CN113596263A - Call method and device, server, initiating terminal, receiving terminal and storage medium - Google Patents

Call method and device, server, initiating terminal, receiving terminal and storage medium Download PDF

Info

Publication number
CN113596263A
CN113596263A CN202110744154.1A CN202110744154A CN113596263A CN 113596263 A CN113596263 A CN 113596263A CN 202110744154 A CN202110744154 A CN 202110744154A CN 113596263 A CN113596263 A CN 113596263A
Authority
CN
China
Prior art keywords
communication
communication identifier
teleconference
control instruction
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110744154.1A
Other languages
Chinese (zh)
Inventor
李信
李贺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202110744154.1A priority Critical patent/CN113596263A/en
Publication of CN113596263A publication Critical patent/CN113596263A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/56Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure relates to a conversation method and device, a server, an initiating terminal, a receiving terminal and a storage medium; the call method applied to the server comprises the following steps: acquiring a first request instruction for requesting to establish a teleconference; wherein the conference call is a session in which at least three terminals participate; determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not based on the first request instruction; responding to a communication identifier hiding requirement of at least one communication terminal, and issuing a first control instruction for establishing the teleconference; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement. Therefore, the protection of the privacy of the user in the teleconference in which at least three terminals participate can be realized by controlling the information carried by the issued first control instruction.

Description

Call method and device, server, initiating terminal, receiving terminal and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a communication method and apparatus, a server, an originating terminal, a receiving terminal, and a storage medium.
Background
With the popularization of mobile phones, the realization of multi-party, remote and real-time online communication based on mobile phones is increasing. In such online communication, various communication services have emerged in response to various user demands. For example, when caller privacy is to be protected in exchange, each large communications carrier proposes: a calling line identification restriction service (CLIR) capable of restricting the display of a calling telephone number on a called handset. However, this service can only be applied to one-to-one call services, and the CLIR service will automatically fail in a call in which at least three parties participate, so a user privacy protection scheme for the call in which at least three parties participate is urgently needed.
Disclosure of Invention
The disclosure provides a call method and device, a server, an initiating terminal, a receiving terminal and a storage medium.
According to a first aspect of the embodiments of the present disclosure, there is provided a call method, applied to a server, including:
acquiring a first request instruction for requesting to establish a teleconference; wherein the conference call is a session in which at least three terminals participate;
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not based on the first request instruction;
responding to a communication identifier hiding requirement of at least one communication terminal, and issuing a first control instruction for establishing the teleconference; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
Optionally, the communication terminal includes: a receiving end for receiving the teleconference;
the issuing of the first control instruction for establishing the teleconference in response to the communication identifier hiding requirement of the at least one communication terminal includes:
and responding to a communication identifier hiding requirement of a target receiving end in at least one receiving end, and issuing a first control instruction to the receiving ends except the target receiving end in the communication ends participating in the teleconference.
Optionally, the communication terminal includes: an originating terminal that initiates the teleconference;
the method further comprises the following steps:
acquiring a second request instruction for requesting to establish point-to-point communication;
responding to a communication identifier hiding requirement of the initiating terminal in the second request instruction, and sending a second control instruction for establishing the point-to-point call; the second control instruction does not carry the communication identifier of the initiating terminal or carry the ciphertext of the communication identifier of the initiating terminal.
Optionally, the determining, based on the first request instruction, whether a communication end to participate in the teleconference has a communication identifier hiding requirement includes:
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not according to service opening information carried in the first request instruction; the service opening information is used for indicating whether a communication identifier hiding service is opened at the communication terminal to participate in the teleconference.
Optionally, the method further comprises:
responding to the situation that a communication end to participate in the teleconference does not have a communication identifier hiding requirement, and issuing a third control instruction for establishing the teleconference; and the third control instruction carries the plaintext of the communication identifier of each communication end.
According to a second aspect of the embodiments of the present disclosure, there is provided a call method applied to an originating end, including:
sending a first request instruction for requesting to establish a teleconference; the first request instruction is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate;
establishing the teleconference according to a first control instruction issued by the server based on the first request instruction; wherein the content of the first and second substances,
when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
Optionally, the method further comprises:
sending a second request instruction for requesting to establish the point-to-point call;
establishing point-to-point communication with a receiving end indicated in the second request instruction according to a second control instruction issued by the server based on the second request instruction; when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal.
Optionally, the method further comprises:
establishing the teleconference according to a third control instruction issued by the server based on the first request instruction; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
According to a second aspect of the embodiments of the present disclosure, there is provided a call method applied to a receiving end, including:
receiving a first control instruction issued by a server based on a first request instruction sent by an initiator; wherein the content of the first and second substances,
the first request instruction is used for requesting to establish a teleconference and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement;
and establishing the teleconference based on the first control instruction.
Optionally, the method further comprises:
receiving a second control instruction issued by the server based on a second request instruction sent by the initiating terminal; the second request instruction is used for requesting to establish a point-to-point call, and when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal;
and establishing point-to-point conversation with the initiating terminal indicated in the second request instruction based on the second control instruction.
Optionally, the method further comprises:
receiving a third control instruction issued by the server based on the first request instruction sent by the initiating terminal; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
According to a fourth aspect of embodiments of the present disclosure, there is provided a server, including:
the first acquisition module is used for acquiring a first request instruction for requesting to establish a teleconference; wherein the conference call is a session in which at least three terminals participate;
the determining module is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not based on the first request instruction;
the first response module is used for responding to a communication identifier hiding requirement of the at least one communication terminal and issuing a first control instruction for establishing the teleconference; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
Optionally, the communication terminal includes: a receiving end for receiving the teleconference;
the first response module is further configured to:
and responding to a communication identifier hiding requirement of a target receiving end in at least one receiving end, and issuing a first control instruction to the receiving ends except the target receiving end in the communication ends participating in the teleconference.
Optionally, the communication terminal includes: an originating terminal that initiates the teleconference;
the server further comprises:
the second acquisition module is used for acquiring a second request instruction for requesting to establish the point-to-point call;
a second response module, configured to send a second control instruction for establishing the peer-to-peer session in response to a communication identifier hiding requirement of the originating terminal in the second request instruction; the second control instruction does not carry the communication identifier of the initiating terminal or carry the ciphertext of the communication identifier of the initiating terminal.
Optionally, the determining module is further configured to:
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not according to service opening information carried in the first request instruction; the service opening information is used for indicating whether a communication identifier hiding service is opened at the communication terminal to participate in the teleconference.
Optionally, the server further comprises:
the third response module is used for responding that the communication end to participate in the teleconference does not have a communication identifier hiding requirement, and issuing a third control instruction for establishing the teleconference; and the third control instruction carries the plaintext of the communication identifier of each communication end.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an initiating terminal comprising:
the first sending module is used for sending a first request instruction for requesting to establish a teleconference; the first request instruction is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate;
the first establishing module is used for establishing the teleconference according to a first control instruction issued by the server based on the first request instruction; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
Optionally, the initiating end further comprises:
the second sending module is used for sending a second request instruction for requesting to establish the point-to-point call;
the second establishing module is used for establishing point-to-point conversation with the receiving end indicated in the second request instruction according to a second control instruction issued by the server based on the second request instruction; when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal.
Optionally, the initiating end further comprises:
the third establishing module is used for establishing the teleconference according to a third control instruction issued by the server based on the first request instruction; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a receiving end, including:
the first receiving module is used for receiving a first control instruction issued by the server based on a first request instruction sent by the initiating terminal; the first request instruction is used for requesting to establish a teleconference and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement;
and the fourth establishing module is used for establishing the teleconference based on the first control instruction.
Optionally, the receiving end further includes:
the second receiving module is used for receiving a second control instruction issued by the server based on a second request instruction sent by the initiating terminal; the second request instruction is used for requesting to establish a point-to-point call, and when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal;
and the fifth establishing module is used for establishing point-to-point conversation with the initiating terminal indicated in the second request instruction based on the second control instruction.
Optionally, the receiving end further includes:
the third receiving module is used for receiving a third control instruction issued by the server based on the first request instruction sent by the initiating terminal; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
According to a seventh aspect of the disclosed embodiments, there is provided a call device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the steps of the method of any of the first, second or third aspects described above are implemented when executable instructions stored in the memory are executed.
According to an eighth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, implement the steps in the method provided by any one of the first, second or third aspects described above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the call method provided by the embodiment of the disclosure, after the first request instruction is obtained, information carried by the first control instruction issued based on the first request instruction is controlled, so that privacy of users in a teleconference in which at least three terminals participate is hidden. Here, since the information carried by the first control instruction issued by the server side is controlled, the communication identifier hiding requirement of the communication terminal can be realized through the information carried by the first control instruction in the process of establishing the teleconference. For example, when a communication terminal with a communication identifier hiding requirement exists in a teleconference, a first control instruction sent down can be controlled to carry a ciphertext of the communication identifier of the communication terminal, or the communication identifier of the communication terminal is not carried, so that the communication identifier of the communication terminal cannot be obtained in the teleconference, and privacy protection can be performed on the communication terminal with the communication identifier hiding requirement in the teleconference in which at least three terminals participate.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flow chart illustrating a method of telephony in accordance with an exemplary embodiment.
FIG. 2 is an interface diagram illustrating a call according to an example embodiment.
FIG. 3 is a diagram illustrating an interface for merging calls, according to an example embodiment.
Fig. 4 is a flow chart illustrating a method of telephony in accordance with an exemplary embodiment.
Fig. 5 is a flow chart illustrating a method of telephony in accordance with an exemplary embodiment.
Fig. 6 is a flow chart illustrating a method of telephony in accordance with an exemplary embodiment.
Fig. 7 is a flow chart illustrating a method of telephony in accordance with an exemplary embodiment.
Fig. 8 is a flow chart illustrating a method of telephony in accordance with an exemplary embodiment.
Fig. 9 is a block diagram illustrating a configuration of a server according to an example embodiment.
Fig. 10 is a block diagram illustrating an architecture of an initiator according to an exemplary embodiment.
Fig. 11 is a block diagram illustrating a structure of a receiving end according to an example embodiment.
Fig. 12 is a block diagram illustrating a configuration of a call device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
As shown in fig. 1 and fig. 2, a call method is provided in the embodiment of the present disclosure, where fig. 1 is a flowchart illustrating a call method according to an exemplary embodiment, and fig. 2 is an interface diagram illustrating a call according to an exemplary embodiment. As shown in fig. 1, the call method is applied to a server, and includes the following steps:
step 101, acquiring a first request instruction for requesting to establish a teleconference; wherein the conference call is a session in which at least three terminals participate;
step 102, determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not based on a first request instruction;
103, responding to a communication identifier hiding requirement of at least one communication terminal, and issuing a first control instruction for establishing a teleconference; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
It should be noted that the server to which the call method is applied may be a server of each communication operator, for example, the server may be a server of a communication operator such as mobile, internet, or telecommunications.
And the server is used for realizing various calls among the communication terminals based on the received various call request instructions. The various call request instructions are initiated by various communication terminals, and the communication terminals can be terminal equipment such as mobile phones and fixed phones.
According to the different roles assumed in the call establishment process, in the embodiment of the present disclosure, the communication end may include: an initiating terminal and a receiving terminal; the initiating terminal is a terminal device for initiating a call, and the receiving terminal is a terminal device for receiving the call. In some embodiments, the initiating end is also referred to as a calling end (MO) and the receiving end is also referred to as a called end (MT).
The various call request instructions may include: a first request instruction or a second request instruction.
The first request instruction may be a call merge instruction; the second request command may be a point-to-point call command.
The point-to-point call instruction is used for establishing one-to-one call connection participated by two ends (an initiating end and a receiving end).
The call merging instruction is used for merging at least two point-to-point calls to form a teleconference, or is used for forming the teleconference based on at least three selected ends; wherein the conference call is a multi-party conversation involving at least three parties. The speech of any communication end in the multi-party conversation can be heard by other communication ends.
As shown in fig. 2, after the originating terminal initiates a call to any receiving terminal, the call interface shown in fig. 2 is displayed on the display interface of the originating terminal, and the interface may include: one or more icons "record," wait, "" add call, "" video call, "" mute, "" contact, "and" call. The 'add call' icon can be used for adding a communication terminal after being triggered, so that the current one-to-one call can be converted into a multi-party conversation with at least three terminals participating in.
In some embodiments, the first request instruction comprises: communication identifiers of all communication terminals to participate in the teleconference, and service opening information of all communication terminals.
The communication identifier is used for indicating a communication terminal to participate in the teleconference, and the communication identifier can be a telephone number or a communication address.
And the service opening information is used for indicating whether a communication end to participate in the teleconference opens the communication identifier hidden service. In some embodiments, the service provisioning information may be: the method comprises the steps that the opening information of a calling line identification restriction service (CLIR) can hide a communication identifier of a calling terminal on a called terminal after the CLIR is opened, so that privacy protection of the calling terminal can be achieved.
As such, the determining, based on the first request instruction, whether the communication terminal to participate in the teleconference has a communication identifier hiding requirement in step 102 may include:
and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not according to the service opening information carried in the first request instruction.
Here, when the communication end has a communication identifier hiding requirement, the communication identifier hiding service is correspondingly opened.
Based on whether the communication identifier hiding service is opened or not, the process of determining whether the communication end has the communication identifier hiding requirement may be: when the communication end sends a first request instruction to the server, the server can determine which communication ends to participate in the teleconference according to the received first request instruction, and determine whether the communication ends to participate in the teleconference have opened communication identifier hiding services; and then when at least one communication terminal among the communication terminals to participate in the teleconference is provided with the communication identifier hiding service, issuing a first control instruction, and controlling the first control instruction not to carry the communication identifier of the communication terminal provided with the communication identifier hiding service, or encrypting the communication identifier of the communication terminal provided with the communication identifier hiding service firstly and then sending the encrypted communication identifier so as to hide the communication identifier of the communication terminal provided with the communication identifier hiding service. Thus, the method can play a privacy protection role in multi-party communication.
Exemplarily, assuming that a communication terminal to participate in a teleconference is an ABC three terminal, and a communication terminal a has a hidden requirement for a telephone number, after a first request instruction is sent, the first request instruction may carry service enabling information that the communication terminal a enables a telephone number hidden service. Therefore, the server determines a telephone number hiding requirement of the communication terminal A according to the received first request instruction, and then issues a first control instruction to realize 3-party communication connection between the communication terminals ABC, and the server can control the first control instruction not to carry the telephone number of the communication terminal A because the telephone number of the communication terminal A needs to be hidden, or directly encrypt the telephone number of the communication terminal A to form a ciphertext, and carry the ciphertext in the first control instruction to be sent. Therefore, the hiding of the telephone number of the communication terminal A can be realized in the multi-party call.
Here, there are various ways to encrypt the communication identifier, and the present disclosure provides the following two alternatives:
for example, the communication identifier to be encrypted may be encrypted based on an encryption algorithm preset in the server, so as to obtain a ciphertext of the communication identifier. For example, a telephone number is encrypted into letters or other numbers.
As still another example, the communication identifier to be encrypted may be partially or completely replaced by a replacement identifier. For example, some or all of the telephone numbers may be replaced with an "a" number.
The present disclosure does not limit the encryption method.
In some embodiments, the first control instruction may be: space-the-Air Technology (OTA) signaling.
The OTA is a technology for remotely managing Subscriber Identity Module (SIM) card data and applications through an air interface in mobile communication. Illustratively, the OTA implements dynamic downloading, deleting and updating of the service menu in the SIM card on the terminal device or the server based on a short message mechanism, so that the user obtains personalized information service.
Here, after the communication terminal activates the communication identifier hiding service, the server terminal automatically hides the communication identifier of the communication terminal with the communication identifier hiding requirement by issuing an OTA signaling.
It should be noted that, in some embodiments, the issuing of the first control instruction for establishing the teleconference may be: and issuing a first control instruction for establishing the teleconference to a receiving end to be participated in the teleconference.
Exemplarily, assuming that a communication end to participate in the teleconference is ABC, a is an initiating end of the teleconference, and a has a communication identifier hiding requirement, after a sends a first request instruction requesting establishment of the teleconference to a corresponding server, the server may issue a first control instruction to a communication end BC, where the first control instruction does not carry the communication identifier of a or carries a ciphertext of the communication identifier of a. Therefore, a conference call can be established between the ABC based on the first control instruction, and the BC cannot acquire the communication identifier of the A, so that the privacy of the communication terminal A can be effectively protected in the call.
In another exemplary embodiment, assuming that a communication end to participate in the teleconference is ABC and a is an initiating end of the teleconference, after a sends a first request instruction requesting establishment of the teleconference to a corresponding server, the server may issue a first control instruction to the communication end BC, assuming that B has a communication identifier hiding requirement, and the first control instruction does not carry a communication identifier of B or carries a ciphertext of the communication identifier of B. Therefore, a conference call can be established between the ABC based on the first control instruction, and the C cannot acquire the communication identifier of the B, so that the privacy of the communication terminal B can still be effectively protected in the call.
In some embodiments, the conference call may be: after at least two point-to-point call connections are established, a first request instruction is generated based on touch operation detected on terminal equipment, and then the terminal equipment sends the first request instruction to a corresponding server, so that the server forms a teleconference by issuing a first control instruction. Namely, at least two point-to-point call connections are established first, and then the at least two point-to-point calls are combined to form a teleconference. However, in this way, when the at least two point-to-point calls include a common communication end, a teleconference can be formed according to the at least two point-to-point calls.
In other embodiments, the conference call may also be: the method comprises the steps that at least two pieces of terminal equipment to be participated in a teleconference are selected by the terminal equipment at an initiating end through touch operation, a first request instruction is generated based on the selected at least two pieces of terminal equipment and the initiating end and is sent to a corresponding server, and therefore the server forms the teleconference by issuing a first control instruction. I.e. directly selecting at least three terminal devices to form a conference call.
Illustratively, as shown in fig. 3, fig. 3 is a schematic diagram of an interface for merging calls according to an exemplary embodiment. The formation of the conference call may be: the initiating terminal a initiates a request of a point-to-point call to the communication terminal B through the server, and establishes a point-to-point call connection, and at the same time, the initiating terminal a also initiates a request of a point-to-point call to the communication terminal C through the server, and establishes a point-to-point call connection, because two point-to-point call connections have been established at this time and include the common communication terminal a, then, as shown in fig. 3, a "merged call" control will be displayed on the communication interface of the communication terminal a. The combined call control is used for combining a plurality of point-to-point calls into a teleconference, and then all communication ends in the point-to-point calls can hear each other in the call. Therefore, the communication terminal A can trigger the combined call control to generate a first request instruction, and send the first request instruction to the server, and then the server forms a teleconference by issuing a first control instruction based on the first request instruction.
As yet another example, the formation of the teleconference may be: the method comprises the steps that an initiating terminal A initiates a multi-party call, at least two communication terminals BC to be participated in a teleconference are selected, a first request instruction is generated based on the at least two communication terminals BC and the initiating terminal A which are selected, the first request instruction is sent to a server, and the server controls ABC to form the teleconference by issuing a first control instruction based on the first request instruction.
The present disclosure is not limited to the form in which the conference call is formed.
In the following, the establishment of the point-to-point call connection in the above-mentioned scheme in which at least two point-to-point call connections are established first and then the at least two point-to-point calls are combined to form a teleconference will be described:
in some embodiments, fig. 4 is a flow chart illustrating a method of telephony according to an example embodiment, as shown in fig. 4, the method further comprising:
step 201, acquiring a second request instruction for requesting to establish a point-to-point call;
step 202, in response to a communication identifier hiding requirement of the originating terminal in the second request instruction, sending a second control instruction for establishing the point-to-point call; the second control instruction does not carry the communication identifier of the initiating terminal or carry the ciphertext of the communication identifier of the initiating terminal.
Here, steps 201 and 202 are executed before step 101, that is, before receiving the first request instruction, it is necessary to receive a second request instruction, and based on the second request instruction, control the establishment of the point-to-point call between the two communication terminals.
The second request command at least comprises: the method comprises the steps of communication identification of two communication ends to participate in point-to-point communication and service opening information of the two communication ends. And the service opening information is used for indicating whether a communication end to participate in the point-to-point communication opens the communication identifier hidden service.
Here, the two communication terminals to participate in the point-to-point call include: an initiating end. The initiating terminal is terminal equipment which initiates the point-to-point conversation to a server. For example, if the communication terminal a initiates a request for a peer-to-peer call to the communication terminal B through the server, the communication terminal a is the initiating terminal.
And after receiving a second request instruction, the server firstly analyzes the second request instruction, determines which two ends the communication end to participate in the point-to-point communication is, determines whether an initiating end of the two communication ends has a communication identifier hiding requirement, and if the initiating end is determined to have the communication identifier hiding requirement based on service opening information carried in the second request instruction, when sending a second control instruction for establishing the point-to-point communication, a ciphertext of the communication identifier of the initiating end is carried in the second control instruction, or the second control instruction is controlled not to carry the communication identifier of the initiating end.
Exemplarily, the communication terminal a initiates a second request instruction requesting to establish a peer-to-peer call to the communication terminal B through the server, then the communication terminal a is an initiating terminal, and if a has a communication identifier hiding requirement, a ciphertext of the communication identifier of the initiating terminal a is carried in a issued second control instruction, or the second control instruction is controlled not to carry the communication identifier of the initiating terminal a, then the communication terminal B establishes a peer-to-peer call connection with the communication terminal a based on the second control instruction after receiving the second control instruction, and cannot see the communication identifier of the communication terminal a.
Therefore, after the receiving end receives the second control instruction, the communication identifier of the initiating end cannot be acquired, the privacy of the initiating end can be protected, and a premise is provided for protecting the privacy of the initiating end in a subsequent teleconference.
In some embodiments, the communication terminal may further include: and receiving the receiving end of the teleconference.
In step 103, the issuing a first control instruction for establishing the teleconference in response to the communication identifier hiding requirement of the at least one communication terminal includes:
and responding to a communication identifier hiding requirement of a target receiving end in at least one receiving end, and issuing a first control instruction to the receiving ends except the target receiving end in the communication ends participating in the teleconference.
Here, in the process of establishing the teleconference in which at least three terminals participate, if the receiving terminal has the communication identifier hiding requirement, a first control instruction for establishing the teleconference is issued to other receiving terminals in the teleconference.
The receiving end is a called terminal in the point-to-point call. For example, if the communication terminal a initiates a request for a peer-to-peer call to the communication terminal B through the server, the communication terminal B is a receiving terminal.
Here, when a teleconference is performed, a plurality of receiving ends are associated, and the target receiving end is: among the plurality of receiving terminals, there is a receiving terminal having a communication identifier hiding requirement.
When the target receiving end has a communication identifier hiding requirement, the first control instruction may be: and aiming at the instructions sent by the receiving ends except the target receiving end in the communication ends participating in the teleconference. Therefore, after receiving the first control instruction, the receiving terminals except the target receiving terminal can not obtain the communication identification of the target receiving terminal, so that even though the CLIR service is opened by the target receiving terminal, the privacy protection effect on the target receiving terminal can be achieved.
Illustratively, the communication terminal A triggers a 'merge call' control, sends the first request instruction to the server, and the server receives the first request instruction to determine whether the communication terminal (ABC) to participate in the teleconference has a communication identifier hiding requirement. If the receiving end B has a communication identifier hiding requirement in at least one receiving end (where BC is the receiving end), a first control instruction is issued to the receiving end C, and the first control instruction carries a cipher text of the communication identifier of the receiving end B, or does not carry the communication identifier of the receiving end B.
It should be noted that, since the present disclosure is directed to the CLIR service, even if the receiving end B has the communication identifier hiding requirement, since B is the receiving end, the communication identifier hiding requirement of B is only applicable to other receiving ends, but is not applicable to the communication end a, and the communication end a can still see the communication identifier of the receiving end B, which is beneficial to the correct selection of the call object when the originating end a initiates a call.
Therefore, in a teleconference in which at least three terminals participate, even if the receiving terminal B (also called a called terminal) is provided with the communication identifier hiding service, the privacy protection function of the receiving terminal B can be realized, and application scenes of privacy protection in the CLIR service are increased.
In some embodiments, the method further comprises:
responding to the situation that a communication end to participate in the teleconference does not have a communication identifier hiding requirement, and issuing a third control instruction for establishing the teleconference; and the third control instruction carries the plaintext of the communication identifier of each communication end.
Here, the plaintext of the communication identifier is the communication identifier that is not encrypted, for example, the communication identifier is a telephone number, and the plaintext of the communication identifier is an actual telephone number represented in numbers.
In the embodiment of the disclosure, after the server receives the first request instruction, it is determined that none of the communication terminals to participate in the teleconference has a communication identifier hiding requirement based on the first request instruction, and then after the teleconference is established, each communication terminal can see the communication identifiers of each other.
Therefore, in the process of establishing the teleconference, the server can issue the corresponding control instruction according to the information carried by the received first request instruction, and privacy protection is achieved for the user in a targeted manner in the process of establishing the teleconference.
The present disclosure also provides the following embodiments:
fig. 5 is a flowchart illustrating a calling method according to an exemplary embodiment, where the calling method is applied to a server, as shown in fig. 5, and the method includes:
step 301, receiving a call request, and determining whether the call request is a first request instruction for requesting to establish a teleconference.
If yes, go to step 302;
if not, go to step 303.
Step 302, based on the first request instruction, determining whether an initiator to participate in the teleconference has a communication identifier hiding requirement.
Here, the initiating end may be: and a communication end initiating the teleconference, namely a calling end (MO).
Here, it may be determined whether an originating terminal to participate in the teleconference has a communication identifier hiding requirement through the service provisioning information of each communication terminal in the first request instruction, and if the originating terminal has the communication identifier hiding requirement, go to step 304; if the originating terminal does not have the communication identity hiding requirement, go to step 305.
Step 303, establish a point-to-point call.
Here, the point-to-point call is a one-to-one call in which both ends participate.
Step 304, a first control instruction is issued.
Here, the first control instruction may be: and signaling the OTA. The OTA signaling realizes the hiding of the communication identifier of the MO on a receiving end (MT) participating in the teleconference through not carrying the communication identifier of the MO with the communication identifier hiding requirement or carrying the ciphertext of the communication identifier of the MO with the communication identifier hiding requirement.
Here, in the above-mentioned teleconference implemented based on the communication terminal ABC, when the communication terminal (also referred to as the originating terminal) a activates the communication identifier hiding service, based on the OTA signaling sent by the server, the communication terminal BC participating in the teleconference cannot acquire the communication identifier of the originating terminal a, so that the automatic hiding of the communication identifier of the originating terminal a is implemented.
Step 305, a third control instruction is issued.
Here, the third control instruction may be: OTA signaling carrying plaintext of the communication identifier of the originating terminal. In this manner, the communication identification of the MO can be seen on the MTs participating in the conference call.
Therefore, for a communication end (namely a calling end) initiating a call, the communication identifier of the calling end can be hidden in a teleconference participated by at least three parties by controlling information carried by a transmitted first control instruction, so that the privacy protection effect is achieved.
Fig. 6 is a flowchart illustrating a calling method according to an exemplary embodiment, where the calling method is applied to a server, as shown in fig. 6, and the calling method includes:
step 401, receiving a call request, and determining whether the call request is a first request instruction for requesting to establish a teleconference.
If yes, go to step 402;
if not, go to step 403.
Step 402, determining whether a receiving end to participate in the teleconference has a communication identifier hiding requirement or not based on the first request instruction.
Here, the receiving end may be: a called terminal (MT) among the communication terminals participating in the teleconference.
Illustratively, when the communication terminal a sends a first request instruction to the server to request to establish a conference call with the communication terminals B and C, the communication terminals B and C are called terminals (MT).
Here, it may be determined whether the MT to participate in the teleconference has a communication identifier hiding requirement through the service enabling information of each communication terminal in the first request instruction, and if the MT has the communication identifier hiding requirement, go to step 404; if the MT does not have the communication identity hiding requirement, go to step 405.
In step 403, a point-to-point call is established.
Here, the point-to-point call is a one-to-one call in which both ends participate.
Step 404, a first control command is issued.
Here, the first control instruction may be: and signaling the OTA.
If a plurality of MTs exist, but it is determined that a target MT with a communication identifier hiding service opened exists in the plurality of MTs, the OTA signaling does not carry the communication identifier of the target MT with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the target MT with the communication identifier hiding requirement, so as to hide the communication identifier of the target MT for other MTs participating in the teleconference except for the target MT.
Here, in the above-mentioned teleconference implemented based on the communication terminal ABC, when the communication terminal B (also referred to as a called terminal) opens the communication identifier hiding service, the communication terminal C participating in the teleconference cannot acquire the communication identifier of the communication terminal B based on the OTA signaling sent by the server, so that the automatic hiding of the communication identifier of the communication terminal B can be implemented.
It should be noted that, if the receiving end opens the communication identifier hiding service, the service is only valid for other receiving ends in the teleconference, but is not valid for the MO, and the communication identifier of the MT having the communication identifier hiding service opened can still be seen on the MO, so that the privacy protection of the MT having the communication identifier hiding service opened can be satisfied, the information obtaining function of the MO can also be satisfied, and the correct routing of the call can be realized.
Step 405, a third control instruction is issued.
Here, the third control instruction may be: and carrying clear-text OTA signaling of the communication identifier of the communication terminal with the communication identifier hiding requirement, namely a call connection instruction without the communication identifier hiding requirement.
Therefore, for a communication terminal (namely a called terminal) receiving the teleconference, the communication identifier of the MT can be hidden in the teleconference participated by at least three parties by controlling the information carried by the issued first control instruction, so that the privacy protection effect is achieved, and the application range of the user privacy protection is further expanded.
The embodiment of the disclosure also provides a call method, which is applied to an initiating terminal; fig. 7 is a flow chart illustrating a method of calling according to an exemplary embodiment, as shown in fig. 7, including the steps of:
step 501, sending a first request instruction for requesting to establish a teleconference; the first request instruction is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate;
step 502, establishing the teleconference according to a first control instruction issued by the server based on the first request instruction; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
Here, the initiating end may be: the communication end that initiates the conference call is also called a calling end (MO).
The initiating terminal generates a first request instruction after triggering the 'merging call' control, and sends the first request instruction to a corresponding server. For example, if the initiating end is a terminal device using a communication service of a unicom company, the first request instruction is sent to a server of the unicom company.
After receiving the first request instruction, the communication operator server analyzes the first request instruction, and determines whether a communication end to participate in the teleconference has a communication identifier hiding requirement, if at least one communication end with the communication identifier hiding requirement exists in at least three ends to participate in the teleconference, the communication operator server returns a first control instruction to a receiving end, wherein the first control instruction does not carry a communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement. And after receiving the first control instruction, the receiving end establishes the teleconference with the initiating end.
Here, if the originating terminal has a communication identifier hiding requirement, the communication identifier of the originating terminal cannot be seen on the receiving terminal in the process of establishing the teleconference. If one receiving end has the communication identifier hiding requirement, the other receiving ends cannot see the communication identifier of the receiving end with the communication identifier hiding requirement in the process of establishing the teleconference.
In some embodiments, the method further comprises:
sending a second request instruction for requesting to establish the point-to-point call;
establishing point-to-point communication with a receiving end indicated in the second request instruction according to a second control instruction issued by the server based on the second request instruction; when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal.
Here, before transmitting a first request instruction for forming a teleconference in which at least three terminals participate, a second request instruction for establishing a point-to-point call is transmitted to a corresponding server.
The second request instruction may be a point-to-point call instruction; the point-to-point call instruction is used for establishing one-to-one call connection participated by two ends (an initiating end and a receiving end).
The second request command at least comprises: communication identifiers of two communication ends to participate in the call and service opening information of the two communication ends; and the service opening information is used for indicating whether a communication end to participate in the point-to-point communication opens the communication identifier hidden service.
Here, the two communication terminals to participate in the point-to-point call include: an initiator and a receiver. The initiating terminal is terminal equipment which initiates the point-to-point conversation to a server. For example, if the communication terminal a initiates a request for a peer-to-peer call to the communication terminal B through the server, the communication terminal a is an initiating terminal, and the communication terminal B is an initiating terminal.
And after receiving the second request instruction, the server firstly analyzes the second request instruction, determines which two ends the communication end to participate in the point-to-point call is, determines whether an initiating end of the two communication ends has a communication identifier hiding requirement, and if the initiating end is determined to have the communication identifier hiding requirement based on service opening information carried in the second request instruction, when sending a second control instruction for establishing the point-to-point call, a ciphertext of the communication identifier of the initiating end is carried in the second control instruction, or the second control instruction is controlled not to carry the communication identifier of the initiating end, so that privacy protection of the initiating end is realized.
In some embodiments, the method further comprises:
establishing the teleconference according to a third control instruction issued by the server based on the first request instruction; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
Here, the plaintext of the communication identifier is the communication identifier that is not encrypted, for example, the communication identifier is a telephone number, and the plaintext of the communication identifier is a telephone number represented in numbers.
In the embodiment of the present disclosure, after receiving the first request instruction, the server determines that none of the communication terminals to participate in the teleconference has a communication identifier hiding requirement based on the first request instruction, and then issues a third control instruction to the receiving terminal, and after receiving the third control instruction, the receiving terminal establishes the teleconference with the initiating terminal, and in the teleconference, each communication terminal can see the communication identifier of each other.
The embodiment of the disclosure provides a communication method, which is applied to a receiving end; fig. 8 is a flow chart illustrating a calling method according to an exemplary embodiment, as shown in fig. 8, the calling method includes the steps of:
601, receiving a first control instruction issued by a server based on a first request instruction sent by an initiator; the first request instruction is used for requesting to establish a teleconference and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement;
step 602, establishing the conference call based on the first control instruction.
Here, the receiving end may be: the communication terminal, also called terminal (MT), receiving the conference call.
After a calling end (MO) sends the first request instruction to a corresponding server, the server receives the first request instruction, analyzes the first request instruction, determines whether a communication end to participate in the teleconference has a communication identifier hiding requirement, and if at least one communication end with the communication identifier hiding requirement exists in at least three ends of the teleconference, the server returns a first control instruction to a called end (MT), wherein the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement. And after receiving the first control instruction, the MT establishes the teleconference with the MO.
Here, if the originating terminal has a communication identifier hiding requirement, the communication identifier of the originating terminal cannot be seen on the receiving terminal in the process of establishing the teleconference. If one receiving end has the communication identifier hiding requirement, the other receiving ends cannot see the communication identifier of the target receiving end with the communication identifier hiding requirement in the process of establishing the teleconference.
In some embodiments, the method further comprises:
receiving a second control instruction issued by the server based on the call request sent by the initiating terminal; the second request instruction is used for requesting to establish a point-to-point call, and when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal;
and establishing point-to-point conversation with the initiating terminal indicated in the second request instruction based on the second control instruction.
Here, before transmitting a first request instruction for forming a teleconference in which at least three terminals participate, a second request instruction for establishing a point-to-point call is transmitted to a corresponding server.
The second request instruction may be a point-to-point call instruction; the point-to-point call instruction is used for establishing one-to-one call connection participated by two ends (an initiating end and a receiving end).
The second request command at least comprises: communication identifiers of two communication ends to participate in the call and service opening information of the two communication ends; and the service opening information is used for indicating whether a communication end to participate in the point-to-point communication opens the communication identifier hidden service.
Here, the two communication terminals to participate in the point-to-point call include: an initiator and a receiver. The initiating terminal is terminal equipment which initiates the point-to-point conversation to a server. For example, if the communication terminal a initiates a request for a peer-to-peer call to the communication terminal B through the server, the communication terminal a is an initiating terminal, and the communication terminal B is a receiving terminal.
And after receiving a second request instruction, the server firstly analyzes the second request instruction, determines which two ends the communication end to participate in the point-to-point communication is, determines whether an initiating end of the two communication ends has a communication identifier hiding requirement, and if the initiating end is determined to have the communication identifier hiding requirement based on service opening information carried in the second request instruction, when sending a second control instruction for establishing the point-to-point communication, a ciphertext of the communication identifier of the initiating end is carried in the second control instruction, or the second control instruction is controlled not to carry the communication identifier of the initiating end.
And the receiving end receives the second control instruction, establishes point-to-point conversation with the initiating end indicated in the second request instruction, and cannot acquire the communication identifier of the initiating end. Thus, the hiding of the communication identifier of the initiating terminal can be realized.
In some embodiments, the method further comprises:
receiving a third control instruction issued by the server based on the first request instruction sent by the initiating terminal; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
Here, the plaintext of the communication identifier is the communication identifier that is not encrypted, for example, the communication identifier is a telephone number, and the plaintext of the communication identifier is a telephone number represented in numbers.
In the embodiment of the present disclosure, after receiving the first request instruction, the server determines that none of the communication terminals to participate in the teleconference has a communication identifier hiding requirement based on the first request instruction, and then issues a third control instruction, so that the receiving terminal establishes the teleconference based on the third control instruction after receiving the third control instruction, and each communication terminal can see the communication identifier of each other in the teleconference.
According to the communication method provided by the embodiment of the disclosure, since the information carried by the first control instruction issued by the server side is controlled, the communication identifier hiding requirement of the communication terminal can be realized through the information carried by the first control instruction in the process of establishing the teleconference. For example, when a communication terminal with a communication identifier hiding requirement exists in a teleconference, a first control instruction sent down can be controlled to carry a ciphertext of the communication identifier of the communication terminal, or the communication identifier of the communication terminal is not carried, so that the communication identifier of the communication terminal cannot be obtained in the teleconference, and privacy protection can be performed on the communication terminal with the communication identifier hiding requirement in the teleconference in which at least three terminals participate.
The present disclosure also provides a server, fig. 9 is a schematic structural diagram of a server according to an exemplary embodiment, and as shown in fig. 9, the server 700 includes:
a first obtaining module 701, configured to obtain a first request instruction for requesting establishment of a teleconference; wherein the conference call is a session in which at least three terminals participate;
a determining module 702, configured to determine, based on the first request instruction, whether a communication end to participate in the teleconference has a communication identifier hiding requirement;
a first response module 703, configured to issue a first control instruction for establishing the teleconference, in response to a communication identifier hiding requirement that the at least one communication terminal has; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
In some embodiments, the communication terminal comprises: a receiving end for receiving the teleconference;
the first response module is further configured to:
and responding to a communication identifier hiding requirement of a target receiving end in at least one receiving end, and issuing a first control instruction to the receiving ends except the target receiving end in the communication ends participating in the teleconference.
In some embodiments, the communication terminal comprises: an originating terminal that initiates the teleconference;
the server further comprises:
the second acquisition module is used for acquiring a second request instruction for requesting to establish the point-to-point call;
a second response module, configured to send a second control instruction for establishing the peer-to-peer session in response to a communication identifier hiding requirement of the originating terminal in the second request instruction; the second control instruction does not carry the communication identifier of the initiating terminal or carry the ciphertext of the communication identifier of the initiating terminal.
In some embodiments, the determining module is further configured to:
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not according to service opening information carried in the first request instruction; the service opening information is used for indicating whether a communication identifier hiding service is opened at the communication terminal to participate in the teleconference.
In some embodiments, the server further comprises:
the third response module is used for responding that the communication end to participate in the teleconference does not have a communication identifier hiding requirement, and issuing a third control instruction for establishing the teleconference; and the third control instruction carries the plaintext of the communication identifier of each communication end.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present disclosure also provides an initiating terminal, fig. 10 is a schematic structural view illustrating an initiating terminal according to an exemplary embodiment, and as shown in fig. 10, the initiating terminal 800 includes:
a first sending module 801, configured to send a first request instruction requesting establishment of a teleconference; the first request instruction is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate;
a first establishing module 802, configured to establish the teleconference according to a first control instruction issued by the server based on the first request instruction; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
In some embodiments, the initiating end further comprises:
the second sending module is used for sending a second request instruction for requesting to establish the point-to-point call;
the second establishing module is used for establishing point-to-point conversation with the receiving end indicated in the second request instruction according to a second control instruction issued by the server based on the second request instruction; when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal.
In some embodiments, the initiating end further comprises:
the third establishing module is used for establishing the teleconference according to a third control instruction issued by the server based on the first request instruction; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present disclosure also provides a receiving end, fig. 11 is a schematic structural diagram of a receiving end according to an exemplary embodiment, and as shown in fig. 11, the receiving end 900 includes:
a first receiving module 901, configured to receive a first control instruction issued by a server based on a first request instruction sent by an originating terminal; the first request instruction is used for requesting to establish a teleconference and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement;
a fourth establishing module 902, configured to establish the teleconference based on the first control instruction.
In some embodiments, the receiving end further comprises:
the second receiving module is used for receiving a second control instruction issued by the server based on a second request instruction sent by the initiating terminal; the second request instruction is used for requesting to establish a point-to-point call, and when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal;
and the fifth establishing module is used for establishing point-to-point conversation with the initiating terminal indicated in the second request instruction based on the second control instruction.
In some embodiments, the receiving end further comprises:
the third receiving module is used for receiving a third control instruction issued by the server based on the first request instruction sent by the initiating terminal; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 12 is a block diagram illustrating a communications device 1800 in accordance with an exemplary embodiment. For example, the apparatus 1800 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and so forth.
Referring to fig. 12, apparatus 1800 may include one or more of the following components: a processing component 1802, a memory 1804, a power component 1806, a multimedia component 1808, an audio component 1810, an input/output (I/O) interface 1812, a sensor component 1814, and a communications component 1816.
The processing component 1802 generally controls the overall operation of the device 1800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1802 may include one or more processors 1820 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1802 may also include one or more modules that facilitate interaction between the processing component 1802 and other components. For example, the processing component 1802 can include a multimedia module to facilitate interaction between the multimedia component 1808 and the processing component 1802.
The memory 1804 is configured to store various types of data to support operation at the apparatus 1800. Examples of such data include instructions for any application or method operating on the device 1800, contact data, phonebook data, messages, images, videos, and so forth. The memory 1804 may be implemented by any type or combination of volatile or non-volatile storage devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 1806 provide power to various components of device 1800. The power components 1806 may include: a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the apparatus 1800.
The multimedia component 1808 includes a screen that provides an output interface between the device 1800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 1800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and/or rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
Audio component 1810 is configured to output and/or input audio signals. For example, the audio component 1810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 1800 is in operating modes, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1804 or transmitted via the communication component 1816. In some embodiments, audio component 1810 also includes a speaker for outputting audio signals.
I/O interface 1812 provides an interface between processing component 1802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 1814 includes one or more sensors for providing various aspects of state assessment for the apparatus 1800. For example, the sensor assembly 1814 can detect an open/closed state of the device 1800, the relative positioning of components such as a display and keypad of the device 1800, the sensor assembly 1814 can also detect a change in position of the device 1800 or a component of the device 1800, the presence or absence of user contact with the device 1800, orientation or acceleration/deceleration of the device 1800, and a change in temperature of the device 1800. The sensor assembly 1814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1816 is configured to facilitate communications between the apparatus 1800 and other devices in a wired or wireless manner. The device 1800 may access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1816 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, or other technologies.
In an exemplary embodiment, the apparatus 1800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as the memory 1804 including instructions that are executable by the processor 1820 of the apparatus 1800 to perform the above-described method. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, wherein instructions, when executed by a processor, enable performance of the above-described method.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (24)

1. A call method is applied to a server and comprises the following steps:
acquiring a first request instruction for requesting to establish a teleconference; wherein the conference call is a session in which at least three terminals participate;
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not based on the first request instruction;
responding to a communication identifier hiding requirement of at least one communication terminal, and issuing a first control instruction for establishing the teleconference; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
2. The method according to claim 1, wherein the communication terminal comprises: a receiving end for receiving the teleconference;
the issuing of the first control instruction for establishing the teleconference in response to the communication identifier hiding requirement of the at least one communication terminal includes:
and responding to a communication identifier hiding requirement of a target receiving end in at least one receiving end, and issuing a first control instruction to the receiving ends except the target receiving end in the communication ends participating in the teleconference.
3. The method according to claim 1 or 2, wherein the communication terminal comprises: an originating terminal that initiates the teleconference;
the method further comprises the following steps:
acquiring a second request instruction for requesting to establish point-to-point communication;
responding to a communication identifier hiding requirement of the initiating terminal in the second request instruction, and sending a second control instruction for establishing the point-to-point call; the second control instruction does not carry the communication identifier of the initiating terminal or carry the ciphertext of the communication identifier of the initiating terminal.
4. The method of claim 1, wherein the determining whether the communication end to participate in the teleconference has a communication identifier hiding requirement based on the first request instruction comprises:
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not according to service opening information carried in the first request instruction; the service opening information is used for indicating whether a communication identifier hiding service is opened at the communication terminal to participate in the teleconference.
5. The method of claim 1, further comprising:
responding to the situation that a communication end to participate in the teleconference does not have a communication identifier hiding requirement, and issuing a third control instruction for establishing the teleconference; and the third control instruction carries the plaintext of the communication identifier of each communication end.
6. A call method is applied to an initiating terminal, and comprises the following steps:
sending a first request instruction for requesting to establish a teleconference; the first request instruction is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate;
establishing the teleconference according to a first control instruction issued by the server based on the first request instruction; wherein the content of the first and second substances,
when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
7. The method of claim 6, further comprising:
sending a second request instruction for requesting to establish the point-to-point call;
establishing point-to-point communication with a receiving end indicated in the second request instruction according to a second control instruction issued by the server based on the second request instruction; when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal.
8. The method of claim 6, further comprising:
establishing the teleconference according to a third control instruction issued by the server based on the first request instruction; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
9. A call method is applied to a receiving end, and comprises the following steps:
receiving a first control instruction issued by a server based on a first request instruction sent by an initiator; wherein the content of the first and second substances,
the first request instruction is used for requesting to establish a teleconference and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement;
and establishing the teleconference based on the first control instruction.
10. The method of claim 9, further comprising:
receiving a second control instruction issued by the server based on a second request instruction sent by the initiating terminal; the second request instruction is used for requesting to establish a point-to-point call, and when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal;
and establishing point-to-point conversation with the initiating terminal indicated in the second request instruction based on the second control instruction.
11. The method of claim 9, further comprising:
receiving a third control instruction issued by the server based on the first request instruction sent by the initiating terminal; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
12. A server, comprising:
the first acquisition module is used for acquiring a first request instruction for requesting to establish a teleconference; wherein the conference call is a session in which at least three terminals participate;
the determining module is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not based on the first request instruction;
the first response module is used for responding to a communication identifier hiding requirement of the at least one communication terminal and issuing a first control instruction for establishing the teleconference; the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
13. The server according to claim 12, wherein the communication terminal comprises: a receiving end for receiving the teleconference;
the first response module is further configured to:
and responding to a communication identifier hiding requirement of a target receiving end in at least one receiving end, and issuing a first control instruction to the receiving ends except the target receiving end in the communication ends participating in the teleconference.
14. The server according to claim 12 or 13, wherein the communication terminal comprises: an originating terminal that initiates the teleconference;
the server further comprises:
the second acquisition module is used for acquiring a second request instruction for requesting to establish the point-to-point call;
a second response module, configured to send a second control instruction for establishing the peer-to-peer session in response to a communication identifier hiding requirement of the originating terminal in the second request instruction; the second control instruction does not carry the communication identifier of the initiating terminal or carry the ciphertext of the communication identifier of the initiating terminal.
15. The server of claim 12, wherein the determining module is further configured to:
determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not according to service opening information carried in the first request instruction; the service opening information is used for indicating whether a communication identifier hiding service is opened at the communication terminal to participate in the teleconference.
16. The server according to claim 12, wherein the server further comprises:
the third response module is used for responding that the communication end to participate in the teleconference does not have a communication identifier hiding requirement, and issuing a third control instruction for establishing the teleconference; and the third control instruction carries the plaintext of the communication identifier of each communication end.
17. An initiating terminal, comprising:
the first sending module is used for sending a first request instruction for requesting to establish a teleconference; the first request instruction is used for determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate;
the first establishing module is used for establishing the teleconference according to a first control instruction issued by the server based on the first request instruction; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries the ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement.
18. The initiating tip according to claim 17, further comprising:
the second sending module is used for sending a second request instruction for requesting to establish the point-to-point call;
the second establishing module is used for establishing point-to-point conversation with the receiving end indicated in the second request instruction according to a second control instruction issued by the server based on the second request instruction; when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal.
19. The initiating tip according to claim 17, further comprising:
the third establishing module is used for establishing the teleconference according to a third control instruction issued by the server based on the first request instruction; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
20. A receiving end, comprising:
the first receiving module is used for receiving a first control instruction issued by the server based on a first request instruction sent by the initiating terminal; the first request instruction is used for requesting to establish a teleconference and determining whether a communication end to participate in the teleconference has a communication identifier hiding requirement or not; the conference call is a session in which at least three terminals participate; when at least one communication end with a communication identifier hiding requirement exists in the at least three ends, the first control instruction does not carry the communication identifier of the communication end with the communication identifier hiding requirement, or carries a ciphertext of the communication identifier of the communication end with the communication identifier hiding requirement;
and the fourth establishing module is used for establishing the teleconference based on the first control instruction.
21. The receiving end according to claim 20, wherein the receiving end further comprises:
the second receiving module is used for receiving a second control instruction issued by the server based on a second request instruction sent by the initiating terminal; the second request instruction is used for requesting to establish a point-to-point call, and when an initiating terminal with a communication identifier hiding requirement exists in the point-to-point call, the second control instruction does not carry the communication identifier of the initiating terminal or carries a ciphertext of the communication identifier of the initiating terminal;
and the fifth establishing module is used for establishing point-to-point conversation with the initiating terminal indicated in the second request instruction based on the second control instruction.
22. The receiving end according to claim 20, wherein the receiving end further comprises:
the third receiving module is used for receiving a third control instruction issued by the server based on the first request instruction sent by the initiating terminal; and when no communication end with communication identifier hiding requirements exists in the at least three ends, the third control instruction carries the plaintext of the communication identifiers of the communication ends.
23. A communication device, comprising:
a processor and a memory for storing executable instructions operable on the processor, wherein:
the processor is configured to execute the executable instructions to perform the steps of the method as provided in any one of claims 1 to 5, 6 to 8 or 9 to 11.
24. A non-transitory computer readable storage medium having stored thereon computer executable instructions which, when executed by a processor, implement the steps of the method as provided in any one of claims 1 to 5, 6 to 8 or 9 to 11.
CN202110744154.1A 2021-07-01 2021-07-01 Call method and device, server, initiating terminal, receiving terminal and storage medium Pending CN113596263A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110744154.1A CN113596263A (en) 2021-07-01 2021-07-01 Call method and device, server, initiating terminal, receiving terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110744154.1A CN113596263A (en) 2021-07-01 2021-07-01 Call method and device, server, initiating terminal, receiving terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113596263A true CN113596263A (en) 2021-11-02

Family

ID=78245723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110744154.1A Pending CN113596263A (en) 2021-07-01 2021-07-01 Call method and device, server, initiating terminal, receiving terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113596263A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449112A (en) * 2022-04-08 2022-05-06 荣耀终端有限公司 Telephone conference reminding method, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449112A (en) * 2022-04-08 2022-05-06 荣耀终端有限公司 Telephone conference reminding method, electronic equipment and storage medium
CN114449112B (en) * 2022-04-08 2023-06-16 荣耀终端有限公司 Prompting method for telephone conference, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105516183B (en) Equipment connection method and device
CN106453052B (en) Message interaction method and device
CN105915521B (en) Multi-party call management method, device and terminal
CN113766259B (en) Information synchronization system, method, device, equipment and storage medium
CN107147815B (en) Call processing method and device based on taxi taking
CN107959757B (en) User information processing method and device, APP server and terminal equipment
CN111314211A (en) Message forwarding method and device
CN112632418A (en) Password sharing method and device, electronic equipment and storage medium
CN105208089A (en) Information display method, apparatus and system
US10263925B2 (en) Method, device and medium for sending message
CN109040651B (en) Video communication method and device
CN114513571A (en) Device connection method and device, electronic device and readable storage medium
CN111246032B (en) Call management method and device
CN113596263A (en) Call method and device, server, initiating terminal, receiving terminal and storage medium
CN105338184A (en) Call making method and apparatus
CN106506808B (en) Method and device for prompting communication message
CN107277422B (en) Video call method, device and system
CN106550482B (en) Communication connection establishing method and device and electronic equipment
CN106658412B (en) Positioning method and device
CN114268691A (en) Call method, device, terminal equipment and readable storage medium
CN111865767B (en) User display method, device, server, client, terminal and storage medium for indirectly monitoring telephone in instant messaging
CN114615647A (en) Call control method, device and storage medium
CN110913055B (en) Terminal device searching method and device and electronic device
CN112039756A (en) Method, device, electronic equipment and medium for establishing real-time communication
CN110213531B (en) Monitoring video processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination