CN112671864B - Privacy number dynamic allocation system based on active request - Google Patents

Privacy number dynamic allocation system based on active request Download PDF

Info

Publication number
CN112671864B
CN112671864B CN202011481459.XA CN202011481459A CN112671864B CN 112671864 B CN112671864 B CN 112671864B CN 202011481459 A CN202011481459 A CN 202011481459A CN 112671864 B CN112671864 B CN 112671864B
Authority
CN
China
Prior art keywords
platform
privacy
party
privacy number
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011481459.XA
Other languages
Chinese (zh)
Other versions
CN112671864A (en
Inventor
罗晓
刘作
陈杨
黄梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi Dongxin Yitong Technology Co ltd
Original Assignee
Guangxi Dongxin Yitong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Dongxin Yitong Technology Co ltd filed Critical Guangxi Dongxin Yitong Technology Co ltd
Priority to CN202011481459.XA priority Critical patent/CN112671864B/en
Publication of CN112671864A publication Critical patent/CN112671864A/en
Application granted granted Critical
Publication of CN112671864B publication Critical patent/CN112671864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention relates to the technical field of communication, in particular to a privacy number dynamic allocation system based on an active request, which comprises a privacy number platform, a third-party platform and an operator, wherein the privacy number platform and the third-party platform are respectively provided with a platform privacy number pool and a third-party privacy number pool, the privacy number platform acquires a calling request of calling numbers for calling middle numbers in the privacy number pool through a core network of the operator, and is used for initiating a query request to the third-party platform according to the calling request so that the third-party platform dynamically allocates and continues called numbers according to the query request and a set allocation strategy, the third-party platform returns the called numbers and calling control information to the privacy number platform, and the privacy number platform performs continuous calling by using the core network roaming of the operator. The invention can improve the updating time efficiency of the intermediate number binding relationship and simplify the updating process of the intermediate number binding relationship.

Description

Privacy number dynamic allocation system based on active request
Technical Field
The invention relates to the technical field of communication, in particular to a privacy number dynamic allocation system based on an active request.
Background
With the development of modern business models and internet technologies, mobile phone numbers are used as identity labels to circulate among acquaintances such as friends and colleagues, and meanwhile, the mobile phone numbers also bear the identity of a service carrier. The mobile phone number is widely used in business fields such as commercial promotion, e-commerce transaction, logistics distribution, travel service and the like. If the mobile phone number is directly exposed and then illegally used in such scenes, such as short message bombing, telephone harassment and the like, the mobile phone number causes great threat and trouble to personal privacy protection.
In order to realize the function of protecting the privacy of the mobile phone number of the user in various service scenes, a privacy number system platform appears. The privacy number platform carries out continuous communication on the calling party and the called party by using the intermediate number, thereby achieving the effect of privacy protection. The realization of the existing privacy number function requires that a third party platform initiates a request to the privacy number platform to carry out relationship binding on an intermediate number and a calling and called number, thereby determining a connection relationship and further realizing the function of carrying out call connection through the intermediate number. The existing binding and intermediate number distribution method and call connection process are as follows: the privacy number platform maintains an available intermediate number pool, the third party platform performs number binding and determines call control information (ring tones, sound recordings and the like) by sending a request to the privacy number platform, and the privacy number platform maintains and saves the number binding relationship and the call control information. The calling party initiates a call, and the privacy number platform performs call connection between the intermediate number and the called party according to the binding relationship, so that the privacy number function is realized.
The existing binding and distribution are completed on a privacy number platform, and if a third-party platform wants to create an updating binding relationship, a request must be sent to the privacy number platform to perform unbinding, binding and updating operations. The timeliness is poor, the intermediate number cannot be dynamically allocated in real time, and the operation process is complex.
Disclosure of Invention
In order to solve the above problems, the present invention provides a privacy number dynamic allocation system based on an active request, which can improve the update timeliness of the intermediate number binding relationship and simplify the update procedure of the intermediate number binding relationship.
In order to achieve the purpose, the invention adopts the technical scheme that:
a privacy number dynamic allocation system based on active request comprises a privacy number platform, a third party platform and an operator,
the privacy number platform is provided with a platform privacy number pool, the third party platform is provided with a third party privacy number pool, and the privacy number platform synchronizes the content of the platform privacy number pool to the third party privacy number pool so that the third party platform sets an allocation strategy according to the third party privacy number pool;
the privacy number platform obtains a calling request of calling number calling an intermediate number in a privacy number pool through the operator core network, and is used for initiating a query request to the third party platform according to the calling request so that the third party platform can dynamically distribute and continue the called number according to the query request and the set distribution strategy, and the third party platform returns the called number and calling control information to the privacy number platform so that the privacy number platform can carry out continuous calling on the called number returned by the third party platform by utilizing the core network roaming of the operator through the corresponding intermediate number in the platform privacy number pool.
Furthermore, the privacy number platform and the third-party platform perform request synchronization through a server, so that the intermediate number of the platform privacy number pool is synchronized with the corresponding intermediate number information of the third-party privacy number pool.
Further, after the privacy number platform obtains the call request, the privacy number platform initiates a query request to the corresponding third-party platform according to the intermediate number corresponding to the platform privacy number pool, and the privacy number platform submits the calling number and the intermediate number of the platform privacy number pool to the third-party platform and synchronously waits for the request result to return, so that the third-party platform can query and distribute the called number according to the calling number and the intermediate number of the platform privacy number pool according to a set distribution strategy.
Furthermore, the third party platform is also used for registering the calling number and the called number.
Furthermore, the privacy number platform is also used for setting a blacklist library, and the blacklist library is arranged in the platform privacy number pool; after the privacy number platform obtains the call request, the privacy number platform inquires and checks according to the set blacklist library to judge whether the calling number exists in the blacklist library, when the calling number exists in the blacklist library, the privacy number platform refuses to continue, and when the calling number does not exist in the blacklist library, the privacy number platform encrypts and signs the calling number and the intermediate number through a secret key and then initiates the call inquiry request to the third party platform.
Further, the third-party platform is also used for setting an IP white list library, and the IP white list library is arranged in the third-party privacy number pool; after the privacy number platform initiates a call inquiry request, the third party platform judges whether a call request IP exists in the IP white list library, and when the call request IP does not exist in the IP white list library, the privacy number platform receives a return error prompt of the third party platform and refuses call continuation;
when the call request IP exists in the IP white list library, the third-party platform signs the received request content of the privacy number platform by using a secret key, compares the signature with the signature carried by the request, returns an error prompt with inconsistent signature when the signature is inconsistent, and the privacy number platform receives the error prompt and refuses the call connection; and when the signature is consistent with the third-party platform, the third-party platform returns call control information including the called party, and the privacy number platform receives the call control information and then carries out communication connection.
Further, the privacy number platform and the third-party platform perform request interaction security verification through secret key encryption and signature.
Further, the privacy number dynamic allocation method based on the active request comprises the following steps:
s1, the privacy number platform and the third party platform request to synchronize the intermediate number of a privacy number pool and the corresponding intermediate number information of the third party privacy number pool through a server;
s2, the third party platform sets an allocation strategy of the intermediate number and the calling party and the called party in the third party privacy number pool;
s3, the calling number inquires an intermediate number corresponding to the called number in the third-party privacy number pool through the third-party platform, and the calling number dials the intermediate number:
s4, a calling request from a calling number to the intermediate number of the third party privacy number pool roams to the privacy number platform through a core network of the operator;
s5, the privacy number platform carries out inquiry and verification according to the set blacklist library and judges whether the calling number exists in the blacklist library or not; when the calling number belongs to the blacklist library, the privacy number platform refuses to continue, and when the calling number does not belong to the blacklist library, the step S6 is carried out;
s6, after the privacy number platform initiates a call inquiry request, the third-party platform judges whether a call request IP exists in the IP white list library or not; when the call request IP does not exist in the IP white list library, the third-party platform returns an error prompt to the privacy number platform and refuses to inquire, when the call request IP exists in the IP white list library, the third-party platform encrypts and signs the request content of the privacy number platform by adopting a secret key agreed by both parties, compares the encrypted and signed content with the signature of the privacy number platform, when the signatures are inconsistent, the third-party platform returns an error prompt to the privacy number platform and refuses to inquire, and when the signatures are consistent, the step S7 is carried out;
s7, the third party platform initiates a query request according to a calling number and an intermediate number corresponding to the platform privacy number pool, and the third party platform queries and distributes a called number according to the calling number and the intermediate number of the platform privacy number pool;
s8, the third party platform returns the called number and the call control information to the privacy number platform, and the privacy number platform calls the called number returned by the third party platform by using core network roaming through a corresponding intermediate number in the platform privacy number pool;
and S9, the operator calls the called party through the intermediate number of the platform privacy number pool to carry out call connection.
The beneficial effects of the invention are:
1. because the privacy number platform obtains the calling request of calling number calling the intermediate number in the privacy number pool through the operator core network, and the privacy number platform can actively initiate a query request to the third party platform according to the calling request so as to realize the query according to the calling number and the intermediate number in the third party privacy number pool, dynamically distribute and continue the called party, and simultaneously the third party platform returns the called number and the calling control information to the privacy number platform, so that the privacy number platform continues the calling party and the called party according to the query result, the binding and distribution time efficiency of the intermediate number in the privacy number platform is improved, the instant distribution is realized, and the tedious procedures that the third party platform is used for binding and updating the privacy number platform frequently are reduced.
2. If the number binding relationship and the distribution strategy of the third-party platform user are stored in the privacy number platform, the protection of the privacy and the business privacy of the user and the third-party platform is not facilitated. Once the binding relationship is determined, the security protection of the called number and the intermediate number depends on the single platform control and processing of the privacy number platform, and the security policy adjustment and verification can not be timely and effectively carried out. The invention enhances the privacy of the intermediate number and the called number and the safety protection of the business secret of the third party platform. The blacklist bank is set by the privacy number platform, so that the privacy number platform can inquire the calling number to judge whether the calling number belongs to the number of the blacklist bank, and abnormal numbers are prevented from using the privacy number platform; the IP white list library is set through the third-party platform, so that the third-party platform can judge the white list of the call request IP of the privacy number platform, and the use safety of the third-party platform is ensured. And the privacy number platform carries out request interaction by encrypting the signature with the third party platform through the secret key, and the security verification of the request interaction is realized and the security of the third party platform is improved through the comparison of the encrypted signature. The privacy number platform does not store the service binding relationship of the third-party platform, so that the service privacy of the third-party platform is protected; the third-party platform can flexibly adjust the security policy at any time, and the security protection flexibility is enhanced. And IP and signature verification are carried out between the privacy number platform and the third-party platform, so that the reliability of safety protection is enhanced.
Drawings
Fig. 1 is a block diagram of a privacy number dynamic allocation system based on unsolicited request according to a preferred embodiment of the present invention.
FIG. 2 is a timing diagram of the privacy number dynamic allocation system based on active request according to a preferred embodiment of the present invention.
FIG. 3 is a flow chart of the privacy number dynamic allocation system based on active request according to a preferred embodiment of the present invention.
In the figure, 1-privacy number platform, 11-platform privacy number pool, 2-third party platform, 21-third party privacy number pool, and 3-operator.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
Referring to fig. 1 to fig. 3, a privacy number dynamic allocation system based on active request according to a preferred embodiment of the present invention includes a privacy number platform 1, a third party platform 2 and an operator 3.
Privacy number platform 1 is equipped with platform privacy number pond 11, and third party platform 2 is equipped with third party privacy number pond 21, and privacy number platform 1 is synchronous to third party privacy number pond 21 with the content in platform privacy number pond 11 to make third party platform 2 set for the distribution strategy according to third party privacy number pond 21. In this embodiment, the platform privacy number pool 11 allocates a privacy number to each third-party platform, and the third-party privacy number pool 21 is obtained from the privacy numbers to which the privacy number platform 1 belongs synchronously.
In this embodiment, the privacy number platform 1 and the third party platform 2 perform request synchronization through the server, so that the intermediate number of the platform privacy number pool 11 is synchronized with the intermediate number information of the corresponding third party privacy number pool 21.
The third party platform 2 is also used for registration of calling numbers and called numbers.
The privacy number platform 1 obtains a calling request of calling a calling number to call an intermediate number in the privacy number pool 21 through a core network of an operator 3, and the privacy number platform 1 is used for initiating a query request to the third party platform 2 according to the calling request so that the third party platform 2 dynamically allocates and continues the called number according to the query request and a set allocation strategy, and the third party platform 2 returns the called number and calling control information to the privacy number platform 1 so that the privacy number platform 1 performs continuous calling on the called number returned by the third party platform 2 through roaming of the core network of the operator 3 through the corresponding intermediate number in the platform privacy number pool 11.
In this embodiment, after the privacy number platform 1 obtains the call request, the privacy number platform 1 initiates a query request to the corresponding third party platform 2 according to the intermediate number corresponding to the platform privacy number pool 11, and the privacy number platform 1 submits the calling number and the intermediate number of the platform privacy number pool 11 to the third party platform 2 and synchronously waits for the request result to return, so that the third party platform 2 can query and allocate the called number according to the calling number and the intermediate number of the platform privacy number pool 11 according to the set allocation policy.
The privacy number platform 1 obtains a calling request of calling a calling number to call an intermediate number in the third-party privacy number pool 21 through the core network of the operator 3, and the privacy number platform 1 can actively initiate a query request to the third-party platform 2 according to the calling request so as to realize query according to the calling number and the intermediate number in the third-party privacy number pool 21 and dynamically distribute and continue the called party.
Meanwhile, the called number and the call control information are returned to the privacy number platform 1 by the third party platform 2, so that the privacy number platform 1 can carry out calling and called connection according to the query result, the binding and distribution timeliness of the intermediate number of the privacy number platform is improved, instant distribution is realized, the tedious processes of the third party platform for binding and updating the frequent privacy number platform request are reduced, the updating timeliness of the intermediate number binding relationship is improved, and the updating process of the intermediate number binding relationship is simplified.
In this embodiment, the privacy number platform 1 is further configured to set a blacklist library, and the blacklist library is disposed in the platform privacy number pool 11.
After the privacy number platform 1 obtains the call request, the privacy number platform 1 inquires and checks according to the set blacklist library to judge whether the calling number exists in the blacklist library, when the calling number exists in the blacklist library, the privacy number platform 1 refuses to continue, and when the calling number does not exist in the blacklist library, the privacy number platform 1 carries out encryption signature on the calling number and the intermediate number through a secret key and then initiates the call inquiry request to the third party platform 2.
The third party platform 2 is also used for setting an IP white list library, and the IP white list library is arranged in the third party privacy number pool 21.
After the privacy number platform 1 initiates a call inquiry request, the third party platform 2 judges whether a call request IP exists in an IP white list library, and when the call request IP does not exist in the IP white list library, the privacy number platform 1 receives a return error prompt of the third party platform 2 and refuses call connection.
When the call request IP exists in the IP white list library, the third party platform 2 signs the received request content of the privacy number platform 1 by using a secret key, compares the signature with the signature carried by the request, and when the signature is inconsistent, the third party platform 2 returns an error prompt with inconsistent signature, and the privacy number platform 1 receives the error prompt and refuses the connection of the call; when the signature is consistent with the signature, the third-party platform 2 returns the call control information including the called party, and the privacy number platform 1 receives the call control information and then carries out communication connection.
If the number binding relationship and the distribution strategy of the third party platform 2 user are stored in the privacy number platform, the number binding relationship and the distribution strategy are stored in the privacy number platform, and therefore the protection of the privacy and the business secret of the user and the third party platform is not facilitated. Once the binding relationship is determined, the security protection of the called number and the intermediate number depends on the single platform control and processing of the privacy number platform, and the security policy adjustment and verification can not be performed timely and effectively. In the invention, the privacy of the intermediate number and the called number is enhanced, and the safety protection of the business secret of the third party platform 2 is realized.
The blacklist library is set through the privacy number platform 1, so that the privacy number platform 1 can inquire the calling number to judge whether the calling number belongs to the number of the blacklist library, and the privacy number platform 1 is prevented from being used by abnormal numbers. Meanwhile, the IP white list library is set through the third-party platform 2, so that the third-party platform 2 can judge the white list of the call request IP of the privacy number platform 1, and the use safety of the third-party platform 2 is ensured.
And the privacy number platform 1 and the third party platform 2 encrypt the signature by using the secret key to carry out request interaction, and the encrypted signature comparison realizes the safety verification of the request interaction and improves the safety of the third party platform.
The privacy number platform does not store the service binding relationship of the third-party platform 2, and the service privacy of the third-party platform 2 is protected. And IP and signature verification are carried out between the privacy number platform 1 and the third party platform 2, so that the reliability of safety protection is enhanced.
The privacy number platform 1 and the third party platform 2 of this embodiment perform security verification of the encrypted key of the signature through request interaction, and the encrypted key may perform encryption signature through the key agreed by both the privacy number platform 1 and the third party platform 2, so as to realize flexible adjustment of the security policy at any time.
As shown in fig. 3, the privacy number dynamic allocation method based on active request includes the following steps:
s1, a privacy number platform 1 and a third party platform 2 request to synchronize the intermediate number of a privacy number pool 11 and the intermediate number information of a corresponding third party privacy number pool 21 through a server;
s2, the third party platform 2 sets a distribution strategy of the intermediate number and the calling party and the called party in the third party privacy number pool 21;
s3, the calling number inquires an intermediate number corresponding to the called number in the third party privacy number pool 21 through the third party platform 2, and the calling number dials the intermediate number:
s4, a call request from the calling number to the intermediate number of the third party privacy number pool 21 roams to the privacy number platform 2 through a core network of an operator 3;
s5, the privacy number platform 1 inquires and checks according to the set blacklist library and judges whether the calling number exists in the blacklist library; when the calling number belongs to the blacklist library, the privacy number platform 1 refuses to continue, and when the calling number does not belong to the blacklist library, the step S6 is carried out;
s6, after the privacy number platform 1 initiates a call inquiry request, the third party platform 2 judges whether a call request IP exists in an IP white list library or not; when the call request IP does not exist in the IP white list library, the third party platform 2 returns an error prompt to the privacy number platform 1 and refuses to inquire, when the call request IP exists in the IP white list library, the third party platform 2 encrypts and signs the request content of the privacy number platform 1 by adopting a secret key agreed by both parties, compares the encrypted and signed content with the signature of the privacy number platform 1, when the signatures are inconsistent, the third party platform 2 returns an error prompt to the privacy number platform 1 and refuses to inquire, and when the signatures are consistent, the step S7 is carried out;
and S7, the third party platform 2 initiates a query request according to the calling number and the intermediate number corresponding to the platform privacy number pool 11, and the third party platform 2 queries and distributes the called number according to the calling number and the intermediate number of the platform privacy number pool 11.
And S8, the third party platform 2 returns the called number and the call control information to the privacy number platform 1, and the privacy number platform 1 calls the called number returned by the third party platform 2 by using core network roaming through a corresponding intermediate number in the platform privacy number pool 11.
And S9, the operator calls the called party through the intermediate number of the platform privacy number pool 11 so as to carry out call connection.

Claims (8)

1. A privacy number dynamic distribution system based on active request is characterized by comprising a privacy number platform (1), a third party platform (2) and an operator (3),
the privacy number platform (1) is provided with a platform privacy number pool (11), the third-party platform (2) is provided with a third-party privacy number pool (21), and the privacy number platform (1) synchronizes the content of the platform privacy number pool (11) to the third-party privacy number pool (21) so that the third-party platform (2) sets an allocation strategy according to the third-party privacy number pool (21);
the privacy number platform (1) acquires a calling request of calling a number to call an intermediate number in a privacy number pool (21) through a core network of an operator (3), and the privacy number platform (1) is used for initiating a query request to the third party platform (2) according to the calling request so as to enable the third party platform (2) to dynamically distribute a continuous called number according to the query request and a set distribution strategy, and the third party platform (2) returns the called number and calling control information to the privacy number platform (1) so as to enable the privacy number platform (1) to carry out continuous calling on the called number returned by the third party platform (2) by utilizing the core network roaming of the operator (3) through the corresponding intermediate number in the platform privacy number pool (11).
2. The system according to claim 1, wherein the privacy number dynamic allocation system based on active request comprises: the privacy number platform (1) and the third party platform (2) perform request synchronization through a server, so that the intermediate numbers of the platform privacy number pool (11) are synchronized with the corresponding intermediate number information of the third party privacy number pool (21).
3. The system according to claim 2, wherein the privacy number dynamic allocation system based on active request comprises: after the privacy number platform (1) obtains a call request, the privacy number platform (1) initiates a query request to the corresponding third-party platform (2) according to the intermediate number corresponding to the platform privacy number pool (11), and the privacy number platform (1) submits the calling number and the intermediate number of the platform privacy number pool (11) to the third-party platform (2) and synchronously waits for the request result to return, so that the third-party platform (2) can query and distribute the called number according to the calling number and the intermediate number of the platform privacy number pool (11) according to a set distribution strategy.
4. The system according to claim 1, wherein the privacy number dynamic allocation system based on active request comprises: the third party platform (2) is also used for registering a calling number and a called number.
5. The system according to claim 1, wherein the privacy number dynamic allocation system based on active request comprises: the privacy number platform (1) is also used for setting a blacklist library, and the blacklist library is arranged in the platform privacy number pool (11); after the privacy number platform (1) obtains a call request, the privacy number platform (1) queries and checks according to the set blacklist library to judge whether the calling number exists in the blacklist library, when the calling number exists in the blacklist library, the privacy number platform (1) refuses to continue, and when the calling number does not exist in the blacklist library, the privacy number platform (1) conducts encryption and signature on the calling number and the intermediate number through a secret key and then initiates a call query request to the third party platform (2).
6. The system according to claim 5, wherein the privacy number dynamic allocation system based on active request comprises: the third-party platform (2) is also used for setting an IP white list library, and the IP white list library is arranged in the third-party privacy number pool (21); after the privacy number platform (1) initiates a call inquiry request, the third party platform (2) judges whether a call request IP exists in the IP white list library, and when the call request IP does not exist in the IP white list library, the privacy number platform (1) receives a return error prompt of the third party platform (2) and refuses call connection;
when the call request IP exists in the IP white list library, the third party platform (2) signs the received request content of the privacy number platform (1) by using a secret key, compares the signature with the signature carried by the request, and when the signature is inconsistent, the third party platform (2) returns an error prompt with inconsistent signature, and the privacy number platform (1) receives the error prompt and refuses the call connection; and when the signature is consistent with the third-party platform (2), the third-party platform (2) returns call control information including the called party, and the privacy number platform (1) receives the call control information and then carries out call connection.
7. The system according to claim 6, wherein the privacy number dynamic allocation system based on active request comprises: and the privacy number platform (1) and the third party platform (2) perform request interaction security verification through secret key encryption and signature.
8. The system according to any of claims 1-7, wherein the system comprises: the privacy number dynamic allocation method based on the active request comprises the following steps:
s1, the privacy number platform (1) and the third party platform (2) request to synchronize the intermediate number of a privacy number pool (11) and the intermediate number information of the corresponding third party privacy number pool (21) through a server;
s2, the third party platform (2) sets a distribution strategy of the intermediate number and the calling party and the called party in the third party privacy number pool (21);
s3, the calling number inquires an intermediate number corresponding to the called number in the third-party privacy number pool (21) through the third-party platform (2), and the calling number dials the intermediate number:
s4, a calling request from a calling number to an intermediate number of the third party privacy number pool (21) roams to the privacy number platform (2) through a core network of the operator (3);
s5, the privacy number platform (1) carries out inquiry and verification according to the set blacklist library and judges whether the calling number exists in the blacklist library or not; when the calling number belongs to the blacklist library, the privacy number platform (1) refuses to continue, and when the calling number does not belong to the blacklist library, the step S6 is carried out;
s6, after the privacy number platform (1) initiates a call inquiry request, the third-party platform (2) judges whether a call request IP exists in the IP white list library or not; when the call request IP does not exist in the IP white list library, the third-party platform (2) returns an error prompt to the privacy number platform (1) and refuses to inquire, when the call request IP exists in the IP white list library, the third-party platform (2) encrypts and signs the request content of the privacy number platform (1) by adopting a secret key agreed by both parties, compares the encrypted and signed content with the signature of the privacy number platform (1), when the signatures are inconsistent, the third-party platform (2) returns an error prompt to the privacy number platform (1) and refuses to inquire, and when the signatures are consistent, the step S7 is carried out;
s7, the third party platform (2) initiates a query request according to a calling number and an intermediate number corresponding to the platform privacy number pool (11), and the third party platform (2) queries and distributes a called number according to the calling number and the intermediate number of the platform privacy number pool (11);
s8, the third party platform (2) returns the called number and the call control information to the privacy number platform (1), and the privacy number platform (1) calls the called number returned by the third party platform (2) by using core network roaming through a corresponding intermediate number in the platform privacy number pool (11);
and S9, the operator calls the called party through the intermediate number of the platform privacy number pool (11) to carry out call connection.
CN202011481459.XA 2020-12-15 2020-12-15 Privacy number dynamic allocation system based on active request Active CN112671864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011481459.XA CN112671864B (en) 2020-12-15 2020-12-15 Privacy number dynamic allocation system based on active request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011481459.XA CN112671864B (en) 2020-12-15 2020-12-15 Privacy number dynamic allocation system based on active request

Publications (2)

Publication Number Publication Date
CN112671864A CN112671864A (en) 2021-04-16
CN112671864B true CN112671864B (en) 2023-04-07

Family

ID=75405148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011481459.XA Active CN112671864B (en) 2020-12-15 2020-12-15 Privacy number dynamic allocation system based on active request

Country Status (1)

Country Link
CN (1) CN112671864B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225440B (en) * 2021-04-22 2022-09-02 广西东信易通科技有限公司 Management method of cloud communication network slices, computer equipment and storage medium
CN113438370B (en) * 2021-06-24 2022-08-30 广西东信易通科技有限公司 System and method for reducing privacy number continuing time delay
CN114048339B (en) * 2021-08-19 2022-08-05 广西东信易通科技有限公司 Intelligent AI (Artificial intelligence) query method and system for privacy number marking
CN113852723B (en) * 2021-11-22 2022-08-16 阿里云计算有限公司 Number scheduling method, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9203955B1 (en) * 2001-11-01 2015-12-01 Callwave Communications, Llc Methods and systems for creating a dynamic call log and contact records
CN108234779A (en) * 2017-05-05 2018-06-29 深圳市大众通信技术有限公司 The System and method for of true number is hidden in a kind of calling procedure
CN108366075A (en) * 2018-03-09 2018-08-03 中国—东盟信息港股份有限公司 A kind of security privacy number protecting platform based on core net Security Techniques
CN108566498A (en) * 2018-03-09 2018-09-21 中国—东盟信息港股份有限公司 A kind of guard method of phone number security privacy and platform based on mobile Internet
CN109391476A (en) * 2017-08-03 2019-02-26 腾讯科技(深圳)有限公司 Internet phone-calling method, apparatus and system
CN111131631A (en) * 2019-12-02 2020-05-08 华迪计算机集团有限公司 Security communication method and system based on privacy protection
CN111866287A (en) * 2019-04-28 2020-10-30 中国移动通信集团河南有限公司 Multimedia communication method, device and system based on third-party platform system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3071126B1 (en) * 2017-09-13 2020-12-11 Onoff Telecom TELEPHONE LINKAGE PROCEDURE FOR A MULTI-NUMBER COMMUNICATION TERMINAL

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9203955B1 (en) * 2001-11-01 2015-12-01 Callwave Communications, Llc Methods and systems for creating a dynamic call log and contact records
CN108234779A (en) * 2017-05-05 2018-06-29 深圳市大众通信技术有限公司 The System and method for of true number is hidden in a kind of calling procedure
CN109391476A (en) * 2017-08-03 2019-02-26 腾讯科技(深圳)有限公司 Internet phone-calling method, apparatus and system
CN108366075A (en) * 2018-03-09 2018-08-03 中国—东盟信息港股份有限公司 A kind of security privacy number protecting platform based on core net Security Techniques
CN108566498A (en) * 2018-03-09 2018-09-21 中国—东盟信息港股份有限公司 A kind of guard method of phone number security privacy and platform based on mobile Internet
CN111866287A (en) * 2019-04-28 2020-10-30 中国移动通信集团河南有限公司 Multimedia communication method, device and system based on third-party platform system
CN111131631A (en) * 2019-12-02 2020-05-08 华迪计算机集团有限公司 Security communication method and system based on privacy protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于IMS的下一代融合网络安全接入方案的研究";张朝辉;《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》;20140131;全文 *

Also Published As

Publication number Publication date
CN112671864A (en) 2021-04-16

Similar Documents

Publication Publication Date Title
CN112671864B (en) Privacy number dynamic allocation system based on active request
US20090025075A1 (en) On-demand authentication of call session party information during a telephone call
US6779020B1 (en) Establishing communications between a calling server and a called server according to services subscribed by their respective calling and called parties
CN100484274C (en) Packet mode speech communication
US5410602A (en) Method for key management of point-to-point communications
RU2315438C2 (en) Peer phone system
US5615266A (en) Secure communication setup method
CN109756889B (en) Block chain-based group number portability method and system
CN106302927A (en) The voice call platform that two-way number is hidden
JP2003534747A (en) Communication protection system and method
CN102025719B (en) Next generation integration between different domains using sequencing applications and IMS peering
CN108901018A (en) A kind of mobile communication system user identity hiding method that terminal is initiated
GB2398707A (en) Authentication method for enabling a user of a mobile station to access private data or services
CN109474926B (en) Block chain-based number portability method and device and storage medium
CN109525983B (en) Information processing method and device, and storage medium
EP0660564A2 (en) Secure communication setup method
CN109743699B (en) Communication method and system based on block chain
CN109673010B (en) Block chain-based number portability method and device and storage medium
CN113596262A (en) Method for increasing efficiency and ensuring full coverage of call based on logistics industry and service platform
CN113079258A (en) Number privacy protection method, network device and computer storage medium
CN107708103B (en) Method for realizing number security based on MAP signaling
US20090129293A1 (en) Recording a circuit switched call using an ip based control interface
CN109548021B (en) Communication method and system based on block chain
CN109714752B (en) Communication method and system based on block chain
Du et al. {UCBlocker}: Unwanted call blocking using anonymous authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant