CN116017452A - Block chain-based number privacy protection method, system, equipment and medium - Google Patents

Block chain-based number privacy protection method, system, equipment and medium Download PDF

Info

Publication number
CN116017452A
CN116017452A CN202211662152.9A CN202211662152A CN116017452A CN 116017452 A CN116017452 A CN 116017452A CN 202211662152 A CN202211662152 A CN 202211662152A CN 116017452 A CN116017452 A CN 116017452A
Authority
CN
China
Prior art keywords
calling
called
blockchain
calling number
called number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211662152.9A
Other languages
Chinese (zh)
Inventor
齐飞
盛明哲
陶蒙华
陈明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211662152.9A priority Critical patent/CN116017452A/en
Publication of CN116017452A publication Critical patent/CN116017452A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a number privacy protection method, a system, equipment and a medium based on a blockchain, wherein the method comprises the following steps: the network side obtains a call request of a terminal where a calling number is located, wherein the call request carries the calling number and a called number; the network side judges whether the calling number is a trust number on the blockchain where the called number is located; when the calling number is a trust number on a blockchain where the called number is located and the calling number is not a shielding number set by the called number, the network side responds to a call request and establishes communication connection between the calling number and the called number, otherwise, the network side refuses or shields the call request sent by the calling number to the called number and controls the calling number to be unable to share the contact link of the called number on the blockchain so as to carry out privacy protection on the called number. The method utilizes traceability of the blockchain to carry out privacy protection on the called number by the blockchain trust authentication from the source.

Description

Block chain-based number privacy protection method, system, equipment and medium
Technical Field
The present invention relates to the field of computer communications technologies, and in particular, to a blockchain-based number privacy protection method, a blockchain-based number privacy protection system, an electronic device, and a computer readable storage medium.
Background
Conventionally, each card has a mobile phone number, and each mobile phone number corresponds to a mobile phone user. After the number of the called number user is obtained, the called number user can be reached through various channels, and the called number user has no effective method for the number.
In the prior art, a mobile phone user is pushed by adopting an identification means for harassing calls and fraud calls, so that the risk of the user is prompted. However, there is no good way for the nuisance phone and fraud phone users to replace their mobile phones to perform new nuisance and fraud, and once they obtain the mobile phone numbers and related information of the mobile phone users, they may continuously harass and fraud the users. Therefore, a privacy protection method capable of targeted prevention and treatment from the trusted sources of nuisance calls, fraud call users and called numbers is needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a number privacy protection method, a system, equipment and a medium based on a blockchain, which utilize the traceability of the blockchain to pass the blockchain trust authentication from the source so that a server can reject or shield the calling number which is not trusted or needs to be shielded by the called number, thereby carrying out privacy protection on the called number.
In a first aspect, the present invention provides a blockchain-based number privacy protection method, the method comprising the steps of:
s1: the network side obtains a call request of a terminal where a calling number is located, wherein the call request carries the calling number and a called number;
s2: the network side judges whether the calling number is a trust number on a blockchain where the called number is located; when the calling number is a trust number on the blockchain where the called number is located, entering a step S3, and when the calling number is not the trust number on the blockchain where the called number is located, entering a step S4;
s3: the network side judges whether the calling number is a shielding number set by a called number, if the calling number is not the shielding number set by the called number, the network side responds to the call request and establishes communication connection between the calling number and the called number; if the calling number is the shielding number set by the called number, entering step S4;
s4: the network side refuses or shields the call request sent by the calling number to the called number so as to carry out privacy protection on the called number.
Further, in step S2, the network side determines whether the calling number is a trust number in the called number blockchain, and specifically includes the following steps:
s2.1: the network side judges whether the calling number is a registration number on the blockchain where the called number is located according to the attribute information of the calling number, and if the calling number is the registration number on the blockchain where the called number is located, the step S2.2 is entered; if the calling number is not the registration number on the blockchain where the called number is located, confirming that the calling number is not the trust number in the blockchain of the called number, and entering step S4; the calling number is a registration number on the blockchain where the called number is located, and comprises a second calling number existing on the blockchain where the called number is located and a first calling number newly registered on the blockchain of the called number;
s2.2: the network confirms the information transmission path of the calling number according to the registration number information of the calling number on the blockchain where the called number is located;
s2.3: the network side judges whether the information transmission path of the calling number is tampered according to the information transmission path of the calling number, if the information transmission path of the calling number is not tampered, the network side confirms that the calling number is a trust number in the called number blockchain, and if the information transmission path of the calling number is tampered, the network side confirms that the calling number is not the trust number in the called number blockchain.
Further, the calling number includes a first calling number and a second calling number, the registration of the first calling number is performed through a called number contact link shared by the called numbers, and the registration of the second calling number is performed through a called number contact link shared by the first calling numbers.
Optionally, the registering of the first calling number specifically includes the following steps:
a1: acquiring a contact link of the called number shared by the called numbers on a blockchain;
a2: according to the contact link of the called number on the blockchain, carrying out registration application on the blockchain where the called number is located;
a3: after all nodes on the blockchain where the called number is located agree on the registration application of the calling number to be registered, the calling number to be registered is successfully registered as a first calling number on the blockchain of the called number.
Optionally, the registering of the second calling number specifically includes the following steps:
b1: acquiring a contact link of the called number shared by a first calling number on a blockchain;
b2: according to the contact link of the called number on the blockchain, carrying out registration application on the blockchain where the called number is located;
b3: after all nodes on the blockchain where the called number is located agree on the registration application of the calling number to be registered, the calling number to be registered is successfully registered as a second calling number on the blockchain of the called number.
Further, after the step B3, it further includes determining whether the second calling number is a trust number on the blockchain where the called number is located, and specifically includes the steps of:
b4: judging whether the state of the first calling number is valid or not: if the state of the first calling number is valid, the network side confirms that the second calling number is a trust number on the blockchain where the called number is located; if the first calling number state is invalid, entering a step B5;
b5: judging whether the second calling number passes through the first calling number and then sends a call request to the called number, if the second calling number can pass through the first calling number and then sends the call request to the called number, the network side confirms that the second calling number is a trust number on a blockchain where the called number is located; if the second calling number can not pass through the first calling number and then send a call request to the called number, the network side confirms that the second calling number is not the trust number on the blockchain where the called number is located.
Further, in the step S3, the network side determines whether the calling number is a shielding number set by the called number, and the step is implemented by the server listing the calling number corresponding to the shielding request in a shielding number list after the called number sends the shielding request to the server, which specifically includes the following steps:
after a calling number user sends a plurality of harassment calls or a plurality of harassment short messages to a called number user, the called number user sends a request for shielding the calling number to a server of a network side;
after the server responds to the shielding request sent by the called number user to the server, shielding the telephone or short message sent by the calling number user to the called number user, and listing the calling number corresponding to the shielding request into a shielding number list of the called number;
if the shielding number list of the called number contains the calling number, the server judges that the calling number is the shielding number set by the called number.
In a second aspect, the present invention provides a server, the system comprising:
the acquisition unit is used for acquiring a call request of a terminal where a calling number is located, wherein the call request carries the calling number and a called number;
the first judging unit is connected with the acquiring unit and is used for judging whether the calling number is a trust number on a blockchain where the called number is located according to the attribute information of the calling number;
the second judging unit is connected with the first judging unit and is used for judging whether the calling number is a shielding number set by the called number or not after judging that the calling number is a trust number on a blockchain where the called number is located according to the first judging unit;
the establishing unit is connected with the second judging unit and is used for responding to the call request and establishing communication connection between the calling number and the called number after judging that the calling number is not the shielding number set by the called number according to the second judging unit;
the protection unit is respectively connected with the first judgment unit and the second judgment unit and is used for rejecting or shielding a call request sent by the calling number to the called number after judging that the calling number is not the trust number on the blockchain where the called number is located according to the first judgment or after judging that the calling number is a shielding number set by the called number according to the second judgment so as to carry out privacy protection on the called number.
In a third aspect, the present invention provides an electronic device, including a memory and a processor, where the memory stores a computer program, and the processor executes the blockchain-based number privacy protection method described above when the processor runs the computer program stored in the memory.
In a fourth aspect, the present invention provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the blockchain-based number privacy protection method described above.
The beneficial effects realized by the invention are as follows:
the invention carries out privacy protection on the called number through the blockchain communication authentication and the black-and-white list setting, wherein the blockchain communication authentication is to confirm whether the calling number is the trust number on the blockchain where the called number is located, the black-and-white list setting is to judge whether the calling number is the shielding number set by the called number, if the calling number is not the shielding number set by the called number, the calling number is a white list, and if the calling number is the shielding number set by the called number, the calling number is a black list. The invention utilizes the traceable characteristic of the blockchain to carry out full-flow tracking record on the process of obtaining the called number, and for the called number, when a certain link (the number on the blockchain is equivalent to a node) and/or a link after a certain link has excessive harassment calls and fraud calls, the link is invalid by applying for a server, namely, the calling number is controlled to be unable to share the contact link of the called number on the blockchain, the calling number link and the links after the calling number can not contact the called number through the original contact way, thereby enhancing the active access mechanism of the mobile phone user facing the harassment.
Drawings
FIG. 1 is a block chain view in accordance with an embodiment of the present invention;
FIG. 2 is a flow chart of a method in an embodiment of the invention;
FIG. 3 is a flow chart of another method according to an embodiment of the invention.
Detailed Description
In order to make the technical scheme of the present invention better understood by those skilled in the art, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention, and are not limiting of the invention.
It is to be understood that the various embodiments of the invention and the features of the embodiments may be combined with each other without conflict.
It is to be understood that only the portions relevant to the present invention are shown in the drawings for convenience of description, and the portions irrelevant to the present invention are not shown in the drawings.
It should be understood that each unit and module in the embodiments of the present invention may correspond to only one physical structure, may be formed by a plurality of physical structures, or may be integrated into one physical structure.
It will be appreciated that, without conflict, the functions and steps noted in the flowcharts and block diagrams of the present invention may occur out of the order noted in the figures.
It is to be understood that the flowcharts and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatuses, devices, methods according to various embodiments of the present invention. Where each block in the flowchart or block diagrams may represent a unit, module, segment, code, or the like, which comprises executable instructions for implementing the specified functions. Moreover, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by hardware-based systems that perform the specified functions, or by combinations of hardware and computer instructions.
It should be understood that the units and modules related in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, for example, the units and modules may be located in a processor.
The invention uses the traceability characteristic of the blockchain to carry out full-flow tracking record on the process of obtaining the mobile phone number of other people, and when a certain link (and the following links) has excessive nuisance calls and fraud calls, the link is set as invalid, and the link and the following links can not contact the mobile phone number through the original contact way.
Based on traditional mobile phone number management, a block linked list aiming at number propagation is added for each mobile phone user at a communication management end.
At the mobile phone communication server, maintaining a block linked list for each user number, where the block linked list includes: sequence number, destination (i.e., called number), hierarchy, name, preamble, successor, whether valid bit, whether traversing.
As shown in fig. 1, the "valid" bit and "pass through" are commonly used, and when the "valid" bit is "yes", the "pass through" is not considered; when the "whether valid" bit is "no", if "whether traversing" bit is "no", all subsequent numbers including the position are shielded, if "whether traversing" bit is "yes", only the position number is shielded, and all subsequent numbers of the position can still normally contact the called number a.
Example 1:
as shown in fig. 1 and 2, the present embodiment provides a number privacy protection method based on a blockchain, which includes the following steps:
s1: the network side obtains a call request of a terminal where a calling number is located, and the call request carries the calling number and a called number;
s2: the network side judges whether the calling number is a trust number on the blockchain where the called number is located according to the attribute information of the calling number; when the calling number is the trust number on the blockchain where the called number is located, entering a step S3, and when the calling number is not the trust number on the blockchain where the called number is located, entering a step S4;
specifically, in step S2, it is determined whether the calling number is a trusted number in the called number blockchain, and the method specifically includes the following steps:
s2.1: the network side judges whether the calling number is a registration number on the blockchain where the called number is located according to the calling number attribute information, and if the calling number is the registration number on the blockchain where the called number is located, the step S2.2 is entered; if the calling number is not the registered number on the blockchain where the called number is located, confirming that the calling number is not the trust number in the blockchain of the called number, and entering step S4; the calling number is a registration number on the blockchain where the called number is located, and comprises a second calling number existing on the blockchain where the called number is located and a first calling number newly registered on the blockchain of the called number;
the calling number comprises a first calling number and a second calling number, and the distinction between the first calling number and the second calling number is as follows: the registration of the first calling number is registered through a called number contact link shared by the called numbers, and the registration of the second calling number is registered through a called number contact link shared by the first calling number.
As shown in fig. 2, the registration of the first calling number specifically includes the following steps:
a1: the method comprises the steps that a first calling number to be registered obtains a contact link of a called number shared by the called numbers on a blockchain;
a2: according to the contact link of the called number on the blockchain, carrying out registration application on the blockchain where the called number is located;
a3: after all nodes on the blockchain where the called number is located agree on a registration application of the first calling number to be registered, the first calling number to be registered is successfully registered as the first calling number on the blockchain of the called number.
As another embodiment, as shown in fig. 3, the registration of the second calling number specifically includes the following steps:
b1: the second calling number to be registered obtains a contact link of the called number shared by the first calling number on the blockchain;
b2: according to the contact link of the called number on the blockchain, carrying out registration application on the blockchain where the called number is located;
b3: after all nodes on the blockchain where the called number is located reach consensus on the registration application of the second calling number to be registered, the second calling number to be registered is successfully registered as the second calling number on the blockchain of the called number.
The registration process is a contact link of a called number shared by a second calling number on a blockchain, but sometimes the state of the second calling number is not necessarily valid, and when the second calling number is invalid, a pass through judgment is needed, so that step B3 further comprises judging whether the second calling number is a trust number on the blockchain where the called number is located, and the method specifically comprises the following steps:
b4: judging whether the state of the first calling number is valid or not: if the state of the first calling number is valid, the network side confirms that the second calling number is a trust number on the blockchain where the called number is located; if the first calling number state is invalid, entering a step B5;
b5: judging whether the second calling number passes through the first calling number and then sends a call request to the called number, if the second calling number can pass through the first calling number and then sends the call request to the called number, the network side confirms that the second calling number is a trust number on a blockchain where the called number is located; if the second calling number can not pass through the first calling number and then send a call request to the called number, the network side confirms that the second calling number is not the trust number on the blockchain where the called number is located.
S2.2: the network confirms the information transmission path of the calling number according to the registration number information of the calling number on the blockchain where the called number is;
s2.3: the network side judges whether the information transmission path of the calling number is tampered according to the information transmission path of the calling number, if the information transmission path of the calling number is not tampered, the network side confirms that the calling number is a trust number on a blockchain where the called number is located, and if the information transmission path of the calling number is tampered, the network side confirms that the calling number is not a trust number on the blockchain where the called number is located.
S3: judging whether the calling number is a shielding number set by the called number, if the calling number is not the shielding number set by the called number, responding to a call request and establishing communication connection between the calling number and the called number; if the calling number is a shielding number set by the called number, entering step S4;
specifically, the network side judges whether the calling number is a shielding number set by the called number, and the method is realized by the server listing the calling number corresponding to the shielding request in a shielding number list after the called number sends the shielding request to the server, and specifically comprises the following steps:
after a calling number user sends a plurality of harassment calls or a plurality of harassment short messages to a called number user, the called number user sends a request for shielding the calling number to a server of a network side;
after the server responds to the shielding request sent by the called number user to the server, shielding the telephone or short message sent by the calling number user to the called number user, and listing the calling number corresponding to the shielding request into a shielding number list of the called number;
if the shielding number list of the called number contains the calling number, the server judges that the calling number is the shielding number set by the called number.
S4: rejecting or shielding a call request sent by a calling number to a called number and controlling the calling number to not share a contact link of the called number on a blockchain so as to carry out privacy protection on the called number.
The following are to be described:
(1) As shown in fig. 1, each calling number needs to have a way to obtain the called number a when contacting the called number a, for example, the calling number needs to be added to a contact list of the called number a (i.e. to be contacted with an a phone or a short message later), registration needs to be applied at a server end, a blockchain is added, the server end judges whether to permit the application according to the credit of the user, after the application passes, the blockchain allocates a serial number to the user, the user is added to the blockchain, and the preface number of the user is recorded. The record information is stored at each number side on the transmission path, for example, the information that the calling number B22 joins the blockchain is in the called number A, the calling number B, the calling number C, the calling number D, the calling number B1, the calling number B2 and the calling number B3.. . And the subsequent verification can be performed to confirm that the transmission path is not tampered with.
(2) The contact mode of the called number A is added to the calling number, and the calling number A can not be realized by directly dialing and storing the number of the called number A and can only be shared to the calling number by the called number A; similarly, the calling number B2 needs to obtain the phone of the called number a from the calling number B, and needs to share the phone with the calling number B, and this sharing can be achieved through a sms link, which is also part of the registration process.
For better explanation, the calling number B and the calling number B2 in fig. 1 are respectively used for specific flow illustration, so as to protect privacy of the called number a.
As shown in fig. 1 and 2, the specific flow of privacy protection for the called number a is as follows:
1) The calling number B22 directly calls the called number A of the called user A under the unregistered condition, and hopes to talk with the called number A;
2) The server side verifies to find that the number is not the number on the called mobile phone number blockchain, refuses the request and prompts that the number is not registered (not registered on the called mobile phone number blockchain);
3) The calling number B22 knows the contact way of the called user A through the called number and hopes to add the contact way into the personal address book;
4) The called number A shares the contact link of the called number A with the calling number B2;
5) The calling number B2 applies for the server to add the called user A into the personal address book through the contact link;
6) The server judges whether to permit the application according to the credit of the user, after the application passes, the blockchain allocates a serial number for the user, adds the user into the blockchain, records the preamble number of the user, and adds the calling number B2 into the contact blockchain table of the called user A;
7) The calling number B2 and the called user A are contacted normally through a short message or a telephone;
8) The calling number B2 sends a plurality of harassing calls or short message applications to the called user A;
9) The called user A defines the calling number B2 contacted with the called user A as a telephone needing shielding to the server, does not accept the contact telephone any more, and verifies whether the number transmission path is tampered, for example: calling number B, calling number C, calling number D. . . Is the transmission path information on the same? If the two types of data are inconsistent, falsification is proved;
the recorded information is stored on each number side of the transmission path, for example, the information of the calling number B2 added into the blockchain is stored on the mobile phone of the called number A, and can be verified later to confirm that the transmission path is not tampered. It can also be determined whether the number following the number is also masked.
10 The server side performs corresponding operation according to the application of the called user A.
11 The calling number B2 (or the subsequent number) sends a crank call or a short message application to the called user A, and is directly shielded by a communication system.
As shown in fig. 1 and 3, the specific flow of privacy protection for the called number a is as follows:
1) The calling number B22 directly calls the called number A of the called user A under the unregistered condition, and hopes to talk with the called number A;
2) The server side verifies to find that the number is not the number on the called mobile phone number blockchain, refuses the request and prompts that the number is not registered (not registered on the called mobile phone number blockchain);
3) The calling number B22 knows the contact way of the called user A through the calling number B2 (intermediate user), and hopes to add the contact way into the personal address book;
4) Calling number B2 shares the contact link of called number A with calling number B22;
5) The calling number B22 applies for the server to add the called user A into the personal address book through the contact link;
6) The server judges whether to permit the application according to the credit of the user, after the application passes, the blockchain allocates a serial number for the user, adds the user into the blockchain, records the preamble number of the user, and adds the calling number B22 into the contact blockchain table of the called user A;
7) The calling number B22 and the called user A are contacted normally through a short message or a telephone;
8) The calling number B22 sends a plurality of harassing calls or short message applications to the called user A;
9) The called user A defines the calling number B2 contacted with the called user A as a telephone needing shielding to the server, does not accept the contact telephone any more, and verifies whether the number transmission path is tampered, for example: calling number B, calling number C, calling number D. . . Is the transmission path information on the same? If the two types of data are inconsistent, falsification is proved;
the recorded information is stored on each number side of the transmission path, for example, the information that the calling number B22 joins the blockchain is on the mobile phones of the called number A, the calling number B and the calling number B2, and can be verified later to confirm that the transmission path is not tampered. It can also be determined whether the number following the number is also masked.
10 The server side performs corresponding operation according to the application of the called user A.
11 Caller number B22 (or its subsequent number) sends a nuisance call or short message application to the called party a, which is directly masked by the communication system.
In the method of the embodiment, privacy protection is performed on the called number through blockchain communication authentication and black-and-white list setting, the blockchain communication authentication is to confirm whether the calling number is a trust number on the blockchain where the called number is located, the black-and-white list setting is to judge whether the calling number is a shielding number set by the called number, if the calling number is not the shielding number set by the called number, the calling number is a white list, and if the calling number is the shielding number set by the called number, the calling number is a black list. The invention utilizes the traceable characteristic of the blockchain to carry out full-flow tracking record on the process of obtaining the called number, and for the called number, when a certain link (the number on the blockchain is equivalent to a node) and/or a link after a certain link has excessive harassment calls and fraud calls, the link is invalid by applying for a server, namely, the calling number is controlled to be unable to share the contact link of the called number on the blockchain, the calling number link and the links after the calling number can not contact the called number through the original contact way, thereby enhancing the active access mechanism of the mobile phone user facing the harassment.
Example 2:
the embodiment discloses a server, the server includes:
the acquisition unit is used for acquiring a call request of a terminal where a calling number is located, wherein the call request carries the calling number and a called number;
the first judging unit is connected with the acquiring unit and is used for judging whether the calling number is a trust number on the blockchain where the called number is located according to the attribute information of the calling number;
the second judging unit is connected with the first judging unit and is used for judging whether the calling number is a shielding number set by the called number or not after judging that the calling number is a trust number on a blockchain where the called number is located according to the first judging unit;
the establishing unit is connected with the second judging unit and is used for responding to the call request and establishing communication connection between the calling number and the called number after judging that the calling number is not the shielding number set by the called number according to the second judging unit;
the protection unit is respectively connected with the first judgment unit and the second judgment unit and is used for rejecting or shielding a call request sent by the calling number to the called number after judging that the calling number is not the trust number on the blockchain where the called number is located according to the first judgment or after judging that the calling number is a shielding number set by the called number according to the second judgment so as to carry out privacy protection on the called number.
In a specific implementation, the first judging unit includes:
the registration judgment module is respectively connected with the acquisition unit and the protection unit and is used for judging whether the calling number is a registration number on the blockchain where the called number is located according to the attribute information of the calling number;
when the registration judging unit judges that the calling number is not the trust number in the called number blockchain, the protection unit refuses or shields the call request sent by the calling number to the called number so as to carry out privacy protection on the called number; the calling number is a registration number on the blockchain where the called number is located and comprises a second calling number existing on the blockchain where the called number is located and a first calling number newly registered on the blockchain of the called number;
the transmission path determining module is connected with the registration judging module and is used for determining an information transmission path of the calling number according to the registration number information of the calling number on the blockchain where the called number is located after the registration judging module judges that the calling number is the registration number on the blockchain where the called number is located;
the transfer path judging module is connected with the transfer path determining module and is used for judging whether the information transfer path of the calling number is tampered according to the information transfer path of the calling number, if the information transfer path of the calling number is not tampered, the calling number is confirmed to be a trust number in a called number blockchain, and if the information transfer path of the calling number is tampered, the calling number is confirmed to be not the trust number in the called number blockchain.
In addition, as shown in fig. 2 and 3, the steps of embodiment 2 and embodiment 1 are the same for the network side to determine whether the calling number is a trust number on the blockchain where the called number is located.
In the system of this embodiment, privacy protection is performed on the called number through blockchain communication authentication and black-and-white list setting, where the blockchain communication authentication is to confirm whether the calling number is a trust number on the blockchain where the called number is located, the black-and-white list setting is to determine whether the calling number is a shielding number set by the called number, if the calling number is not the shielding number set by the called number, the calling number is a white list, and if the calling number is the shielding number set by the called number, the calling number is a black list. The invention utilizes the traceable characteristic of the blockchain to carry out full-flow tracking record on the process of obtaining the called number, and for the called number, when a certain link (the number on the blockchain is equivalent to a node) and/or a link after a certain link has excessive harassment calls and fraud calls, the link is invalid by applying for a server, namely, the calling number is controlled to be unable to share the contact link of the called number on the blockchain, the calling number link and the links after the calling number can not contact the called number through the original contact way, thereby enhancing the active access mechanism of the mobile phone user facing the harassment.
Example 3:
based on the same technical concept as embodiment 1, the electronic device provided in this embodiment includes a memory and a processor, the memory storing a computer program, and the processor executing the blockchain-based number privacy protection method described in embodiment 1 when the processor runs the computer program stored in the memory.
Example 4:
based on the same technical concept as embodiment 1, this embodiment provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the blockchain-based number privacy protection method described in embodiment 1.
It is to be understood that the above embodiments are merely illustrative of the application of the principles of the present invention, but not in limitation thereof. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the invention, and are also considered to be within the scope of the invention.

Claims (10)

1. A blockchain-based number privacy protection method, the method comprising the steps of:
s1: the network side obtains a call request of a terminal where a calling number is located, wherein the call request carries the calling number and a called number;
s2: the network side judges whether the calling number is a trust number on a blockchain where the called number is located; when the calling number is a trust number on the blockchain where the called number is located, entering a step S3, and when the calling number is not the trust number on the blockchain where the called number is located, entering a step S4;
s3: the network side judges whether the calling number is a shielding number set by a called number, if the calling number is not the shielding number set by the called number, the network side responds to the call request and establishes communication connection between the calling number and the called number; if the calling number is the shielding number set by the called number, entering step S4;
s4: the network side refuses or shields the call request sent by the calling number to the called number and controls the calling number to not share the contact link of the called number on the blockchain so as to carry out privacy protection on the called number.
2. The blockchain-based number privacy protection method of claim 1, wherein in step S2, the network side determines whether the calling number is a trust number on a blockchain where the called number is located, and specifically includes the following steps:
s2.1: the network side judges whether the calling number is a registration number on the blockchain where the called number is located according to the attribute information of the calling number, and if the calling number is the registration number on the blockchain where the called number is located, the step S2.2 is entered; if the calling number is not the registered number on the blockchain where the called number is located, confirming that the calling number is not the trust number in the blockchain where the called number is located;
s2.2: the network confirms the information transmission path of the calling number according to the information that the calling number is the registration number on the blockchain where the called number is located;
s2.3: the network side judges whether the information transmission path of the calling number is tampered according to the information transmission path of the calling number, if the information transmission path of the calling number is not tampered, the network side confirms that the calling number is a trust number on a blockchain where the called number is located, and if the information transmission path of the calling number is tampered, the network side confirms that the calling number is not a trust number on the blockchain where the called number is located.
3. The blockchain-based number privacy protection method of claim 2, wherein the calling numbers include a first calling number and a second calling number, the registration of the first calling number is registered through a called number contact link shared by the called numbers, and the registration of the second calling number is registered through a called number contact link shared by the first calling numbers.
4. The blockchain-based number privacy protection method of claim 3, wherein the registration of the first calling number specifically includes the steps of:
a1: the method comprises the steps that a first calling number to be registered obtains a contact link of a called number shared by the called numbers on a blockchain;
a2: according to the contact link of the called number on the blockchain, carrying out registration application on the blockchain where the called number is located;
a3: after all nodes on the blockchain where the called number is located agree on the registration application of the first calling number to be registered, the first calling number to be registered is successfully registered as the first calling number on the blockchain of the called number.
5. The blockchain-based number privacy protection method of claim 3, wherein the registration of the second calling number specifically includes the steps of:
b1: the second calling number to be registered acquires a contact link of the called number shared by the first calling number on a blockchain;
b2: according to the contact link of the called number on the blockchain, carrying out registration application on the blockchain where the called number is located;
b3: after all nodes on the blockchain where the called number is located agree on the registration application of the second calling number to be registered, the second calling number to be registered is successfully registered as the second calling number on the blockchain of the called number.
6. The blockchain-based number privacy protection method of claim 5, wherein,
and step B3 is followed by judging whether the second calling number is a trust number on the blockchain where the called number is located, and specifically comprises the steps of:
b4: judging whether the state of the first calling number is valid or not: if the state of the first calling number is valid, the network side confirms that the second calling number is a trust number on the blockchain where the called number is located; if the first calling number state is invalid, entering a step B5;
b5: judging whether the second calling number passes through the first calling number and then sends a call request to the called number, if the second calling number can pass through the first calling number and then sends the call request to the called number, the network side confirms that the second calling number is a trust number on a blockchain where the called number is located; if the second calling number can not pass through the first calling number and then send a call request to the called number, the network side confirms that the second calling number is not the trust number on the blockchain where the called number is located.
7. The blockchain-based number privacy protection method of any of claims 1-6,
in the step S3, the network side judges whether the calling number is a shielding number set by the called number, and the step is implemented by the server listing the calling number corresponding to the shielding request in a shielding number list after the called number sends the shielding request to the server, which specifically includes the following steps:
after a calling number user sends a plurality of harassment calls or a plurality of harassment short messages to a called number user, the called number user sends a request for shielding the calling number to a server of a network side;
after the server responds to the shielding request sent by the called number user to the server, shielding the telephone or short message sent by the calling number user to the called number user, and listing the calling number corresponding to the shielding request into a shielding number list of the called number;
if the shielding number list of the called number contains the calling number, the server judges that the calling number is the shielding number set by the called number.
8. A server, the server comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a call request of a terminal where a calling number is located, and the call request carries the calling number and a called number;
the first judging unit is connected with the acquiring unit and is used for judging whether the calling number is a trust number on a blockchain where the called number is located;
the second judging unit is connected with the first judging unit and is used for judging whether the calling number is a shielding number set by the called number or not after judging that the calling number is a trust number on a blockchain where the called number is located according to the first judging unit;
the establishing unit is connected with the second judging unit and is used for responding to the call request and establishing communication connection between the calling number and the called number after judging that the calling number is not the shielding number set by the called number according to the second judging unit;
the protection unit is respectively connected with the first judgment unit and the second judgment unit and is used for rejecting or shielding a call request sent by the calling number to the called number after judging that the calling number is not the trust number on the blockchain where the called number is located according to the first judgment or after judging that the calling number is a shielding number set by the called number according to the second judgment, and controlling the calling number to not share the contact link of the called number on the blockchain so as to carry out privacy protection on the called number.
9. An electronic device comprising a memory and a processor, the memory having a computer program stored therein, the processor performing the blockchain-based number privacy protection method of any of claims 1-7 when the processor runs the computer program stored in the memory.
10. A computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, which when executed by a processor, implements the blockchain-based number privacy protection method of any of claims 1 to 7.
CN202211662152.9A 2022-12-23 2022-12-23 Block chain-based number privacy protection method, system, equipment and medium Pending CN116017452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211662152.9A CN116017452A (en) 2022-12-23 2022-12-23 Block chain-based number privacy protection method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211662152.9A CN116017452A (en) 2022-12-23 2022-12-23 Block chain-based number privacy protection method, system, equipment and medium

Publications (1)

Publication Number Publication Date
CN116017452A true CN116017452A (en) 2023-04-25

Family

ID=86022761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211662152.9A Pending CN116017452A (en) 2022-12-23 2022-12-23 Block chain-based number privacy protection method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN116017452A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116800887A (en) * 2023-07-20 2023-09-22 咪咕音乐有限公司 Video color ring NFT playing method, device, equipment and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116800887A (en) * 2023-07-20 2023-09-22 咪咕音乐有限公司 Video color ring NFT playing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
EP1596611A2 (en) Method and system for notifying a changed telephone number
WO2021135602A1 (en) Number privacy protection method, network device and computer storage medium
CA3013899C (en) Methods, telecommunication switches and computer programs for processing call setup signalling
CN104660809A (en) Answer management method and device for incoming call of private contact person
CN101911666A (en) Intelligent do not disturb rule
CN113067859B (en) Communication method and device based on cloud mobile phone
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
RU2642483C2 (en) Method and device for conference access
CN116017452A (en) Block chain-based number privacy protection method, system, equipment and medium
CN104283851A (en) Illegal automatic call shielding method and system and voice authentication equipment
JP4897864B2 (en) Protection against CLI spoofing of services in mobile networks
KR101295442B1 (en) Apparatus for preventing voice phishing and method thereof
RU2577844C2 (en) System and method for displaying source identifier in recipient device
CN113347311B (en) Abnormal number call processing method and device and electronic equipment
CN111405107B (en) Call control method, device, equipment and storage medium
WO2016206411A1 (en) User management method and system for government and enterprise network, service server, and communication core network
US5970409A (en) Protocol for local routing of calls coming from the switched telephone network in a cellular network
JP2000209284A (en) Device and method for authentication
US20230179696A1 (en) Method for managing an unallocated telephone number in a communication network, method for processing a request for allocating a telephone number, corresponding devices, item of communication equipment, system and computer programs
FI130228B (en) Automated fraud call detection
KR100394552B1 (en) How to perform authentication in WL system
CN114979992B (en) Call state determining method and device
JP2007535185A (en) Method for providing authorization for a user during a telephone connection and telecommunication system
CN114268467B (en) Key updating processing method, device, system, equipment and storage medium
CN115426183B (en) Identity authentication method, device, equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination