CN111277711A - Virtual contact number generation method and device, storage medium and computer equipment - Google Patents

Virtual contact number generation method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN111277711A
CN111277711A CN202010069474.7A CN202010069474A CN111277711A CN 111277711 A CN111277711 A CN 111277711A CN 202010069474 A CN202010069474 A CN 202010069474A CN 111277711 A CN111277711 A CN 111277711A
Authority
CN
China
Prior art keywords
contact number
virtual contact
virtual
user
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010069474.7A
Other languages
Chinese (zh)
Other versions
CN111277711B (en
Inventor
王星雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010069474.7A priority Critical patent/CN111277711B/en
Publication of CN111277711A publication Critical patent/CN111277711A/en
Application granted granted Critical
Publication of CN111277711B publication Critical patent/CN111277711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42187Lines and connections with preferential service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A virtual contact number generation method, a virtual contact number generation device, a storage medium and computer equipment comprise: acquiring a virtual contact number registration request; extracting user information and personalized communication authority configuration requirement data carried in the virtual contact number registration request; when the user information passes the verification, generating an initial virtual contact number set, wherein the initial virtual contact number set comprises a limited virtual contact number list and an unlimited virtual contact number list; acquiring virtual contact number configuration data according to the personalized communication authority configuration demand data, wherein the virtual contact number configuration data comprises allowable contacts and corresponding communication priorities under a restricted virtual contact number list; and updating the initial virtual contact number set according to the virtual contact number configuration data association to generate a virtual contact number. Only other users who allow the contact persons and have the communication priority meeting the requirement can contact the user through the virtual contact number, and the user is prevented from receiving harassing calls or short messages of different numbers.

Description

Virtual contact number generation method and device, storage medium and computer equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for generating a virtual contact number, a computer-readable storage medium, and a computer device.
Background
With the development of networks, more and more channels are available for easily revealing personal information, wherein the personal information comprises telephone contact information which is revealed, and the revealing of the telephone contact information is likely to cause users to receive a large number of harassing calls, short messages and the like such as fraud, advertising promotion and the like, so that intercepting technologies for the harassing calls, the short messages and the like are appeared.
The existing interception technology determines whether a telephone number is a harassing telephone number, and usually judges based on feedback information such as marks of a large number of users on the telephone number, and the like, so that the number which is not marked cannot be intercepted; thus, a user's telephone contact, once compromised, may still receive harassment of various numbers.
Disclosure of Invention
Based on this, it is necessary to provide a virtual contact number generation method, apparatus, storage medium and computer device for solving the technical problem that once a telephone contact is disclosed, the telephone contact may be harassed by a large number of different numbers.
A method of virtual contact number generation, the method comprising:
acquiring a virtual contact number registration request;
extracting user information and personalized communication authority configuration requirement data carried in the virtual contact number registration request;
when the user information passes the verification, generating an initial virtual contact number set, wherein the initial virtual contact number set comprises a limited virtual contact number list and an unlimited virtual contact number list;
acquiring virtual contact number configuration data according to the personalized communication authority configuration demand data, wherein the virtual contact number configuration data comprises allowed contacts and corresponding communication priorities in the restricted virtual contact number list;
and updating the initial virtual contact number set according to the virtual contact number configuration data association to generate a virtual contact number.
An apparatus for generating a virtual contact number, the apparatus comprising:
a registration request acquisition module for acquiring a virtual contact number registration request;
the information extraction module is used for extracting the user information and the personalized communication authority configuration requirement data carried in the virtual contact number registration request;
an initial virtual contact number generation module, configured to generate an initial virtual contact number set when the user information passes verification, where the initial virtual contact number set includes a restricted virtual contact number list and an unrestricted virtual contact number list;
a virtual contact number configuration data acquisition module, configured to acquire virtual contact number configuration data according to the personalized communication permission configuration demand data, where the virtual contact number configuration data includes allowed contacts and corresponding communication priorities in the restricted virtual contact number list;
and the virtual contact number updating module is used for updating the initial virtual contact number set according to the virtual contact number configuration data association to generate a virtual contact number.
A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to perform the steps of the virtual contact number generation method as described above.
A computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the virtual contact number generation method as described above.
The virtual contact number generation method, the device, the storage medium and the computer equipment acquire the virtual contact number registration request, and generate an initial virtual contact number set including a restricted virtual contact number list and an unrestricted virtual contact number list when determining that the user information corresponding to the registration request passes the verification; acquiring virtual contact number configuration data according to personalized communication authority configuration demand data carried by the registration request, wherein the virtual contact number configuration data comprises allowable contacts and corresponding communication priorities under a limited virtual contact number list, and updating an initial virtual contact number set according to the virtual contact number configuration data to generate a virtual contact number; the user can inform relatives and friends of the unlimited virtual contact number in the virtual contact numbers generated by the method for communication, and inform the limited virtual contact number list of people needing to be informed in a specific occasion, and by setting corresponding allowed contacts and communication priorities for the limited virtual contact number list, other users who only allow the contacts and meet the communication priority can be ensured to contact the user through the virtual contact number, and the situation that the user reserves the contact way to leak information under the scene that the information is easy to leak is avoided from receiving harassing calls or short messages of a large number of different numbers and the like.
Drawings
FIG. 1 is a diagram of an application environment of a method for virtual contact number generation in one embodiment;
FIG. 2 is a flowchart illustrating a method for generating a virtual contact number according to an embodiment;
FIG. 3 is a diagram illustrating a mapping relationship between user information and virtual contact numbers in an exemplary embodiment;
FIG. 4 is a flowchart illustrating a method for generating a virtual contact number according to another embodiment;
FIG. 5 is a flowchart illustrating a method for generating a virtual contact number according to another embodiment;
FIG. 6 is a diagram illustrating an exemplary implementation of communication via blockchains;
FIG. 7 is a block diagram showing the structure of a virtual contact number generation apparatus according to an embodiment;
fig. 8 is a block diagram showing the configuration of a virtual contact number generating means in another embodiment;
FIG. 9 is a block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Fig. 1 is a diagram of an application environment of a virtual contact number generation method in one embodiment. Referring to fig. 1, the virtual contact number generation method involves a terminal 110 and a server 120 in some embodiments. The server 120 obtains a virtual contact number registration request initiated by a user through the terminal 110, generates an initial virtual contact number set including a restricted virtual contact number list and an unrestricted virtual contact number list when determining that user information corresponding to the registration request passes verification, obtains virtual contact number configuration data according to personalized communication permission configuration requirement data carried by the registration request, wherein the virtual contact number configuration data includes allowed contacts and corresponding communication priorities in the restricted virtual contact number list, and updates the initial virtual contact number set according to the virtual contact number configuration data to generate a virtual contact number. Wherein the terminal 110 and the server 120 are connected through a network. The terminal 110 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 120 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
As shown in fig. 2, in one embodiment, a virtual contact number generation method is provided. The embodiment is mainly illustrated by applying the method to the server 120 in fig. 1. Referring to fig. 2, the virtual contact number generating method specifically includes steps S210 to S250.
Step S210, a virtual contact number registration request is obtained.
In this embodiment, the user may initiate the virtual contact number registration request through the terminal.
Step S220, extracting the user information and the personalized communication authority configuration requirement data carried in the virtual contact number registration request.
The user information refers to the related information of the user; in one embodiment, the user information includes a user identifier, where the user identifier may be a mobile phone number of the user, a mailbox, or a user-defined character string, etc.; in another embodiment, the user information may further include identity information of the user, which is used to verify the validity of the identity of the user; in other embodiments, the user information may also include information on addresses, professions or units, and so on.
The personalized communication authority configuration requirement data refers to the requirement of a user on the communication authority of the virtual contact number, and the user can set the communication authority of an account requesting registration according to actual needs; in one embodiment, the personalized communication requirements may include one or more of a number of virtual contact numbers that need to be registered, allowable contacts to limit the virtual contact numbers, an allowable contact age for the allowable contacts, a communication priority, and an allowable contact time period. Wherein the allowed contacts may include a plurality of contacts, the allowed contacts being allowed to contact the user through corresponding restricted virtual contact numbers.
Step S230, when the user information passes the verification, generating an initial virtual contact number set; wherein the initial set of virtual contact numbers includes a restricted virtual contact number list and an unrestricted virtual contact number list.
In one embodiment, when the user identifier does not conflict with the existing user identifier in the preset database, the user information is judged to pass the verification; in another embodiment, the user information comprises the identity information of the user, and when the identity information of the user passes legal verification, the user information is judged to pass the verification; in other embodiments, the user information may be determined to be verified in other ways.
When the user information passes the verification, generating an initial virtual contact number set for the user according to the registration request of the user; further, generating an initial set of virtual contact numbers for the user includes at least a restricted virtual contact number list and an unrestricted virtual contact number list. The unlimited virtual contact number list corresponds to at least one unlimited virtual contact number, and both the unlimited virtual contact number and the limited virtual contact number are unique; in this embodiment, the unrestricted virtual contact number indicates that no restriction condition is set for the contact person of the communication, in one embodiment, the user may use the unrestricted virtual contact number in an application scenario where privacy is not easily revealed, such as for use between relatives and friends, and since the number that informs the relatives and friends is not revealed, no restriction is set for the contact person for the unrestricted virtual contact number; the user with the limited virtual contact number can be used in application scenes which are easy to leak, for example, when the contact way needs to be reserved in an intermediary platform, the contact way needs to be reserved in recruitment and the like, the limited virtual contact number can ensure that only the user meeting a certain limiting condition can contact the user, and even if the user not meeting the limiting condition knows the limited virtual contact number, the user can not contact the user, so that the communication that the user receives harassing calls, short messages and the like can be greatly reduced; wherein the limitations will be described in detail in the examples which follow.
Further, in an embodiment, the virtual contact number may be determined specifically according to the user information, for example, the user information is converted into a numeric character string by a preset operation method, the numeric character string is used as the virtual contact number, and the virtual contact number of each user is guaranteed to be unique. In another embodiment, two numbers in the preset number segment may also be randomly allocated to the user as the virtual contact number restriction and the virtual contact number restriction, for example, a plurality of virtual contact numbers in the preset number segment are preset, and when the virtual contact number needs to be generated for the user, one virtual contact number in the preset number segment is randomly selected as the optimized virtual contact number. In other embodiments, the generation of the virtual contact number may also be determined in other ways. It will be appreciated that the generated virtual contact number is associated with user information.
In one embodiment, the initial set of virtual contact numbers includes a plurality of restricted virtual contact number lists; in this embodiment, configuring the demand data according to the personalized communication right, and acquiring the virtual contact number configuration data includes: and respectively acquiring virtual contact number configuration data of each restricted virtual contact number list according to the personalized communication authority configuration requirement data.
Further, in one embodiment, generating the initial set of virtual contact numbers includes: determining a first target number of the limited virtual contact numbers and a second target number of the unlimited virtual contact numbers to be registered according to the personalized communication authority configuration demand data, and generating an initial virtual contact number set containing the limited virtual contact numbers of the first target number and the unlimited virtual contact numbers of the second target number. In this embodiment, a user may request to register a plurality of limited virtual contact numbers and unlimited virtual contact numbers, and when the registration request carries the number (the target number) of virtual contact numbers that the user needs to register, when the user information passes the verification, the limited virtual contact numbers and the unlimited virtual contact numbers of the corresponding number are allocated to the user. In the embodiment, a user can select and set a plurality of limited virtual contact numbers and unlimited virtual contact numbers according to own preference, and the user can inform different people of different limited virtual contact numbers and unlimited virtual contact numbers in different occasions, so that harassment caused by number leakage is avoided by better utilizing the plurality of virtual contact numbers.
Step S240, according to the personalized communication authority configuration demand data, acquiring virtual contact number configuration data, wherein the virtual contact number configuration data comprises allowable contacts and corresponding communication priorities in the restricted virtual contact number list.
The virtual contact number configuration data is the communication requirement of the user for the virtual contact number determined according to the individual user communication authority configuration requirement data; in this embodiment, the virtual contact number configuration data includes limiting the allowed contacts and corresponding communication priorities under the virtual contact number list.
Further, the allowed contact represents other users allowed to contact corresponding to the restricted virtual contact number, and the allowed contact may include a plurality of other users; further, in one embodiment, the allowed contacts may be stored in the form of contact identifications, such as contact numbers of other users (which may be real contact numbers or virtual contact numbers), user information of other users, and the like, which may represent identities of other users. The communication priority corresponds to the contact, and it is understood that when the allowed contact includes a plurality of allowed contacts, the communication priority of each allowed contact may be the same or different, indicating the priority of other users allowed to contact the user.
And step S250, updating the initial virtual contact number set according to the virtual contact number configuration data association, and generating a virtual contact number.
After the virtual contact number configuration data are obtained, associating the virtual contact number configuration data with the initial virtual contact number set to obtain an updated virtual contact number set, thereby generating a virtual contact number; the method comprises the steps of associating virtual contact number configuration data with an initial virtual contact number set, specifically setting communication authority of a virtual contact number according to personalized communication authority configuration requirement data, and after the communication authority is updated, obtaining the updated virtual contact number set.
Further, in this embodiment, the virtual contact numbers include an unrestricted virtual contact number and a restricted virtual contact number, where the restricted virtual contact number corresponds to an allowed contact and a corresponding communication priority.
Further, in one embodiment, after the virtual contact number with the communication authority set is obtained, the virtual contact number is bound with the real number of the user, and when the virtual contact number is requested to be contacted, the contact request is transferred to the corresponding real number of the user. In the embodiment, the virtual contact number is set for the real telephone contact way of the user by docking with the existing telephone contact way, and the virtual contact number can be reserved when the user reserves the contact way on a public platform and the like where information is easy to leak; even if the user still receives a harassing call through the virtual contact number, the user can choose to change or close the virtual contact number at any time. Fig. 3 is a diagram illustrating a correspondence relationship between user information and virtual contact numbers in a specific embodiment, where one user corresponds to a plurality of restricted virtual contact numbers.
According to the virtual contact number generation method, when a virtual contact number registration request is obtained, when the user information corresponding to the registration request is confirmed to pass verification, an initial virtual contact number set is generated and comprises a limited virtual contact number list and an unlimited virtual contact number list, virtual contact number configuration data is obtained according to personalized communication authority configuration required data carried by the registration request, wherein the virtual contact number configuration data comprises allowed contacts and corresponding communication priorities under the limited virtual contact number list, and the initial virtual contact number set is updated according to the virtual contact number configuration data to generate a virtual contact number; the user can inform relatives and friends of the unlimited virtual contact number in the virtual contact numbers generated by the method for communication, and inform the limited virtual contact number list of people needing to be informed in a specific occasion, and by setting corresponding allowed contacts and communication priorities for the limited virtual contact number list, other users who only allow the contacts and meet the communication priority can be ensured to contact the user through the virtual contact number, and the situation that the user reserves the contact way to leak information under the scene that the information is easy to leak is avoided from receiving harassing calls or short messages of a large number of different numbers and the like.
In one embodiment, the virtual contact number configuration data further includes a public state corresponding to the restricted virtual contact number list; the public state represents whether other people are allowed to request to add an allowed contact; and when the public state is public, allowing others to request to newly add a permission contact. Further, in the present embodiment, after the virtual contact number is generated, as shown in fig. 4, steps S410 to S440 are further included.
And step S410, acquiring a contact person adding request corresponding to the virtual contact number limitation.
The contact person adding request is a request initiated by a user and used for requesting to add an allowable contact person with a certain limited virtual contact number; the request may be initiated by the user himself or by another user.
Step S420, the contact person adding request is analyzed to obtain the target contact person identifier to be added.
The contact identifier to be added refers to a contact identifier that is expected to be added as an allowed contact in the contact addition request, and is recorded as a target contact identifier in this embodiment. In one embodiment, the contact identification may be a contact number, a user identification, or other identification information that may represent a user. Further, in an embodiment, the contact person addition request further identifies a virtual contact number corresponding to the contact person requested to be added, that is, a contact person is expected to be added to the allowed contact person of which virtual contact number.
And step S430, when the contact person adding request is determined to be sent by one of the allowed contact persons in the limited virtual contact number list and the public state of the limited virtual contact number is public, sending contact person adding confirmation information to the user.
When a contact person adding request is sent by a user corresponding to a non-virtual contact number, whether the user has the permission to add a contact person to a virtual contact number needs to be confirmed, in the embodiment, whether the user sending the contact person adding request is one of allowed contact persons limiting the virtual contact number in the virtual contact number is detected; meanwhile, when the public state of the virtual contact number is limited to be public, the fact that other people are allowed to request for adding new contacts is shown; further, sending confirmation information to the user corresponding to the virtual contact number, and determining whether the user corresponding to the virtual contact number agrees to newly add the target contact identification as an allowed contact; in this embodiment, the confirmation information sent to the user is recorded as contact person newly-added confirmation information, and the contact person newly-added confirmation information carries the target contact person identifier and further can carry a user identifier for sending a contact person newly-added request.
Step S440, when receiving feedback information which is sent by the user and confirms the newly added contact person, adding the target contact person identification as an allowed contact person in the restricted virtual contact number list.
Further, in an embodiment, sending the contact person newly-added confirmation information to the user corresponding to the virtual contact number limitation includes: and when a communication authority acquisition request corresponding to the target contact person identification is received, sending contact person newly-added confirmation information to a user corresponding to the restricted virtual contact number according to the communication authority acquisition request.
The communication authority acquisition request is a request initiated by other users who wish to contact the user through the virtual contact number, for example, the user B has a virtual contact number including the restricted virtual contact number X, and the user C knows the restricted virtual contact number X of the user B through one of the allowed contacts corresponding to the restricted virtual contact number X, but cannot contact the user B through the restricted virtual contact number X, so the user C initiates the communication authority acquisition request to the server. In this embodiment, when a request initiated by the user a (a contact addition request) and the user C (a communication authority acquisition request) at the same time needs to be received at the same time, the server sends contact addition confirmation information to the user corresponding to the virtual contact number.
And receiving feedback information sent by the user to confirm the newly added contact person, wherein the feedback information indicates that the user agrees to add the target contact person identification as the allowed contact person of the limited virtual contact number. Further, in an embodiment, after the target contact identifier is added as the allowed contact of the restricted virtual contact number, a prompt message that the contact addition is successful is returned to the device sending the contact addition request.
In another embodiment, if the disclosure state of the virtual contact number is not disclosed (the virtual contact number is limited not to allow others to request the new contact), or the user sending the contact person new adding request is not one of the allowed contact persons in the virtual contact number list, or feedback information of the new contact person is not allowed to be added, which is sent by the user corresponding to the virtual contact person, the target contact person is not allowed to be newly added as the allowed contact person in the virtual contact number list, and prompt information of failure of the new contact person is returned to the device where the user sending the contact person new adding request is located.
In another embodiment, referring to fig. 4 again, the method further includes step S450, when the user information of the request for sending the contact addition is consistent with the user information corresponding to the virtual contact number, adding the target contact identifier as an allowed contact in the restricted virtual contact number list.
The fact that the user information corresponding to the contact person adding request is consistent with the user information corresponding to the virtual contact number indicates that the contact person adding request is sent by the user of the virtual contact number, and the user of the virtual contact number can adjust the virtual contact number configuration data in the virtual contact number at any time. In other embodiments, it may also be determined whether the contact person addition request is sent by the user corresponding to the virtual contact number according to a terminal identifier, an account identifier, and the like, which sends the contact person addition request.
In another embodiment, the user himself may also generate a contact deletion request, and when the server receives the contact deletion request, after determining that the request is sent by the user himself corresponding to the virtual contact number, the contact identifier corresponding to the request for deletion of the contact deletion request is deleted from the allowed contacts in the restricted virtual contact number list.
In the method in the above embodiment, whether to restrict the virtual contact number to allow another person to request a new contact person is set through the public state in the virtual contact number configuration data, when the public state is public, the allowed contact person in the restricted virtual contact number list can inform the restricted virtual contact number to a third person through a sharing manner, and when the virtual contact number corresponds to a user agrees to add the third person as an allowed contact person, a contact person identifier (target contact person identifier) of the third person is added as an allowed contact person of the restricted virtual contact number, so that the third person can contact the user through the restricted virtual contact number.
Further, in an embodiment, as shown in fig. 5, after the virtual contact number is generated, the method further includes steps S510 to S530.
Step S510, receiving a communication level update request sent by the user corresponding to the virtual contact number.
The communication level updating request corresponding to the virtual contact number is a request initiated by the user when the user wants to set the communication level of the limited contact number, and the user can initiate the communication level updating request at any time for updating the current communication level of the limited contact number.
Step S520, the communication level update request is analyzed to obtain the target communication level to be updated.
The communication level that the user currently wants to set for limiting the virtual contact number can be obtained by analyzing the communication level update request, which is recorded as a target communication level in this embodiment.
Step S530, updating the current communication grade associated with the restricted virtual contact number list in the virtual contact numbers to a target communication grade; and when other users contact the user through the restricted virtual contact number list, the communication priority corresponding to the other users is matched with the current communication level, and the other users are allowed to contact the user.
And updating the current communication grade associated with the restricted virtual contact number in the virtual contact number, setting the communication grade as a target communication grade, and finishing the setting.
In a specific embodiment, when a user enters a rest time and does not want to receive a short message or the like for communication, a communication level update request can be initiated to a server to request that the current communication level associated with a restricted contact number is set to a higher level, which indicates that a non-emergency telephone is not available for contact, and whether contact is allowed or not is determined according to the communication priority of each allowed contact; for example, the current communication rating is 5, while the communication priority of the allowed contact is 2, indicating that the current communication rating is not met, and the allowed contact is not allowed to be contacted at this time.
It can be understood that the current communication level may also be set for the unlimited virtual contact number, in this embodiment, the contact person and the communication priority corresponding to the contact person need to be set in the unlimited virtual contact number list, and a specific setting method is similar to the limited virtual contact number, and is not described herein again.
According to the method in the embodiment, the user can adjust the authority of the virtual contact number at any time, and the diversified requirements of the user are met.
In a particular embodiment, the virtual contact number configuration data includes one or more of allowable contacts to limit the virtual contact number, corresponding contact age, communication priority, and allowable contact time period. The allowed contact persons can comprise a plurality of contact persons, and the user belonging to the allowed contact persons can contact with the user through the corresponding limited virtual contact numbers; further, the contact information in the allowed contacts may be phone numbers of other users, user identifications, and the like. In one embodiment, the setting of the contact permission time period indicates that the user is not allowed to be contacted in the non-contact permission time period, and further, the contact permission time period can be set for each contact person; for example, in one embodiment, the allowed contact time period corresponding to a certain allowed contact is 8 o 'clock to 18 o' clock per day, the allowed contact can only contact the user through the virtual contact number during 8 o 'clock to 18 o' clock per day, and the user cannot be contacted through the virtual contact number in other time periods. In one embodiment, each allowable contact may be set to a different communication priority, and whether the communication request of the allowable contact can be accessed is determined according to the communication priority. Still further, the user may set a contact age for the allowed contact, the allowed contact allowing the user to be contacted by the virtual contact number when the contact age of the allowed contact is valid, and not allowing the user to be contacted by the virtual contact number when the contact age of the allowed contact is invalid; for example, in one embodiment, the contact time corresponding to the allowed contact is a preset time period, the allowed contact may contact the user through the virtual contact number within the preset time period, and the allowed contact may not contact the user through the virtual contact number outside the preset time period.
Further, in one embodiment, after generating the virtual contact number, the method further includes: receiving a virtual contact number configuration data adjustment request sent by a user; and updating the virtual contact number configuration data corresponding to the virtual contact number according to the virtual contact number configuration data adjustment request.
After registering the virtual contact number, the user may also update the communication rights of the virtual contact number by initiating a virtual contact number configuration data adjustment request. For example, in a specific embodiment, when a user wants to update an existing allowed contact, and wants to add an allowed contact or delete an existing allowed contact, a virtual contact number configuration data adjustment request may be initiated to the server; when the server receives the virtual contact number configuration data adjustment request, analyzing and obtaining virtual contact number configuration data (adjustment allowed contact persons) which need to be adjusted actually, and adjusting the virtual contact number configuration data of the virtual contact numbers; in another embodiment, when the user wishes to temporarily stop using the virtual contact number, the server may also adjust the use state in the communication authority for limiting the virtual contact number to be closed by initiating a virtual contact number configuration data adjustment request, and when receiving the virtual contact number configuration data adjustment request, resolving and determining that the user wishes to temporarily stop using the limited virtual contact number; the restricted virtual contact number whose use state is closed cannot contact the user, and then the restricted virtual contact number can be enabled again if the user initiates a virtual contact number configuration data adjustment request for re-enabling the restricted virtual contact number, so that the server can adjust the use state in the communication authority of the restricted virtual contact number to be open when receiving the virtual contact number configuration data adjustment request for re-enabling the restricted virtual contact number; in other embodiments, when a user wishes to adjust the allowed contact time period, update the communication priority, etc., this may be accomplished by initiating a virtual contact number configuration data adjustment request.
In another embodiment, after generating the virtual contact number, the method further includes: receiving a virtual contact number logout request of a user; and logging out the virtual contact number corresponding to the virtual contact number logging-out request. The user can initiate a logout request to logout a virtual contact number when the user considers that the virtual contact number is not used, and the user can not be contacted through the virtual contact number after logout.
Further, in one embodiment, the process of communicating through the virtual contact number includes the following steps: the server receives a communication request; analyzing the communication request to obtain an initiator identifier of a communication initiator corresponding to the communication request and a virtual contact number of a communication receiver corresponding to the communication request; acquiring related information of the virtual contact number; and when the communication initiator is determined to have the communication authority to communicate with the communication receiver according to the initiator identifier and the related information of the virtual contact number, communication is established for the communication initiator and the communication receiver.
The server acquires the related information of the virtual contact number, firstly determines whether the virtual contact number belongs to a limited virtual contact number or an unlimited virtual contact number: when the virtual contact number is an unlimited virtual contact number, directly judging that the communication initiator has the communication permission with the communication receiver, and establishing communication between the communication initiator and the communication receiver by the server; and when the virtual contact number is determined to be the restricted virtual contact number, acquiring the communication priority corresponding to the restricted virtual contact number and the corresponding allowed contact and the current communication level of the restricted virtual contact number, and further determining whether the communication initiator has the communication permission with the communication receiver.
In an embodiment that the virtual contact number of the communication receiver is the restricted virtual contact number, when the communication initiator belongs to an allowed contact under the restricted virtual contact number list and the communication priority corresponding to the communication initiator accords with the current communication level of the restricted virtual contact number, determining that the communication initiator has the permission to communicate with the communication receiver; further, when the identifier of the communication initiator is found in the allowed contact corresponding to the restricted virtual contact number, it is determined that the communication initiator belongs to the allowed contact in the restricted virtual contact number list.
Further, in one embodiment, establishing communication for the communication initiator and the communication recipient includes forwarding the communication request to a device on which the communication recipient is located; in another embodiment, establishing communication for the communication initiator and the communication receiver comprises acquiring a real contact number corresponding to the virtual contact number, and forwarding the communication request to a device corresponding to the real number; in other embodiments, establishing communication for the communication initiator and the communication recipient may be accomplished in other ways.
In the embodiment, when the server receives a communication request, the server determines the initiator identifier of the communication initiator and the virtual contact number of the communication receiver, and acquires the related information of the communication receiver according to the virtual contact number, and when the virtual contact number of the communication receiver is the restricted virtual contact number, the server establishes communication for the communication initiator and the communication receiver only when determining that the communication initiator has the authority to communicate with the communication receiver, so that a contact person only having the communication authority can contact the communication receiver through the virtual contact number, and the communication receiver is prevented from receiving harassing call short messages and the like when the information is leaked.
In another embodiment that the virtual contact number of the communication receiver is the restricted virtual contact number, when the communication initiator is determined to belong to the allowed contact of the communication receiver according to the identifier of the communication initiator, the allowed communication time of the communication initiator is valid, and the communication priority accords with the current communication level, it is determined that the communication initiator has the authority to communicate with the communication receiver. The contact is allowed to be allowed to contact the user corresponding to the virtual contact number through the limitation virtual contact number only in the time period when the corresponding permission communication time is valid, and when the permission communication time is invalid, the corresponding user cannot be contacted through the limitation virtual contact number even if the communication initiator belongs to the permission contact. In other embodiments, if the virtual contact number of the communication receiver is the restricted virtual contact number, it is determined that the communication initiator has the communication right according to the related information of the restricted virtual contact number, and then communication can be established between the communication initiator and the communication receiver.
Further, in an embodiment, the virtual contact number generation method may be implemented by a blockchain node, that is, an execution subject of the virtual contact number is one of the nodes of the blockchain.
It should be noted that, in the embodiment that the virtual contact number generation method is implemented by a blockchain node, a user initiating a virtual contact number registration request needs to be a registered user of a blockchain, and have a public key ID and a private key password, where the user may be an individual or an organization; the virtual contact number registration request initiated by the user is used for correspondingly registering a new virtual contact number in an account registered by the user; it will be appreciated that the user may or may not have registered other virtual contact numbers prior to initiating the virtual contact number. In one embodiment, the extracting the user information and the personalized communication authority configuration requirement data carried in the virtual contact number registration request includes: the block chain node extracts a user private key and personalized communication authority configuration demand data carried in the virtual contact number registration request; the user private key is a private key password distributed when the user registers as the block chain user and corresponds to an account of the user; the block chain node needs to verify the private key and determine whether the user has the authority to register the virtual contact number. Further, after the virtual contact number is generated, the virtual contact number is stored in a preset path of the block link point; the preset path is associated with the user private key, namely the preset path is one path in a user account corresponding to the user private key. In the embodiment, the user information and the virtual contact number are stored in the block chain link point in a block mode, and as the block chain adopts decentralized storage, no individual can access the account of the user, so that the privacy information of the user can be better protected.
In a specific embodiment of a method for generating a virtual contact number through a block link point, the method for generating a virtual contact number includes the following steps, and in this embodiment, for example, a user corresponds to a plurality of virtual contact numbers:
the block chain node acquires a virtual contact number registration request, extracts a user private key and personalized communication authority configuration requirement data carried in the virtual contact number registration request, and generates an initial virtual contact number set including an unlimited virtual contact number and a limited virtual contact number when the user private key passes verification. The unlimited virtual contact number is generally used by a user in a private mode, and the limited virtual contact number is used in a specific scene needing to reserve contact information, such as the contact information reserved for an intermediary when the user looks at a house.
The block link points acquire virtual contact number configuration data according to the personalized communication authority configuration demand data, wherein the virtual contact number configuration data comprise allowable contacts and corresponding communication priorities under a virtual contact number limiting list; for example, when the method is specifically applied to a user to find work, the contact way reserved on the recruitment website is a virtual contact number, the user sends a contact person identifier of a contact person (such as HR) needing to be contacted through the restricted virtual contact number to a block chain node as personalized communication authority configuration requirement data, the block chain node acquires the contact person identifier, and the contact person identifier is added to an allowed contact person in a restricted virtual contact number list; meanwhile, the user can also designate the communication priority of the contact person identification, the communication priority is also used as personalized communication authority configuration demand data to be sent to the block chain node, the block chain node updates the initial virtual contact number set based on the allowed contact persons and the corresponding communication priority in the acquired restricted virtual contact number list, the virtual contact number corresponding to the user is acquired, and the virtual contact number corresponding to the user is stored in the block chain node.
Further, the user may send a virtual contact number configuration data adjustment request to the blockchain node server at any time to adjust the virtual contact number configuration data corresponding to the virtual contact number, for example, to temporarily or permanently close the use of the virtual contact number, or to adjust the allowed contacts, the communication priority of the allowed contacts, and the like.
Further, the public state corresponding to the restricted virtual contact number is set as a public restricted virtual contact number according to the personalized communication authority configuration requirement data, and other users can initiate contact person adding requests; for example, in a specific embodiment, a user B reserves a virtual contact number for a user a (the user a is one of allowed contacts of the user B for limiting the virtual contact number), and the disclosure state of the limited virtual contact number of the user B is public, a friend user C of the user a wants to contact the user B through the limited virtual contact number, and can issue an application to the user a by the user C, and the user a and the user C simultaneously use a private key signature to issue a request to a block link (the request sent by the user a for adding the contact is an addition request, and the request sent by the user C for acquiring the communication right is an acquisition request); when the block chain node receives the request, the user A is determined to be one of the allowed contacts of the limited virtual contact number of the user B, the public state of the limited virtual contact number of the user B is public, the block chain node sends confirmation information of the newly added contact C to the user B, the user B can select whether to approve the newly added contact C as the allowed contact according to the requirement after receiving the confirmation information, if so, the block chain node receives feedback information of confirming the newly added contact by the user, and at the moment, the block chain node adds the identification (the target contact identification) of the contact C as the allowed contact in the limited virtual contact number list of the user B. It is understood that in this embodiment, the block link points continuously update the configuration of all users.
In the above embodiment, various pieces of information related to the virtual contact number of the user are updated and synchronized to the block chain at regular time, and the uploading process is consistent with the synchronizing process, so that data are uploaded to any node in the block chain by the block chain node and are spread to the whole network. The nodes in the network can collect the information received in a period of time and integrate the information together to form a block structure stored on the network, and the block structure is diffused to the whole network; after receiving the data in the network, any node compares the data with the data stored by the node and sends a data set approved by the node to the network. Through network diffusion iteration, finally, data information of all nodes in the network is agreed.
Furthermore, the process of communication based on the virtual contact number can be realized through the block chain node; fig. 6 is a schematic diagram illustrating an application scenario in which communication is implemented based on virtual contact numbers through block chains in an embodiment, where a call node represents a block link point for implementing communication, and multiple call nodes may exist in one block chain; the user refers to a user who registers the virtual contact number in the method, and the equipment used by the user can also be one of the block chain link points; in one embodiment, the device where the communication initiator is located and the device where the communication receiver is located may also be nodes of the block chain.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
In an embodiment of the communication based on the virtual contact number, the method includes the following steps: the user A initiates a communication request for communicating with the user B based on the virtual contact number of the user B; after receiving a communication request sent by A, the block link node acquires an identifier of A (an identifier of the communication initiator) and relevant information of a virtual contact number of B (relevant information of the virtual contact number of the communication receiver); if the virtual contact number of the B is the restricted virtual contact number, determining whether the A has the authority of communicating with the B (whether the A is an allowed contact in the restricted virtual contact number list of the B and whether the communication priority of the A accords with the current communication level of the restricted virtual contact number of the B), and if not, terminating the communication; and if the A has the authority of communicating with the B, establishing communication for the A and the B. In another embodiment, the blockchain node establishes communication for a and B if the virtual contact number of B is an unrestricted virtual contact number.
According to the method, the virtual contact number generation method is realized through the block chain nodes, a user can configure virtual contact number configuration data of the virtual contact numbers in a user-defined mode according to requirements, the fact that the specific limitation virtual contact number in the virtual contact numbers limits the contact persons allowed to be contacted to be effectively dialed, one user can generate a plurality of different unlimited virtual contact numbers and limitation virtual contacts, different limitation virtual contact numbers set different allowed contact persons and corresponding communication priorities, the user can change the configuration of the limitation virtual contact persons according to the requirements at any time, and the problem of harassment of telephone short messages and the like of the user is effectively solved.
Fig. 2 is a flowchart illustrating a method for generating a virtual contact number according to an embodiment. It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, the present application provides a virtual contact number generating apparatus, as shown in fig. 7, the apparatus comprising: a registration request obtaining module 710, an information extracting module 720, an initial virtual contact number generating module 730, a virtual contact number configuration data obtaining module 740, and a virtual contact number updating module 750.
Wherein:
a registration request obtaining module 710, configured to obtain a virtual contact number registration request;
the information extraction module 720 is configured to extract user information and personalized communication permission configuration requirement data carried in the virtual contact number registration request;
an initial virtual contact number generating module 730, configured to generate an initial virtual contact number set when the user information passes verification, where the initial virtual contact number set includes a restricted virtual contact number list and an unrestricted virtual contact number list;
a virtual contact number configuration data obtaining module 740, configured to obtain virtual contact number configuration data according to the personalized communication permission configuration requirement data, where the virtual contact number configuration data includes allowable contacts and corresponding communication priorities in the restricted virtual contact number list;
the virtual contact number updating module 750 is configured to update the initial virtual contact number set according to the virtual contact number configuration data association, and generate a virtual contact number.
When a virtual contact number registration request is obtained, and when the user information corresponding to the registration request is confirmed to pass verification, an initial virtual contact number set is generated by the virtual contact number generation device, wherein the initial virtual contact number set comprises a limited virtual contact number list and an unlimited virtual contact number list, and virtual contact number configuration data is obtained according to personalized communication permission configuration demand data carried by the registration request, wherein the virtual contact number configuration data comprises allowed contacts and corresponding communication priorities in the limited virtual contact number list, and the initial virtual contact number set is updated according to the virtual contact number configuration data to generate a virtual contact number; the user can inform relatives and friends of the unlimited virtual contact number in the virtual contact numbers generated by the method for communication, and inform the limited virtual contact number list of people needing to be informed in a specific occasion, and by setting corresponding allowed contacts and communication priorities for the limited virtual contact number list, other users who only allow the contacts and meet the communication priority can be ensured to contact the user through the virtual contact number, and the situation that the user reserves the contact way to leak information under the scene that the information is easy to leak is avoided from receiving harassing calls or short messages of a large number of different numbers and the like.
In another embodiment, as shown in fig. 8, the above apparatus further comprises: a contact person addition request obtaining module 810, a target contact person identification obtaining module 820, a confirmation information sending module 830 and a contact person adding module 840. Wherein:
a contact person addition request obtaining module 810, configured to receive a contact person addition request corresponding to the virtual contact number;
the target contact person identification obtaining module 820 analyzes the contact person adding request to obtain a target contact person identification to be added;
the confirmation information sending module 830 is configured to send contact person newly-added confirmation information to the user when it is determined that the contact person newly-added request is sent by one of the allowed contact persons in the restricted virtual contact number list and the disclosure state of the restricted virtual contact number is public;
and the contact adding module 840 is configured to add the target contact identifier as an allowed contact in the restricted virtual contact number list when receiving feedback information sent by the user and confirming that a new contact is added.
Further, in an embodiment, the contact adding module in the virtual contact number generating device is specifically configured to send contact newly-added confirmation information to the user corresponding to the restricted virtual contact number according to the communication authority acquisition request when receiving the communication authority acquisition request corresponding to the target contact identifier.
In an embodiment, the contact adding module is further configured to add the target contact identifier as an allowed contact in the restricted virtual contact list when the user information corresponding to the contact adding request is consistent with the user information corresponding to the virtual contact.
In one embodiment, the above apparatus further comprises: a communication level update request receiving module, configured to receive a communication level update request sent by a user corresponding to the virtual contact number;
the target communication grade determining module is used for analyzing the communication grade updating request to obtain a target communication grade to be updated;
the communication grade updating module is used for updating the current communication grade associated with the restricted virtual contact number list in the virtual contact numbers to a target communication grade; the current communication level associated with the restricted virtual contact number list is used for allowing the other users to contact the user when the other users contact the user through the restricted virtual contact number list, and the other users are allowed to contact the user when the other users belong to the allowed contact persons and the communication priorities corresponding to the other users accord with the current communication level.
FIG. 9 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the server 120 in fig. 1. As shown in fig. 9, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the virtual contact number generation method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the virtual contact number generation method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the virtual contact number generation apparatus provided in the present application may be implemented in the form of a computer program that is executable on a computer device such as the one shown in fig. 9. The memory of the computer device may store various program modules constituting the virtual contact number generation apparatus, such as a registration request acquisition module, an information extraction module, an initial virtual contact number generation module, a virtual contact number configuration data acquisition module, and a virtual contact number update module shown in fig. 7. The program modules constitute computer programs that cause a processor to execute the steps in the virtual contact number generation method of the embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 9 may receive a registration request of a user through a receiving module in the virtual contact number generating apparatus as shown in fig. 7. The computer device can obtain the virtual contact number registration request through the registration request obtaining module. The computer equipment can extract the user information and the personalized communication authority configuration requirement data carried in the virtual contact number registration request through the information extraction module. The computer equipment can generate an initial virtual contact number set through an initial contact number generating module when the user information passes the verification, wherein the initial virtual contact number set comprises a limited virtual contact number list and an unlimited virtual contact number list. The computer equipment can acquire virtual contact number configuration data according to the personalized communication authority configuration demand data through the contact number configuration data acquisition module, wherein the virtual contact number configuration data comprises allowable contacts and corresponding communication priorities under the virtual contact number list. The computer equipment can update the initial virtual contact number set according to the virtual contact number configuration data association through the virtual contact number updating module to generate the virtual contact number.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the above-described virtual contact number generation method. Here, the steps of the virtual contact number generation method may be steps in the virtual contact number generation method of each of the above embodiments.
In one embodiment, a computer readable storage medium is provided, storing a computer program which, when executed by a processor, causes the processor to perform the steps of the above-described virtual contact number generation method. Here, the steps of the virtual contact number generation method may be steps in the virtual contact number generation method of each of the above embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of virtual contact number generation, the method comprising:
acquiring a virtual contact number registration request;
extracting user information and personalized communication authority configuration requirement data carried in the virtual contact number registration request;
when the user information passes the verification, generating an initial virtual contact number set, wherein the initial virtual contact number set comprises a limited virtual contact number list and an unlimited virtual contact number list;
acquiring virtual contact number configuration data according to the personalized communication authority configuration demand data, wherein the virtual contact number configuration data comprises allowed contacts and corresponding communication priorities in the restricted virtual contact number list;
and updating the initial virtual contact number set according to the virtual contact number configuration data association to generate a virtual contact number.
2. The method of claim 1, wherein the virtual contact number configuration data further comprises a public status corresponding to the restricted virtual contact number list;
after the generating the virtual contact number, further comprising:
acquiring a contact person newly-adding request corresponding to the restricted virtual contact number;
analyzing the contact person adding request to obtain a target contact person identifier to be added;
when the contact person newly-adding request is determined to be sent by one of the allowed contact persons in the restricted virtual contact number list and the public state of the restricted virtual contact number is public, sending contact person newly-adding confirmation information to the user corresponding to the restricted virtual contact number;
and when feedback information which is sent by the user and confirms the newly added contact person is received, adding the target contact person identification as an allowed contact person in the limited virtual contact number list.
3. The method of claim 2, wherein sending contact addition confirmation information to the user corresponding to the restricted virtual contact number comprises:
and when a communication authority acquisition request corresponding to the target contact person identification is received, sending contact person newly-added confirmation information to a user corresponding to the limited virtual contact number according to the communication authority acquisition request.
4. The method of claim 2, further comprising:
and when the user information for sending the contact person adding request is consistent with the user information corresponding to the virtual contact number, adding the target contact person identification as an allowed contact person in the limited virtual contact number list.
5. The method of claim 1, wherein after generating the virtual contact number, further comprising:
receiving a communication level updating request sent by a user corresponding to the virtual contact number;
analyzing the communication grade updating request to obtain a target communication grade to be updated;
updating the current communication grade associated with the restricted virtual contact number list in the virtual contact numbers to the target communication grade; and the current communication grade associated with the restricted virtual contact number list is used for allowing other users to contact the user through the restricted virtual contact number list, and the other users are allowed to contact the user if and only if the other users belong to the allowed contact persons and the communication priorities corresponding to the other users accord with the current communication grade.
6. The method of claim 1, applied to a blockchain node;
the extracting of the user information and the personalized communication authority configuration requirement data carried in the virtual contact number registration request comprises: the block chain node extracts a user private key and personalized communication authority configuration requirement data carried in the virtual contact number registration request;
after the initial virtual contact number set is updated according to the virtual contact number configuration data association and a virtual contact number is generated, the method further includes: and storing the virtual contact number into the block chain node.
7. An apparatus for generating a virtual contact number, the apparatus comprising:
a registration request acquisition module for acquiring a virtual contact number registration request;
the information extraction module is used for extracting the user information and the personalized communication authority configuration requirement data carried in the virtual contact number registration request;
an initial virtual contact number generation module, configured to generate an initial virtual contact number set when the user information passes verification, where the initial virtual contact number set includes a restricted virtual contact number list and an unrestricted virtual contact number list;
a virtual contact number configuration data acquisition module, configured to acquire virtual contact number configuration data according to the personalized communication permission configuration demand data, where the virtual contact number configuration data includes allowed contacts and corresponding communication priorities in the restricted virtual contact number list;
and the virtual contact number updating module is used for updating the initial virtual contact number set according to the virtual contact number configuration data association to generate a virtual contact number.
8. The apparatus of claim 7, further comprising:
the contact person newly-adding request acquisition module is used for receiving a contact person newly-adding request corresponding to the restricted virtual contact number;
the target contact person identification acquisition module analyzes the contact person newly-adding request to acquire a target contact person identification to be added;
the confirmation information sending module is used for sending contact person newly-added confirmation information to the user when the contact person newly-added request is determined to be sent by one of the allowed contact persons in the restricted virtual contact number list and the public state of the restricted virtual contact number is public;
and the contact person adding module is used for adding the target contact person identifier as an allowed contact person in the restricted virtual contact number list when receiving feedback information which is sent by the user and confirms the newly added contact person.
9. A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 6.
10. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 6.
CN202010069474.7A 2020-01-21 2020-01-21 Virtual contact number generation method and device, storage medium and computer equipment Active CN111277711B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010069474.7A CN111277711B (en) 2020-01-21 2020-01-21 Virtual contact number generation method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010069474.7A CN111277711B (en) 2020-01-21 2020-01-21 Virtual contact number generation method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN111277711A true CN111277711A (en) 2020-06-12
CN111277711B CN111277711B (en) 2023-03-24

Family

ID=71001176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010069474.7A Active CN111277711B (en) 2020-01-21 2020-01-21 Virtual contact number generation method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN111277711B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831678A (en) * 2020-09-17 2020-10-27 支付宝(杭州)信息技术有限公司 Privacy protection method and device based on block chain and electronic equipment
CN112714437A (en) * 2020-12-23 2021-04-27 平安普惠企业管理有限公司 Virtual number activation method and device based on block chain and computer equipment
CN113329130A (en) * 2021-06-15 2021-08-31 上海云鱼智能科技有限公司 Pseudo-virtual telephone number using method and device based on Internet and server
CN113472953A (en) * 2021-07-03 2021-10-01 深圳市壹通道科技有限公司 E-commerce platform privacy number voice communication method and system
CN113794794A (en) * 2021-10-08 2021-12-14 北京俩撇科技有限公司 Method, device, equipment and storage medium for adding contact persons based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform
US20160088162A1 (en) * 2014-09-19 2016-03-24 Vonage Network Llc Method and systems for automatically assigning virtual numbers
CN107580151A (en) * 2017-09-14 2018-01-12 北京行圆汽车信息技术有限公司 The distribution method and device of virtual-number
CN108696864A (en) * 2017-04-06 2018-10-23 北京嘀嘀无限科技发展有限公司 Virtual-number is asked and sending method, device and storage medium
CN110677843A (en) * 2018-07-03 2020-01-10 北京旅信顺捷软件科技有限公司 Application method and device of virtual SIM card based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104093136A (en) * 2014-07-21 2014-10-08 中国电信股份有限公司 Method and system for obtaining virtual numbers and virtual number service platform
US20160088162A1 (en) * 2014-09-19 2016-03-24 Vonage Network Llc Method and systems for automatically assigning virtual numbers
CN108696864A (en) * 2017-04-06 2018-10-23 北京嘀嘀无限科技发展有限公司 Virtual-number is asked and sending method, device and storage medium
CN107580151A (en) * 2017-09-14 2018-01-12 北京行圆汽车信息技术有限公司 The distribution method and device of virtual-number
CN110677843A (en) * 2018-07-03 2020-01-10 北京旅信顺捷软件科技有限公司 Application method and device of virtual SIM card based on block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831678A (en) * 2020-09-17 2020-10-27 支付宝(杭州)信息技术有限公司 Privacy protection method and device based on block chain and electronic equipment
CN112714437A (en) * 2020-12-23 2021-04-27 平安普惠企业管理有限公司 Virtual number activation method and device based on block chain and computer equipment
CN112714437B (en) * 2020-12-23 2022-11-04 平安普惠企业管理有限公司 Virtual number activation method and device based on block chain and computer equipment
CN113329130A (en) * 2021-06-15 2021-08-31 上海云鱼智能科技有限公司 Pseudo-virtual telephone number using method and device based on Internet and server
CN113472953A (en) * 2021-07-03 2021-10-01 深圳市壹通道科技有限公司 E-commerce platform privacy number voice communication method and system
CN113794794A (en) * 2021-10-08 2021-12-14 北京俩撇科技有限公司 Method, device, equipment and storage medium for adding contact persons based on block chain
CN113794794B (en) * 2021-10-08 2023-01-06 北京俩撇科技有限公司 Method, device, equipment and storage medium for adding contact persons based on block chain

Also Published As

Publication number Publication date
CN111277711B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN111277711B (en) Virtual contact number generation method and device, storage medium and computer equipment
US10178076B2 (en) Cryptographic security functions based on anticipated changes in dynamic minutiae
CN111488598B (en) Access control method, device, computer equipment and storage medium
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
CN111010372A (en) Block chain network identity authentication system, data processing method and gateway equipment
CN110213223B (en) Service management method, device, system, computer equipment and storage medium
CN111010367B (en) Data storage method and device, computer equipment and storage medium
CN111742531B (en) Profile information sharing
CN112559993B (en) Identity authentication method, device and system and electronic equipment
CN110856174B (en) Access authentication system, method, device, computer equipment and storage medium
CN112187931A (en) Session management method, device, computer equipment and storage medium
CN111294356A (en) Block chain based method and system for organizing node uplink
CN110908786A (en) Intelligent contract calling method, device and medium
CN100527737C (en) Method of providing resources with restricted access
CN110908812A (en) Business data processing method and device, readable storage medium and computer equipment
CN114168923B (en) Group CA certificate generation method and system based on digital certificate
CN114172747B (en) Method and system for group members to obtain authentication certificate based on digital certificate
CN110011796B (en) Certificate updating method and device, computer equipment and storage medium
CN110647583A (en) Block chain construction method, device, terminal and medium
CN111327602B (en) Equipment access processing method, equipment and storage medium
CN112528268A (en) Cross-channel applet login management method and device and related equipment
CN110599332A (en) Block chain-based user intention determination method, device, equipment and storage medium
CN110247879A (en) It calls the generation method of terraced authentication code together and generation system, calls terraced authentication method and system together
KR102332004B1 (en) Method, system and non-transitory computer-readable recording medium for managing an account on blockchain network
CN112714437B (en) Virtual number activation method and device based on block chain and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024198

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant