CN113965648B - Information hiding method and device and electronic equipment - Google Patents

Information hiding method and device and electronic equipment Download PDF

Info

Publication number
CN113965648B
CN113965648B CN202010704905.2A CN202010704905A CN113965648B CN 113965648 B CN113965648 B CN 113965648B CN 202010704905 A CN202010704905 A CN 202010704905A CN 113965648 B CN113965648 B CN 113965648B
Authority
CN
China
Prior art keywords
called party
calling
party
information
real number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010704905.2A
Other languages
Chinese (zh)
Other versions
CN113965648A (en
Inventor
任中岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Shandong Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Shandong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Shandong Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010704905.2A priority Critical patent/CN113965648B/en
Publication of CN113965648A publication Critical patent/CN113965648A/en
Application granted granted Critical
Publication of CN113965648B publication Critical patent/CN113965648B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42348Location-based services which utilize the location information of a target
    • H04M3/42357Location-based services which utilize the location information of a target where the information is provided to a monitoring entity such as a potential calling party or a call processing server

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The application provides an information hiding method, an information hiding device and electronic equipment, and relates to the technical field of information security. In the method of the embodiment of the application, the calling party initiates a call request according to the encryption number of the called party, and the call request comprises the area information of the calling party and the encryption number of the called party. After receiving a call request initiated by a calling party, the target platform judges whether the area information is contained in the service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, the target platform determines the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. According to the method provided by the embodiment of the application, the calling party initiates the call request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party, so that the real number of the called party is effectively hidden, the leakage of personal information of the called party is prevented, and the personal information safety of the called party is protected.

Description

Information hiding method and device and electronic equipment
[ Field of technology ]
The present application relates to the field of information security technologies, and in particular, to an information hiding method, an information hiding device, and an electronic device.
[ Background Art ]
In a package serving scenario, personal information such as a recipient's contact phone, address, etc. is typically displayed in plain text on one side. In the process of sending the package, the courier and all people touching the package can directly acquire the personal information of the user, so that the personal information of the user is revealed. Even after the package is signed, the discarded package still has personal information of the user, which is not beneficial to protecting the personal information of the user.
In the prior art, users can only smear or destroy personal information on package packages to be discarded after signing packages, so that leakage of the personal information is prevented. However, there is always a risk of leakage of the user's personal information during the package dispatch process.
[ Invention ]
The embodiment of the application provides an information hiding method, an information hiding device and electronic equipment, which are used for hiding and protecting personal information of a receiver and preventing the personal information of the receiver from being revealed in the package dispatching process.
In a first aspect, an embodiment of the present application provides an information hiding method, including: receiving a call request initiated by a calling party; the calling request contains the area information of the calling party and the encryption number of the called party; judging whether the area information is contained in a service area range associated with the calling party; if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party; and calling the called party according to the real number of the called party.
In one possible implementation manner, determining an encryption manner of the real number of the called party according to the attribution of the real number of the called party in the order to be dispatched; encrypting the real number of the called party according to the determined encryption mode; determining a calling party for dispatching the order to be dispatched according to the receiving address of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
In one possible implementation manner, the method further includes: when the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, encrypting the real number of the called party by using a second encryption mode.
In one possible implementation manner, the encrypted number of the called party contains a ciphertext character and a plaintext character; determining the real number of the called party according to the encrypted number of the called party comprises the following steps: determining order information to be dispatched in a service area associated with the calling party; determining a calling number consistent with a plaintext character in the encrypted number of the called party from the order information to be dispatched; if the determined calling number is one, determining the calling number as the real number of the called party; if the determined calling number is a plurality of, sending prompt information to the calling party so as to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from a plurality of calling numbers according to the auxiliary identification code input by the calling party.
In one possible implementation manner, the called party encryption number includes an encryption mode prompt;
from the to-be-dispatched order information, determining a calling number consistent with a plaintext character in a called party encryption number, including:
If the encryption number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt, screening first order dispatch information of the area where the called party number belongs to and the destination address belong to from the order information to be dispatched; determining a calling number consistent with a plaintext in a called party encryption number from the first order placement information; if the encryption number of the called party is determined to be encrypted in a second encryption mode according to the encryption mode prompt, screening second order dispatch information of which the called party number attribution and the receiver address belong to different areas from the order information to be dispatched; a calling number is determined from the second order dispatch information that is consistent with the plaintext in the encrypted number of the called party.
In one possible implementation manner, after the called party is called according to the real number of the called party, the method further includes: when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the signing state, the encryption number of the called party is set to be invalid.
In a second aspect, an embodiment of the present application provides an information hiding apparatus, including: the receiving module is used for receiving a call request initiated by a calling party; the calling request contains the area information of the calling party and the encryption number of the called party; a judging module, configured to judge whether the area information is included in a service area range associated with the calling party; a determining module, configured to determine, when the area information is included in a service area range associated with the calling party, a real number of the called party according to an encrypted number of the called party; and the calling module is used for calling the called party according to the real number of the called party.
In one possible implementation manner, the apparatus further includes: the encryption module is used for determining an encryption mode of the real number of the called party according to the attribution of the real number of the called party in the order to be dispatched before the receiving module receives the call request initiated by the calling party; encrypting the real number of the called party according to the determined encryption mode; the sending module is used for determining a calling party sending the order to be sent according to the receiving address of the order to be sent; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
In a third aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, which are called by the processor to perform the method as described above.
In a fourth aspect, embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the method as described above.
In the technical scheme, the calling party initiates a call request according to the encryption number of the called party, and the call request comprises the area information of the calling party and the encryption number of the called party. After receiving a call request initiated by a calling party, the target platform judges whether the area information is contained in the service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, the target platform determines the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. The calling party initiates a call request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party in the whole call process, so that the real number of the called party is effectively hidden. In the calling process, the target platform determines the real number of the called party according to the encryption number of the called party in the calling request, so that the calling is completed, the safety is higher, the leakage of personal information of the called party is prevented, and the personal information safety of the called party is protected.
[ Description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of one embodiment of an information hiding method according to the present application;
FIG. 2 is a flow chart of another embodiment of the information hiding method according to the present application;
FIG. 3 is a flow chart of a further embodiment of the information hiding method according to the present application;
FIG. 4 is a schematic diagram illustrating an embodiment of an information hiding method according to the present application;
FIG. 5 is another schematic diagram illustrating one embodiment of an information hiding method according to the present application;
FIG. 6 is a schematic diagram of an embodiment of an information hiding method according to the present application;
FIG. 7 is a flow chart of another embodiment of the information hiding method according to the present application;
FIG. 8 is a schematic diagram illustrating an embodiment of an information hiding apparatus according to the present application;
FIG. 9 is a schematic diagram of another embodiment of an information hiding apparatus according to the present application;
fig. 10 is a schematic structural diagram of an embodiment of the electronic device of the present application.
[ Detailed description ] of the invention
For a better understanding of the technical solution of the present application, the following detailed description of the embodiments of the present application refers to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In the package dispatch scenario involved in the embodiment of the present application, a dispatcher initiates a call to a recipient according to the contact phone of the recipient. In this process, the dispatcher is the calling party of the embodiment of the application, and the recipient is the called party of the embodiment of the application.
In the embodiment of the application, the contact phone of the receiver is the encrypted contact phone of the receiver, and when the calling party initiates a call request according to the encrypted contact phone, the target platform responds to the call request and executes the information hiding method according to the call request.
FIG. 1 is a flow chart of an embodiment of an information hiding method according to the present application. The execution subject of the method shown in fig. 1 is the target platform. The target platform may be, for example, a logistics service platform, or may be an enterprise information platform, etc. As shown in fig. 1, the information hiding method performed by the target platform may include:
step 101, receiving a call request initiated by a calling party, wherein the call request comprises the area information of the calling party and the encryption number of a called party.
After receiving the call request of the calling party, the target platform analyzes the call signaling contained in the call request. The target platform can obtain the number information of the calling party, the area information of the calling party and the encrypted number of the called party carried by the calling signaling according to the analysis result. The area information of the calling party refers to the current position of the calling party, and the area information can be determined according to the base station or the cell where the calling party initiates the call request; the terminal equipment used by the calling party can also be positioned by the global positioning system when the calling party initiates a call request. The area information can be accurate to county according to actual needs.
Step 102, judging whether the area information is contained in the service area range associated with the calling party; if yes, go to step 103; if not, step 104 is performed.
In the embodiment of the application, the service area associated with the calling party exists in the target platform. The service area may be used to represent the area where the calling party is responsible for serving the package. For example, when the area where the calling party is responsible for serving the package is the eastern city of beijing, then the service area associated with the calling party in the target platform is the eastern city of beijing. When the area where the calling party is responsible for sending the package changes, the service area associated with the calling party needs to be updated in the target platform.
After the area information of the calling party is obtained in step 101, it is determined whether the area information of the calling party is included in the service area range associated with the calling party. I.e., determine if the caller's current location is contained within the area where it is responsible for dispatching the package. When it is determined that the area information in which the calling party is located is included in the service area range associated with the calling party, step 103 is performed, otherwise step 104 is performed.
Step 103, determining the real number of the called party according to the encrypted number of the called party.
In this embodiment, the encrypted number of the called party includes a plaintext character and an encrypted character. Wherein, the plaintext character is a displayable part of real number, and the encrypted character is another hidden part of real number. The specific steps for determining the real number of the called party according to the encrypted number of the called party are as follows.
First, order information to be dispatched in a service area associated with a calling party is determined.
Then, from the order information to be dispatched, a calling number that coincides with a plain text character in the encrypted number of the called party is determined.
Specifically, the encrypted number of the called party includes an encrypted prompt, when the encrypted number of the called party is determined to be encrypted by adopting a first encrypted mode according to the encrypted prompt, order information of the area where the number attribution of the called party belongs to the same area as the receiving address is screened from the order information to be dispatched, the order information is used as first order dispatch information, and a calling number consistent with a plaintext character in the encrypted number of the called party is determined from the first order dispatch information.
When the encryption number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt, order information of areas where the called party number belongs to and the destination address belong to is screened out from the order information to be dispatched and used as second order dispatch information, and a calling number consistent with a plaintext character in the encrypted number of the called party is determined from the second order dispatch information.
Finally, if the determined calling number is one, the calling number is determined as the real number of the called party. If the determined calling number is a plurality of calling numbers, prompt information is sent to the calling party to prompt the calling party to input an auxiliary identification code, and the real number of the called party is determined from the plurality of calling numbers according to the auxiliary identification code input by the calling party.
Wherein the auxiliary identification code is associated with the real number of the called party, and the real number of the called party can be uniquely determined. The auxiliary identification code may be transmitted to the calling party simultaneously when the real number of the called party is transmitted to the calling party. A specific transmission scheme will be described in the second embodiment of the present application.
In this embodiment, optionally, the auxiliary identification code is an order number of a package corresponding to the called party; or the auxiliary identification code is a code value generated according to the operation of the called Fang Zhenshi number, and comprises a combination of numbers and/or letters, ASCII codes and the like; or the auxiliary identification code is a multi-bit digital value generated randomly, etc., the application is not limited.
Step 104, calling the called party according to the real number of the called party.
Step 105, rejecting the call request of the calling party.
When the area information is determined not to be included in the service area range associated with the calling party, the current position of the calling party is not in the range of the calling party responsible for sending the package. The reasons for this may be: first, the calling party is not the dispatch responsible person of the package corresponding to the current called party; second, the calling party is the dispatch responsible person of the package corresponding to the current called party, but is far away from the dispatch place, and cannot effectively execute the dispatch task. In this case, then, the calling party's call request is denied in order to ensure dispatch efficiency and to reduce the interference to the called party.
In this embodiment, a call request initiated by a calling party is received, where the call request includes area information of the calling party and an encrypted number of a called party. Whether the area information is included in the service area range associated with the calling party is judged, and if the area information is included in the service area range associated with the calling party, the real number of the called party is determined according to the encrypted number of the called party. And calling the called party according to the real number of the called party. And rejecting the calling party's call request when the area information is not included within the service area associated with the calling party. The real number of the called party is effectively hidden, the leakage of personal information of the called party is prevented, and the personal information safety of the called party is protected.
Fig. 2 is a flowchart of another embodiment of the information hiding method according to the present application.
As shown in fig. 2, in this embodiment, before the step 101 is performed, the information hiding method of the present application further includes the following steps:
Step 1001, determining an encryption mode for the real number of the called party according to the attribution of the real number of the called party in the order to be dispatched.
When the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, encrypting the real number of the called party by using a second encryption mode.
Specifically, the attribution of the real number of the called party may be specific to the city, and when the attribution is the same as the city corresponding to the destination address of the package to be dispatched, the attribution may be considered to belong to the same area, the real number of the called party is encrypted by using the first encryption mode, otherwise, the real number of the called party is encrypted by using the second encryption mode. Optionally, the attribution of the real number of the called party can also be determined according to the actual requirement, specifically to the county, and correspondingly, according to the county corresponding to the destination address of the package to be dispatched, different encryption modes are determined, and the specific determination modes are the same as the above, and are not repeated.
Step 1002, encrypting the real number of the called party according to the determined encryption mode.
The first encryption scheme and the second encryption scheme may be the same encryption scheme or different encryption schemes. Specific encryption modes may include: deleting digits adjacent to the middle in the real number of the called party, replacing digits adjacent to the middle in the real number of the called party, shielding digits adjacent to the middle in the real number of the called party, and the like.
The encrypted number of the called party obtained by encrypting by adopting the first encryption mode and the second encryption mode comprises different encryption mode prompt signs for prompting the encryption mode of the encrypted number of the called party. The encryption mode prompt can exist as a part of the encryption number of the called party in the encryption number of the called party, or can exist as an additional character independently outside the encryption number of the called party.
For example, for the real number 12345678910, when the real number is encrypted by the first encryption method, the obtained encrypted number is 123# 8910, and when the real number is encrypted by the second encryption method, the obtained encrypted number is 123# 8910. At this time, the encryption scheme indicators "#" and "×" are present in the generated encrypted number as part of the encrypted number. For another example, the encrypted number 123sgRy8910 (#) is obtained using a first encryption scheme and the encrypted number 123yshF8910 (#) is obtained using a second encryption scheme. At this time, the encryption scheme cues "#" and "×" are independent of the generated encryption number as additional symbols.
In step 1003, the caller who dispatches the to-be-dispatched order is determined according to the receiving address of the to-be-dispatched order. And sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
And determining a service area corresponding to the receiving address according to the receiving address of the to-be-dispatched order, further inquiring a calling party associated with the service area in a target platform, and determining the calling party as the calling party of the to-be-dispatched order, namely a dispatcher responsible for dispatching the to-be-dispatched package.
The auxiliary identification code associated with the real number of the called party and the encrypted number of the called party generated in the steps are sent to the calling party, which may be: and sending the auxiliary identification code and the generated encrypted number of the called party to terminal equipment associated with the calling party, and initiating a call request to the called party by the calling party through the encrypted number of the called party in the terminal equipment. It is also possible that: and generating a package face list according to the auxiliary identification code and the generated encrypted number of the called party, and initiating a call request to the called party by the calling party according to the called Fang Jiami number on the package face list.
In this embodiment, the real number of the called party is encrypted by different encryption methods, the encrypted number of the called party is sent to the calling party, the calling party initiates the call request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party, so that personal information security of the called party is protected.
Fig. 3 is a flowchart of still another embodiment of the information hiding method according to the present application.
As shown in fig. 3, in this embodiment, after the step 104 is performed, the information hiding method according to the embodiment of the present application further includes the following steps:
In step 1041, when the order corresponding to the real number of the called party is changed from the waiting status to the receiving status, the encrypted number of the called party is set to be invalid.
In this embodiment, when the encrypted number of the called party is generated according to the real number of the called party, a valid time limit is set for the encrypted number of the called party and the auxiliary identification code associated with the real number of the called party, and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the sign-in state, the encrypted number and the auxiliary identification code of the called party are invalid.
The validity time limit may be that when an order corresponding to the called party enters a to-be-dispatched state, the validity of the encrypted number of the called party is triggered, and at this time, a call request may be initiated to the called party through the encrypted number of the called party; when the order corresponding to the called party is changed from the dispatch state to the sign-on state, the effectiveness of the encryption number of the called party disappears, and at the moment, the call request cannot be initiated to the called party through the encryption number of the called party. Under the condition, only when the order is in the state to be dispatched, the encryption number of the called party is valid, and the personal information safety of the called party can be protected to the greatest extent.
The validity time limit may also be that when the encrypted number of the called party is generated, the encrypted number of the called party is valid, and in the whole logistics process of the order, the call request may be initiated to the called party through the encrypted number of the called party. Until the order is changed from the waiting state to the signing state, the encryption number of the called party is invalid, and the call request cannot be initiated to the called party through the encryption number of the called party. Under the condition, the method can ensure that the encrypted number of the called party can be contacted with the called party in the whole logistics process, thereby being convenient for processing unexpected situations in the logistics process; meanwhile, the encryption number of the called party is invalid after the order is signed, so that the privacy safety of the called party is protected.
Fig. 4 is a schematic diagram of an embodiment of an information hiding method according to the present application.
Fig. 4 is a flow diagram illustrating the transfer of call signaling generated by a call request between a calling party and a called party in a common call flow. As shown in fig. 4, the process includes:
Step 41, a calling party User Equipment (UE) sends a call signaling INVITE to a Proxy session border control network element (Proxy-Session Border Control, PSBC).
In the prior art, a calling party UE (User equipment) initiates a call request according to a real number ABCXXXXDEFG of a called party, and the generated call signaling INVITE includes a calling party ue_a, real number information ABCXXXXDEFG of the called party, and information of a radio cell where the calling party is located.
After receiving the call signaling INVITE, PSBC _a analyzes the wireless cell information therein to obtain the area information AREAID where the calling party is located. And replaces the radio cell information in the call signaling INVITE with AREAID.
Step 42-47, forwarding the call signaling INVITE carrying the calling party ue_a, the called party real number information ABCXXXXDEFG, and the calling party area information AREAID to the called party User equipment (ue_b) via the querying session control function/Serving session control function network element (Interrogating/Serving-Call Session Control Function, I/SCSCF), other platform AS, the querying session control function/Serving session control function network element I/scscf_b, the proxy session border control network element PSBC _b. At this time, the called party rings.
At step 48, ue_b transmits the generated RING signal 180RING back to the calling party ue_a.
In the call process shown in fig. 4, a call request is initiated by the real number of the called party, the real number of the called party cannot be protected, and the generated call signaling INVITE does not pass through the target platform, namely the enterprise information platform AS in fig. 4.
In the call flow of the embodiment of the application, unlike the prior art, the calling party initiates the call request through the encrypted number of the called party. As shown in fig. 5, the called party number information included in the call signaling INVITE generated at the calling party ue_a is encrypted number information. In the embodiment of the application, the flow comprises the following steps:
In step 50, the calling party ue_a transfers the call signaling INVITE containing the encrypted number of the called party to the proxy session border control network element PSBC _a.
A further difference is that the call signaling INVITE will pass through the target platform, i.e. the enterprise information platform AS in fig. 5.
The call signaling INVITE is transferred to the enterprise information platform AS via the interrogating session control function/serving session control function network element I/SCSCF _ a, steps 50-52. At this time, the enterprise information platform AS compares the area information AREAID of the calling party carried in the call signaling INVITE with the service area associated with the calling party in the target platform, and determines the calling authority of the calling party.
When the enterprise information platform AS determines that the calling party has the calling right, determining the real number ABCXXXXDEFG of the called party according to the encrypted number ABC and the DEFG of the called party carried in the calling signaling INVITE. And replaces the encrypted number ABC of the called party DEFG in the call signaling INVITE with the real number ABCXXXXDEFG of the called party.
In step 53, the enterprise information platform AS returns the call signaling INVITE containing the real number ABCXXXXDEFG of the called party to the querying session control function/serving session control function network element I/scscf_a.
In step 54-58, the call signaling INVITE is transferred to the called party ue_b via forwarding of the query session control function/service session control function network element I/scscf_a, other platform AS, query session control function/service session control function network element I/scscf_b, proxy session border control network element PSBC _b. At this time, the called party rings.
At step 59, the called party ue_b transmits the ringing information 180RING back to the calling party ue_a.
The enterprise information platform AS determines the real number of the called party according to the encrypted number of the called party carried in the call signaling INVITE, and the process is AS follows.
First, the encryption mode of the encryption number of the called party is determined according to the encryption mode prompt contained in the encryption number of the called party.
And secondly, determining the query range when the real number of the called party is queried according to the encryption mode.
AS shown in fig. 5, after the enterprise information platform AS determines the encryption mode according to the encryption mode indicator, assuming that the encryption mode is the first encryption mode, the query range is determined AS an order in which the attribution of the real number of the called party and the recipient address belong to the same area in the order to be dispatched in the service area of the calling party.
AS shown in fig. 6, after the enterprise information platform AS determines the encryption mode according to the encryption mode indicator "#", assuming that the encryption mode is the second encryption mode, the query range is determined AS an order in which the attribution of the real number of the called party and the recipient address do not belong to the same area in the order to be dispatched in the service area of the calling party.
Then, from the determined query range, the calling number which is consistent with the plaintext of the encrypted number of the called party is queried.
Specifically, the encrypted number of the called party includes a plaintext character and an encrypted character, and the consistency with the plaintext character of the encrypted number of the called party means that the digits in the corresponding position of the searched calling number are consistent with the plaintext character of the encrypted number of the called party. For example, for the called party encryption number ABC DEFG in fig. 5, the plaintext symbol is ABCDEFG and the encrypted symbol is ABCDEFG; if the query results in a calling number ABCJUHKDEFG, which also starts with ABC and ends with DEFG, it is considered to be consistent with the plaintext of the encrypted number of the called party.
And finally, determining the real number of the called party from the calling number according to the auxiliary identification code.
In this embodiment, the calling party initiates a call request according to the encrypted number of the called party, when the call signaling INVITE is transferred to the target platform, i.e. the enterprise information platform AS, the enterprise information platform AS converts the encrypted number of the called party carried in the call signaling INVITE into the real number of the called party, and executes the following signaling transfer process to complete the call. In the whole calling process, the real number of the called party is invisible to the calling party, so that the personal information safety of the called party is protected.
In order to facilitate understanding of the present application, in another embodiment of the present application, an information hiding method of the present application will be described with a specific example.
In this embodiment, an implementation flow is described by taking an example of implementing the information hiding method of the present application under a Voice over long term evolution (Voice over LTE) network.
There are two preconditions for implementing the method under VoLTE. First, as a calling party, the courier needs to pre-store principal information including basic information such as name, age, sex, contact phone, etc., and work information such as service area, etc. in a target platform. Second, the courier needs to open VoLTE services, sign up for specific initial filtering criteria (INITIAL FILTER CRITERIA, IFC). The IFCs are used to indicate an execution platform of a call service, and among all the IFCs that have been signed, the IFCs have the highest priority, so that when a calling party initiates a call request, the IFCs are triggered first, so that the call service jumps to a target platform for execution, and in this embodiment, the target platform is an enterprise information platform AS.
Fig. 7 is a flowchart of another embodiment of the information hiding method according to the present application. As shown in fig. 7, on the basis of the above premise, the execution flow of the information hiding method of the present application is as follows.
Step 201, receiving a call request of a calling party, and judging the call authority of the calling party.
After the calling party initiates the call request, a call signaling INVITE is generated, and at this time, the core network triggers the call signaling INVITE to the enterprise information platform AS according to the IFCs subscribed by the calling party. After receiving the call signaling INVITE, the enterprise information platform AS determines the identity information of the calling party according to the information of the calling party contained in the call signaling INVITE, such AS the contact telephone of the calling party; and inquiring the service area of the calling party in the enterprise information platform AS according to the area information of the calling party, such AS Beijing east urban area, and if the service area of the calling party is Beijing city, judging that the area information is contained in the service area of the calling party, and considering that the calling party has calling authority. If the service area of the calling party is the western city of Beijing city, the area information is judged not to be contained in the service area of the calling party, and the calling party is considered to have no calling authority. If the caller information does not exist in the enterprise information platform AS, the caller is also considered to have no calling authority.
In the call signaling INVITE, the area information of the calling party may be accurate to the county, and the format is "0+area code. For example, the east city of Beijing is 010.001 and the west city is 010.002.
When it is determined that the calling party has the call right, step 202 is performed. Otherwise, step 204 is performed.
Step 202, determining the real number of the called party according to the call signaling INVITE.
When judging that the calling party has the calling right, the enterprise information platform AS determines the real number of the called party according to the received calling signaling INVITE.
Firstly, obtaining the encryption number ABC DEFG of the called party carried in the call signaling INVITE, and determining the adopted encryption mode according to the encryption mode prompt. In this embodiment, the encryption mode indicator is "×", and it can be determined that the first encryption mode is adopted. Of course, the encryption mode indicator may correspond to the second encryption mode, as required by the actual situation.
Secondly, determining the real number of the called party according to the encryption mode of the encryption number of the called party. In this embodiment, the encryption mode is determined to be the first encryption mode, and assuming that the home location of the real number of the called party is the east city of beijing and the destination address is also the east city of beijing, then in the enterprise information platform AS, the destination address is queried from the order in the status to be dispatched AS the east city of beijing and the home location of the contact phone of the recipient is also the order in the east city of beijing. Determining an order in which the contact of the recipient starts with ABC and ends with DEFG, and extracting the contact phone of the recipient in the order.
When only one contact telephone meeting the conditions exists, the contact telephone is used as the real number of the called party; when a plurality of contact phones exist, an enterprise information platform AS initiates a voice prompt 'please input auxiliary identification codes' to a calling party, and the auxiliary identification codes screen the contact phones to obtain the real numbers of the called party.
Step 203, executing the call request according to the real number of the called party.
After obtaining the real number of the called party, the enterprise information platform AS replaces the encrypted number of the called party carried in the call signaling INVITE with the real number of the called party, and transmits the call signaling INVITE to the corresponding network element to execute the call request.
Step 204, rejecting the call request of the calling party.
Fig. 8 is a schematic structural diagram of an embodiment of an information hiding apparatus according to the present application, where the information hiding apparatus according to the present embodiment may be used as an information hiding device to implement an information hiding method according to an embodiment of the present application. As shown in fig. 8, the above information hiding apparatus may include: a receiving module 81, a judging module 82, a determining module 83 and a calling module 84.
The receiving module 81 is configured to receive a call request initiated by a calling party, where the call request includes area information of the calling party and an encrypted number of a called party. A determining module 82 is configured to determine whether the area information is included in a service area associated with the calling party. A determining module 83, configured to determine the real number of the called party according to the encrypted number of the called party when the area information is included in the service area range associated with the calling party. A calling module 84, configured to make a call to the called party according to the real number of the called party.
In particular, the determining module 83 is configured to determine to-be-dispatched order information in a service area associated with the calling party, and determine a calling number consistent with a plaintext character in the encrypted number of the called party from the to-be-dispatched order information. If the determined calling number is one, determining the calling number as the real number of the called party; if the determined calling number is a plurality of calling numbers, prompt information is sent to the calling party to prompt the calling party to input an auxiliary identification code, and the real number of the called party is determined from the plurality of calling numbers according to the auxiliary identification code input by the calling party.
In this embodiment, when a call request is initiated to a called party, the receiving module 81 receives the call request initiated by the calling party, the judging module 82 judges the calling authority of the calling party to judge, and when the calling party has the calling authority, the determining module 83 determines the real number of the called party according to the encrypted number of the called party, and calls the called party through the calling module 84. In the whole calling process, the real number of the called party is invisible to the calling party, so that the personal information of the called party is effectively hidden, and the personal information safety of the called party is protected.
Fig. 9 is a schematic structural diagram of another embodiment of the information hiding apparatus according to the present application, which is different from the information hiding apparatus shown in fig. 8 in that the information hiding apparatus shown in fig. 9 may further include: encryption module 85, transmission module 86.
In a specific implementation, the encryption module 85 is configured to determine, before the receiving module 81 receives a call request initiated by a calling party, an encryption manner for the real number of the called party according to the attribution of the real number of the called party in the order to be dispatched, and encrypt the real number of the called party according to the determined encryption manner.
And the sending module 86 is configured to determine a calling party sending the order to be dispatched according to the address of the receiver of the order to be dispatched, and send the encrypted number of the called party to the calling party, so that the calling party initiates a call request through the encrypted number of the called party.
FIG. 10 is a schematic diagram of an embodiment of an electronic device of the present application, as shown in FIG. 10, which may include at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, and the processor invokes the program instructions to execute the information hiding method provided by the embodiment of the present application.
The electronic device may be an information hiding device, and the specific form of the electronic device is not limited in this embodiment.
Fig. 10 shows a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the application. The electronic device shown in fig. 10 is merely an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the present application.
As shown in fig. 10, the electronic device is in the form of a general purpose computing device. Components of an electronic device may include, but are not limited to: one or more processors 410, a memory 430, and a communication bus 440 that connects the various system components (including the memory 430 and the processing unit 410).
The communication bus 440 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include industry Standard architecture (Industry Standard Architecture; hereinafter ISA) bus, micro channel architecture (Micro Channel Architecture; hereinafter MAC) bus, enhanced ISA bus, video electronics standards Association (Video Electronics Standards Association; hereinafter VESA) local bus, and peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECTION; hereinafter PCI) bus.
Electronic devices typically include a variety of computer system readable media. Such media can be any available media that can be accessed by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 430 may include computer system readable media in the form of volatile memory, such as random access memory (Random Access Memory; hereinafter: RAM) and/or cache memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. Although not shown in fig. 10, a disk drive for reading from and writing to a removable nonvolatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable nonvolatile optical disk (e.g., a compact disk read only memory (Compact Disc Read Only Memory; hereinafter, "CD-ROM"), digital versatile read only optical disk (Digital Video Disc Read Only Memory; hereinafter, "DVD-ROM"), or other optical media) may be provided. In such cases, each drive may be coupled to communication bus 440 by one or more data medium interfaces. Memory 430 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of the embodiments of the application.
A program/utility having a set (at least one) of program modules may be stored in the memory 430, such program modules including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules typically carry out the functions and/or methods of the embodiments described herein.
The electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, display, etc.), with one or more devices that enable a user to interact with the electronic device, and/or with any device (e.g., network card, modem, etc.) that enables the electronic device to communicate with one or more other computing devices. Such communication may occur through communication interface 420. Moreover, the electronic device may also communicate with one or more networks (e.g., local area network (Local Area Network; hereinafter: LAN), wide area network (Wide Area Network; hereinafter: WAN) and/or a public network, such as the Internet) via a network adapter (not shown in FIG. 10) that may communicate with other modules of the electronic device via communication bus 440. It should be appreciated that although not shown in fig. 10, other hardware and/or software modules may be used in connection with an electronic device, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, disk arrays (Redundant Arrays of INDEPENDENT DRIVES; hereinafter RAID) systems, tape drives, data backup storage systems, and the like.
The processor 410 executes various functional applications and data processing by running programs stored in the memory 430, for example, to implement the information hiding method provided by the embodiment of the present application.
The embodiment of the application also provides a non-transitory computer readable storage medium, which stores computer instructions that enable the computer to execute the information hiding method provided by the embodiment of the application.
The non-transitory computer readable storage media described above may employ any combination of one or more computer readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory; EPROM) or flash Memory, an optical fiber, a portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and additional implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order from that shown or discussed, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
It should be noted that, the terminal according to the embodiment of the present application may include, but is not limited to, a Personal Computer (Personal Computer; hereinafter referred to as a PC), a Personal digital assistant (Personal DIGITAL ASSISTANT; hereinafter referred to as a PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and so on.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather to enable any modification, equivalent replacement, improvement or the like to be made within the spirit and principles of the application.

Claims (8)

1. An information hiding method is characterized in that an execution subject of the method is a target platform, and the method comprises the following steps:
Receiving a call request initiated by a calling party; the calling request contains the area information of the calling party and the encryption number of the called party;
Judging whether the area information is contained in a service area range associated with the calling party;
If the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party;
calling the called party according to the real number of the called party;
when an order corresponding to the real number of the called party is changed from a to-be-dispatched state to a sign-in state, setting the encryption number of the called party as invalid;
The encryption number of the called party comprises a ciphertext character and a plaintext character; the determining the real number of the called party according to the encrypted number of the called party comprises the following steps:
determining order information to be dispatched in a service area associated with the calling party;
determining a calling number consistent with a plaintext character in an encrypted number of a called party from the order information to be dispatched;
If the determined calling number is one, determining the calling number as the real number of the called party;
If the determined calling number is a plurality of, sending prompt information to the calling party so as to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from a plurality of calling numbers according to the auxiliary identification code input by the calling party.
2. The method of claim 1, wherein prior to receiving the call request initiated by the calling party, the method further comprises:
Determining an encryption mode of the real number of the called party according to the attribution of the real number of the called party in the order to be dispatched; encrypting the real number of the called party according to the determined encryption mode;
determining a calling party for dispatching the order to be dispatched according to the receiving address of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
3. The method of claim 2, wherein determining the encryption of the real number of the called party based on the home location of the real number of the called party in the order to be dispatched comprises:
When the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, encrypting the real number of the called party by using a second encryption mode.
4. The method of claim 1, wherein the encrypted number of the called party includes an encrypted hint;
From the to-be-dispatched order information, determining a calling number consistent with a plaintext character in an encrypted number of a called party, including:
if the encryption number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt, screening first order dispatch information of the area where the called party number belongs to and the destination address belong to from the order information to be dispatched; determining a calling number consistent with a plaintext in an encrypted number of a called party from the first order placement information;
If the encryption number of the called party is determined to be encrypted in a second encryption mode according to the encryption mode prompt, screening second order dispatch information of which the called party number attribution and the receiver address belong to different areas from the order information to be dispatched; a calling number is determined from the second order dispatch information that is consistent with the plaintext in the encrypted number of the called party.
5. An information hiding apparatus, characterized by comprising:
the receiving module is used for receiving a call request initiated by a calling party; the calling request contains the area information of the calling party and the encryption number of the called party;
A judging module, configured to judge whether the area information is included in a service area range associated with the calling party;
A determining module, configured to determine, when the area information is included in a service area range associated with the calling party, a real number of the called party according to an encrypted number of the called party;
the calling module is used for calling the called party according to the real number of the called party;
the device is also used for setting the encryption number of the called party as invalid when the order corresponding to the real number of the called party is changed from the state to be dispatched to the signing state;
the encryption number of the called party comprises a ciphertext character and a plaintext character; the determining module is specifically configured to:
determining order information to be dispatched in a service area associated with the calling party;
determining a calling number consistent with a plaintext character in an encrypted number of a called party from the order information to be dispatched;
If the determined calling number is one, determining the calling number as the real number of the called party;
If the determined calling number is a plurality of, sending prompt information to the calling party so as to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from a plurality of calling numbers according to the auxiliary identification code input by the calling party.
6. The apparatus of claim 5, wherein the apparatus further comprises:
The encryption module is used for determining an encryption mode of the real number of the called party according to the attribution of the real number of the called party in the order to be dispatched before the receiving module receives the call request initiated by the calling party; encrypting the real number of the called party according to the determined encryption mode;
the sending module is used for determining a calling party sending the order to be sent according to the receiving address of the order to be sent; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
7. An electronic device, comprising:
at least one processor; and
At least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1-4.
8. A non-transitory computer readable storage medium storing computer instructions that cause the computer to perform the method of any one of claims 1 to 4.
CN202010704905.2A 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment Active CN113965648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010704905.2A CN113965648B (en) 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010704905.2A CN113965648B (en) 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113965648A CN113965648A (en) 2022-01-21
CN113965648B true CN113965648B (en) 2024-05-07

Family

ID=79459755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010704905.2A Active CN113965648B (en) 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113965648B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011154221A1 (en) * 2010-06-11 2011-12-15 International Business Machines Corporation System, method and computer program product for filtering telephone communications
CN102567883A (en) * 2010-12-07 2012-07-11 亚马逊技术股份有限公司 Privacy protection related to product shipment
CN105721720A (en) * 2014-12-03 2016-06-29 中国电信股份有限公司 Method for displaying virtual number, and virtual number distribution platform and system
CN105992200A (en) * 2015-02-13 2016-10-05 中国电信股份有限公司 Addressee calling method, device, server and system
CN106303103A (en) * 2015-06-25 2017-01-04 阿里巴巴集团控股有限公司 A kind of communication means protecting personal information and device
WO2018147467A1 (en) * 2017-02-13 2018-08-16 クックパッド株式会社 Reservation management phone-call system, reservation management phone-call program, and reservation management phone-call method
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
US10681206B1 (en) * 2018-12-05 2020-06-09 At&T Intellectual Property I, L.P. Detecting a spoofed call

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8199746B2 (en) * 2007-07-20 2012-06-12 Cisco Technology, Inc. Using PSTN reachability to verify VoIP call routing information
CN102238500B (en) * 2010-04-21 2014-07-02 中兴通讯股份有限公司 Method and system for forwarding calls safely
US8639225B2 (en) * 2010-05-25 2014-01-28 Heine F. NZUMAFO E-mail to phone number resolution for mobile to mobile, mobile to landline, and PC to mobile communications
EP3162104B1 (en) * 2014-06-25 2022-11-02 Orange A method to authenticate calls in a telecommunication system
US11018872B2 (en) * 2018-07-17 2021-05-25 Verizon Patent And Licensing Inc. Validating and securing caller identification to prevent identity spoofing

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011154221A1 (en) * 2010-06-11 2011-12-15 International Business Machines Corporation System, method and computer program product for filtering telephone communications
CN102567883A (en) * 2010-12-07 2012-07-11 亚马逊技术股份有限公司 Privacy protection related to product shipment
CN105721720A (en) * 2014-12-03 2016-06-29 中国电信股份有限公司 Method for displaying virtual number, and virtual number distribution platform and system
CN105992200A (en) * 2015-02-13 2016-10-05 中国电信股份有限公司 Addressee calling method, device, server and system
CN106303103A (en) * 2015-06-25 2017-01-04 阿里巴巴集团控股有限公司 A kind of communication means protecting personal information and device
WO2018147467A1 (en) * 2017-02-13 2018-08-16 クックパッド株式会社 Reservation management phone-call system, reservation management phone-call program, and reservation management phone-call method
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
US10681206B1 (en) * 2018-12-05 2020-06-09 At&T Intellectual Property I, L.P. Detecting a spoofed call

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
VoLTE网络短号码呼叫方案研究;陆广海;;山东通信技术(03);13-16 *
互联网语音业务中的个人信息保护方法与实现技术;陈士梁;;中国新通信(16);129-130 *

Also Published As

Publication number Publication date
CN113965648A (en) 2022-01-21

Similar Documents

Publication Publication Date Title
US20120135744A1 (en) Systems and methods for generating and managing communication rules associated with geographic locations
CN105637848A (en) Call handling using IP multimedia subsystem
CN113645612B (en) Communication method and device
US20150113282A1 (en) System and method for digitally signing documents from a mobile device
CN108605226B (en) Incoming call reminding method, terminal equipment and graphical user interface
EP1919174A1 (en) Presence information delivery apparatus and method for mobile communication network
KR20110132392A (en) User challenge using information based on geography or user identity
CN102833411A (en) Method and system for processing information on basis of dual-tone multifrequency and receiving terminal
US20070140439A1 (en) Method for presenting location information on a mobile terminal
CN103873704A (en) Caller identification method and system for calling number
CN107635016A (en) A kind of call-information management method and system based on big data
CN102598733A (en) Discovering and using phone number location information
US20130244706A1 (en) System and method for providing user names for network addresses
CN113965648B (en) Information hiding method and device and electronic equipment
US20090298519A1 (en) Systems, methods and software applications for mobile device menu modification
CN111600987A (en) Method and device for displaying calling name of short message, storage medium, short message service center and receiving terminal
WO2012124955A2 (en) Method for setting spam string in mobile device and device therefor
JP2009260484A (en) Communication device
JP2010246054A (en) Communication system, communication terminal, data transfer server and control program
US10728191B2 (en) Method for establishing communication within a closed network
CN109246105B (en) Communication method and system for preventing information leakage
CN103391120A (en) Friend relation establishing method and device based on near-field communication
KR20130054575A (en) Apparatus and method for identifying loss of portable terminal in wireless communication system
CN114598774B (en) Cloud mobile phone communication method and system
KR20130137423A (en) Apparatus and method for providing address book information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant