CN115002284A - Calling information display method, terminal and system based on private conversation - Google Patents

Calling information display method, terminal and system based on private conversation Download PDF

Info

Publication number
CN115002284A
CN115002284A CN202210555989.7A CN202210555989A CN115002284A CN 115002284 A CN115002284 A CN 115002284A CN 202210555989 A CN202210555989 A CN 202210555989A CN 115002284 A CN115002284 A CN 115002284A
Authority
CN
China
Prior art keywords
calling
identity
information
called
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210555989.7A
Other languages
Chinese (zh)
Inventor
宗瑞
李子阳
邱振涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weway Shenzhen Network Technology Co ltd
Original Assignee
Weway Shenzhen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weway Shenzhen Network Technology Co ltd filed Critical Weway Shenzhen Network Technology Co ltd
Priority to CN202210555989.7A priority Critical patent/CN115002284A/en
Publication of CN115002284A publication Critical patent/CN115002284A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to a calling information display method, a calling information display terminal and a calling information display system based on private conversation. The method comprises the following steps: the method comprises the steps of receiving an outbound request of a calling party, obtaining outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate, obtaining virtual numbers distributed to the calling party and a called party, calling a private key corresponding to the identity certificate in an identity management module, signing the virtual numbers and the calling purpose to obtain a password token, responding to the outbound request, transmitting calling information containing the password token and the identity certificate to a called terminal corresponding to the called party, and displaying the calling user identity information corresponding to the calling purpose and the identity certificate to the called party after the called terminal verifies the calling information. The method and the device can realize that the telephone number of the call is a temporary number, and can display the information and the incoming call of the calling party to the called party.

Description

Calling information display method, terminal and system based on private conversation
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, a terminal, and a system for displaying calling information based on a private call.
Background
At present, in the scenes of network car booking service or express delivery and the like, a driver or a courier can carry out telephone communication with a client in advance, in order to protect the mobile phone number information of the client and staff (the driver and the courier), a real number call is converted into a temporary number through a mobile phone operator, and the real number can be hidden by both sides for carrying out communication service. For example: in the network car appointment travel service, a driver and a passenger call the passenger through a temporary privacy number temporarily distributed by a network car appointment platform without exposing a real number of the driver and the passenger, and the privacy number is invalid after transaction is finished. In an express delivery scene, a courier dials a temporary privacy number to contact a receiver, the privacy of the receiver is protected, and a privacy number is invalid after transaction is finished.
Although the above scheme protects the privacy of both parties of the call, the called party cannot know the identity information and the purpose of the incoming call because the calling party uses the temporary virtual number in each call, and the situation that the called party mistakenly thinks that the incoming call is a fraud call and refuses the incoming call may occur.
Therefore, how to realize that the telephone number for calling is a temporary virtual number and can show the information of the calling party and the purpose of calling to the called party becomes a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
In view of the above, the present application provides a calling information displaying method, a terminal and a system based on a private call, which aim to realize that a telephone number of a call is a temporary virtual number, and can display information and incoming call of a calling party to a called party.
In order to achieve the above object, the present invention provides a calling information display method based on a privacy call, which is applied to a calling terminal, wherein the calling terminal is provided with an identity management module, and the method comprises:
receiving an outbound request of a calling party, and acquiring outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
acquiring virtual numbers distributed to a calling user and a called user;
calling a private key corresponding to the identity certificate in the identity management module, and signing the virtual number and the call destination to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In order to achieve the above object, the present invention provides a calling information display method based on private calling, which is applied to a calling terminal, wherein the calling terminal is provided with an identity management module, and the method comprises:
receiving an outbound request of a calling subscriber;
acquiring virtual numbers of a calling user and a called user;
calling the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signing the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In order to achieve the above object, the present invention provides a calling information display method based on private conversation, which is applied to a called terminal, wherein the called terminal is provided with an identity management module, and the method comprises:
receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
In order to achieve the above object, the present invention provides a calling terminal, where the calling terminal is installed with an identity management module, the calling terminal includes a memory and a processor connected to the memory, a calling information display program based on a private call and running on the processor is stored in the memory, and when executed by the processor, the calling information display program based on the private call implements the following steps:
receiving an outbound request of a calling party, and acquiring outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
acquiring virtual numbers distributed to a calling user and a called user;
calling a private key corresponding to the identity certificate in the identity management module, and signing the virtual number and the call destination to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In order to achieve the above object, the present invention provides a calling terminal, where the calling terminal is installed with an identity management module, the calling terminal includes a memory and a processor connected to the memory, a calling information display program based on a private call and running on the processor is stored in the memory, and when executed by the processor, the calling information display program based on the private call implements the following steps:
receiving an outbound request of a calling subscriber;
acquiring virtual numbers of a calling user and a called user;
calling the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signing the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In order to achieve the above object, the present invention provides a called terminal, where the called terminal is installed with an identity management module, the called terminal includes a memory and a processor connected to the memory, the memory stores a calling information display program based on a private call, where the calling information display program based on a private call is executed by the processor, and the following steps are implemented:
receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
In order to achieve the above object, the present invention further provides a calling information display system based on the private call, wherein the system is provided with the calling terminal and the called terminal.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
the calling user can independently select the outbound identity information and the calling purpose when calling the telephone, the identity information has a corresponding identity certificate, and the identity certificate can be audited by an enterprise or a service platform, so that the identity information is real and effective, and the harassing influence on the called user is avoided. The virtual number is used for dialing, so that the real number information of the telephones of the two parties can be ensured not to be acquired by the other party. The private key corresponding to the identity certificate in the identity management module is called, the virtual number and the calling purpose are signed to obtain the password token, the calling information containing the password token and the identity certificate is transmitted to the called terminal, the called terminal can show the calling purpose and the identity information of the calling user to the called user after the calling information is verified, the fact that the telephone number of the call is the virtual number is achieved, and the information of the calling party and the purpose of calling can be shown to the called party.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic flowchart illustrating a calling party information presentation method based on private calling according to a preferred embodiment of the present invention;
FIG. 2 is a schematic flowchart illustration of a calling information presentation method based on private calling in accordance with another preferred embodiment of the present invention;
FIG. 3 is a schematic flowchart of a calling party information presentation method based on private calling according to another preferred embodiment of the present application;
FIG. 4 is a schematic diagram of a calling information presentation system based on private calling according to a preferred embodiment of the present invention;
the implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the technical solutions in the embodiments of the present application may be combined with each other, but it must be based on the realization of those skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination of the technical solutions should be considered to be absent and not within the protection scope of the present invention.
Referring to fig. 1, a schematic method flow diagram of an embodiment of a calling information presentation method based on a private call is provided for the present application. The method can be executed by a calling terminal, the calling terminal is provided with an identity management module, the identity management module can be embedded into a third-party application to interact with the third-party application, or the identity management module is used as an independent application to interact with the third-party application, and the calling terminal can be realized by software and/or hardware. The calling information display method based on the privacy conversation comprises the following steps:
step S110: the method comprises the steps that a third-party application receives an outbound request of a calling party and acquires outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
step S120: the third party application acquires virtual numbers distributed to a calling user and a called user;
step S130: the third party application calls a private key corresponding to the identity certificate in the identity management module, and signs the virtual number and the call destination to obtain a password token;
step S140: and the third party application responds to the external call request, and transmits the call information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal verifies the call information and then displays the call destination and the identity information of the calling user corresponding to the identity certificate to the called user.
In this embodiment, the calling terminal is provided with an identity management module, the identity management module may be integrated into a third-party application (for example, an application of an express platform, an application of a takeaway platform, or an application of a network appointment platform) installed at the calling terminal, or may be integrated into dialing software of the terminal, the identity management module is provided with an identity certificate issued by an enterprise or other authorities to which the third-party application belongs to the calling user, so as to ensure that information displayed to a called user is real and effective, and the identity management module should have a secure storage function of the identity certificate and a corresponding private key, and a subsequent password function required for cryptographic signature, hash operation, and the like. The called terminal has the password functions of password signature verification, Hash operation and the like so as to realize the verification and display effects of the identity information of the calling party.
When the identity management module is integrated in the third-party application of the calling terminal, according to the login account information of the calling user in the third-party application, the identity bound with the account information in the identity management module can be called, for example: a certain calling user has multiple identities such as ID1, ID2 and ID3, but only the identity of ID1 is bound with the account information, and at this time, after the calling user logs in a third-party application by using the account, only the identity information of ID1 and the corresponding private key information in the identity management module can be called. It is understood that the calling user may be a courier, a takeout person or a net car appointment driver, and the called user may be a customer to be contacted by the courier, the takeout person or the net car appointment driver, for example, the net car appointment driver asks the current location of the passenger by telephone, and the calling user takes the net car appointment driver and the passenger as the called user.
The calling subscriber may choose in a third party application to place a call to the called subscriber with a certain outbound identity (e.g., a certain taxi cab driver) having a corresponding identity certificate, and to select the destination of the call (e.g., ask the location of the passenger). The third party application obtains the temporary virtual number N1 allocated to the called user in the call and the virtual temporary numbers N2, N1 and N2 allocated to the calling user, wherein the numbers can be the same or different. The virtual number may be allocated by the phone carrier platform, for example, in a car appointment or express application, when a calling user (a driver or a courier) clicks to contact a customer, a mobile phone dialing interface of the calling user is displayed as a temporary privacy number of a called user, and when the calling user dials a phone, the phone carrier platform analyzes the phone, converts the number of the calling user into a virtual number, and displays the virtual number to the called user. It can be understood that when the calling party calls out, the real number of the calling party is used for dialing, after the calling party dials the real number, the telephone operator platform can randomly select a virtual number from the corresponding virtual number pool to distribute to the calling party and the corresponding called party, wherein each third party application can apply for the corresponding virtual number pool from the telephone operator platform, so as to meet the requirement that the user of the third party application calls by using the virtual number.
Calling a private key of an identity certificate corresponding to the outbound identity information in the identity management module according to the outbound identity information selected by the calling party, and signing the call by using the private key and a digital signature algorithm, wherein the signature content comprises: the virtual number N2 of the calling user, the virtual number N1 of the called user, the current timestamp T and the call destination R are used for obtaining a signature result Sig, and a password token is established according to the signature result, wherein the password token at least needs to contain the signature result Sig and the call destination R.
The third party application responds to the external call request (namely the calling party dials the outgoing call of N1), the calling terminal transmits an identity certificate and a password token corresponding to the external call identity selected by the calling party to the called terminal through the third party application, the called terminal can acquire the identity certificate and the password token sent by the calling terminal and receive a virtual phone call dialed by the calling party, and after the called terminal verifies that the identity certificate and the password token pass, the called terminal displays the calling purpose and the identity information of the calling party corresponding to the identity certificate to the called party.
The called terminal obtains the virtual number N2 of the calling user, the called terminal verifies the validity of the identity certificate of the calling user by using the cryptographic operation function of the identity management module of the called terminal, and verifies whether the signature result Sig is consistent with the signed content by using the public key in the identity certificate, if so, the identity information and the calling purpose of the calling user are displayed to the called user, for example, the displayed content can be 'a driver of a certain taxi appointment platform inquires the position of a passenger', and the called user can determine whether to answer the incoming call according to the displayed content.
In an embodiment, the process of constructing the password token and the identity management module may also be integrated on a background side of the third-party application, that is, the background of the third-party application stores the identity certificate and the private key corresponding to the calling party and constructs the password token, the background sends the password token and the identity certificate to the called terminal, and the calling terminal is only responsible for selecting corresponding identity information and calling purpose to dial a telephone to the called party.
Further, the transmission of the cryptographic token and the identity certificate may be passed in several ways:
the identity certificate and the password token of the calling party are sent to the called terminal through a channel of the third-party application, and after the called terminal verifies that the identity certificate and the password token pass, a telephone answering interface of the called terminal displays the identity information and the calling purpose of the calling party in a popup mode;
in the method, a calling terminal and a called terminal can upload and download corresponding password tokens in a pre-agreed manner, for example, setting a password token index value to be Hash (M1| | M2| | T), wherein M1 and M2 are some fixed position numbers (for example, the last 4 bits) of N1 and N2 respectively;
the identity certificate and password token information of the calling user are directly transmitted to the called terminal by the calling terminal through a telephone signaling channel.
The outbound identity information with the identity certificate is audited by a third party application or an authority, and the outbound identity information is ingeniously combined with the virtual number, so that the public trust of the telephone call is ensured while the real numbers of the two parties in the call are protected.
Referring to fig. 2, a schematic method flow diagram of an embodiment of a calling information presentation method based on a private call is provided for the present application. The method can be executed by a calling terminal, the calling terminal is provided with an identity management module, the identity management module is embedded into a dialing application to interact with the dialing application, or the identity management module is used as an independent application to interact with the dialing application, and the calling terminal can be realized by software and/or hardware. The calling information display method based on the private conversation comprises the following steps:
step S210: the dialing application receives an outbound request of a calling subscriber;
step S220: the dialing application acquires virtual numbers of a calling party and a called party, which are sent by a third-party application;
step S230: the dialing application calls the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signs the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
step S240: and the dialing application responds to the outbound request and transmits the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In this embodiment, when a calling user selects a called user to make a call in a third-party application, the dialing application may receive an outbound request of the calling user, the third-party application obtains a virtual number N1 allocated to the called user and a virtual number N2 allocated to the calling user, where N1 and N2 may be the same number or different numbers, and sends N1 and N2 to the dialing software, after the dialing application obtains a virtual number N1 of the calling user and a virtual number N2 of the called user, the calling user may invoke an identity management module in the dialing software to select outbound identity information corresponding to an identity certificate and a call destination to make a call, the identity management module invokes a private key corresponding to the identity certificate in the identity management module according to the outbound identity information selected by the calling user, and signs the call by using the private key and a digital signature algorithm, the signature content comprises: the virtual number N2 of the calling user, the virtual number N1 of the called user, the current timestamp T and the call destination R are used for obtaining a signature result Sig, and a password token is established according to the signature result, wherein the password token at least needs to contain the signature result Sig and the call destination R.
The dialing application responds to an external call request (namely, a calling party dials a call), an identity certificate and a password token corresponding to an external call identity selected by the calling party are transmitted to a called terminal, the called terminal can obtain the identity certificate and the password token sent by the calling terminal and receive a virtual telephone incoming call dialed by the calling party, and after the identity certificate and the password token are verified by the called terminal to pass, a calling purpose and calling party identity information corresponding to the identity certificate are displayed to the called party. For example, the displayed content may be "a driver of a certain network appointment platform asks the passenger's location", and the called user may determine whether to answer the incoming call according to the displayed content.
Further, the transmission of the cryptographic token and the identity certificate may be passed in several ways:
the identity certificate and the password token of the calling party are sent to the called terminal through a channel of the third-party application, and after the called terminal verifies that the identity certificate and the password token pass, a telephone answering interface of the called terminal displays the identity information and the calling purpose of the calling party in a popup mode;
in the method, a calling terminal and a called terminal can upload and download corresponding password tokens in a pre-agreed manner, for example, setting a password token index value to be Hash (M1| | M2| | T), wherein M1 and M2 are some fixed position numbers (for example, the last 4 bits) of N1 and N2 respectively;
the identity certificate and password token information of the calling user are directly transmitted to the called terminal by the calling terminal through a telephone signaling channel.
Referring to fig. 3, which is a schematic flowchart illustrating another preferred embodiment of the calling information presentation method based on private conversation according to the present invention, the method may be executed by a called terminal, the called terminal is installed with an identity management module, and the called terminal may be implemented by software and/or hardware. The calling information display method based on the privacy conversation comprises the following steps:
step S310: receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
step S320: verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
step S330: and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
In this embodiment, the called terminal receives call information containing a password token and an identity certificate sent by the calling terminal, the called terminal may obtain the identity certificate and the password token sent by the calling terminal, and receive a virtual phone call dialed by the calling user, the called terminal verifies the validity of the identity certificate of the calling user using a cryptographic operation function of the identity management module, and verifies whether a signature result Sig in the password token is consistent with the signed content using a public key in the identity certificate, and if consistent and valid, the identity information and the call purpose of the calling user are displayed to the called user, for example, the displayed content may be "a driver of a certain internet appointment platform asks a passenger for the position of the called user", and whether to answer the call may be determined according to the displayed content.
Fig. 4 is a schematic diagram illustrating a calling information presentation system based on a private call according to a preferred embodiment of the present application.
The calling information display system based on the privacy communication is provided with a calling terminal 10 and a called terminal 20, and the calling terminal 10 and the called terminal 20 may be devices capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions. The calling terminal 10 may include, but is not limited to, a mobile phone, a landline, a computer with a telephone call function, etc., and the called terminal 20 may include, but is not limited to, a tower phone, a landline, a computer with a telephone call function, etc. The network 30 may be a wireless or wired network such as a 4G network, a 5G network, an Intranet (Intranet), the Internet (Internet), a Global System for Mobile communications (GSM), Wideband Code Division Multiple Access (WCDMA), Bluetooth (Bluetooth), Wi-Fi, or a telephone network.
In the present embodiment, the calling terminal 10 may include, but is not limited to, a memory 11, a processor 12, and a network interface 13, which may be communicatively connected to each other through a system bus, and the memory 11 stores a calling information presentation program based on a private call that may be executed on the processor 12. It is noted that fig. 4 only shows the calling terminal 10 with components 11-13, but it is to be understood that not all of the shown components are required to be implemented, and that more or less components may be implemented instead.
The called terminal 20 may include, but is not limited to, a memory 21, a processor 22, and a network interface 23, which may be communicatively connected to each other through a system bus, wherein the memory 21 stores a calling information presentation program based on a private call that may be executed on the processor 22. It is noted that fig. 4 only shows the called terminal 20 with components 21-23, but it is to be understood that not all shown components are required to be implemented, and that more or less components may be implemented instead.
The storage 11 includes a memory and at least one type of readable storage medium. The readable storage medium may be volatile or nonvolatile. For example, the readable storage medium may be a non-volatile storage medium such as a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the readable storage medium may be an internal storage unit of the calling terminal 10, such as a hard disk of the calling terminal; in other embodiments, the storage medium may also be an external storage device of the calling terminal, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like. In this embodiment, the readable storage medium of the memory 11 may be used to store various application software, for example, program codes of the calling information presentation program based on the private call in the embodiment of the present invention. Further, the memory 11 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 12 is generally configured to control the overall operation of the calling terminal 10, such as performing data interaction or communication related control and processing with the calling terminal 10. In this embodiment, the processor 12 is configured to run a program code stored in the memory 11 or process data, for example, run a calling information presentation program based on a private call.
The network interface 13 may comprise a wireless network interface or a wired network interface, and the network interface 13 is generally used for establishing a communication connection between a calling terminal and a called terminal or other modules. In this embodiment, the network interface 13 is mainly used to connect the calling terminal and the called terminal, and establish a data transmission channel and a communication connection between the calling terminal and the called terminal.
A calling information presentation program based on a private call is stored in the memory 11, and includes at least one computer readable instruction stored in the memory 11, and the at least one computer readable instruction can be executed by the processor 12 to implement the method of the embodiments of the present application; and the at least one computer readable instruction may be divided into different logic blocks depending on the functions implemented by the respective portions.
In addition, the memory 21, the processor 22 and the network interface 23 of the called terminal are similar to the memory 11, the processor 12 and the network interface 13 of the calling terminal, and are not described herein again.
In one embodiment, the calling information presentation program based on private calling is executed by the processor 12 to implement the following steps:
the method comprises the steps that a third-party application receives an outbound request of a calling party and acquires outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
the third party application acquires virtual numbers distributed to a calling user and a called user;
the third party application calls a private key corresponding to the identity certificate in the identity management module, and signs the virtual number and the call destination to obtain a password token;
and the third-party application responds to the outbound request and transmits the calling information containing the password token and the identity certificate to a called terminal corresponding to the called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In another embodiment, the above-mentioned calling information presentation program based on private calling is implemented by the processor 12 as follows:
the dialing application receives an outbound request of a calling subscriber;
the dialing application acquires virtual numbers of a calling party and a called party, which are sent by a third-party application;
the dialing application calls the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signs the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
and the dialing application responds to the outbound request and transmits the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
In another embodiment, the above-mentioned calling information presentation program based on private calling is implemented by the processor 22 to perform the following steps:
receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
For detailed description of the above steps, please refer to the above description about the flowchart of the calling information presentation method based on the private call.
In addition, the present invention also provides a computer-readable storage medium, in which a calling information presentation program based on a privacy call is stored, and when being executed by a processor, the calling information presentation program based on the privacy call implements the following steps:
the method comprises the steps that a third-party application receives an outbound request of a calling party and acquires outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
the third party application acquires virtual numbers distributed to a calling user and a called user;
the third party application calls a private key corresponding to the identity certificate in the identity management module, and signs the virtual number and the call destination to obtain a password token;
and the third-party application responds to the outbound request and transmits the calling information containing the password token and the identity certificate to a called terminal corresponding to the called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
The specific implementation of the computer-readable storage medium is substantially the same as the specific implementation of the calling information presentation method based on the private call shown in fig. 1, and is not described herein again.
The invention also provides a computer readable storage medium, on which a calling information presentation program based on the privacy call is stored, and when being executed by a processor, the calling information presentation program based on the privacy call realizes the following steps:
the dialing application receives an outbound request of a calling user;
the dialing application acquires virtual numbers of a calling party and a called party, which are sent by a third-party application;
the dialing application calls the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signs the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
and the dialing application responds to the external call request, and transmits the call information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal verifies the call information and then displays the call destination and the identity information of the calling user corresponding to the identity certificate to the called user.
The specific implementation of the computer-readable storage medium is substantially the same as the specific implementation of the calling information presentation method based on the private call shown in fig. 2, and is not described herein again.
The invention also provides a computer readable storage medium, on which a calling information presentation program based on the privacy call is stored, and when being executed by a processor, the calling information presentation program based on the privacy call realizes the following steps:
receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
The specific implementation of the computer-readable storage medium is substantially the same as the specific implementation of the calling information presentation method based on the private call shown in fig. 3, and is not described herein again.
It should be noted that the above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, an electronic device, or a network device) to execute the method according to the embodiments of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A calling information display method based on privacy conversation is applied to a calling terminal, and is characterized in that the calling terminal is provided with an identity management module, and the method comprises the following steps:
receiving an outbound request of a calling party, and acquiring outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
acquiring virtual numbers distributed to a calling user and a called user;
calling a private key corresponding to the identity certificate in the identity management module, and signing the virtual number and the call destination to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal displays the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
2. The calling information display method based on the private call as claimed in claim 1, wherein the transmitting the call information containing the password token and the identity certificate to the called terminal corresponding to the called user comprises:
and uploading the password token and the identity certificate to a cloud service, so that the called terminal downloads the password token and the identity certificate from the cloud service.
3. The calling party information display method based on private calling according to claim 1, wherein the transmitting the calling information including the password token and the identity certificate to a called terminal corresponding to a called party comprises:
and transmitting the password token and the identity certificate to the called terminal through a telephone channel.
4. The calling party information presentation method based on the private call as claimed in claim 1, wherein the signing the virtual number and the call destination to obtain a password token comprises:
and signing the virtual number of the calling user, the virtual number of the called user, the current timestamp and the call destination to obtain a password token.
5. A calling information display method based on privacy conversation is applied to a calling terminal, and is characterized in that the calling terminal is provided with an identity management module, and the method comprises the following steps:
receiving an outbound request of a calling subscriber;
acquiring virtual numbers of a calling user and a called user;
calling the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signing the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
6. A calling information display method based on privacy conversation is applied to a called terminal and is characterized in that the called terminal is provided with an identity management module, and the method comprises the following steps:
receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
7. A calling terminal is characterized in that an identity management module is installed in the calling terminal, the calling terminal comprises a memory and a processor connected with the memory, a calling information display program based on a private call and running on the processor is stored in the memory, and when being executed by the processor, the calling information display program based on the private call realizes the following steps:
receiving an outbound request of a calling party, and acquiring outbound identity information and a calling purpose selected by the calling party, wherein the outbound identity information has a corresponding identity certificate;
acquiring virtual numbers distributed to a calling user and a called user;
calling a private key corresponding to the identity certificate in the identity management module, and signing the virtual number and the call destination to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
8. A calling terminal is characterized in that an identity management module is installed in the calling terminal, the calling terminal comprises a memory and a processor connected with the memory, a calling information display program based on a private call and running on the processor is stored in the memory, and when being executed by the processor, the calling information display program based on the private call realizes the following steps:
receiving an outbound request of a calling subscriber;
acquiring virtual numbers of a calling user and a called user;
calling the identity management module to enable a calling user to select outbound identity information and a calling purpose, and signing the virtual number and the calling purpose by using a private key of an identity certificate corresponding to the outbound identity information to obtain a password token;
and responding to the outbound request, and transmitting the calling information containing the password token and the identity certificate to a called terminal corresponding to a called user, so that the called terminal can display the calling purpose and the identity information of the calling user corresponding to the identity certificate to the called user after verifying the calling information.
9. A called terminal is characterized in that an identity management module is installed in the called terminal, the called terminal comprises a memory and a processor connected with the memory, a calling information display program based on a privacy call and running on the processor is stored in the memory, and when being executed by the processor, the calling information display program based on the privacy call realizes the following steps:
receiving call information which is transmitted by a calling terminal and contains a password token and an identity certificate;
verifying whether the identity certificate is valid or not based on the identity management module, and verifying a signature result in the password token by using a public key of the identity certificate;
and when the identity certificate is verified to be valid and the signature result passes, displaying the calling purpose in the calling information to the called user and displaying the identity information of the calling user corresponding to the identity certificate.
10. A calling information presentation system based on private conversation, characterized in that the system is provided with a calling terminal according to claim 7 and/or a calling terminal according to claim 8, and the system is further provided with a called terminal according to claim 9.
CN202210555989.7A 2022-05-20 2022-05-20 Calling information display method, terminal and system based on private conversation Pending CN115002284A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210555989.7A CN115002284A (en) 2022-05-20 2022-05-20 Calling information display method, terminal and system based on private conversation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210555989.7A CN115002284A (en) 2022-05-20 2022-05-20 Calling information display method, terminal and system based on private conversation

Publications (1)

Publication Number Publication Date
CN115002284A true CN115002284A (en) 2022-09-02

Family

ID=83027712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210555989.7A Pending CN115002284A (en) 2022-05-20 2022-05-20 Calling information display method, terminal and system based on private conversation

Country Status (1)

Country Link
CN (1) CN115002284A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116346361A (en) * 2023-03-28 2023-06-27 微位(深圳)网络科技有限公司 Identity verification and live video broadcast based combined calling method, terminal and system
CN116506410A (en) * 2023-06-29 2023-07-28 杭州诚智天扬科技有限公司 Method, system and device for showing incoming call intention in privacy call

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116346361A (en) * 2023-03-28 2023-06-27 微位(深圳)网络科技有限公司 Identity verification and live video broadcast based combined calling method, terminal and system
CN116346361B (en) * 2023-03-28 2024-04-26 微位(深圳)网络科技有限公司 Identity verification and live video broadcast based combined calling method, terminal and system
CN116506410A (en) * 2023-06-29 2023-07-28 杭州诚智天扬科技有限公司 Method, system and device for showing incoming call intention in privacy call
CN116506410B (en) * 2023-06-29 2023-09-08 杭州诚智天扬科技有限公司 Method, system and device for showing incoming call intention in privacy call

Similar Documents

Publication Publication Date Title
US10237706B2 (en) Method and apparatus for establishing communication between mobile terminals, incoming communication control and outgoing communication control and system by use thereof
US10244105B2 (en) Methods and systems for real time display of caller location, profile, and trust relationship
CN115002284A (en) Calling information display method, terminal and system based on private conversation
CN108307333B (en) Method and device for transmitting intermediate number for mobile communication equipment and storage medium
CN103944737A (en) User identity authentication method, third-party authentication platform and operator authentication platform
CN113067859B (en) Communication method and device based on cloud mobile phone
CN112765648B (en) Document processing method, device, equipment and storage medium
CN104935500B (en) Friend recommendation method and device based on network call
TW201830949A (en) Methods for sharing sim card and mobile terminals
CN100574345C (en) Be used for the method and apparatus that anonymity call is set up
CN109150864B (en) Anti-cheating method and device based on secondary authentication
KR20190109804A (en) Apparatus and method of car calling service in autonomous vehicle
CN114845301A (en) Number verification method, terminal and system based on super SIM card
CN110868709A (en) Method and system for preventing harassment and enabling normal communication
CN116233847A (en) Login method, login device, computer equipment and storage medium
CN111988473B (en) Voice communication call control method and device based on intelligent contract
CN110399714B (en) Method for verifying authenticity of trusted user interface of terminal and system thereof
CN116346361B (en) Identity verification and live video broadcast based combined calling method, terminal and system
CN114584978B (en) Value added service authentication method, device, equipment and readable medium
CN115022819B (en) 5G message transmission method, terminal and system
CN115022820B (en) Verification method, terminal and system of 5G message
CN107046684B (en) Mobile phone card matching method under one number and multiple cards, mobile terminal and server
CN114900577A (en) Calling subscriber identity display method, terminal and system based on super SIM card
CN110648122B (en) Electronic red envelope sending method and device, readable storage medium and electronic equipment
CN116132086A (en) Network communication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination