CN110868500A - Call communication method, device, computer equipment and storage medium - Google Patents

Call communication method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110868500A
CN110868500A CN201910969510.2A CN201910969510A CN110868500A CN 110868500 A CN110868500 A CN 110868500A CN 201910969510 A CN201910969510 A CN 201910969510A CN 110868500 A CN110868500 A CN 110868500A
Authority
CN
China
Prior art keywords
identifier
call
identification
calling
passive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910969510.2A
Other languages
Chinese (zh)
Other versions
CN110868500B (en
Inventor
彭铁磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN201910969510.2A priority Critical patent/CN110868500B/en
Publication of CN110868500A publication Critical patent/CN110868500A/en
Application granted granted Critical
Publication of CN110868500B publication Critical patent/CN110868500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2272Subscriber line supervision circuits, e.g. call detection circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a call communication method, a device, computer equipment and a storage medium, wherein the call communication method comprises the following steps: acquiring a call communication request sent by a call terminal; inquiring a virtual number library corresponding to the scene identification according to the passive calling identification, and if the using state of the virtual identification to be used is a starting state, calling a third party blacklist interface to carry out risk detection on the active outbound identification to obtain a risk detection result; if the risk detection result is successful, selecting one of the virtual identifiers to be used with the starting state as a target outbound identifier, and establishing communication connection according to the target outbound identifier and the passive calling identifier; the method effectively solves the problem of missed emergency calls and improves the number call completing rate.

Description

Call communication method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of artificial intelligence technologies, and in particular, to a call communication method, apparatus, computer device, and storage medium.
Background
At present, telephone sales promotion services are increasingly popularized, and frequent dialing of customer calls by a waiter leads to rejection or shielding of strange calls as harassing calls by customers, so that the condition of missed emergency calls is inevitable. For example, in some parking lots or temporary parking areas, partially parked vehicles often cause the problem that other vehicles are difficult to enter and exit, most vehicle owners can place contact ways or vehicle moving codes on the vehicles so as to contact the vehicle owners to move the vehicles when the vehicles need to move, but some operators can frequently dial the telephone of the vehicle owners through the contact ways or the vehicle moving codes reserved by the vehicle owners, so that the vehicle owners can easily reject or shield strange calls as harassing calls when receiving strange calls.
Disclosure of Invention
The embodiment of the invention provides a call communication method, a call communication device, computer equipment and a storage medium, which are used for solving the problem that the conventional user easily rejects or shields an unfamiliar incoming call as a harassing call to cause the condition of missing an emergency call.
A call communication method, comprising:
acquiring a call communication request sent by a call terminal, wherein the call communication request comprises an active outbound identifier, a passive call identifier and a scene identifier;
inquiring a virtual number library corresponding to a scene identifier according to a passive calling identifier, acquiring a use state of a virtual identifier to be used corresponding to the passive calling identifier, and if the use state of the virtual identifier to be used is a starting state, calling a third party blacklist interface to carry out risk detection on the active outbound identifier to acquire a risk detection result;
if the risk detection result is successful, selecting one of the virtual identifiers to be used with the use state being the starting state as a target outbound identifier, and establishing communication connection according to the target outbound identifier and the passive calling identifier;
and inquiring a number mark library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification, and displaying the scene remark information on a called terminal corresponding to the passive calling identification.
A call communication device, comprising:
the call communication request acquisition module is used for acquiring a call communication request sent by a call terminal, wherein the call communication request comprises an active outbound identifier, a passive call identifier and a scene identifier;
the risk detection result acquisition module is used for inquiring a virtual number library corresponding to the scene identification according to the passive calling identification, acquiring the use state of the virtual identification to be used corresponding to the passive calling identification, and calling a third-party blacklist interface to carry out risk detection on the active outbound identification if the use state of the virtual identification to be used is a starting state, so as to acquire a risk detection result;
a communication connection establishing module, configured to select one of the to-be-used virtual identifiers in the use state as a start state as a target outbound identifier if the risk detection result is that the detection is successful, and establish a communication connection according to the target outbound identifier and the passive call identifier;
and the scene remark information acquisition module is used for inquiring a number marking library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification and displaying the scene remark information on a called terminal corresponding to the passive calling identification.
A computer device comprising a memory, a processor and a computer program stored in said memory and executable on said processor, said processor implementing the steps of the above-mentioned call communication method when executing said computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned call communication method.
In the call communication method, the call communication device, the computer equipment and the storage medium, the call communication request sent by the call terminal is acquired so as to inquire the virtual number library corresponding to the scene identifier according to the passive call identifier in the call communication request, the using state of the virtual identifier to be used corresponding to the passive call identifier is acquired, if the using state of the virtual identifier to be used is a forbidden state, the server defaults that the current communication is forbidden, and the result of call communication failure is directly returned, so that the data processing time is reduced, and the call communication efficiency is improved. If the using state of the virtual identification to be used is the starting state, calling a third-party blacklist interface to carry out risk detection on the active outbound identification, obtaining a risk detection result, if the risk detection result is successful, selecting one of the virtual identifications to be used with the using state as the starting state as a target outbound identification, and establishing communication connection according to the target outbound identification and the passive call identification so as to achieve the purpose of party harassment. And finally, inquiring a number mark library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification, and displaying the scene remark information on a called terminal corresponding to the passive calling identification, so that a called user can know the purpose or items of a current strange call, the condition of missing an emergency call is effectively solved, and the number call completing rate is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a diagram of an application environment of a call communication method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method of call communication in accordance with an embodiment of the present invention;
FIG. 3 is a flow chart of a method of call communication in accordance with an embodiment of the present invention;
FIG. 4 is a detailed flowchart of step S112 in FIG. 3;
FIG. 5 is a flow chart of a method of call communication in accordance with one embodiment of the present invention;
FIG. 6 is a flow chart of a method of call communication in accordance with one embodiment of the present invention;
FIG. 7 is a flow chart of a method of call communication in accordance with one embodiment of the present invention;
FIG. 8 is a flow chart of a method of call communication in accordance with one embodiment of the present invention;
FIG. 9 is a schematic diagram of a calling communication device in accordance with an embodiment of the present invention;
FIG. 10 is a schematic diagram of a computer device according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The call communication method provided by the embodiment of the invention can be applied to a call communication system and is used for carrying out scene marking on the passive call identifier, namely marking telephone items, so that other users cannot be rejected or shielded as strange calls when calling the passive call identifier, and the number call completing rate is improved. The call communication method can be applied in an application environment as shown in fig. 1, in which a computer device communicates with a server through a network. The computer device may be, but is not limited to, various personal computers, laptops, smartphones, tablets, and portable wearable devices. The server may be implemented as a stand-alone server.
In one embodiment, as shown in fig. 2, a call communication method is provided, which is described by taking the server in fig. 1 as an example, and includes the following steps:
s10: the method comprises the steps of obtaining a call communication request sent by a call terminal, wherein the call communication request comprises an active outbound identifier, a passive call identifier and a scene identifier.
Wherein the call communication request is a request for making an automatic outbound call. Illustratively, the call outgoing request may be a call communication request acquired by the calling terminal scanning a specific two-dimensional code. The calling terminal refers to a user terminal which actively performs calling communication. The active outbound identification is a communication identification corresponding to the calling terminal, specifically a telephone number corresponding to the calling terminal. The passive call identifier is a communication identifier corresponding to a called user terminal (i.e., a called terminal), and specifically, is a telephone number corresponding to the called terminal. The called terminal is a called user terminal. The scene identification is a unique identification used for identifying different scene types, such as a vehicle moving scene, an express delivery scene, a take-away scene or a taxi taking scene.
Specifically, in the case that a user needs to perform number marking (e.g., temporary parking), the user can enter the number marking system and provide the passive calling identification and the license plate number to the system, so that the server binds the passive calling identification and the license plate number. In addition, the user needs to determine the scene type, such as moving the vehicle, so that the server obtains the number marking request sent by the client. Understandably, if in a vehicle moving scene, the call-out request can input the license plate number in the calling terminal for calling so as to obtain the call communication request sent by the calling terminal.
S20: inquiring a virtual number library corresponding to a scene identifier according to a passive calling identifier, acquiring the use state of a virtual identifier to be used corresponding to the passive calling identifier, and calling a third party blacklist interface to carry out risk detection on the active outbound identifier if the use state of the virtual identifier to be used is a starting state, so as to acquire a risk detection result.
The virtual number library is a database for storing virtual numbers corresponding to the scene identifiers. The virtual number library is stored with passive calling identification and at least one corresponding virtual identification to be used in a correlated manner. The virtual identifier to be used refers to a virtual number that is applied by a user in advance by calling a communication system. Understandably, each passive calling identification is uniquely corresponding to a user, and each user can apply at least one virtual number as a virtual identification to be used through a calling communication system. The third party blacklist interface is a pre-configured interface for detecting whether the active outbound identification exists in a currently open number blacklist. The risk detection result refers to the detection result of whether the active outbound call identification is a harassing call or a promotional call.
Different scenes correspond to different virtual number libraries, and the corresponding relation is established through scene identification. The virtual number library comprises a passive calling identifier and at least one corresponding to-be-used virtual identifier. Specifically, the server queries a virtual number library corresponding to the scene identifier according to the passive calling identifier, determines whether the use state of at least one to-be-used virtual identifier corresponding to the passive calling identifier is a start state, if the use state of the to-be-used virtual identifier is the start state, proves that the to-be-used virtual identifier corresponding to the passive calling identifier is available, and then invokes a third-party blacklist interface to perform risk detection on the active outbound identifier to obtain a risk detection result, so as to preliminarily detect whether the active calling identifier has a risk of telephone harassment. If the use states of at least one virtual identifier to be used are closed states, the virtual identifier to be used corresponding to the passive calling identifier is proved to be unavailable, and the server does not perform subsequent steps, so that the data processing time is reduced, and the calling communication efficiency is improved.
S30: and if the risk detection result is successful, selecting one of the virtual identifiers to be used with the use state as the starting state as a target outbound identifier, and establishing communication connection according to the target outbound identifier and the passive calling identifier.
Specifically, if the risk detection result is successful, it is proved that the active outbound identification has no risk of harassing call, one of the virtual identifications to be used, whose use state is the starting state, is selected as the target outbound identification, and a communication connection is established according to the target outbound identification and the passive call identification, so as to achieve the purpose of harassment prevention.
S40: and inquiring a number mark library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification, and displaying the scene remark information on a called terminal corresponding to the passive calling identification.
The number marking library is a database for storing the virtual identification to be used and scene remark information associated with the virtual identification to be used. The scene remark information is remark information corresponding to the scene identifier and is used for carrying out number identification on the virtual identifier to be used, such as moving vehicles, taking out, drivers or express delivery and the like. Specifically, the server queries a number tag library based on the target outbound identification to acquire scene remark information corresponding to the target outbound identification so as to display the scene remark information on a called terminal corresponding to the passive calling identification, so that a called user can know the purpose or items of a current strange incoming call, the situation of missed emergency calls is effectively solved, and the number call completing rate is improved.
In this embodiment, a call communication request sent by a call terminal is acquired, so that a virtual number library corresponding to a scene identifier is queried according to a passive call identifier in the call communication request, and a use state of a virtual identifier to be used corresponding to the passive call identifier is acquired. If the using state of the virtual identification to be used is the starting state, calling a third-party blacklist interface to carry out risk detection on the active outbound identification, obtaining a risk detection result, if the risk detection result is successful, selecting one of the virtual identifications to be used with the using state as the starting state as a target outbound identification, and establishing communication connection according to the target outbound identification and the passive call identification so as to achieve the purpose of party harassment. And finally, inquiring a number mark library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification, and displaying the scene remark information on a called terminal corresponding to the passive calling identification, so that a called user can know the purpose or items of a current strange call, the condition of missing an emergency call is effectively solved, and the number call completing rate is improved.
In one embodiment, as shown in fig. 3, before step 10, the call communication method further includes the following steps:
s111: and acquiring a number marking request, wherein the number marking request comprises a passive calling identifier and a corresponding scene identifier.
The number identification request is a request for triggering the server to perform number marking. Specifically, the user may select a scene type (the scene type corresponds to a scene identifier) that needs to be number-marked in the call communication system, and at the same time, the user needs to enter a passive call identifier, that is, a phone number of the user, so that the server obtains a number marking request.
S112: and calling a number detection interface to verify the passive calling identifier and acquiring a verification result.
The number detection interface is a pre-configured interface used for verifying whether the passive calling identifier is real and valid. The verification result refers to a verification result of whether the passive calling identifier is true and valid. Specifically, the passive calling identifier is verified by calling a number detection interface, and a verification result is obtained, so that the purpose of automatically verifying whether the passive calling identifier is real and effective is achieved, and meanwhile, the condition that whether the user inputs the passive calling identifier and makes mistakes is verified.
S113: and if the verification result is that the verification is passed, randomly selecting at least one virtual identifier from the preset virtual identifiers as the virtual identifier to be used, and storing the virtual identifier to be used and the passive calling identifier in a correlation manner.
The preset virtual identification is an available virtual number which is applied by the calling communication system from an operator in advance. Specifically, if the verification result is that the verification is passed, it is proved that the passive calling identifier corresponding to the user is real and effective, and the server displays the preset virtual identifier, which is stored in advance in the system and in an unallocated state, to the user, so that the user can select at least one of the preset virtual identifiers as the virtual identifier to be used. Understandably, the system can also randomly select at least one virtual identifier to be used from the preset virtual identifiers automatically without manual operation of a user. Specifically, after the server acquires the virtual identifier to be used, the virtual identifier to be used and the passive calling identifier are stored in an associated manner, so that when other subsequent users call a target user, the virtual identifier to be used can be directly mapped to the passive calling identifier according to the virtual identifier to be used, communication between the two is established, the purpose of not displaying the passive calling identifier can be achieved, and privacy information of the user is protected from being leaked. Understandably, the virtual number is a virtual number which cannot be called even if other users know the virtual identifier to be used, and the safety of user information can be ensured by setting the virtual number.
Understandably, the use states corresponding to the preset virtual identifiers comprise an allocated state and an unallocated state. The using state corresponding to the virtual identifier to be used comprises a closing state and a starting state.
S114: and calling a number marking interface to mark the scene of the virtual identifier to be used based on the scene identifier.
The number marking interface is an interface of number marking provided by a mobile phone manufacturer and used for marking the number according to the target outbound identification and the scene remark information corresponding to the scene identification. Specifically, the virtual identification to be used and the scene remark information are sent to the number marking interface, so that the number marking interface marks the virtual identification to be used based on the scene remark information corresponding to the scene identification, and other users can display the scene remark information corresponding to the scene identification at the called terminal when calling the target user, so that the target user can know the purpose of communicating strange calls, the communicating strange calls cannot be rejected or shielded as harassing calls, the call completing rate is improved, and the target user can be contacted in time in an emergency. Understandably, the number marking interface can add the target outbound identification and the scene remark information into an address book of a mobile phone system so as to display the marked scene remark information when other users dial the passive calling identification, for example, if the Huashi or millet mobile phone inputs 955xx (namely the target outbound identification), the marked scene remark information can be displayed as a safe moving vehicle hotline (namely the scene remark information) so as to improve the call completing rate.
Further, the server can also prompt whether the user needs to convert the virtual identification to be used into the two-dimensional code, and the user can select according to scene needs, for example, under a vehicle moving scene, the user can print the generated two-dimensional code and paste the two-dimensional code on a vehicle body, so that vehicle moving contact is facilitated, and personal contact information of the user cannot be revealed. Specifically, if the user needs to convert the two-dimensional code, the server may call the two-dimensional code interface to convert the virtual identifier to be used, and obtain the two-dimensional code corresponding to the virtual identifier to be used, so that the mobile terminal may quickly scan the two-dimensional code to perform call communication. The two-dimension code generation interface is an open source interface and can be directly called without repeated development. Because the two-dimensional code can express more information in a smaller area, the two-dimensional code is high in safety, and the target outbound identification can be more safely and conveniently accessed. In the embodiment, the target outbound identification is converted into the two-dimensional code, so that harassing calls such as advertisement calls and marketing calls can be effectively avoided, the privacy of the user is protected from being revealed, and the safety of the system is improved.
In this embodiment, the passive calling identifier in the number marking request is subjected to number verification by obtaining the number marking request, and a verification result is obtained to ensure the accuracy and validity of the passive calling identifier. And then, checking the verification result, if the verification result is that the verification is passed, randomly selecting one of the preset virtual identifiers as a virtual identifier to be used, and storing the virtual identifier to be used and the passive calling identifier in a correlation manner, so that when other subsequent users call the target user, communication connection can be established directly from the virtual identifier to be used to the passive calling identifier, and the purposes of not displaying the passive calling identifier and protecting the privacy information of the user from being leaked are achieved. And then, the virtual identification to be used and the corresponding scene remark information are sent to a number marking interface for marking, so that a target user can know the purpose of the unfamiliar incoming call, the unfamiliar incoming call is not rejected or shielded as a harassing call, the call completing rate is improved, and the target user can be contacted in time in an emergency.
In an embodiment, as shown in fig. 4, in step S112, that is, the number detection interface is called to verify the passive call identifier, and the verification result is obtained, which specifically includes the following steps:
s1121: the method comprises the steps of obtaining a first verification code generated based on a random number generation function, sending the first verification code to a called terminal corresponding to a passive calling identifier, and displaying an information filling area in the called terminal.
Wherein the random number generation function is a function for randomly generating numbers. The information filling area is an area for filling the first authentication code. Specifically, the server may pre-configure the number of bits of the required first verification code in order to generate the first verification code based on a random number generation function, for example: the first verification code is obtained by randomly combining the numbers 0-9, and the value of N is pre-configured by the user, which is not limited herein. The first verification code is generated by the server based on a random number generation function. Specifically, the server obtains a first verification code generated based on a random number generation function, and sends the first verification code to a called terminal corresponding to the passive calling identifier, at this time, an information filling area is displayed in the called terminal, so that a user fills the first verification code received by the called terminal into the information filling area, and the authenticity and the validity of the passive calling identifier provided by the user can be detected subsequently.
S1122: and if the information filling area is not empty within the first preset time, acquiring a second verification code fed back by the called terminal, and if the first verification code and the second verification code are successfully compared, acquiring a verification result passing the verification.
The first preset duration is effective duration of the first verification code, and understandably, if the server does not receive the first verification code within the first preset duration, the first verification code will be out of order due to timeout, and the user needs to acquire the first verification code again for verification to ensure the security of the verification process, and can check whether the number marking request is triggered by a real user corresponding to the passive calling identifier or whether the passive calling identifier is in a normal state to ensure the authenticity and validity of the passive calling identifier. Specifically, if the information filling area is not empty within the first preset time duration, that is, the server receives the verification code (i.e., the second verification code) filled by the user within the first preset time duration, the first verification code and the second verification code are compared, and if the first verification code and the first verification code are completely consistent, a verification result that the verification is passed is obtained.
S1123: and if the comparison between the first verification code and the second verification code fails or the information filling area is empty within a first preset time, obtaining a verification result that the verification fails.
Specifically, if the first verification code and the second verification code fail to be compared, a verification result that the verification fails is obtained; or, if the information filling area is empty within the preset time duration, that is, the server does not receive the first verification code within the preset time duration, the verification result that the verification fails is obtained, the user needs to check whether the filled passive calling identifier or the first verification code is accurate again, and provide the passive calling identifier or obtain the first verification code again for verification, so as to verify whether the number filled by the current user is accurate, that is, to ensure the authenticity and validity of the passive calling identifier.
In this embodiment, a first verification code generated based on a random number generation function is acquired, the first verification code is sent to a called terminal corresponding to a passive calling identifier, an information filling area is displayed in the called terminal, then, whether the information filling area is empty within a preset time duration is judged, if not, a comparison result between the first verification code and a second verification code is judged, so that authenticity and validity of the passive calling identifier are guaranteed, and the situation that the passive calling identifier is filled incorrectly or is not the person is avoided.
In an embodiment, the scenario identifier includes a vehicle moving scenario, as shown in fig. 5, before step S10, the call communication method further includes the following steps:
s121: and receiving GPS navigation data sent by the vehicle-mounted terminal corresponding to the passive calling identifier in real time, wherein the GPS navigation data comprises the moving speed.
S122: and if the moving speed in the second preset time length is not greater than the preset speed threshold, the called terminal is in a non-driving state currently, prompt information is generated, and the prompt information is sent to the called terminal corresponding to the passive calling identifier.
The vehicle-mounted terminal is front-end equipment of a vehicle monitoring management system connected with the called terminal. Specifically, when the server receives a number marking request sent by the user terminal, an authorization interface is popped up so that the user can determine whether to allow reading of the GPS navigation data. If the user selects permission, the server can read the GPS navigation data of the user terminal corresponding to the passive calling identifier, the GPS navigation data comprises the moving speed, and the current driving state of the vehicle can be known by judging the moving speed in the GPS navigation data. The second preset time is used for judging whether the user parks or not, interference of factors such as braking and the like can be eliminated by setting the second preset time, and the accuracy of estimating whether the current driving state of the vehicle is a non-driving state (the current driving state of the vehicle can be understood as a parking state) is ensured. The preset speed threshold is a threshold for determining whether the user is in a driving state. The current driving state of the vehicle refers to the current motion state of the user. The current running state of the vehicle includes a running state and a non-running state. Understandably, if the moving speed is greater than the preset speed threshold, acquiring that the current running state of the vehicle is the running state, namely the current state of driving the vehicle by the user; if the moving speed is not greater than the preset speed threshold value, the current driving state of the vehicle is acquired as a non-driving state, namely a parking state, a prompt message is generated and sent to the called terminal, whether the user needs to start the virtual identification to be used is prompted, the strange incoming call is allowed, the user does not need to manually change the using state of the virtual identification to be used, and the purpose of automatically detecting and updating the using state of the virtual identification to be used is achieved.
S123: and receiving a state updating instruction fed back by the called terminal based on the prompt information, and updating the use state corresponding to the virtual identifier to be used into a starting state if the state updating instruction is started.
The state updating instruction is used for updating the using state of the virtual identifier to be used. Specifically, the user can select based on the prompt information, so that the server receives a state updating instruction fed back by the called terminal based on the prompt information, and if the user selects "start", that is, the state updating instruction is started, the server will randomly update the use state corresponding to the virtual identifier to be used to the start state, thereby achieving the purpose of automatically detecting and updating the use state of the virtual identifier to be used. Further, the user can close the using state of the virtual identification to be used when the user does not need to remind to move the vehicle, and the called terminal cannot receive a calling communication request sent by the active calling terminal so as to prevent strange incoming call harassment.
In the embodiment, the current running state of the vehicle is automatically detected to judge that the current running state of the vehicle is the parking state, so that the aim of reminding a vehicle owner of paying attention to the vehicle moving item is fulfilled, the use state corresponding to the target outbound identification does not need to be manually updated by a user, and the time is saved.
In one embodiment, as shown in fig. 6, after step S30, the call communication method further includes the following steps:
s311: and establishing communication connection according to the target outbound identification and the passive calling identification, and acquiring a communication connection result.
S312: and if the communication connection result is that the connection fails and the communication connection times do not reach the preset connection times, establishing communication connection according to the target outbound identification and the passive calling identification according to the preset outbound interval, and acquiring the communication connection result.
The preset connection times are preset times for limiting the number of times that a user sends a call communication request, and the number of times that part of marketing personnel frequently send the call communication request is limited by setting the preset connection times, so that the purpose of preventing harassment is achieved. The preset outbound interval is the preset outbound interval time for automatically outbound each time so as to ensure that the user can know in time. Understandably, the preset connection times are not set too much, so as to save the outbound cost and have the effect of preventing harassment.
Specifically, taking a vehicle moving scene as an example, the server monitors each communication connection, that is, whether each communication connection is successful or not, so as to obtain a communication connection result, if the communication connection result is a connection failure and the communication connection frequency does not reach the preset connection frequency, it is proved that a vehicle owner does not timely put through a vehicle moving telephone, the server automatically calls out the passive calling identifier according to the preset time interval, a user does not need to scan the code again for calling, and the calling communication efficiency is improved. Further, after the call is put through by the owner of the vehicle, if the call is found to be a crank call, the outbound number can be marked as a crank call, so that the server uploads the active outbound identification to a blacklist, and the call communication request sent by the server cannot be responded subsequently.
In the embodiment, each communication connection is monitored to obtain a communication connection result, if the communication connection result is connection failure and the communication connection frequency does not reach the preset connection frequency, the passive calling identifier is automatically called outwards according to the preset outgoing interval, a user does not need to scan the code again to call, and the calling communication efficiency is improved.
In an embodiment, as shown in fig. 7, after step S312, the call communication method further includes the following steps:
s51: and if the communication connection result is that the connection fails and the communication connection times reach the preset connection times, acquiring GPS positioning data of the calling terminal corresponding to the active outbound identification.
The GPS positioning data refers to positioning data of the calling terminal corresponding to the active outbound identification. Specifically, if the communication connection result is a connection failure and the communication connection frequency reaches the preset connection frequency, that is, the communication connection result of each communication connection within the preset connection frequency is a connection failure, the server may obtain the GPS positioning data of the calling terminal corresponding to the active outbound identifier to ensure that the user can contact the target user in time, and provide a data source for subsequently obtaining the information to be sent.
S52: and calling an information sending template prestored in the database, wherein the information sending template comprises a user information field to be filled and a positioning field to be filled.
The information sending template is a template which is created in advance and used for automatically generating information to be sent. The information to be sent is information which is sent to the called terminal and used for reminding the user of knowing the incoming call items in time. The information sending template comprises a user information field to be filled and a positioning field to be filled. The user information field to be filled is a field for filling user information. The to-be-filled positioning field is a field for filling GPS positioning data.
S53: and inquiring a user database based on the passive calling identifier to acquire user information corresponding to the passive calling identifier.
S54: and mapping the user information and the GPS positioning data into a user information field to be filled and a positioning field to be filled correspondingly, acquiring information to be sent, and sending the information to be sent to a called terminal corresponding to the passive calling identifier.
The user database is used for storing the user information corresponding to each passive outbound identification in an associated manner. The user information includes, but is not limited to, a user name and a user surname. Specifically, the server queries the user database based on the passive call identifier to obtain user information corresponding to the passive call identifier, so as to map the user information and the GPS positioning data into the user information field to be filled and the positioning field to be filled, that is, map the user information into the user information field to be filled, map the user information and the GPS positioning data into the positioning field to be filled, and obtain information to be sent, for example, the information to be sent may be "honored mr. XXX/lady (user information field to be filled), you are good, you are parked in a vehicle of XXX (positioning field to be filled), the license plate number is XXX (user information field to be filled), other vehicle owners have been affected to go out, please go to the vehicle as soon as possible, thank you! Further, in order to prevent the user information from being leaked, the full name of the user is not displayed in the information to be sent, and only the family name and the gender (such as mr. zhang/ms) are displayed. It should be noted that, if the vehicle moving scene is adopted, the call communication request may further include the license plate number, so that the license plate number is automatically filled into the user information field to be filled in the information sending template, and the user does not need to manually edit the information to be sent, thereby saving time.
In the embodiment, the information sending template is adopted to automatically generate the sending information by taking the communication connection result as the connection failure and taking the communication connection times as the preset connection times, so that manual editing by a user is not needed, and the generation efficiency of the information to be sent is improved. And then, the information to be sent is sent to the called terminal corresponding to the passive calling identifier, so that the condition that the target user cannot know the purpose of the strange call in time due to the fact that the strange call cannot be connected by objective factors is guaranteed.
In one embodiment, as shown in fig. 8, before step S40, the call communication method further includes the following steps:
s61: and counting the number of outbound times to be detected of the call communication request sent by the call terminal corresponding to the active outbound identification within the preset time.
The preset time is preset time for detecting whether the outgoing call number is a harassing call, for example, 24 h. The outbound frequency to be detected is the outbound frequency used for judging whether the outbound number is a crank call. Specifically, in order to reduce disturbance of code scanning calling of part of marketing personnel, the server records each outbound number, and counts the number of outbound times to be detected corresponding to each outbound number within preset time so as to obtain the number of outbound times to be detected.
S62: and if the request times are not more than the preset request times, executing the step of establishing communication connection according to the target outbound identification and the passive calling identification.
S63: and if the number of outbound times to be detected is greater than the preset request number, storing the active outbound identification into a blacklist.
The preset request times are preset and used for judging whether the outbound number is a harassing call time, specifically, if the outbound number to be detected is not more than the preset times, the risk that the outbound number is a harassing call is proved to be low, and the step of establishing communication connection based on the passive call identifier and the outbound number can be executed. If the number of outbound calls to be detected is greater than the preset number, the risk that the outbound number is a harassment call is proved to be higher, the server shields the outbound number and stores the active outbound identification into a blacklist, namely, the step of establishing communication connection based on the passive call identification and the outbound number cannot be executed, so that the risk of harassment calls is further reduced, and the purpose of harassment prevention is achieved.
In this embodiment, the number of outbound calls to be detected is set, so that whether the outbound number has a risk of harassing calls is determined by the number of outbound calls to be detected, and the purpose of harassment prevention is further achieved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In one embodiment, a calling communication device is provided, which corresponds to the calling communication method in the above embodiments one to one. As shown in fig. 9, the call communication apparatus includes a call communication request acquisition module 10, a risk detection result acquisition module 20, a communication connection establishment module 30, and a scene remark information acquisition module 40. The functional modules are explained in detail as follows:
a call communication request obtaining module 10, configured to obtain a call communication request sent by a call terminal, where the call communication request includes an active outbound identifier, a passive call identifier, and a scene identifier.
And the risk detection result acquisition module 20 is configured to query the virtual number library corresponding to the scene identifier according to the passive call identifier, acquire the use state of the virtual identifier to be used corresponding to the passive call identifier, and if the use state of the virtual identifier to be used is the start state, invoke a third-party blacklist interface to perform risk detection on the active outbound identifier, so as to acquire a risk detection result.
And the communication connection establishing module 30 is configured to select one of the to-be-used virtual identifiers in the use state as the target outbound identifier if the risk detection result is that the detection is successful, and establish a communication connection according to the target outbound identifier and the passive call identifier.
And the scene remark information acquisition module 40 is configured to query the number tag library based on the target outbound identifier, acquire scene remark information corresponding to the target outbound identifier, and display the scene remark information on the called terminal corresponding to the passive calling identifier.
Specifically, the calling communication device further comprises a number marking request acquisition unit, a verification result acquisition unit, a to-be-used virtual identifier acquisition unit and a scene marking unit.
And the number marking request acquisition unit is used for acquiring a number marking request, and the number marking request comprises a passive calling identifier and a corresponding scene identifier.
And the verification result acquisition unit is used for calling the number detection interface to verify the passive calling identifier and acquiring a verification result.
And the to-be-used virtual identifier acquisition unit is used for randomly selecting at least one of the preset virtual identifiers as the to-be-used virtual identifier if the verification result is that the verification is passed, and storing the to-be-used virtual identifier and the passive calling identifier in an associated manner.
And the scene marking unit is used for calling the number marking interface to mark the scene of the virtual identifier to be used based on the scene identifier.
Specifically, the verification result acquisition unit includes a first verification code transmission unit, a first verification result acquisition unit, and a second verification result acquisition unit.
And the first verification code sending unit is used for acquiring a first verification code generated based on a random number generation function, sending the first verification code to the called terminal corresponding to the passive calling identifier, and displaying an information filling area in the called terminal.
And the first verification result acquisition unit is used for acquiring a second verification code fed back by the called terminal if the information filling area is not empty within the first preset time length, and acquiring a verification result passing the verification if the first verification code and the second verification code are successfully compared.
And the second verification result acquisition unit is used for acquiring a verification result which is not verified if the comparison between the first verification code and the second verification code fails or the information filling area is empty within a first preset time length.
Specifically, the scene identification comprises a vehicle moving scene, and the calling communication device further comprises a GPS navigation data receiving unit, a prompt information sending unit and a state updating unit.
And the GPS navigation data receiving unit is used for receiving the GPS navigation data sent by the vehicle-mounted terminal corresponding to the passive calling identifier in real time, and the GPS navigation data comprises the moving speed.
And the prompt information sending unit is used for generating prompt information when the called terminal is in a non-driving state currently if the moving speed in the second preset time length is not greater than the preset speed threshold value, and sending the prompt information to the called terminal corresponding to the passive calling identifier.
And the state updating unit is used for receiving a state updating instruction fed back by the called terminal based on the prompt information, and updating the use state corresponding to the virtual identifier to be used into a starting state if the state updating instruction is started.
Specifically, the call communication apparatus further includes a communication connection result acquisition unit and an automatic outbound unit.
And the communication connection result acquisition unit is used for establishing communication connection according to the target outbound identification and the passive calling identification and acquiring a communication connection result.
And the automatic outbound unit is used for executing the establishment of communication connection according to the target outbound identifier and the passive calling identifier and acquiring a communication connection result according to the preset outbound interval if the communication connection result is that the connection fails and the communication connection times do not reach the preset connection times.
Specifically, the calling communication device further comprises a GPS positioning data receiving unit, an information sending template calling unit, a user information acquiring unit and an information acquiring unit to be sent.
And the GPS positioning data receiving unit is used for acquiring the GPS positioning data of the calling terminal corresponding to the active outbound identification if the communication connection result is connection failure and the communication connection times reach the preset connection times.
And the information sending template calling unit is used for calling an information sending template prestored in the database, and the information sending template comprises a user information field to be filled and a positioning field to be filled.
And the user information acquisition unit is used for inquiring the user database based on the passive calling identifier and acquiring the user information corresponding to the passive calling identifier.
And the information to be sent acquiring unit is used for mapping the user information and the GPS positioning data into the user information field to be filled and the positioning field to be filled correspondingly, acquiring the information to be sent and sending the information to be sent to the called terminal corresponding to the passive calling identifier.
Specifically, the calling communication device further comprises an obtaining unit for detecting the number of outbound calls, a first processing unit and a second processing unit.
And the number-of-outbound-to-be-detected acquisition unit is used for counting the number of outbound times to be detected of the call communication request sent by the call terminal corresponding to the active outbound identifier within the preset time.
And the first processing unit is used for executing the step of establishing communication connection according to the target outbound identifier and the passive calling identifier if the number of outbound times to be detected is not more than the preset request number.
And the second processing unit is used for storing the active outbound identification into a blacklist if the number of outbound times to be detected is greater than the preset request number.
For specific limitations of the calling communication device, reference may be made to the above limitations of the calling communication method, which are not described herein again. The various modules in the call communication apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 10. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a computer readable storage medium, an internal memory. The computer readable storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the computer-readable storage medium. The database of the computer device is used to store data generated or obtained during the execution of the call communication method, such as scene remark information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a call communication method.
In one embodiment, a computer device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the call communication method in the above embodiments when executing the computer program, such as the steps S10-S40 shown in fig. 2 or the steps shown in fig. 3 to 8. Alternatively, the processor implements the functions of each module/unit in the embodiment of the calling communication device when executing the computer program, for example, the functions of each module/unit shown in fig. 9, and are not described herein again for avoiding repetition.
In an embodiment, a computer-readable storage medium is provided, and a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of the call communication method in the foregoing embodiments, such as steps S10-S40 shown in fig. 2 or steps shown in fig. 3 to 8, which are not repeated herein to avoid repetition. Alternatively, the computer program is executed by the processor to implement the functions of the modules/units in the embodiment of the calling communication device, for example, the functions of the modules/units shown in fig. 9, which are not described herein again to avoid repetition.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method of call communication, comprising:
acquiring a call communication request sent by a call terminal, wherein the call communication request comprises an active outbound identifier, a passive call identifier and a scene identifier;
inquiring a virtual number library corresponding to a scene identifier according to a passive calling identifier, acquiring a use state of a virtual identifier to be used corresponding to the passive calling identifier, and if the use state of the virtual identifier to be used is a starting state, calling a third party blacklist interface to carry out risk detection on the active outbound identifier to acquire a risk detection result;
if the risk detection result is successful, selecting one of the virtual identifiers to be used with the use state being the starting state as a target outbound identifier, and establishing communication connection according to the target outbound identifier and the passive calling identifier;
and inquiring a number mark library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification, and displaying the scene remark information on a called terminal corresponding to the passive calling identification.
2. The call communication method according to claim 1, wherein before said acquiring the call communication request transmitted from the calling terminal, the call communication method further comprises:
acquiring a number marking request, wherein the number marking request comprises a passive calling identifier and a corresponding scene identifier;
calling a number detection interface to verify the passive calling identifier to obtain a verification result;
if the verification result is that the verification is passed, randomly selecting at least one virtual identifier from preset virtual identifiers as a virtual identifier to be used, and storing the virtual identifier to be used and the passive calling identifier in an associated manner;
and calling a number marking interface to mark the scene of the virtual identifier to be used based on the scene identifier.
3. The call communication method according to claim 2, wherein the invoking number detection interface verifies the passive call identifier and obtains a verification result, comprising:
acquiring a first verification code generated based on a random number generation function, sending the first verification code to a called terminal corresponding to the passive calling identifier, and displaying an information filling area in the called terminal;
if the information filling area is not empty within a first preset time, acquiring a second verification code fed back by the called terminal, and if the first verification code and the second verification code are successfully compared, acquiring a verification result passing verification;
and if the comparison between the first verification code and the second verification code fails or the information filling area is empty within a first preset time, obtaining a verification result that the verification fails.
4. The call communication method according to claim 1, wherein the scene identification includes a vehicle moving scene;
before the obtaining of the call communication request sent by the calling terminal, the call communication method further includes:
receiving GPS navigation data sent by a vehicle-mounted terminal corresponding to the passive calling identifier in real time, wherein the GPS navigation data comprises moving speed;
if the moving speed is not greater than a preset speed threshold value within a second preset time, the called terminal is in a non-driving state currently, prompt information is generated, and the prompt information is sent to the called terminal corresponding to the passive calling identifier;
and receiving a state updating instruction fed back by the called terminal based on the prompt information, and updating the use state corresponding to the virtual identifier to be used to be a starting state if the state updating instruction is started.
5. The call communication method according to claim 1, wherein after said establishing a communication connection based on said target outbound identification and passive call identification, said call communication method further comprises:
establishing communication connection according to the target outbound identification and the passive calling identification, and acquiring a communication connection result;
and if the communication connection result is connection failure and the communication connection times do not reach the preset connection times, according to a preset outbound interval, executing the establishment of communication connection according to the target outbound identification and the passive calling identification, and acquiring a communication connection result.
6. The call communication method according to claim 5, wherein after said establishing a communication connection based on said target outbound identification and passive call identification and obtaining a communication connection result, said call communication method further comprises:
if the communication connection result is connection failure and the communication connection times reach preset connection times, acquiring GPS positioning data of the calling terminal corresponding to the active outbound identification;
calling an information sending template prestored in a database, wherein the information sending template comprises a user information field to be filled and a positioning field to be filled;
inquiring a user database based on the passive calling identifier to acquire user information corresponding to the passive calling identifier;
and correspondingly mapping the user information and the GPS positioning data into the user information field to be filled and the positioning field to be filled, acquiring information to be sent, and sending the information to be sent to a called terminal corresponding to the passive calling identifier.
7. The call communication method according to claim 1, wherein before said establishing a communication connection based on said target outbound identification and passive call identification, said call communication method further comprises:
counting the number of outbound times to be detected of a call communication request sent by a call terminal corresponding to the active outbound identification within a preset time;
if the number of the outbound calls to be detected is not more than the preset number of the requests, the step of establishing communication connection according to the target outbound identification and the passive calling identification is executed;
and if the number of the outbound calls to be detected is greater than the preset number of the requests, storing the active outbound identification into a blacklist.
8. A call communication device, comprising:
the call communication request acquisition module is used for acquiring a call communication request sent by a call terminal, wherein the call communication request comprises an active outbound identifier, a passive call identifier and a scene identifier;
the risk detection result acquisition module is used for inquiring a virtual number library corresponding to the scene identification according to the passive calling identification, acquiring the use state of the virtual identification to be used corresponding to the passive calling identification, and calling a third-party blacklist interface to carry out risk detection on the active outbound identification if the use state of the virtual identification to be used is a starting state, so as to acquire a risk detection result;
a communication connection establishing module, configured to select one of the to-be-used virtual identifiers in the use state as a start state as a target outbound identifier if the risk detection result is that the detection is successful, and establish a communication connection according to the target outbound identifier and the passive call identifier;
and the scene remark information acquisition module is used for inquiring a number marking library based on the target outbound identification, acquiring scene remark information corresponding to the target outbound identification and displaying the scene remark information on a called terminal corresponding to the passive calling identification.
9. A computer arrangement comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the call communication method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the call communication method according to one of claims 1 to 7.
CN201910969510.2A 2019-10-12 2019-10-12 Call communication method, device, computer equipment and storage medium Active CN110868500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910969510.2A CN110868500B (en) 2019-10-12 2019-10-12 Call communication method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910969510.2A CN110868500B (en) 2019-10-12 2019-10-12 Call communication method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110868500A true CN110868500A (en) 2020-03-06
CN110868500B CN110868500B (en) 2022-11-01

Family

ID=69652659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910969510.2A Active CN110868500B (en) 2019-10-12 2019-10-12 Call communication method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110868500B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751942A (en) * 2021-01-15 2021-05-04 东莞中国科学院云计算产业技术创新与育成中心 Communication establishing method, device, equipment and storage medium
CN113065780A (en) * 2021-04-09 2021-07-02 平安国际智慧城市科技股份有限公司 Task allocation method, device, storage medium and computer equipment
CN115086046A (en) * 2022-06-20 2022-09-20 支付宝(杭州)信息技术有限公司 Intelligent interactive security deployment method and system
CN115426178A (en) * 2022-09-01 2022-12-02 中国联合网络通信集团有限公司 Calling method, calling device, electronic equipment and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068319A (en) * 2018-07-13 2018-12-21 维沃移动通信有限公司 A kind of call method, first terminal and second terminal
US20190037070A1 (en) * 2016-02-29 2019-01-31 Digital Privacy Gmbh Method for call setup
CN109699029A (en) * 2018-12-14 2019-04-30 北京筑梦园科技有限公司 One kind is anti-harassment to move vehicle method of servicing, system and server
CN110266896A (en) * 2019-05-15 2019-09-20 平安科技(深圳)有限公司 Method of calling, device, computer equipment and storage medium based on virtual-number

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190037070A1 (en) * 2016-02-29 2019-01-31 Digital Privacy Gmbh Method for call setup
CN109068319A (en) * 2018-07-13 2018-12-21 维沃移动通信有限公司 A kind of call method, first terminal and second terminal
CN109699029A (en) * 2018-12-14 2019-04-30 北京筑梦园科技有限公司 One kind is anti-harassment to move vehicle method of servicing, system and server
CN110266896A (en) * 2019-05-15 2019-09-20 平安科技(深圳)有限公司 Method of calling, device, computer equipment and storage medium based on virtual-number

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751942A (en) * 2021-01-15 2021-05-04 东莞中国科学院云计算产业技术创新与育成中心 Communication establishing method, device, equipment and storage medium
CN112751942B (en) * 2021-01-15 2022-11-15 东莞中国科学院云计算产业技术创新与育成中心 Communication establishing method, device, equipment and storage medium
CN113065780A (en) * 2021-04-09 2021-07-02 平安国际智慧城市科技股份有限公司 Task allocation method, device, storage medium and computer equipment
CN115086046A (en) * 2022-06-20 2022-09-20 支付宝(杭州)信息技术有限公司 Intelligent interactive security deployment method and system
CN115086046B (en) * 2022-06-20 2024-01-12 支付宝(杭州)信息技术有限公司 Intelligent interaction safety deployment method and system
CN115426178A (en) * 2022-09-01 2022-12-02 中国联合网络通信集团有限公司 Calling method, calling device, electronic equipment and computer readable medium
CN115426178B (en) * 2022-09-01 2024-04-12 中国联合网络通信集团有限公司 Calling method, calling device, electronic equipment and computer readable medium

Also Published As

Publication number Publication date
CN110868500B (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN110868500B (en) Call communication method, device, computer equipment and storage medium
CN103067911B (en) The method and apparatus that control hardware module uses
CN105873068B (en) Method and device for identifying pseudo base station
EP2417755B1 (en) System and method for identity protection using mobile device signaling network derived location pattern recognition
CN106330958B (en) Secure access method and device
CN109672792B (en) Intelligent vehicle moving method, device and system
US10496802B2 (en) Security audit tracking on access
CN108307333B (en) Method and device for transmitting intermediate number for mobile communication equipment and storage medium
CN107154919B (en) Safe login method and device
CN107705576B (en) Vehicle fake plate detection method, server and storage medium
US10097685B2 (en) Telecommunications privacy method
CN113067859B (en) Communication method and device based on cloud mobile phone
CN112672316A (en) Method, device, server, client, terminal and storage medium for calling vehicle owner
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
CN112672315A (en) Method, device, server, client, terminal and storage medium for calling car owner
CN111526143B (en) Method and device for realizing anti-unauthorized access of CRM system and storage medium
CN108733385A (en) Application program installation method, device, equipment and storage medium
CN111539274B (en) Method for informing vehicle owner to move vehicle
CN113780025A (en) Method and device for managing and controlling supplier sources and computer storage medium
CN112182546A (en) Account number protection method and device, terminal equipment and storage medium
CN111862474A (en) Shared vehicle processing method, device, equipment and computer readable storage medium
CN108200540B (en) Call answering method and device of communication terminal
CN115018024A (en) Vehicle moving data processing method and device
CN109905551B (en) Communication method and device for moving vehicle, computer equipment and storage medium
CN111800762B (en) Communication processing method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant