CN114125158B - Anti-harassment method, device, equipment and storage medium based on trusted telephone - Google Patents
Anti-harassment method, device, equipment and storage medium based on trusted telephone Download PDFInfo
- Publication number
- CN114125158B CN114125158B CN202111408121.6A CN202111408121A CN114125158B CN 114125158 B CN114125158 B CN 114125158B CN 202111408121 A CN202111408121 A CN 202111408121A CN 114125158 B CN114125158 B CN 114125158B
- Authority
- CN
- China
- Prior art keywords
- identity
- mobile phone
- phone number
- bill
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000006854 communication Effects 0.000 claims abstract description 79
- 238000004891 communication Methods 0.000 claims abstract description 70
- 238000012795 verification Methods 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 9
- 238000013473 artificial intelligence Methods 0.000 abstract description 6
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013503 de-identification Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42042—Notifying the called party of information on the calling party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to artificial intelligence technology, and discloses an anti-harassment method based on a trusted telephone, which comprises the following steps: receiving user information uploaded by a first user, encrypting the user information to generate an identity bill, and generating a corresponding identity bill ID; when a second user side initiates a call request through application, encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID to obtain a communication token; and obtaining a communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, obtaining an identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of a third user terminal. In addition, the invention also relates to a blockchain technology, and user information can be stored in nodes of the blockchain. The invention also provides an anti-harassment device based on the trusted telephone, electronic equipment and a storage medium. The method can solve the problem of low recognition rate of the harassing calls.
Description
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to an anti-harassment method, device, electronic equipment and computer readable storage medium based on a trusted telephone.
Background
The rapid development of mobile communication technology brings great convenience to the life, work and study of people, but various marketing, fraud, malicious phones and the like are generated along with the rapid development of mobile communication technology, so that great trouble is caused to the life of people, and the operation order of a communication network is disturbed.
At present, when the incoming call is displayed, only the incoming call number and remarks in the called party equipment are displayed, and although operators and mobile phone manufacturers add part of harassment call identifications, such as fraud, harassment, advertisement promotion, fast delivery meal and the like, and call interception is performed, the interception and identification cannot ensure that harassment calls are completely prevented, and the number banks of the operators and mobile phone manufacturers cannot be updated in real time, and meanwhile, the problem that normal incoming calls are misidentified or intercepted by mistake can also occur.
In summary, the recognition rate of the harassment calls in the current method needs to be improved.
Disclosure of Invention
The invention provides an anti-harassment method, device and computer readable storage medium based on a trusted telephone, and mainly aims to solve the problem of low accuracy in product recommendation.
In order to achieve the above purpose, the invention provides an anti-harassment method based on a trusted telephone, comprising the following steps:
receiving user information uploaded by a first user, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
When a second user side successfully logs in a preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of the preset application;
When the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
Receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal.
Optionally, the verifying the user information includes:
extracting information which can represent the identity of the user from the user information, such as a mobile phone number, an identity card number, a name and the like;
And verifying the user information according to the information representing the user identity.
Optionally, the encrypting the user information to generate an identity ticket includes:
and encrypting the user information by using an SM2 algorithm to generate an identity bill and a digital certificate corresponding to the identity bill.
Optionally, the encrypting the calling party mobile phone number, the called party mobile phone number and the identity ticket ID corresponding to the selected identity ticket to obtain the communication token includes:
Generating a first key pair by using an SM2 algorithm, and calculating the digest values of the calling party mobile phone number and the called party mobile phone number by using a message digest algorithm;
Signing the digest value by adopting a private key in the first key pair to obtain a signature value;
Generating a second key pair by using an SM3 algorithm, and encrypting the identity bill ID by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the verification parameter into a communication token.
Optionally, the generating the first key pair by using the SM2 algorithm includes:
Selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) =d×g (x, y) based on the private key;
Where G represents the base point of the elliptic curve, n represents an integer greater than 2, P represents the public key, and (x, y) represents the elliptic curve point.
Optionally, the decrypting the communication token to obtain the identity ticket ID includes:
Calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
When the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
And decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the identity bill ID.
Optionally, the obtaining the corresponding identity ticket according to the identity ticket ID, decrypting the user information from the identity ticket, includes:
acquiring the digital certificate corresponding to the identity bill by utilizing the identity bill ID;
and decrypting the identity bill by using the digital certificate to obtain the user information.
In order to solve the above problems, the present invention further provides an anti-harassment device based on a trusted telephone, the device comprising:
The identity bill generation module is used for receiving the user information uploaded by the first user, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
The communication token generation module is used for acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of a preset application when the second user side successfully logs in the preset application; when the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
The decryption module is used for receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user terminal based on the call request, obtaining a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, obtaining a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal.
In order to solve the above-mentioned problems, the present invention also provides an electronic apparatus including:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the trusted telephone-based anti-harassment method described above.
In order to solve the above-mentioned problems, the present invention further provides a computer readable storage medium, in which at least one computer program is stored, the at least one computer program being executed by a processor in an electronic device to implement the above-mentioned anti-harassment method based on a trusted telephone.
According to the embodiment of the invention, the user information of the calling party is encrypted into the identity bill, the identity bill ID corresponding to the identity bill, the mobile phone number of the calling party and the mobile phone number of the called party are further encrypted into the communication token, and the called party displays the user information of the calling party in the incoming call by decrypting the user information, so that the called party can confirm the identity of the incoming call, thereby reducing the possibility of answering the harassment call, and avoiding the problem that the normal incoming call is wrongly marked or wrongly intercepted. Therefore, the anti-harassment method, the device, the electronic equipment and the computer readable storage medium based on the trusted telephone can solve the problem of low harassment call recognition rate.
Drawings
Fig. 1 is a schematic diagram of an environment in which an anti-harassment method based on a trusted telephone according to an embodiment of the present invention is applied.
FIG. 2 is a schematic flow chart of an anti-harassment method based on a trusted telephone according to an embodiment of the invention;
FIG. 3 is a schematic diagram illustrating a detailed implementation flow of one of the steps in the anti-nuisance method based on trusted telephone shown in FIG. 2;
FIG. 4 is a schematic diagram showing a detailed implementation flow of one of the steps in the anti-harassment method based on a trusted telephone shown in FIG. 2;
FIG. 5 is a functional block diagram of an anti-harassment device based on a trusted telephone according to an embodiment of the present invention;
Fig. 6 is a schematic structural diagram of an electronic device for implementing the anti-harassment method based on a trusted telephone according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the application provides an anti-harassment method based on a trusted telephone. The execution main body of the anti-harassment method based on the trusted telephone comprises at least one of electronic equipment, such as a server side, a terminal and the like, which can be configured to execute the method provided by the embodiment of the application. In other words, the anti-harassment method based on the trusted telephone may be performed by software or hardware installed in the terminal device or the server device, and the software may be a blockchain platform.
Preferably, referring to fig. 1, in the embodiment of the present invention, the anti-harassment method based on trusted telephone is applied to a server 1, where the server 1 includes, but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
When executing the anti-harassment method based on the trusted telephone, the server 1 is in communication connection with the first user 2. The first user terminal 2 may be any portable electronic device with a communication function, such as a mobile phone, an intelligent watch, a tablet computer, or may be any non-portable electronic device with a communication function, such as a fixed phone, a desktop computer, or the like. In the embodiment of the present invention, the first user terminal 2 is installed with a client program corresponding to the anti-harassment method based on a trusted telephone, such as a trusted telephone APP.
Further, in the embodiment of the present invention, the first ue 2 may be divided into the second ue 20 and the third ue 30 according to different roles played in the communication process. The second ue 20 is a calling party during the communication process, and the third ue 30 is a called party during the communication process.
Referring to fig. 2, a flow chart of an anti-harassment method based on a trusted telephone according to an embodiment of the invention is shown. In this embodiment, the anti-harassment method based on trusted telephone includes:
S1, receiving user information uploaded by a first user terminal, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
In the embodiment of the present invention, the first user terminal may be all users who install the preset application. The preset application is a client program corresponding to the anti-harassment method based on the trusted telephone, such as a trusted telephone APP, as described above.
Wherein the user information may correspond to one or more identities of the user. Wherein the user identity may be a corporate staff member, a member of a social group, etc. For example, in one application scenario of the present invention, a certain user has multiple identities such as a red-ten worker, a certain student, a certain company's technician, etc. Thus, in the embodiment of the present invention, the user information may be one or more sets of user information, where each set of user information may correspond to an identity of the user. In detail, each set of the user information may include a mobile phone number, an identification card number, a name, a job position, a job, an organization name of the company or group, a work certificate of the user, and the like.
In detail, the verifying the user information includes:
the first user terminal extracts information which can represent the identity of the user from the user information, such as a mobile phone number, an identity card number, a name and the like;
And verifying the user information according to the information representing the user identity.
According to one embodiment of the invention, the information representing the user identity such as the mobile phone number, the identity card number, the name and the like in the user information can be verified by using a national authentication mechanism system, so that the correctness and the legality of the user information are ensured. Wherein the national certification authority system is derived from an identity database of a government department, and the user information can be ensured not to be revealed by de-identification when the national certification authority system is utilized.
In one embodiment of the present invention, when the user information fails to verify, a verification failure prompt message is sent. The user information verification fails, for example: the mobile phone number is wrongly filled, the name of the mobile phone number attribution is not consistent with the name in the user information, the mobile phone number does not pass the real name authentication, the identity card number is not matched with the name in the user information, and the like.
In another embodiment of the present invention, when the authenticity and consistency of the mobile phone number, the identity card number and the name in the user information are checked successfully, an encryption algorithm, such as SM2 algorithm, is used to encrypt each piece of user information, so as to obtain an identity ticket corresponding to each piece of user information and a digital certificate corresponding to the identity ticket.
In the embodiment of the invention, each identity bill corresponds to the unique corresponding identity bill ID, and the identity bill can be called through the identity bill ID, so that the calling speed of the user information related data is improved.
In the implementation of the invention, the SM2 algorithm is an elliptic curve public key cryptographic algorithm issued by the national cryptographic administration, and the SM2 algorithm has high cryptographic complexity and high processing speed, and is beneficial to protecting user information from being revealed.
S2, when a second user side successfully logs in a preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of the preset application;
In the embodiment of the present invention, the second user terminal is any one of the first user terminals. When the second user side needs to make a call, the preset application can be logged in by using an account number password, and when the login is successful, all the identity notes of the second user side and the corresponding identity note IDs are called according to the account number. The second user side can select the identity bills corresponding to different user identities in the application.
S3, when the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting the mobile phone number of the calling party, the mobile phone number of the called party and the identity bill ID corresponding to the selected identity bill to obtain a communication token;
In the embodiment of the invention, the SM2 algorithm, the SM3 algorithm and the SM4 algorithm in the national encryption algorithm are utilized to further encrypt the identity information to obtain the communication token. The SM2 algorithm is an asymmetric encryption algorithm, the SM3 algorithm is a digest algorithm, and the SM4 algorithm is a symmetric encryption algorithm.
In detail, referring to fig. 3, in the step S3, after encrypting the calling party mobile phone number, the called party mobile phone number, and the identity ticket ID corresponding to the selected identity ticket, a communication token is obtained, including:
S31, generating a first key pair by using an SM2 algorithm, and calculating the digest values of the calling party mobile phone number and the called party mobile phone number by using a message digest algorithm;
S32, signing the abstract value by adopting a private key in the first key pair to obtain a signature value;
S33, generating a second key pair by using an SM3 algorithm, and encrypting the identity bill ID by using a private key in the second key pair to obtain a ciphertext;
S34, generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
s35, combining the signature value, the ciphertext and the verification parameter into a communication token.
Specifically, in an embodiment of the present invention, the generating the first key pair by using the SM2 algorithm includes:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) =d×g (x, y) based on the private key;
Where G represents the base point of the elliptic curve, n represents an integer greater than 2, P represents the public key, and (x, y) represents the elliptic curve point.
In the embodiment of the present invention, the communication token may be an asn.1 data structure, and the asn.1 (Abstract Syntax Notation) is a formal language, describing a data format for representing, encoding, transmitting and decoding data, that is, fast and reliable transmission in a wireless broadband, and may also be used by application codes. Further, the embodiment of the invention further comprises the steps of checking the data format of the communication token, preventing other data from being interfered, and storing the communication token passing the check into the server.
According to the embodiment of the invention, the identity bill ID, the calling party mobile phone number and the called party mobile phone number are further encrypted into the communication token, the user information is secondarily encrypted and then transmitted and stored, the identity information is not easy to tamper, and the safety of the identity information is ensured.
S4, receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal.
In the embodiment of the present invention, the third user terminal may be any one of the first user terminals, and at this time, the third user terminal is also installed with the preset application, that is, a client program corresponding to an anti-harassment method based on a trusted telephone, such as a trusted telephone APP.
In detail, referring to fig. 4, in S4, decrypting the communication token to obtain an identity ticket ID includes:
S41, calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
s42, when the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
s43, decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the identity bill ID.
Further, the step of obtaining the corresponding identity ticket according to the identity ticket ID, and decrypting the user information from the identity ticket, includes:
acquiring the digital certificate corresponding to the identity bill by utilizing the identity bill ID;
and decrypting the identity bill by using the digital certificate to obtain the user information.
In another embodiment of the present invention, when the third user terminal is any one of the first user terminals, that is, the third user terminal does not install the preset application, the identity information cannot be displayed on the display screen of the third user terminal, but may be sent to the third user terminal by a multimedia message.
According to the embodiment of the invention, the user information of the calling party is encrypted into the identity bill, the identity bill ID corresponding to the identity bill, the mobile phone number of the calling party and the mobile phone number of the called party are further encrypted into the communication token, and the called party displays the user information of the calling party in the incoming call by decrypting the user information, so that the called party can confirm the identity of the incoming call, thereby reducing the possibility of answering the harassment call, and avoiding the problem that the normal incoming call is wrongly marked or wrongly intercepted. Therefore, the anti-harassment method, the device, the electronic equipment and the computer readable storage medium based on the trusted telephone can solve the problem of low harassment call recognition rate.
Fig. 5 is a functional block diagram of an anti-harassment device based on a trusted telephone according to an embodiment of the present invention.
The anti-harassment device 100 based on the trusted telephone can be installed in electronic equipment. Depending on the implementation, the anti-harassment device 100 based on a trusted telephone may include an identity ticket generating module 101, a communication token generating module 102 and a decrypting module 103. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
The identity bill generating module 101 is configured to receive user information uploaded by a first user, verify the user information, encrypt the user information to generate an identity bill when the user information is verified successfully, and generate a corresponding identity bill ID;
The communication token generation module 102 is configured to obtain a corresponding identity ticket and a corresponding identity ticket ID according to login information of a preset application when the second user side successfully logs in the preset application; when the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
The decryption module 103 is configured to receive a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, obtain a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypt the communication token to obtain an identity ticket ID, obtain a corresponding identity ticket according to the identity ticket ID, decrypt identity information from the identity ticket, and display the identity information on a display screen of the third user terminal.
In detail, each module in the anti-harassment device 100 based on a trusted telephone in the embodiment of the present invention adopts the same technical means as the anti-harassment method based on a trusted telephone described in fig. 1 to 4, and can produce the same technical effects, which are not described herein.
Fig. 6 is a schematic structural diagram of an electronic device for implementing an anti-harassment method based on a trusted telephone according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11, a communication bus 12 and a communication interface 13, and may further comprise a computer program stored in the memory 11 and executable on the processor 10, such as a tamper-proof program based on a trusted telephone.
The processor 10 may be formed by an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed by a plurality of integrated circuits packaged with the same function or different functions, including one or more central processing units (Central Processing unit, CPU), microprocessors, digital processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects the respective components of the entire electronic device using various interfaces and lines, executes or executes programs or modules stored in the memory 11 (for example, executes an anti-harassment program based on a trusted telephone, etc.), and invokes data stored in the memory 11 to perform various functions of the electronic device and process the data.
The memory 11 includes at least one type of readable storage medium including flash memory, a removable hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, such as a mobile hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only for storing application software installed in an electronic device and various types of data, such as codes of anti-harassment programs based on a trusted telephone, but also for temporarily storing data that has been output or is to be output.
The communication bus 12 may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. The bus is arranged to enable a connection communication between the memory 11 and at least one processor 10 etc.
The communication interface 13 is used for communication between the electronic device and other devices, including a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), or alternatively a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device and for displaying a visual user interface.
Fig. 6 shows only an electronic device with components, it being understood by a person skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or may combine certain components, or may be arranged in different components.
For example, although not shown, the electronic device may further include a power source (such as a battery) for supplying power to the respective components, and preferably, the power source may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management, and the like are implemented through the power management device. The power supply may also include one or more of any of a direct current or alternating current power supply, recharging device, power failure detection circuit, power converter or inverter, power status indicator, etc. The electronic device may further include various sensors, bluetooth modules, wi-Fi modules, etc., which are not described herein.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The anti-nuisance program based on trusted telephone stored in the memory 11 in the electronic equipment 1 is a combination of instructions which, when run in the processor 10, can implement:
receiving user information uploaded by a first user, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
When a second user side successfully logs in a preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of the preset application;
When the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
Receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal.
In particular, the specific implementation method of the above instructions by the processor 10 may refer to the description of the relevant steps in the corresponding embodiment of the drawings, which is not repeated herein.
Further, the modules/units integrated in the electronic device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. The computer readable storage medium may be volatile or nonvolatile. For example, the computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The present invention also provides a computer readable storage medium storing a computer program which, when executed by a processor of an electronic device, can implement:
receiving user information uploaded by a first user, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
When a second user side successfully logs in a preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of the preset application;
When the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
Receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The blockchain (Blockchain), essentially a de-centralized database, is a string of data blocks that are generated in association using cryptographic methods, each of which contains information from a batch of network transactions for verifying the validity (anti-counterfeit) of its information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Wherein artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) is the theory, method, technique, and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the system claims can also be implemented by means of software or hardware by means of one unit or means. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.
Claims (9)
1. An anti-harassment method based on a trusted telephone, the method comprising:
receiving user information uploaded by a first user, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
When a second user side successfully logs in a preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of the preset application;
When the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
Receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal; the first user terminal can be divided into a second user terminal and a third user terminal according to different roles played in the communication process; the second user terminal is a calling party identity in the communication process, and the third user terminal is a called party identity in the communication process;
The encrypting the calling party mobile phone number, the called party mobile phone number and the identity note ID corresponding to the selected identity note to obtain a communication token comprises the following steps:
Generating a first key pair by using an SM2 algorithm, and calculating the digest values of the calling party mobile phone number and the called party mobile phone number by using a message digest algorithm;
Signing the digest value by adopting a private key in the first key pair to obtain a signature value;
Generating a second key pair by using an SM3 algorithm, and encrypting the identity bill ID by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the verification parameter into a communication token.
2. A trusted telephone based anti-harassment method as claimed in claim 1, wherein said verifying said user information comprises:
extracting information which can represent the identity of a user from the user information;
And verifying the user information according to the information representing the user identity.
3. A trusted telephone based anti-harassment method as claimed in claim 2, wherein said encrypting said user information to generate an identity ticket comprises:
and encrypting the user information by using an SM2 algorithm to generate an identity bill and a digital certificate corresponding to the identity bill.
4. A trusted telephone based anti-harassment method as claimed in claim 1, wherein said generating a first key pair using SM2 algorithm comprises:
Selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) =d×g (x, y) based on the private key;
Where G represents the base point of the elliptic curve, n represents an integer greater than 2, P represents the public key, and (x, y) represents the elliptic curve point.
5. A trusted telephone based anti-harassment method as claimed in claim 4, wherein said decrypting said communication token to obtain an identity ticket ID comprises:
Calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
When the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
And decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the identity bill ID.
6. A trusted telephone based anti-harassment method as claimed in claim 5, wherein said obtaining a corresponding identity ticket from said identity ticket ID, decrypting user information from said identity ticket, comprises:
acquiring the digital certificate corresponding to the identity bill by utilizing the identity bill ID;
and decrypting the identity bill by using the digital certificate to obtain the user information.
7. An anti-harassment device based on a trusted telephone, the device comprising:
The identity bill generation module is used for receiving the user information uploaded by the first user, checking the user information, encrypting the user information to generate an identity bill when the user information is checked successfully, and generating a corresponding identity bill ID;
The communication token generation module is used for acquiring a corresponding identity bill and a corresponding identity bill ID according to login information of a preset application when the second user side successfully logs in the preset application; when the second user side initiates a call request through the application, receiving an identity bill selected by the second user side in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity bill ID corresponding to the selected identity bill to obtain a communication token;
The decryption module is used for receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user terminal; the first user terminal can be divided into a second user terminal and a third user terminal according to different roles played in the communication process; the second user terminal is a calling party identity in the communication process, and the third user terminal is a called party identity in the communication process;
The encrypting the calling party mobile phone number, the called party mobile phone number and the identity note ID corresponding to the selected identity note to obtain a communication token comprises the following steps:
Generating a first key pair by using an SM2 algorithm, and calculating the digest values of the calling party mobile phone number and the called party mobile phone number by using a message digest algorithm;
Signing the digest value by adopting a private key in the first key pair to obtain a signature value;
Generating a second key pair by using an SM3 algorithm, and encrypting the identity bill ID by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the verification parameter into a communication token.
8. An electronic device, the electronic device comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores a computer program executable by the at least one processor to enable the at least one processor to perform a trusted telephone based anti-harassment method as claimed in any one of claims 1 to 6.
9. A computer readable storage medium storing a computer program which when executed by a processor implements a trusted telephone based anti-harassment method as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111408121.6A CN114125158B (en) | 2021-11-19 | 2021-11-19 | Anti-harassment method, device, equipment and storage medium based on trusted telephone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111408121.6A CN114125158B (en) | 2021-11-19 | 2021-11-19 | Anti-harassment method, device, equipment and storage medium based on trusted telephone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114125158A CN114125158A (en) | 2022-03-01 |
CN114125158B true CN114125158B (en) | 2024-04-23 |
Family
ID=80372456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111408121.6A Active CN114125158B (en) | 2021-11-19 | 2021-11-19 | Anti-harassment method, device, equipment and storage medium based on trusted telephone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114125158B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760114B (en) * | 2022-03-29 | 2024-03-12 | 微位(深圳)网络科技有限公司 | Identity authentication method, device, equipment and medium |
CN114760388A (en) * | 2022-03-29 | 2022-07-15 | 微位(深圳)网络科技有限公司 | Platform-to-end trusted call information display method, device, equipment and medium |
CN114827354A (en) * | 2022-04-21 | 2022-07-29 | 微位(深圳)网络科技有限公司 | Identity authentication information display method and device, electronic equipment and readable storage medium |
CN114900577A (en) * | 2022-04-28 | 2022-08-12 | 微位(深圳)网络科技有限公司 | Calling subscriber identity display method, terminal and system based on super SIM card |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111371797A (en) * | 2020-03-12 | 2020-07-03 | 北京链安区块链科技有限公司 | Credible identity authentication method and system in communication session |
CN112422751A (en) * | 2020-10-27 | 2021-02-26 | 中国科学院大学 | Calling method and system for displaying calling party multimedia identity based on called party |
-
2021
- 2021-11-19 CN CN202111408121.6A patent/CN114125158B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111371797A (en) * | 2020-03-12 | 2020-07-03 | 北京链安区块链科技有限公司 | Credible identity authentication method and system in communication session |
CN112422751A (en) * | 2020-10-27 | 2021-02-26 | 中国科学院大学 | Calling method and system for displaying calling party multimedia identity based on called party |
Also Published As
Publication number | Publication date |
---|---|
CN114125158A (en) | 2022-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114125158B (en) | Anti-harassment method, device, equipment and storage medium based on trusted telephone | |
CN111080295B (en) | Electronic contract processing method and device based on blockchain | |
CN103167491B (en) | A kind of mobile terminal uniqueness authentication method based on software digital certificate | |
CN107493273A (en) | Identity identifying method, system and computer-readable recording medium | |
CN112801663B (en) | Blockchain certification method, device, system, equipment and medium | |
CN110290102A (en) | Service security system and method based on application | |
CN110677261B (en) | Trusted two-dimensional code generation method and device, electronic equipment and storage medium | |
CN109361508A (en) | Data transmission method, electronic equipment and computer readable storage medium | |
CN112699353B (en) | Financial information transmission method and financial information transmission system | |
CN114760114A (en) | Identity authentication method, device, equipment and medium | |
CN114095220A (en) | Telephone communication verification method, device, equipment and storage medium | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN114003925A (en) | Signature combined online declaration method and system based on block chain | |
CN114726630B (en) | License-based information security authorization method and device, electronic equipment and medium | |
CN113434882A (en) | Communication protection method and device of application program, computer equipment and storage medium | |
CN113783690B (en) | Authentication-based bidding method and device | |
CN108777673A (en) | One kind carrying out Bidirectional identity authentication method in block chain | |
CN114499859A (en) | Password verification method, device, equipment and storage medium | |
CN114827354A (en) | Identity authentication information display method and device, electronic equipment and readable storage medium | |
CN118282665A (en) | Quantum algorithm-based JWT signature generation method and related products | |
CN109889344A (en) | The transmission method and computer readable storage medium of terminal, data | |
CN116261139B (en) | Online data security transmission method and system based on 5G message and electronic equipment | |
CN112862484A (en) | Secure payment method and device based on multi-terminal interaction | |
CN104868994A (en) | Collaboration secret key management method, device and system | |
CN111756531A (en) | Communication system and method of LoRa terminal based on CPK |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |