CN114125158A - Anti-harassment method, device, equipment and storage medium based on trusted telephone - Google Patents
Anti-harassment method, device, equipment and storage medium based on trusted telephone Download PDFInfo
- Publication number
- CN114125158A CN114125158A CN202111408121.6A CN202111408121A CN114125158A CN 114125158 A CN114125158 A CN 114125158A CN 202111408121 A CN202111408121 A CN 202111408121A CN 114125158 A CN114125158 A CN 114125158A
- Authority
- CN
- China
- Prior art keywords
- identity
- phone number
- bill
- mobile phone
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000006854 communication Effects 0.000 claims abstract description 72
- 238000004891 communication Methods 0.000 claims abstract description 69
- 238000012795 verification Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 10
- 230000002265 prevention Effects 0.000 abstract description 19
- 238000005516 engineering process Methods 0.000 abstract description 6
- 238000013473 artificial intelligence Methods 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013503 de-identification Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42042—Notifying the called party of information on the calling party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to an artificial intelligence technology, and discloses a harassment prevention method based on a trusted telephone, which comprises the following steps: receiving user information uploaded by a first user side, encrypting the user information to generate an identity bill, and generating a corresponding identity bill ID; when a second user terminal initiates a call request through an application, encrypting a calling party mobile phone number, a called party mobile phone number and an ID (identity) bill to obtain a communication token; and acquiring a communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring the identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of a third user end. In addition, the invention also relates to a block chain technology, and the user information can be stored in the nodes of the block chain. The invention also provides a harassment prevention device based on the trusted telephone, electronic equipment and a storage medium. The method and the device can solve the problem of low identification rate of the crank calls.
Description
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a method and a device for preventing harassment based on a trusted telephone, electronic equipment and a computer readable storage medium.
Background
The rapid development of mobile communication technology brings convenience to people's life, work and study, but various marketing, fraud, malicious calls and the like appear along with the rapid development of mobile communication technology, thereby causing great troubles to people's life and disturbing the operation order of a communication network.
At present, only the caller ID and remarks in called party equipment are displayed when the caller ID is displayed, although operators and mobile phone manufacturers add part of harassing call identifiers, such as fraud, harassment, advertising promotion, express meal delivery and the like, and intercept calls, the interception and identification cannot guarantee complete prevention of harassing calls, and the number libraries of the operators and the mobile phone manufacturers cannot be updated in real time, and the problem that normal calls are wrongly identified or wrongly intercepted can also occur.
In conclusion, the identification rate of the harassing calls in the current method needs to be improved.
Disclosure of Invention
The invention provides a method and a device for preventing harassment based on a trusted telephone and a computer readable storage medium, and mainly aims to solve the problem of low precision in product recommendation.
In order to achieve the above object, the present invention provides a harassment prevention method based on trusted phone, which comprises:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
Optionally, the verifying the user information includes:
extracting information which can represent the identity of the user, such as a mobile phone number, an identity card number, a name and the like from the user information;
and verifying the user information according to the information representing the user identity.
Optionally, the encrypting the user information to generate the identity ticket includes:
and encrypting the user information by using an SM2 algorithm to generate an identity ticket and a digital certificate corresponding to the identity ticket.
Optionally, the encrypting the mobile phone number of the calling party, the mobile phone number of the called party, and the ID of the identity ticket corresponding to the selected identity ticket to obtain the communication token includes:
generating a first key pair by using an SM2 algorithm, and calculating digest values of a calling party mobile phone number and a called party mobile phone number by using a message digest algorithm;
signing the digest value by using a private key in the first key pair to obtain a signature value;
generating a second key pair by using an SM3 algorithm, and encrypting the ID of the identity bill by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the check parameter into a communication token.
Optionally, the generating a first key pair using the SM2 algorithm includes:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) ═ d × G (x, y) based on the private key;
where G denotes a base point of the elliptic curve, n denotes an integer greater than 2, P denotes a public key, and (x, y) denotes an elliptic curve point.
Optionally, the decrypting the communication token to obtain the ID ticket ID includes:
calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
when the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
and decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the ID of the identity bill.
Optionally, the obtaining the corresponding identity ticket according to the identity ticket ID, and decrypting the user information from the identity ticket includes:
acquiring the identity bill and a digital certificate corresponding to the identity bill by using the ID of the identity bill;
and decrypting the identity bill by using the digital certificate to obtain the user information.
In order to solve the above problem, the present invention further provides an anti-harassment device based on trusted phone, the device includes:
the identity bill generation module is used for receiving user information uploaded by a first user end, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
the communication token generation module is used for acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application when the second user terminal successfully logs in the preset application; when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and the decryption module is used for receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill and displaying the identity information on a display screen of the third user terminal.
In order to solve the above problem, the present invention also provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the trusted phone-based anti-harassment method described above.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, in which at least one computer program is stored, and the at least one computer program is executed by a processor in an electronic device to implement the above-mentioned trusted telephone based anti-harassment method.
The embodiment of the invention encrypts the user information of the calling party into the identity bill, further encrypts the identity bill ID, the mobile phone number of the calling party and the mobile phone number of the called party corresponding to the identity bill into the communication token, displays the user information of the calling party in the incoming call by decrypting the called party, and can ensure that the called party confirms the identity of the incoming call through the user information, thereby reducing the possibility of answering a harassing call and avoiding the problem that a normal incoming call is wrongly identified or intercepted. Therefore, the harassment prevention method and device based on the credible telephone, the electronic equipment and the computer readable storage medium can solve the problem of low harassment telephone identification rate.
Drawings
Fig. 1 is an architecture diagram of an application environment of a trusted telephone-based harassment prevention method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of a harassment prevention method based on a trusted telephone according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a detailed implementation flow of one step in the trusted telephone based harassment prevention method shown in FIG. 2;
FIG. 4 is a schematic diagram illustrating a detailed implementation flow of one step in the trusted telephone based harassment prevention method shown in FIG. 2;
FIG. 5 is a functional block diagram of an anti-harassment device based on trusted phone according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device that implements the trusted telephone-based harassment prevention method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the application provides a harassment prevention method based on a trusted telephone. The execution subject of the anti-harassment method based on the trusted telephone includes but is not limited to at least one of electronic devices such as a server and a terminal which can be configured to execute the method provided by the embodiment of the application. In other words, the anti-harassment method based on the trusted telephone can be executed by software or hardware installed in the terminal equipment or the server equipment, and the software can be a block chain platform.
Preferably, referring to fig. 1, in the embodiment of the present invention, the method for preventing harassment based on trusted phone is applied to a server 1, where the server 1 includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and artificial intelligence platform, and the like.
When the anti-harassment method based on the trusted telephone is executed, the server 1 is in communication connection with the first user end 2. The first user end 2 may be any portable electronic device with a communication function, such as a mobile phone, a smart watch, a tablet computer, and the like of a user, or may be a non-portable electronic device with a communication function, such as a fixed phone, a desktop computer, and the like. In the embodiment of the present invention, the first user end 2 is installed with a client program corresponding to the harassment prevention method based on the trusted telephone, such as a trusted telephone APP.
Further, in the embodiment of the present invention, the first user end 2 can be divided into the second user end 20 and the third user end 30 according to different roles played in the communication process. The second user end 20 is a calling party identity during the communication process, and the third user end 30 is a called party identity during the communication process.
Fig. 2 is a schematic flow chart of a harassment prevention method based on a trusted telephone according to an embodiment of the present invention. In this embodiment, the harassment prevention method based on the trusted telephone includes:
s1, receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
in the embodiment of the present invention, the first user side may be all users who install the preset application. As described above, the preset application is a client program corresponding to the harassment prevention method based on the trusted telephone, such as a trusted telephone APP.
The user information may correspond to one or more identities of the user. Wherein, the user identity can be a company employee, a member of a certain social group, and the like. For example, in one application scenario of the present invention, a user has multiple identities of a redcross contractor, a student's home, a technician of a company, and the like. Therefore, in the embodiment of the present invention, the user information may be one or more groups of user information, where each group of user information may correspond to an identity of the user. In detail, each set of the user information may include a mobile phone number, an identification number, a name, a position, a job, an organization name of the company or group, a work certificate of the user, and the like.
In detail, the verifying the user information includes:
the first user end extracts information which can represent the user identity from the user information, such as a mobile phone number, an identity card number, a name and the like;
and verifying the user information according to the information representing the user identity.
In one embodiment of the invention, the information representing the user identity, such as the mobile phone number, the identity card number, the name and the like in the user information can be verified by using a national authentication mechanism system, so that the correctness and the legality of the user information are ensured. The national certified institution system is derived from an identity database of a government department, and when the national certified institution system is utilized, the user information can be ensured not to be leaked through de-identification.
In one embodiment of the present invention, when the user information fails to be verified, a verification failure prompt message is sent. The user information check fails, such as: the filling and writing of the mobile phone number is wrong, the name of the mobile phone number owner is not consistent with the name in the user information, the mobile phone number fails to pass real-name authentication, the identity card number is not matched with the name in the user information, and the like.
Further, in another embodiment of the present invention, when the authenticity and consistency of the mobile phone number, the identification number, and the name in the user information are successfully verified, an encryption algorithm, such as an SM2 algorithm, is used to encrypt each of the user information, so as to obtain an identity ticket corresponding to each of the user information and a digital certificate corresponding to the identity ticket.
In the embodiment of the invention, each identity bill correspondingly generates a unique corresponding identity bill ID, and the identity bills can be called through the identity bill IDs, so that the calling speed of the data related to the user information is improved.
In the implementation of the invention, the SM2 algorithm is an elliptic curve public key cryptographic algorithm issued by the State cryptology administration, the SM2 algorithm has high cryptographic complexity and high processing speed, and is beneficial to protecting user information from being leaked.
S2, when the second user successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
in this embodiment of the present invention, the second user end is any one of the users in the first user end. When the second user needs to make a call, the second user can log in the preset application by using the account password, and when the login is successful, all the identity tickets and the corresponding identity ticket IDs of the second user are called according to the account. The second user terminal can select the identity ticket corresponding to different user identities in the application.
S3, when the second user terminal initiates a call request through the application, receiving the identity ticket selected by the second user terminal in the application, and encrypting the mobile phone number of the calling party, the mobile phone number of the called party and the ID of the identity ticket corresponding to the selected identity ticket to obtain a communication token;
in the embodiment of the invention, the identity information is further encrypted by utilizing the SM2 algorithm, the SM3 algorithm and the SM4 algorithm in the national cryptographic algorithm to obtain the communication token. The SM2 algorithm is an asymmetric encryption algorithm, the SM3 algorithm is a digest algorithm, and the SM4 algorithm is a symmetric encryption algorithm.
In detail, referring to fig. 3, after encrypting the mobile phone number of the calling party, the mobile phone number of the called party, and the ID of the identity ticket corresponding to the selected identity ticket in S3, obtaining the communication token includes:
s31, generating a first key pair by using SM2 algorithm, and calculating the digest values of the mobile phone number of the calling party and the mobile phone number of the called party by using message digest algorithm;
s32, signing the digest value by using a private key in the first key pair to obtain a signature value;
s33, generating a second key pair by using an SM3 algorithm, and encrypting the ID of the identity bill by using a private key in the second key pair to obtain a ciphertext;
s34, generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and S35, combining the signature value, the ciphertext and the check parameter into a communication token.
Specifically, in this embodiment of the present invention, the generating a first key pair by using the SM2 algorithm includes:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) ═ d × G (x, y) based on the private key;
where G denotes a base point of the elliptic curve, n denotes an integer greater than 2, P denotes a public key, and (x, y) denotes an elliptic curve point.
In the embodiment of the invention, the communication token can be an ASN.1 data structure, the ASN.1(Abstract Syntax notification 1) is a formal language, and describes a data format for representing, coding, transmitting and decoding data, namely, the communication token can be rapidly and reliably transmitted in a wireless broadband and can also be used by application program codes. Furthermore, the embodiment of the invention also comprises the steps of verifying the data format of the communication token, preventing other data interference and storing the communication token passing the verification into the server.
In the embodiment of the invention, the ID of the identity bill, the number of the calling party mobile phone and the number of the called party mobile phone are further encrypted into the communication token, the user information is secondarily encrypted and then transmitted and stored, the identity information is not easy to be falsified, and the safety of the identity information is ensured.
S4, receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity ticket ID, acquiring a corresponding identity ticket according to the identity ticket ID, decrypting identity information from the identity ticket, and displaying the identity information on a display screen of the third user terminal.
In this embodiment of the present invention, the third user may be any one of the first user, and at this time, the preset application, that is, a client program corresponding to the harassment prevention method based on the trusted phone, such as the trusted phone APP, is also installed in the third user.
In detail, referring to fig. 4, decrypting the communication token in S4 to obtain the ID ticket ID includes:
s41, computing the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
s42, when the signature passes the verification, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
and S43, decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the ID of the identity bill.
Further, the acquiring the corresponding identity ticket according to the identity ticket ID and decrypting the user information from the identity ticket includes:
acquiring the identity bill and a digital certificate corresponding to the identity bill by using the ID of the identity bill;
and decrypting the identity bill by using the digital certificate to obtain the user information.
In another embodiment of the present invention, when the third user side is any one of the users in the first user side, that is, the third user side does not have the preset application installed therein, the identity information cannot be displayed on the display screen of the third user side, but can be sent to the third user side in a multimedia message manner.
The embodiment of the invention encrypts the user information of the calling party into the identity bill, further encrypts the identity bill ID, the mobile phone number of the calling party and the mobile phone number of the called party corresponding to the identity bill into the communication token, displays the user information of the calling party in the incoming call by decrypting the called party, and can ensure that the called party confirms the identity of the incoming call through the user information, thereby reducing the possibility of answering a harassing call and avoiding the problem that a normal incoming call is wrongly identified or intercepted. Therefore, the harassment prevention method and device based on the credible telephone, the electronic equipment and the computer readable storage medium can solve the problem of low harassment telephone identification rate.
Fig. 5 is a functional block diagram of an anti-harassment device based on trusted phone according to an embodiment of the present invention.
The anti-harassment device 100 based on the trusted telephone of the present invention may be installed in an electronic device. According to the realized functions, the anti-harassment device 100 based on the trusted telephone can comprise an identity bill generating module 101, a communication token generating module 102 and a decryption module 103. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the identity bill generating module 101 is configured to receive user information uploaded by a first user, verify the user information, encrypt the user information to generate an identity bill and generate a corresponding identity bill ID when the user information is successfully verified;
the communication token generation module 102 is configured to, when a second user successfully logs in a preset application, obtain a corresponding identity ticket and a corresponding identity ticket ID according to login information of the preset application; when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
the decryption module 103 is configured to receive a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user based on the call request, obtain a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypt the communication token to obtain an identity ticket ID, obtain a corresponding identity ticket according to the identity ticket ID, decrypt identity information from the identity ticket, and display the identity information on a display screen of the third user.
In detail, when the modules in the anti-harassment device 100 based on the trusted phone according to the embodiment of the present invention are used, the same technical means as the anti-harassment method based on the trusted phone described in fig. 1 to 4 are adopted, and the same technical effects can be produced, which is not described herein again.
Fig. 6 is a schematic structural diagram of an electronic device implementing a harassment prevention method based on a trusted telephone according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11, a communication bus 12 and a communication interface 13, and may further comprise a computer program, such as a trusted telephone based anti-harassment program, stored in the memory 11 and executable on the processor 10.
In some embodiments, the processor 10 may be composed of an integrated circuit, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same function or different functions, and includes one or more Central Processing Units (CPUs), a microprocessor, a digital Processing chip, a graphics processor, a combination of various control chips, and the like. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device by running or executing programs or modules (for example, executing a harassment prevention program based on a trusted telephone, and the like) stored in the memory 11 and calling data stored in the memory 11.
The memory 11 includes at least one type of readable storage medium including flash memory, removable hard disks, multimedia cards, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a removable hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only to store application software installed in the electronic device and various types of data, such as a code of a trusted telephone-based anti-harassment program, but also to temporarily store data that has been output or is to be output.
The communication bus 12 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
The communication interface 13 is used for communication between the electronic device and other devices, and includes a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which are typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
Fig. 6 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management and the like are realized through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The trusted telephone based anti-harassment program stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 10, enable:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
Specifically, the specific implementation method of the instruction by the processor 10 may refer to the description of the relevant steps in the embodiment corresponding to the drawings, which is not described herein again.
Further, the integrated modules/units of the electronic device 1, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. The computer readable storage medium may be volatile or non-volatile. For example, the computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM).
The present invention also provides a computer-readable storage medium, storing a computer program which, when executed by a processor of an electronic device, may implement:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.
Claims (10)
1. A method for preventing harassment based on trusted telephony, the method comprising:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
2. The trusted phone-based anti-harassment method of claim 1, wherein said verifying said user information comprises:
extracting information which can represent the identity of the user from the user information;
and verifying the user information according to the information representing the user identity.
3. The method for preventing harassment based on trusted telephone as claimed in claim 2, wherein said encrypting said user information to generate an identity ticket comprises:
and encrypting the user information by using an SM2 algorithm to generate an identity ticket and a digital certificate corresponding to the identity ticket.
4. The method as claimed in claim 3, wherein said encrypting the caller's phone number, the callee's phone number, the ID of the selected ID ticket to obtain the communication token comprises:
generating a first key pair by using an SM2 algorithm, and calculating digest values of a calling party mobile phone number and a called party mobile phone number by using a message digest algorithm;
signing the digest value by using a private key in the first key pair to obtain a signature value;
generating a second key pair by using an SM3 algorithm, and encrypting the ID of the identity bill by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the check parameter into a communication token.
5. A trusted telephony based anti-harassment method according to claim 4, wherein said generating a first key pair using the SM2 algorithm comprises:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) ═ d × G (x, y) based on the private key;
where G denotes a base point of the elliptic curve, n denotes an integer greater than 2, P denotes a public key, and (x, y) denotes an elliptic curve point.
6. A method as claimed in claim 4, wherein said decrypting said communication token to obtain an identity ticket ID comprises:
calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
when the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
and decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the ID of the identity bill.
7. The method as claimed in claim 6, wherein said obtaining a corresponding identity ticket according to said identity ticket ID, and decrypting user information from said identity ticket comprises:
acquiring the identity bill and a digital certificate corresponding to the identity bill by using the ID of the identity bill;
and decrypting the identity bill by using the digital certificate to obtain the user information.
8. An anti-harassment device based on trusted telephony, characterized in that it comprises:
the identity bill generation module is used for receiving user information uploaded by a first user end, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
the communication token generation module is used for acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application when the second user terminal successfully logs in the preset application; when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and the decryption module is used for receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill and displaying the identity information on a display screen of the third user terminal.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform a trusted phone-based anti-harassment method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out a trusted telephone-based anti-harassment method as claimed in any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111408121.6A CN114125158B (en) | 2021-11-19 | 2021-11-19 | Anti-harassment method, device, equipment and storage medium based on trusted telephone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111408121.6A CN114125158B (en) | 2021-11-19 | 2021-11-19 | Anti-harassment method, device, equipment and storage medium based on trusted telephone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114125158A true CN114125158A (en) | 2022-03-01 |
CN114125158B CN114125158B (en) | 2024-04-23 |
Family
ID=80372456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111408121.6A Active CN114125158B (en) | 2021-11-19 | 2021-11-19 | Anti-harassment method, device, equipment and storage medium based on trusted telephone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114125158B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760388A (en) * | 2022-03-29 | 2022-07-15 | 微位(深圳)网络科技有限公司 | Platform-to-end trusted call information display method, device, equipment and medium |
CN114760114A (en) * | 2022-03-29 | 2022-07-15 | 微位(深圳)网络科技有限公司 | Identity authentication method, device, equipment and medium |
CN114827354A (en) * | 2022-04-21 | 2022-07-29 | 微位(深圳)网络科技有限公司 | Identity authentication information display method and device, electronic equipment and readable storage medium |
CN114900577A (en) * | 2022-04-28 | 2022-08-12 | 微位(深圳)网络科技有限公司 | Calling subscriber identity display method, terminal and system based on super SIM card |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111371797A (en) * | 2020-03-12 | 2020-07-03 | 北京链安区块链科技有限公司 | Credible identity authentication method and system in communication session |
CN112422751A (en) * | 2020-10-27 | 2021-02-26 | 中国科学院大学 | Calling method and system for displaying calling party multimedia identity based on called party |
-
2021
- 2021-11-19 CN CN202111408121.6A patent/CN114125158B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111371797A (en) * | 2020-03-12 | 2020-07-03 | 北京链安区块链科技有限公司 | Credible identity authentication method and system in communication session |
CN112422751A (en) * | 2020-10-27 | 2021-02-26 | 中国科学院大学 | Calling method and system for displaying calling party multimedia identity based on called party |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760388A (en) * | 2022-03-29 | 2022-07-15 | 微位(深圳)网络科技有限公司 | Platform-to-end trusted call information display method, device, equipment and medium |
CN114760114A (en) * | 2022-03-29 | 2022-07-15 | 微位(深圳)网络科技有限公司 | Identity authentication method, device, equipment and medium |
CN114760114B (en) * | 2022-03-29 | 2024-03-12 | 微位(深圳)网络科技有限公司 | Identity authentication method, device, equipment and medium |
CN114827354A (en) * | 2022-04-21 | 2022-07-29 | 微位(深圳)网络科技有限公司 | Identity authentication information display method and device, electronic equipment and readable storage medium |
CN114900577A (en) * | 2022-04-28 | 2022-08-12 | 微位(深圳)网络科技有限公司 | Calling subscriber identity display method, terminal and system based on super SIM card |
Also Published As
Publication number | Publication date |
---|---|
CN114125158B (en) | 2024-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114125158B (en) | Anti-harassment method, device, equipment and storage medium based on trusted telephone | |
CN111080295B (en) | Electronic contract processing method and device based on blockchain | |
CN110290102A (en) | Service security system and method based on application | |
CN113055380B (en) | Message processing method and device, electronic equipment and medium | |
CN112801663B (en) | Blockchain certification method, device, system, equipment and medium | |
CN110677261B (en) | Trusted two-dimensional code generation method and device, electronic equipment and storage medium | |
CN114095220A (en) | Telephone communication verification method, device, equipment and storage medium | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN114760114A (en) | Identity authentication method, device, equipment and medium | |
CN114726630B (en) | License-based information security authorization method and device, electronic equipment and medium | |
CN114827354A (en) | Identity authentication information display method and device, electronic equipment and readable storage medium | |
CN103139179A (en) | Multi-channel active type network identity verification system and network identity verification device | |
CN114499859A (en) | Password verification method, device, equipment and storage medium | |
CN114553532A (en) | Data secure transmission method and device, electronic equipment and storage medium | |
CN110890979B (en) | Automatic deployment method, device, equipment and medium for fort machine | |
CN111199007A (en) | Configuration method based on Web page, data encryption method and device | |
CN114826725B (en) | Data interaction method, device, equipment and storage medium | |
CN113783690B (en) | Authentication-based bidding method and device | |
CN115001784A (en) | Data storage method and device, electronic equipment and computer readable storage medium | |
CN114860713A (en) | Block chain-based data matching method and device, electronic equipment and storage medium | |
CN114697132A (en) | Method, device, equipment and storage medium for intercepting repeated access request attack | |
CN111683070B (en) | Data transmission method and device based on identity encryption and storage medium | |
CN112862484A (en) | Secure payment method and device based on multi-terminal interaction | |
CN114826613B (en) | Identity information query method, device, equipment and storage medium based on blockchain | |
CN118381660B (en) | Regional cash center behavior zero trust system construction method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |