (delivery party), or the delivery task is overtime, etc., the binding of the current bidirectional binding agent number, or the binding of the called binding agent number, or both the binding of the bidirectional binding agent number and the binding of the called binding agent number is released. From another perspective, when a task ends or a task is switched to another caller for execution, the caller and the callee have little possibility to communicate, and thus it is necessary to unbind the numbers. When the task is over, the calling party is likely to have already communicated with the called party, but it is difficult to judge how long it takes for the task to end, and if the number binding is not released, the number and the communication resource are always occupied, and the time limit for releasing the number and the communication resource cannot be determined. Therefore, the number binding is released when the task is overtime, so that the use efficiency of the number and the communication resource is ensured. In one embodiment, when a large number of tasks occur in a short time, that is, a plurality of calling parties perform tasks on a plurality of called parties in a short time, the number and communication resources are in a relatively tight state, and therefore, once a certain task is abnormal, the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number is released for the task, so that the utilization rate of the number and the communication resources can be improved.
In the embodiment of the disclosure, whether the task executed by the calling party to the called party is abnormal is detected; when the abnormal task of the calling party to the called party is detected, the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number are/is released, and the use efficiency of the number and the communication resource can be maximized under the condition that the communication between the calling party and the called party is not influenced as much as possible.
Fig. 5 shows a flowchart of step S101 in the communication privacy protecting method according to the embodiment of the present disclosure shown in fig. 1. As shown in fig. 5, step S101 includes steps S501 and S502.
In step S501, a poll is made in a pool of called binding agent numbers having a plurality of called binding agent numbers to select an available called binding agent number.
In step S502, the selected available called binding agent number is bound to the called party.
In one embodiment, a called binding agent number pool may be provided that includes a plurality of called binding agent numbers, and a called binding agent number selected from the called binding agent number pool may be bound for each called party. The called binding agent number pool can be used for binding a plurality of called binding agent numbers to a plurality of called parties, so that communication privacy protection is provided for more called parties, and the use efficiency of the called binding agent numbers is improved.
In one embodiment, the pool of called binding agent numbers may be a pool of regional called binding agent numbers, i.e., one region provides one pool of numbers. In this case, when the task performed by the calling party to the called party is a task having a relatively strong area, such as a delivery task, the use of the regional called binding agent number pool can improve the number and communication resource utilization rate and reduce the communication cost.
Fig. 6 shows a flowchart of step S102 in the communication privacy protecting method according to the embodiment of the present disclosure shown in fig. 1. As shown in fig. 6, step S102 includes steps S601 and S602.
In step S601, a poll is made in a pool of bidirectional binding agent numbers having a plurality of bidirectional binding agent numbers to select an available bidirectional binding agent number.
In step S602, the selected bidirectional binding agent number is bound to the calling party and the called party.
In one embodiment, a bidirectional binding agent number pool may be provided that includes a plurality of bidirectional binding agent numbers, and a bidirectional binding agent number selected from the bidirectional binding agent number pool may be bound for each caller and called party pair. The bidirectional binding agent number pool can be used for binding a plurality of bidirectional binding agent numbers to a plurality of calling party and called party pairs, so that communication privacy protection is provided for more calling party and called party pairs, and the use efficiency of the bidirectional binding agent numbers is improved.
In one embodiment, the pool of bidirectional bound proxy numbers may be a pool of regional called bound proxy numbers, i.e., one region provides one pool of numbers. In this case, when the task performed by the calling party to the called party is a task having a relatively strong area, such as a delivery task, the use of the regional bidirectional binding proxy number pool can improve the number and communication resource utilization rate and reduce the communication cost.
Fig. 7 shows a block diagram of a communication privacy protecting apparatus according to an embodiment of the present disclosure. The apparatus may include a first binding module 701, a second binding module 702, and a call initiation module 703.
The first binding module 701 is configured to bind a called binding agent number to a called party, where a called party number acquired by a calling party in communication is the called binding agent number;
the second binding module 702 is configured to bind the bidirectional binding agent number to the calling party and the called party, wherein the opposite party number known by the calling party and the called party in communication is the bidirectional binding agent number;
the call initiation module 703 is configured to preferentially initiate a call over the bi-directional bound proxy number when a calling party initiates a call to a called party.
In one embodiment, the called binding agent number may also be referred to as the primary station trombone. For example, the master site trumpet belongs to a pool of regional numbers provided by the communications carrier. This number is used only to bind the real number of the called party (e.g., the user in the online shopping order) in one way, similar to call forwarding. In this case, dialing the called binding agent number by the calling party (e.g., a vendor for online shopping, a distributor, etc.) will reveal the called binding agent number and reach the called party (user), who can not see the real number of the called party, but the called party can see the real number of the calling party. In this case, at least the communication privacy of the called party (user) can be protected.
In one embodiment, the bidirectional binding agent number may also be referred to as a transit trombone. For example, a transit trumpet belongs to a pool of regional numbers provided by a communications carrier. The number can be used for temporarily binding a dialing relationship, namely, the number is used as a transfer number of a calling party and a called party, and the two parties can only see that the other party is the temporary transfer number when dialing. In embodiments of the present disclosure, a bi-directional binding agent number may be considered to bind a dialing relationship between a calling party and a called party, i.e., a calling and called party pair. In this case, the privacy of communication of both the calling party and the called party can be protected. In one embodiment, this number has a binding number limit.
In one embodiment, the binding of the called binding agent number to the called party and the binding of the bidirectional binding agent number to the calling party and the called party may be performed simultaneously, or any binding operation may be performed first. That is, the above description of binding the binding agent number to the called party first, and the description of binding the bidirectional binding agent number to the calling party and the called party later does not indicate that the binding operation must have a precedence order.
In one embodiment, calls are preferably initiated through a two-way binding agent number. That is, both the calling party and the called party cannot see the number of the other party in communication but can see only the bidirectional binding agent number. This may allow privacy of both the calling and called parties to be protected.
In the embodiment of the disclosure, a first binding module is configured to bind a called binding agent number to a called party, wherein a called party number acquired by a calling party in communication is the called binding agent number; the second binding module is configured to bind the bidirectional binding agent number to the calling party and the called party, wherein the opposite party number acquired by the calling party and the called party in communication is the bidirectional binding agent number; and the call initiating module is configured to preferentially initiate a call through the bidirectional binding agent number when a calling party initiates a call to a called party, so that number privacy protection can be preferentially provided for the calling party and the called party without being customized in advance. In the embodiment of the disclosure, by binding the called binding agent number and the bidirectional binding agent number, the user information security in communication can be ensured, privacy disputes are avoided, and personal information leakage is prevented.
In one embodiment, the call initiation module 703 is configured to initiate a call to the called party through the called binding agent number when the calling party fails to initiate a call to the called party through the two-way binding agent number.
In one embodiment, calls are initiated preferentially through the two-way binding proxy number, but when initiating a call to the called party through the two-way binding proxy number fails for various reasons, a call may be initiated to the called party through the called binding proxy number. At this time, the calling party can not see the number of the called party but only the called binding agent number, and the called party can see the number of the calling party, so that the privacy of the called party can be ensured. Since in embodiments of the present disclosure, initiating a call through a two-way binding agent number has a higher priority than initiating a call through a called binding agent number, initiating a call by a calling party to a called party over a called binding agent number may also be considered "downgraded" in a sense.
In one embodiment, the called binding agent number (main station small number) does not need to bind the dialing relation between the calling party and the called party, but only performs call forwarding on the called number, and therefore, the availability is very high. In this case, the called binding agent number is used as a downgrade bottom solution for the two-way binding agent number (transit minor) failure in the order. Therefore, the privacy of the real number of the mobile phone of the called party can be firstly ensured, and the normal conversation between the calling party and the called party is ensured.
In an embodiment of the present disclosure, the call initiation module is configured to: when the calling party fails to initiate a call to the called party through the bidirectional binding agent number, the call is initiated to the called party through the called binding agent number, so that number privacy protection can be at least provided for the called party without being customized in advance. In the embodiment of the disclosure, by binding the called binding agent number and the bidirectional binding agent number, the user information security in communication can be ensured, privacy disputes are avoided, and personal information leakage is prevented.
Fig. 8 shows a block diagram of a communication privacy securing apparatus according to another embodiment of the present disclosure. As shown in fig. 8, the apparatus further includes a first binding module 701, a second binding module 702, and a call initiating module 703, which are the same as those in fig. 7, and further includes a first detecting module 801.
The first detection module 801 is configured to detect tasks performed by a calling party on a called party.
In this embodiment, the first binding module 701 is configured to, upon detecting the occurrence of a task performed by the calling party to the called party, bind the called binding agent number to the called party while detecting the occurrence of the task.
In this embodiment, the second binding module 702 is configured to bind the bi-directional binding agent number to the calling party and the called party before detecting the end of the task performed by the calling party on the called party.
In one embodiment, the reason for the strange communication between the calling party and the called party is because the calling party needs to perform a task on the called party. For example, a task may refer to the caller verifying sales information to the called party, the caller shipping the called party, the caller marketing a product to the called party, the caller conducting a telephone survey to the called party, etc. In one embodiment, an event requiring a caller to initiate communication to a called party may be considered a task performed by the caller on the called party.
In one embodiment, whether to privacy protect communications is determined based on a detection of a task performed by a calling party on a called party. That is, in the case where it is detected that there is an event that the calling party initiates communication to the called party, it is necessary to establish privacy protection for the communication between the calling party and the called party. Therefore, the privacy protection can be effectively and pertinently carried out on the calling party and the called party.
In one embodiment, when the occurrence of a task performed by a calling party to a called party is detected, a called binding agent number is bound to the called party at the same time as the occurrence of the task is detected. This binding may be considered a binding that is synchronized with the detection of the task. In this case, since binding the called binding agent number to the called party is a call forwarding, the occupation of the number and communication resources is smaller than that of binding the bidirectional binding agent number to the numbers and communication resources of the calling party and the called party, and thus the called binding agent number can be bound for the called party when detecting the occurrence of the task performed by the calling party to the called party. In this way, communication privacy protection can be provided for the called party by using smaller numbers and communication resources in the whole task process.
In another embodiment, the called binding agent number may be bound to the called party after detecting the occurrence of a task performed by the calling party to the called party, before the task is completed. I.e. binding the called binding agent number to the called party in an asynchronous manner to the task detected.
In one embodiment, binding a bidirectional binding agent number to a calling party and a called party before detecting the end of a task performed by the calling party on the called party is an asynchronous binding to the detection of the task. Since the bidirectional binding agent number is bound to the numbers of the calling party and the called party and the occupation of communication resources is larger than that of the called binding agent number, in order to reduce the occupation time of the numbers and the communication resources, the bidirectional binding agent number is bound to the calling party and the called party after the task executed by the calling party on the called party is detected and before the task is finished. For example, after detecting that a task performed by the calling party on the called party occurs, the bidirectional binding agent number is not bound to the calling party and the called party until the behavior occurs that the calling party dials the called party phone. Therefore, under the condition of protecting the communication privacy of the calling party and the called party, the number and the communication resource are less occupied.
In another embodiment, the bi-directional binding agent number may be bound to the calling party and the called party at the same time as the end of the task performed by the calling party on the called party is detected, which is a binding synchronized with the detection of the occurrence of the task. In this case, the communication privacy protection of the calling party and the called party is the best, but the number and communication resources are more occupied.
In the embodiment of the disclosure, the first detection module is configured to detect a task executed by a called party by a calling party; wherein the first binding module is configured to: when detecting that a task executed by a calling party to a called party occurs, binding a called binding agent number to the called party while detecting that the task occurs; the second binding module is configured to: the bidirectional binding agent number is bound to the calling party and the called party before the completion of the task executed by the calling party on the called party is detected, so that the called binding agent number can be bound to the called party when the task occurs, and the number is bound to the calling party and the called party before the completion of the task, so that the communication privacy protection can be performed on the calling party and the called party as much as possible under the condition that the number and communication resources are less occupied, and at least the communication privacy protection can be performed on the called party.
Fig. 9 shows a block diagram of a communication privacy securing apparatus according to still another embodiment of the present disclosure. As shown in fig. 9, the apparatus includes a second detection module 901 and a unbinding module 902 in addition to the first binding module 701, the second binding module 702, the call initiation module 703 and the first detection module 801 shown in fig. 8.
The second detection module 901 is configured to detect whether a task performed by the calling party on the called party is abnormal.
The unbinding module 902 is configured to unbind the current bidirectional binding agent number and/or the called binding agent number when detecting that the task performed by the calling party on the called party is abnormal.
In one embodiment, the task exception performed by the calling party to the called party is one of task ending, task switching to another calling party for execution, and task timeout. For example, when the task performed by the calling party to the called party is a delivery task, if one of the cases that the delivery task is ended, the calling party (delivery party) becomes another calling party (delivery party), or the delivery task is overtime, etc., the binding of the current bidirectional binding agent number, or the binding of the called binding agent number, or both the binding of the bidirectional binding agent number and the binding of the called binding agent number is released. From another perspective, when a task ends or a task is switched to another caller for execution, the caller and the callee have little possibility to communicate, and thus it is necessary to unbind the numbers. When the task is over, the calling party is likely to have already communicated with the called party, but it is difficult to judge how long it takes for the task to end, and if the number binding is not released, the number and the communication resource are always occupied, and the time limit for releasing the number and the communication resource cannot be determined. Therefore, the number binding is released when the task is overtime, so that the use efficiency of the number and the communication resource is ensured. In one embodiment, when a large number of tasks occur in a short time, that is, a plurality of calling parties perform tasks on a plurality of called parties in a short time, the number and communication resources are in a relatively tight state, and therefore, once a certain task is abnormal, the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number is released for the task, so that the utilization rate of the number and the communication resources can be improved.
In the embodiment of the disclosure, whether the task executed by the calling party to the called party is abnormal is detected; when the abnormal task of the calling party to the called party is detected, the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number are/is released, and the use efficiency of the number and the communication resource can be maximized under the condition that the communication between the calling party and the called party is not influenced as much as possible.
Fig. 10 shows a block diagram of a first binding module 701 in the communication privacy protecting apparatus according to the embodiment of the disclosure shown in fig. 7. As shown in fig. 10, the first binding module 701 includes a first selection submodule 1001 and a first binding submodule 1002.
The first selection submodule 1001 is configured to poll in a pool of called binding agent numbers having a plurality of called binding agent numbers to select an available called binding agent number.
The first binding submodule 1002 is configured to bind the selected available called binding agent number to the called party.
In one embodiment, a called binding agent number pool may be provided that includes a plurality of called binding agent numbers. The called binding agent number pool can be used for binding a plurality of called binding agent numbers to a plurality of called parties, so that communication privacy protection is provided for more called parties, and the use efficiency of the called binding agent numbers is improved.
In one embodiment, the pool of called binding agent numbers may be a pool of regional called binding agent numbers, i.e., one region provides one pool of numbers. In this case, when the task performed by the calling party to the called party is a task having a relatively strong area, such as a delivery task, the use of the regional called binding agent number pool can improve the number and communication resource utilization rate and reduce the communication cost.
Fig. 11 shows a block diagram of a second binding module 702 in the communication privacy protecting apparatus according to the embodiment of the disclosure shown in fig. 7. As shown in fig. 11, the second binding module 702 includes a second selection submodule 1101 and a second binding submodule 1102.
The second selection submodule 1101 is configured to poll a pool of bidirectional binding agent numbers having a plurality of bidirectional binding agent numbers to select an available bidirectional binding agent number.
The second binding submodule 1102 is configured to bind the selected bi-directional binding agent number to the calling party and the called party.
In one embodiment, a pool of bidirectional binding agent numbers may be provided that includes a plurality of bidirectional binding agent numbers. The bidirectional binding agent number pool can be used for binding a plurality of bidirectional binding agent numbers to a plurality of calling party and called party pairs, so that communication privacy protection is provided for more calling party and called party pairs, and the use efficiency of the bidirectional binding agent numbers is improved.
In one embodiment, the pool of bidirectional bound proxy numbers may be a pool of regional called bound proxy numbers, i.e., one region provides one pool of numbers. In this case, when the task performed by the calling party to the called party is a task having a relatively strong area, such as a delivery task, the use of the regional bidirectional binding proxy number pool can improve the number and communication resource utilization rate and reduce the communication cost.
Having described the internal functions and structure of the communication privacy protecting apparatus, in one possible design, the structure of the communication privacy protecting apparatus may be implemented as a communication privacy protecting device, as shown in fig. 12, and the processing device 1200 may include a processor 1201 and a memory 1202.
The memory 1202 is used for storing programs for supporting the communication privacy protecting apparatus to execute the communication privacy protecting method in any one of the above embodiments, and the processor 901 is configured to execute the programs stored in the memory 902.
The memory 1202 is configured to store one or more computer instructions for execution by the processor 1201.
The processor 1201 is configured to perform all or a portion of the method steps described above.
The communication privacy protection device may further include a communication interface in the structure, and the communication privacy protection device is used for communicating with other devices or a communication network.
The exemplary embodiments of the present disclosure also provide a computer storage medium for storing computer software instructions for the communication privacy protection apparatus, which includes a program for executing the communication privacy protection method according to any one of the above embodiments.
Fig. 13 is a schematic structural diagram of a computer system suitable for implementing a communication privacy protection method according to an embodiment of the present disclosure.
As shown in fig. 13, the computer system 1300 includes a Central Processing Unit (CPU)1301 that can execute various processes in the embodiment shown in fig. 1 described above according to a program stored in a Read Only Memory (ROM)1302 or a program loaded from a storage portion 1308 into a Random Access Memory (RAM) 1303. In the RAM1303, various programs and data necessary for the operation of the system 1300 are also stored. The CPU1301, the ROM1302, and the RAM1303 are connected to each other via a bus 1304. An input/output (I/O) interface 1305 is also connected to bus 1304.
The following components are connected to the I/O interface 1305: an input portion 1306 including a keyboard, a mouse, and the like; an output section 1307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 1308 including a hard disk and the like; and a communication section 1309 including a network interface card such as a LAN card, a modem, or the like. The communication section 1309 performs communication processing via a network such as the internet. A drive 1310 is also connected to the I/O interface 1305 as needed. A removable medium 1311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1310 as necessary, so that a computer program read out therefrom is mounted into the storage portion 1308 as necessary.
In particular, according to embodiments of the present disclosure, the method described above with reference to fig. 1 may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a medium readable thereby, the computer program comprising program code for performing the data processing method of fig. 1. In such embodiments, the computer program may be downloaded and installed from a network via communications component 1309 and/or installed from removable media 1311.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowcharts or block diagrams may represent a module, a program segment, or a portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present disclosure may be implemented by software or hardware. The units or modules described may also be provided in a processor, and the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
As another aspect, the present disclosure also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus in the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present disclosure.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is possible without departing from the inventive concept. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.

Claims (18)

1. A method for protecting communication privacy, comprising:
binding the called binding agent number to a called party, wherein the called party number acquired by the calling party in communication is the called binding agent number;
binding the bidirectional binding agent number to a calling party and a called party, wherein the number of the calling party and the called party, which is obtained in the communication, of the opposite party is the bidirectional binding agent number;
when the calling party initiates a call to the called party, the call is initiated through the bidirectional binding agent number preferentially, and then the call is initiated to the called party through the called binding agent number.
2. The method of claim 1, further comprising:
when the calling party fails to initiate the call to the called party through the bidirectional binding agent number, the call is initiated to the called party through the called binding agent number.
3. The method of claim 1, further comprising:
the tasks performed by the calling party on the called party are detected,
wherein, the binding the called binding agent number to the called party comprises:
when detecting the task executed by the calling party to the called party, binding the called binding agent number to the called party while detecting the occurrence of the task.
4. The method of claim 3, wherein binding the bidirectional binding agent number to the calling party and the called party comprises:
binding the bidirectional binding agent number to the calling party and the called party before detecting that the task performed by the calling party on the called party is finished.
5. The method of claim 3 or 4, further comprising:
detecting whether a task executed by a calling party to a called party is abnormal or not;
and when detecting that the task executed by the calling party to the called party is abnormal, removing the binding of the current bidirectional binding agent number and/or the binding of the called binding agent number.
6. The method of claim 5, wherein the exception to the task performed by the calling party to the called party is one of task completion, task transfer to another calling party, and task timeout.
7. The method of claim 1, wherein binding the called binding agent number to the called party comprises:
polling in a pool of called binding agent numbers having a plurality of called binding agent numbers to select an available called binding agent number;
and binding the selected available called binding agent number to the called party.
8. The method of claim 1, wherein binding the bidirectional binding agent number to the calling party and the called party comprises:
polling in a pool of bidirectional binding agent numbers having a plurality of bidirectional binding agent numbers to select an available bidirectional binding agent number;
and binding the selected bidirectional binding agent number to the calling party and the called party.
9. A communication privacy protecting apparatus, comprising:
the first binding module is configured to bind the called binding agent number to the called party, wherein the called binding agent number is the called binding agent number, and the called binding agent number is acquired by the calling party in communication;
the second binding module is configured to bind the bidirectional binding agent number to the calling party and the called party, wherein the opposite party number acquired by the calling party and the called party in communication is the bidirectional binding agent number;
and the call initiating module is configured to initiate a call to the called party through the bidirectional binding agent number preferentially when the calling party initiates the call to the called party, and initiate the call to the called party through the called binding agent number secondly.
10. The apparatus of claim 9, wherein the call initiation module is configured to:
when the calling party fails to initiate the call to the called party through the bidirectional binding agent number, the call is initiated to the called party through the called binding agent number.
11. The apparatus of claim 9, further comprising:
a first detection module configured to detect a task performed by a calling party on a called party,
wherein the first binding module is configured to:
when detecting the task executed by the calling party to the called party, binding the called binding agent number to the called party while detecting the occurrence of the task.
12. The apparatus of claim 11, wherein the second binding module is configured to:
binding the bidirectional binding agent number to the calling party and the called party before detecting that the task performed by the calling party on the called party is finished.
13. The apparatus of claim 11 or 12, further comprising:
the second detection module is configured to detect whether the task executed by the calling party on the called party is abnormal;
and the unbinding module is configured to unbind the current bidirectional binding agent number and/or the called binding agent number when detecting that the task executed by the calling party on the called party is abnormal.
14. The apparatus of claim 13, wherein the exception to the task performed by the calling party to the called party is one of task completion, task transfer to another calling party, and task timeout.
15. The apparatus of claim 9, wherein the first binding module comprises:
a first selection submodule configured to poll in a pool of called binding agent numbers having a plurality of called binding agent numbers to select an available called binding agent number;
a first binding submodule configured to bind the selected available called binding agent number to the called party.
16. The apparatus of claim 9, wherein the second binding module comprises:
a second selection submodule configured to poll in a pool of bidirectional binding agent numbers having a plurality of bidirectional binding agent numbers to select an available bidirectional binding agent number;
a second binding submodule configured to bind the selected bidirectional binding agent number to the calling party and the called party.
17. An electronic device comprising a memory and a processor; wherein the memory is to store one or more computer instructions, wherein the one or more computer instructions are to be executed by the processor to implement the method of any one of claims 1-8.
18. A computer-readable storage medium having computer instructions stored thereon, wherein the computer instructions, when executed by a processor, implement the method of any one of claims 1-8.
CN201810523760.9A 2018-05-28 2018-05-28 Communication privacy protection method, device, equipment and computer readable storage medium Active CN110545360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810523760.9A CN110545360B (en) 2018-05-28 2018-05-28 Communication privacy protection method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810523760.9A CN110545360B (en) 2018-05-28 2018-05-28 Communication privacy protection method, device, equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110545360A CN110545360A (en) 2019-12-06
CN110545360B true CN110545360B (en) 2021-06-08

Family

ID=68700721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810523760.9A Active CN110545360B (en) 2018-05-28 2018-05-28 Communication privacy protection method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110545360B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1568088A (en) * 2003-06-26 2005-01-19 华为技术有限公司 A qualification method for composite virtual number call proceeding
CN101159778A (en) * 2007-09-10 2008-04-09 汤淼 System for multimedia communication based on virtual number
CN101175236A (en) * 2007-07-27 2008-05-07 中国移动通信集团福建有限公司 Mobile phone virtual number use method and device
WO2012007018A1 (en) * 2010-07-12 2012-01-19 Telefonaktiebolagt L M Ericsson (Publ) Enhanced privacy protection in a telecommunication network
CN105472181A (en) * 2016-01-20 2016-04-06 上海携程商务有限公司 Call forwarding system and method
CN106161807A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 Communication means and server
CN106231143A (en) * 2016-08-12 2016-12-14 北京东方车云信息技术有限公司 A kind of virtual-number binding method and system
CN106302927A (en) * 2016-08-23 2017-01-04 中邮科通信技术股份有限公司 The voice call platform that two-way number is hidden
CN106488048A (en) * 2015-08-28 2017-03-08 中兴通讯股份有限公司 A kind of processing method and processing device of virtual-number
CN107181816A (en) * 2017-06-15 2017-09-19 北京京东尚科信息技术有限公司 Communication service platform, communication service system, communication means and communicator
CN107333013A (en) * 2017-06-30 2017-11-07 北京金山安全软件有限公司 Session establishing method, device, electronic equipment and storage medium
CN107580151A (en) * 2017-09-14 2018-01-12 北京行圆汽车信息技术有限公司 The distribution method and device of virtual-number
CN107749930A (en) * 2017-09-28 2018-03-02 链家网(北京)科技有限公司 It is the call processing method and server that main called party binds virtual-number respectively
CN107809749A (en) * 2017-10-27 2018-03-16 中国—东盟信息港股份有限公司 A kind of guard method of cell-phone number security privacy and platform based on mobile Internet
CN107851267A (en) * 2015-10-07 2018-03-27 谷歌有限责任公司 System and method for carrying out the synchronous data related to audio call via the virtual phone number of dynamically distributes

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1568088A (en) * 2003-06-26 2005-01-19 华为技术有限公司 A qualification method for composite virtual number call proceeding
CN101175236A (en) * 2007-07-27 2008-05-07 中国移动通信集团福建有限公司 Mobile phone virtual number use method and device
CN101159778A (en) * 2007-09-10 2008-04-09 汤淼 System for multimedia communication based on virtual number
WO2012007018A1 (en) * 2010-07-12 2012-01-19 Telefonaktiebolagt L M Ericsson (Publ) Enhanced privacy protection in a telecommunication network
CN106161807A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 Communication means and server
CN106488048A (en) * 2015-08-28 2017-03-08 中兴通讯股份有限公司 A kind of processing method and processing device of virtual-number
CN107851267A (en) * 2015-10-07 2018-03-27 谷歌有限责任公司 System and method for carrying out the synchronous data related to audio call via the virtual phone number of dynamically distributes
CN105472181A (en) * 2016-01-20 2016-04-06 上海携程商务有限公司 Call forwarding system and method
CN106231143A (en) * 2016-08-12 2016-12-14 北京东方车云信息技术有限公司 A kind of virtual-number binding method and system
CN106302927A (en) * 2016-08-23 2017-01-04 中邮科通信技术股份有限公司 The voice call platform that two-way number is hidden
CN107181816A (en) * 2017-06-15 2017-09-19 北京京东尚科信息技术有限公司 Communication service platform, communication service system, communication means and communicator
CN107333013A (en) * 2017-06-30 2017-11-07 北京金山安全软件有限公司 Session establishing method, device, electronic equipment and storage medium
CN107580151A (en) * 2017-09-14 2018-01-12 北京行圆汽车信息技术有限公司 The distribution method and device of virtual-number
CN107749930A (en) * 2017-09-28 2018-03-02 链家网(北京)科技有限公司 It is the call processing method and server that main called party binds virtual-number respectively
CN107809749A (en) * 2017-10-27 2018-03-16 中国—东盟信息港股份有限公司 A kind of guard method of cell-phone number security privacy and platform based on mobile Internet

Also Published As

Publication number Publication date
CN110545360A (en) 2019-12-06

Similar Documents

Publication Publication Date Title
CN105227786B (en) A kind of means of communication and device based on virtual-number
CN112199382B (en) Method for creating node group and transaction based on node group in alliance chain network
CN107682576B (en) Customer incoming line distribution method, system, computer equipment and storage medium
CN102136967B (en) Method, device and system for managing service state
US20160301663A1 (en) Communication method and server
US10623560B2 (en) Method and server for securing communication number
CN110113498A (en) Two-way number guard method and device
CN105007319A (en) Information transmitting method, device and system
CN111010527B (en) Method and related device for establishing video call through short message link
CN109819023B (en) Distributed transaction processing method and related product
CN112040071B (en) Number protection method, device and system and number calling method and device
US10033858B2 (en) Method and server for securing communication number
US20170289354A1 (en) System and Method for Allocation And Management Of Shared Virtual Numbers
CN111291396B (en) Form data processing method and device, electronic equipment and storage medium
CN108632327A (en) Method for processing business, device and storage medium
CN111478974A (en) Network connection method and device, electronic equipment and readable storage medium
CN105744514B (en) A kind of method and device carrying out terminal room communication
CN112416616B (en) Micro-service calling method and device, electronic equipment and storage medium
CN110545360B (en) Communication privacy protection method, device, equipment and computer readable storage medium
CN112905486A (en) Service integration test method, device and system
CN110378494B (en) Remote facing slip method, remote facing slip device, storage medium and computer equipment
CN103607324B (en) Data processing method for Java message service, Java message client and server
CN105228139A (en) A kind of call processing method based on smart machine, device and equipment
CN111367590A (en) Interrupt event processing method and device
CN113766437B (en) Short message sending method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant