CN116208708A - Privacy protection communication method and device - Google Patents

Privacy protection communication method and device Download PDF

Info

Publication number
CN116208708A
CN116208708A CN202111441479.9A CN202111441479A CN116208708A CN 116208708 A CN116208708 A CN 116208708A CN 202111441479 A CN202111441479 A CN 202111441479A CN 116208708 A CN116208708 A CN 116208708A
Authority
CN
China
Prior art keywords
call
original
rule
called
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111441479.9A
Other languages
Chinese (zh)
Inventor
柳亮亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202111441479.9A priority Critical patent/CN116208708A/en
Publication of CN116208708A publication Critical patent/CN116208708A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a privacy protection call method and device, wherein the method comprises the following steps: the network opening function entity receives a first request message from a first server, wherein the first request message is used for setting a first rule, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information; the network opening functional entity sets a first rule according to the first parameter information; the network opening functional entity receives a second request message from the first server, wherein the second request message is used for setting a second rule, the second rule is used for replacing an original calling number and/or an original called number corresponding to a call needing number replacement, and the second request message carries second parameter information; the network opening functional entity sets a second rule according to the second parameter information; the network open function entity provides a number replacement service for the first server based on the first rule and the second rule.

Description

Privacy protection communication method and device
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for protecting privacy.
Background
Currently, a server of a network operator may provide, in an interface manner, a capability for setting a privacy preserving call policy to a third party platform (refer to a user, a third party outside the network operator), where the privacy preserving call policy is used to implement a privacy preserving call function. When the third party platform provides the privacy protection call function for the user, the third party platform can set a corresponding privacy protection call policy for the service by calling an interface provided by a server of the network operator, and then the server of the network operator can provide the privacy protection call function for the user according to the privacy protection call policy set by the third party platform.
Further, the privacy preserving call function has a plurality of privacy preserving modes, such as AXB mode, AX mode, AXYB mode, etc. At present, interfaces provided by a server of a network operator are all business-level, and different interfaces are provided for different privacy protection modes respectively, so that a third party platform needs to call different interfaces to set privacy protection call policies for different privacy protection mode requirements.
However, the demands of various industries for privacy preserving call functions are becoming ever more varied, and when the business process is slightly changed or new privacy preserving mode demands are presented on the market, network operators need to modify interfaces or provide new interfaces. However, the network operators have long periods of updating interfaces, and cannot respond quickly to market demands.
Therefore, the privacy protection communication scheme in the prior art has the problems that the flexibility is poor, and the new business experience cannot be supported to be rapidly online.
Disclosure of Invention
The embodiment of the application provides a privacy protection conversation method and device, which are used for solving the problems that in the prior art, the privacy protection conversation scheme is poor in flexibility and cannot support the quick online of new business experience.
In a first aspect, a privacy preserving call method is provided, including: the network opening function entity receives a first request message from a first server, wherein the first request message is used for setting a first rule, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information; the network opening functional entity sets a first rule according to the first parameter information; the network opening functional entity receives a second request message from the first server, wherein the second request message is used for setting a second rule, the second rule is used for replacing an original calling number and/or an original called number corresponding to a call needing number replacement, and the second request message carries second parameter information; the network opening functional entity sets a second rule according to the second parameter information; the network open function entity provides a number replacement service for the first server based on the first rule and the second rule.
According to the embodiment of the application, according to common elements or links (such as detecting calls needing number replacement, carrying out number replacement on calls needing number replacement and the like) of privacy protection call functions in different privacy protection modes, the capability provided by the network open functional entity is arranged in an atomic level, so that the network open functional entity provides the capability for setting a first rule and the capability for setting a second rule and the like, the atomic level capability is not influenced by a business process or the privacy protection mode and the like, for example, a first server can set the first rule only by providing first parameter information for the network open functional entity and can set the second rule only by providing second parameter information for the network open functional entity, the requirements of various industries and differences can be well met, the popularity of the privacy protection call service is improved, the new business experience is supported to be rapidly online, and the business cost is reduced.
In one possible design, the first parameter information includes one or more of the following:
the first indication information is used for indicating and detecting the time of the call needing number replacement, wherein the time comprises an originating stage or a terminating stage of the call needing number replacement;
The second indication information is used for indicating the matching mode of the calling number; the matching mode of the calling number comprises the following steps: matching the calling number corresponding to the call to be detected with a target calling number, wherein the original calling number is a target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, wherein the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating one target calling number or a plurality of target calling numbers;
fourth indication information for indicating the matching mode of the called calling number; the matching mode of the called calling number comprises the following steps: the method comprises the steps that a called number corresponding to a call to be detected is matched with a target called number, the original called number is a target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
fifth indication information for indicating one target called number or a plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
It should be understood that the above information is by way of example and not by way of limitation.
By the design, the first server can set the first rule by providing corresponding parameters for the network opening functional entity.
In one possible design, the second parameter information includes one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, which is used to indicate the processing mode of the original calling number, the processing mode of the original calling number includes: replacing the original calling number with the new calling number, or keeping the original calling number unchanged;
tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of an original called number, where the processing manner of the original called number includes: replacing the original called number with the new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
It should be understood that the above information is by way of example and not by way of limitation.
By the design, the first server can set the second rule by providing corresponding parameters for the network opening functional entity.
In one possible design, the method further comprises: the network opening functional entity receives a third request message from the first server, wherein the third request message is used for acquiring the virtual number and carries at least one user number; and the network opening functional entity returns a third response message to the first server, wherein the third response message carries at least one virtual number.
With this design, the first server may obtain the virtual number.
In one possible design, the third request message further carries: thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
Through the design, the first server can record and set the call after the call requiring number replacement is put through, and the flexibility of the scheme is further improved.
In one possible design, the network open function entity provides a number replacement service for the first server based on the first rule and the second rule, including: the network opening functional entity detects a call needing number replacement according to a first rule; and replacing the original calling number and/or the original called number corresponding to the call requiring number replacement according to the second rule.
It can be understood that the final purpose of the network open function entity to provide the number replacement service for the first server based on the first rule and the second rule may be to hide the real number of the user, that is, to provide the privacy protection call function for the user, in the process that the application server provides the service (such as taxi taking service, take-away service, etc.) for the user. The first server may be the application server itself, or may be a proxy server of the application server, for example, a cloud service, etc., which is not limited in this application.
Therefore, the number replacement service can be provided for the first server, the privacy protection call function is provided for the user, and the user experience can be improved.
In a second aspect, a privacy preserving call method is provided, including: the method comprises the steps that a first server sends a first request message for setting a first rule to a network opening functional entity, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information; the first server sends a second request message for setting a second rule to the network opening functional entity, the second rule is used for replacing an original calling number and/or an original called number corresponding to a call needing number replacement, and the second request message carries second parameter information.
In one possible design, the first parameter information includes one or more of the following:
the first indication information is used for indicating and detecting the time of the call needing number replacement, wherein the time comprises an originating stage or a terminating stage of the call needing number replacement;
the second indication information is used for indicating a matching mode of the calling number, and the matching mode of the calling number comprises the following steps: matching the calling number corresponding to the call to be detected with a target calling number, wherein the original calling number is a target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, wherein the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating one target calling number or a plurality of target calling numbers;
fourth indication information, which is used for indicating the matching mode of the called calling number, wherein the matching mode of the called calling number comprises: the method comprises the steps that a called number corresponding to a call to be detected is matched with a target called number, the original called number is a target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
Fifth indication information for indicating one target called number or a plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
In one possible design, the second parameter information includes one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, which is used to indicate the processing mode of the original calling number, the processing mode of the original calling number includes: replacing the original calling number with the new calling number, or keeping the original calling number unchanged;
tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of an original called number, where the processing manner of the original called number includes: replacing the original called number with the new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
In one possible design, the method further comprises: the first server sends a third request message for acquiring the virtual number to the network opening functional entity, wherein the third request message carries at least one user number; and the first server receives a third response message returned by the network opening functional entity, wherein the third response message carries at least one virtual number.
In one possible design, the third request message further carries: thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
In one possible design, the method further comprises: the first server receives a fourth request message from the second server, wherein the fourth request message is used for requesting the virtual number, and the fourth request message carries at least one user number; the first server sends a third request message to the network opening functional entity according to the fourth request message; after receiving the third response message, the first server returns a fourth response message to the second server, wherein the fourth response message carries at least one virtual number. The first server is, for example, a cloud server, and the second server is, for example, an application server.
By this design, it is possible to realize a service of providing a number replacement by the first server for the second server.
In one possible design, the fourth request message further carries a privacy protection mode, where the privacy protection mode is used to indicate a number that needs to be converted from a number in at least one user number; the method further comprises the steps of: the first server determines first parameter information and second parameter information according to the privacy protection mode, the at least one user number and the at least one virtual number.
Through the design, the first server determines the first parameter information and the second parameter information according to the privacy protection mode, the at least one user number and the at least one virtual number, so that the first rule and the second rule can be ensured to be accurately matched with the requirements of user privacy protection conversation, and the reliability of the scheme can be improved.
In a third aspect, a privacy preserving telephony device is provided, which may be a network open function entity or a chip in a network open function entity, the device comprising means/units for implementing the method described in the first aspect or any one of the possible designs of the first aspect.
For example, an apparatus may include: a transceiver module and a processing module.
The system comprises a receiving and transmitting module, a first server and a second server, wherein the receiving and transmitting module is used for receiving a first request message from the first server, the first request message is used for setting a first rule, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information; the processing module is used for setting a first rule according to the first parameter information; the receiving and transmitting module is also used for receiving a second request message from the first server, wherein the second request message is used for setting a second rule, the second rule is used for replacing an original calling number and/or an original called number corresponding to a call needing number replacement, and the second request message carries second parameter information; the processing module is also used for setting a second rule according to the second parameter information; the processing module is further used for providing number replacement service for the first server based on the first rule and the second rule.
In one possible design, the first parameter information includes one or more of the following:
the first indication information is used for indicating and detecting the time of the call needing number replacement, wherein the time comprises an originating stage or a terminating stage of the call needing number replacement;
the second indication information is used for indicating the matching mode of the calling number; the matching mode of the calling number comprises the following steps: matching the calling number corresponding to the call to be detected with a target calling number, wherein the original calling number is a target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, wherein the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating one target calling number or a plurality of target calling numbers;
fourth indication information for indicating the matching mode of the called calling number; the matching mode of the called calling number comprises the following steps: the method comprises the steps that a called number corresponding to a call to be detected is matched with a target called number, the original called number is a target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
Fifth indication information for indicating one target called number or a plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
In one possible design, the second parameter information includes one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, which is used to indicate the processing mode of the original calling number, the processing mode of the original calling number includes: replacing the original calling number with the new calling number, or keeping the original calling number unchanged;
tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of an original called number, where the processing manner of the original called number includes: replacing the original called number with the new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
In one possible design, the transceiver module is further configured to receive a third request message from the first server for obtaining the virtual number, where the third request message carries at least one user number; and returning a third response message to the first server, wherein the third response message carries at least one virtual number.
In one possible design, the third request message further carries: thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
In one possible design, the processing module is specifically configured to, when providing the number replacement service for the first server based on the first rule and the second rule: detecting a call requiring number replacement according to a first rule; and replacing the original calling number and/or the original called number corresponding to the call requiring number replacement according to the second rule.
In a fourth aspect, a privacy preserving telephony device is provided, which may be a first server or a chip in a first server, the device comprising means/units for implementing the method described in the second aspect or any one of the possible designs of the second aspect.
For example, an apparatus may include: and a transceiver module.
The network opening function entity comprises a receiving and transmitting module, a network opening function entity and a network switching module, wherein the receiving and transmitting module is used for sending a first request message for setting a first rule, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information; the transceiver module is further configured to send a second request message for setting a second rule to the network open function entity, where the second rule is used to replace an original calling number and/or an original called number corresponding to a call that needs to be subjected to number replacement, and the second request message carries second parameter information.
In one possible design, the first parameter information includes one or more of the following:
the first indication information is used for indicating and detecting the time of the call needing number replacement, wherein the time comprises an originating stage or a terminating stage of the call needing number replacement;
the second indication information is used for indicating a matching mode of the calling number, and the matching mode of the calling number comprises the following steps: matching the calling number corresponding to the call to be detected with a target calling number, wherein the original calling number is a target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, wherein the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating one target calling number or a plurality of target calling numbers;
fourth indication information, which is used for indicating the matching mode of the called calling number, wherein the matching mode of the called calling number comprises: the method comprises the steps that a called number corresponding to a call to be detected is matched with a target called number, the original called number is a target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
Fifth indication information for indicating one target called number or a plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
In one possible design, the second parameter information includes one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, which is used to indicate the processing mode of the original calling number, the processing mode of the original calling number includes: replacing the original calling number with the new calling number, or keeping the original calling number unchanged;
tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of an original called number, where the processing manner of the original called number includes: replacing the original called number with the new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
In one possible design, the transceiver module is further configured to send a third request message for obtaining the virtual number to the network open function entity, where the third request message carries at least one user number; and receiving a third response message returned by the network opening functional entity, wherein the third response message carries at least one virtual number.
In one possible design, the third request message further carries:
thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
In one possible design, the transceiver module is further configured to receive a fourth request message from the second server, where the fourth request message is used for requesting a virtual number, and the fourth request message carries at least one user number; sending a third request message to the network opening functional entity according to the fourth request message; and after receiving the third response message, returning a fourth response message to the second server, wherein the fourth response message carries at least one virtual number.
In one possible design, the fourth request message further carries a privacy protection mode, where the privacy protection mode is used to indicate a number that needs to be converted from a number in at least one user number; the apparatus further comprises: and the processing module is used for determining the first parameter information and the second parameter information according to the privacy protection mode, the at least one user number and the at least one virtual number.
In a fifth aspect, there is provided a communication apparatus comprising: at least one processor; and a memory communicatively coupled to the at least one processor, a communication interface; wherein the memory stores instructions executable by the at least one processor, the at least one processor by executing the instructions stored by the memory, causes the apparatus to perform the method as described in the first aspect or any one of the possible designs of the second aspect through the communication interface.
In a sixth aspect, there is provided a computer readable storage medium comprising a program or instructions which, when run on a computer, cause a method as described in the first aspect or any one of the possible designs of the second aspect or the second aspect to be performed.
In a seventh aspect, there is provided a chip coupled to a memory for reading and executing program instructions stored in the memory such that the method as described in the first aspect or any one of the possible designs of the second aspect or the second aspect is performed.
An eighth aspect provides a communication system comprising: a network open function entity for performing the method as described in the first aspect or any one of the possible designs of the first aspect; and a first server for performing the method as described in the second aspect or any one of the possible designs of the second aspect.
The advantageous effects of each of the second to eighth aspects are described with reference to the advantageous effects of the corresponding design in the first aspect, and will not be described herein.
In the technical solution provided in any one of the above aspects, the network opening function entity may be an opening management platform or a service capability opening function in an operator network.
Drawings
Fig. 1 is a network architecture diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic diagram of IMS in an embodiment of the present application;
fig. 3 is a flowchart of a privacy preserving call method provided in an embodiment of the present application;
fig. 4 is a flowchart of a privacy protection call method based on an AXB mode according to an embodiment of the present application;
fig. 5 is a flowchart of a privacy protection call method based on an AX mode according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a privacy preserving communication device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a communication device according to an embodiment of the present application.
Detailed Description
Some terms related to the present application are described below.
1. Privacy protection talk function: in order to prevent the user real number from being revealed in the call process, a function capable of hiding the user real number is introduced by a network operator. For example: the virtual number is added for the user, and in the process of the user call, the virtual number of the user is only presented to the outside, namely, other users who call with the user can only acquire the virtual number of the user, but can not acquire the real number of the user, so that the user can enjoy high-quality call and short message service and can hide the real number. The function can be used for various scenes such as online shopping, traveling, job hunting, takeaway and the like.
2. Privacy protection mode: and the processing mode is used for indicating the number of the user participating in the call. In different scenes, the number processing modes of the users participating in the call can have different requirements, so that the numbers of the users participating in the call need to be subjected to privacy protection by adopting different privacy protection modes. The following are examples of several possible privacy preserving modes:
(1) Shared virtual number mode (AXB mode):
and establishing a one-to-one association relationship between the user number A and the user number B. The two parties do not know the real number of the other party, contact the other party through the privacy number X, the user number A only presents X numbers to the user number B, and the user number B only presents X numbers to the user number A. The same X number may be multiplexed in different associations, but A, B numbers are different. Examples of applicable scenarios for AXB mode: the method is mainly aimed at privacy protection in a 1-to-1 scene, and the precondition is that the contact mode of A, B is known, such as network taxi taking, short renting, take-out dispatch, on-line doctor inquiry, legal consultation and the like. The privacy protection number in the AXB mode mainly protects privacy of both parties in a one-to-one scene, so that both parties can keep the IMS call normally, and the real numbers of both parties are hidden.
(2) Independent privacy number mode (AXYB mode):
and establishing a one-to-one association relationship between the user number A and the user number B. The two parties do not know the real number of the other party, contact the other party through the privacy number X, Y, the user number A presents only the X number to the user number B, and the user number B presents only the Y number to the user number A. The same group X, Y numbers can be multiplexed in different associations, but A, B numbers are different. Examples of applicable scenarios for AXYB mode: the method is mainly used for the situation that enterprises strictly control the privacy of enterprise members, such as dispatch, car rescue, car renting and the like. The privacy protection number in the AXYB mode mainly protects the number in a one-to-many interaction scene. The call is established through the privacy number, so that the numbers of both parties of the call are ensured not to be revealed.
(3) Unidirectional virtual number mode (AX mode):
the user number a has an independent privacy number X. Anyone can dial to the terminal equipment corresponding to the user number A through the X number, the terminal equipment corresponding to the user number A can dial back to one person in the terminal equipment, the external display number of the user number A is X, and the other user numbers display real user numbers for the user number A. Typically, an X number can only be bound to a subscriber number a. In particular, the user of the user number a may set a plurality of numbers for which it is desired to hide the real number, and the user a number may present the real user number a only for the plurality of numbers with the number X, and for other unset numbers. In the following, AX mode takes the example of presenting X to all numbers. Examples of applicable scenarios for AX mode: consultation industry, express service, etc. The privacy protection number in the AX mode mainly carries out privacy protection on a single number in a pair of N scenes, the numbers outside the user number A are replaced by X, all calls with the user number A are established through X, and the user number A is protected from being revealed.
(4) Group privacy number mode (AXG mode):
and establishing a group-to-one association relationship between the user number A and a group of user numbers G. A plurality of members in a group G are arranged, the G is allocated with a corresponding virtual number X, the members in the group G can dial a user number A through X, and the user number A can call back to one member in the group G. The same X number may be multiplexed in different associations, but A, G is different. AXG mode applicable scenario example: the method is mainly used for industries with team cooperation scenes, such as recruitment, banks, insurance and the like.
It is to be understood that the above modes are merely examples and are not specifically limiting.
The present application will be described in detail with reference to the accompanying drawings.
The technical solution of the embodiment of the application can be applied to various communication systems, for example: long term evolution (long term evolution, LTE) systems, worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication systems, future fifth generation (5th Generation,5G) systems such as new generation radio access technologies (new radio access technology, NR), and future communication systems such as 6G systems. As long as the call requirement exists in the network, the technical scheme of the embodiment of the application can be adopted.
Exemplary, referring to fig. 1, a network architecture diagram of a communication system is provided in an embodiment of the present application. The communication system includes:
1) A terminal device, or User Equipment (UE), is used to initiate or receive calls. The terminal device comprises a device for providing voice and/or data connectivity to a user, in particular a device for providing voice to a user, or a device for providing data connectivity to a user, or a device for providing voice and data connectivity to a user. For example, may include a handheld device having wireless connectivity, or a processing device connected to a wireless modem. Specifically, for example, a mobile phone, a smart watch, a smart earphone, and the like are included.
While the various terminal devices described above, if located on a vehicle (e.g., placed in a vehicle or mounted in a vehicle), may be considered as in-vehicle terminal devices, for example, also referred to as in-vehicle units (OBUs).
In fig. 1, the number of terminal devices is exemplified by two, i.e., a first terminal device and a second terminal device, and the actual number is not limited thereto. The first terminal device and the second terminal device realize mutual communication through a network operator network.
2) The application server: and the background server corresponding to the application installed on the terminal equipment is used for providing corresponding service for the terminal equipment, such as a background server of taxi taking software or a background server of take-away software. In the embodiment of the application, the application server is used for applying for the virtual number from the cloud server and issuing the virtual number to the terminal equipment.
3) The cloud server, the server of the cloud service manufacturer, is a platform which is established, maintained and provided with required services in an easy-to-expand manner on demand through a network by the manufacturer of the terminal equipment or a network operator, such as the server of a mobile phone manufacturer.
As an alternative implementation manner, the cloud server may be configured to receive a number request from the application server to assign a virtual number to the user number, obtain the virtual number from the network open function entity, send the virtual number to the application server, and then the application server may issue the virtual number to the terminal device, so that the terminal device initiates/receives a call based on the virtual number.
As another alternative embodiment, the application server may directly initiate a request to the network open function entity, and obtain the virtual number from the network open function entity.
4) The network open function entity may provide the capability related to the privacy preserving call function, such as the capability for setting the privacy preserving call policy. In the embodiment of the present application, the privacy preserving call policy includes, for example, but is not limited to: a policy for detecting a call requiring number replacement (e.g., a first rule hereinafter), a policy for replacing an original calling number and/or an original called number corresponding to a call requiring number replacement (e.g., a second rule hereinafter), etc. In the embodiment of the present application, the capability provided by the network open functional entity for setting the privacy protection call policy may not distinguish between privacy protection modes.
In one possible implementation, the network open function entity may provide the capability to set privacy preserving call policies externally in the form of an interface, including, for example, but not limited to, an application program interface (Application Programming Interface, API). The third party platform (namely, a third party except a user and a network operator), such as a cloud server, can call a relevant interface provided by a network opening function entity, set a corresponding privacy protection call policy for the service of the third party platform, and then the server of the network operator can provide a privacy protection call function for the user according to the privacy protection call policy set by the third party platform.
In some possible designs, the privacy preserving call function may further perform operations related to the privacy preserving call function according to the privacy preserving call policy, for example, detecting a call requiring number replacement according to a first rule, replacing an original calling number and/or an original called number corresponding to the call requiring number replacement according to a second rule, and so on. In other possible designs, the privacy preserving call function may configure the first rule and the second rule to other network function entities, and further, the other network function entities perform operations related to the privacy preserving call function according to the privacy preserving call policy.
In some possible designs, the network opening function may be located in the network operator network (i.e., as shown in fig. 1). The network open function entity may be an open management platform or a service capability open function in the network operator network. The network opening functional entity can be deployed above the original functional entity of the network operator network, or can be independently deployed, and the application is not limited. In other possible designs, the network open functionality is deployed outside the network operator network, e.g. the network open functionality is integrated on a cloud server. The specific implementation form of the network open function entity is not particularly limited in the present application.
5) The first network function entity and the second network function entity are network function entities in a network operator network providing call control functions. The first network function entity and the second network function entity may interact with a network opening function entity, e.g. may invoke services provided by the network opening function entity, e.g. privacy preserving call services.
It should be understood that fig. 1 is an example in which a network function entity providing a call control function for a first terminal device and a network function entity providing a call control function for a second terminal device are located in different home locations, i.e. the first network function entity provides the call control function for the first terminal device, and the second network function entity provides the call control function for the second terminal device. In practical applications, the network function entity providing the call control function for the first terminal device and the network function entity providing the call control function for the second terminal device may also be located in the same home location, in which case the first network function entity and the second network function entity may be the same network function entity.
In one possible design, the first network function entity and the second network function entity may be an internet protocol multimedia subsystem (Internet Protocol Multimedia Subsystem, IMS) or other real-time audio video network. The IMS is the core of a new generation communication network, adopts a session initiation protocol (Session Initiation Protocol, SIP) system to control call, has no relation with access, and can have various capabilities such as separation of various media service control functions and bearing capacity, separation of call and session, separation of application and service, separation of service and network, fusion of mobile network and Internet service, and the like. The IMS of the user number home location may be referred to as an IMS home domain or home domain IMS, and the IMS of the user number visited location may be referred to as an IMS visited domain or visited domain IMS. According to the position of the terminal equipment corresponding to the user number and the actual condition of IMS network deployment, the terminal equipment corresponding to the user number can be attached to the IMS of the home location or the IMS of the visiting location.
IMS may be composed of a plurality of functional devices that use their functions as short for short. For example, as shown in fig. 2, the terminal device is connected to the IMS through a core network. The devices in the IMS1 (i.e. the first network function entity) to which the first terminal device (first user number) belongs may include proxy-call session control function 1 (proxy-call session control function, P-CSCF 1), service-call session control function 1 (service-call session control function, S-CSCF 1), query-call session control function 1 (interworking-call session control function, I-CSCF 1), home subscriber server 1 (home subscriber server, HSS 1) and application server 1 (application server, AS 1). The devices in the IMS2 (i.e. the second network function) to which the second terminal device (second user number) belongs may comprise a P-CSCF2, an S-CSCF2, an I-CSCF2, an HSS2 and an AS2. The above is simply shown for devices in the IMS, which may also include other devices.
It should be appreciated that IMS is proposed by the third generation partnership project (3rd Generation Partnership Project,3GPP) standard organization on an R5 version basis, and is a generic network architecture for providing multimedia services over IP-based networks. With the continuous evolution of communication technology standards, the specific network structure of the IMS may also change (e.g., splitting functional entities, or adding functional entities, etc.), so the name of the IMS may also change.
It should be understood that, the network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and are not limited to the technical solution provided in the embodiments of the present application, and those of ordinary skill in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided in the embodiments of the present application is equally applicable to similar technical problems.
Referring to fig. 3, a flowchart of a privacy preserving call method provided in an embodiment of the present application is taken as an example, where the method is applied to the network architecture shown in fig. 1, and the specific flow includes:
s301, the first server sends a first request message for setting a first rule to the network opening functional entity, and the network opening functional entity receives the first request message from the first server correspondingly.
The first server may be an application server or a cloud server shown in fig. 1, which is not limited in this application. For ease of understanding and explanation, the following takes the example in which the first server is the cloud server shown in fig. 1.
The first rule is used to detect calls requiring number replacement (or matches sessions requiring number replacement). The first rule may also be referred to as a session matching policy.
In the embodiment of the present application, the network open function entity provides the capability for setting the first rule externally, for example, the first server may set the first rule by sending the first request message. The first request message carries first parameter information for generating a first rule.
Illustratively, the first parameter information includes one or more of:
1) The first indication information is used for indicating and detecting the time of the call needing number replacement, and the time comprises an originating stage or a terminating stage of the call needing number replacement;
2) The second indication information is used for indicating the matching mode of the calling number; the matching mode of the calling number comprises the following steps: matching a calling number corresponding to a call to be detected with a target calling number, wherein the original calling number is the target calling number; or the calling number corresponding to the call to be detected is matched with a plurality of target calling numbers, and the original calling number is any one of the plurality of target calling numbers;
it will be appreciated that the original calling number of the call requiring number replacement is the target calling number.
In the AXB mode and the AXYB mode, only one target calling number is used, and if the calling number corresponding to the call to be detected is the target calling number, the successful matching of the calling number is determined; in AXG mode, there may be multiple target calling numbers, and if the calling number corresponding to the call to be detected is any one of the multiple target calling numbers, it is determined that the calling number matching is successful.
3) Third indication information for indicating one target calling number or a plurality of target calling numbers;
4) Fourth indication information for indicating the matching mode of the called calling number; the matching mode of the called calling number comprises the following steps: the called number corresponding to the call to be detected is matched with a target called number, and the original called number is a target called number; or, matching the called number corresponding to the call to be detected with a plurality of target called numbers, wherein the original called number is any one of the target called numbers;
it will be appreciated that the original called number of the call requiring number replacement is the target called number.
In the AXB mode and the AXYB mode, only one target called number is used, and if the called number corresponding to the call to be detected is the target called number, the called number is determined to be successfully matched; in AXG mode, there may be multiple target called numbers, and if the called number corresponding to the call to be detected is any one of the multiple target called numbers, it is determined that the called number matching is successful.
5) Fifth indication information for indicating one target called number or a plurality of target called numbers;
It can be appreciated that the detection requirements of the calling and called numbers are different according to different privacy protection modes. For example, for AXB mode, AXYB mode, etc., it is necessary to match the calling number and the called number simultaneously; while in AX mode, only the calling number or the called number may be matched, or the calling number and the called number may be matched at the same time, for example, one of the target calling number and the target called number may be set to any value.
6) And sixth indication information for indicating the identification of the second rule.
It can be understood that the effect of carrying the sixth indication information in the first parameter information is that the network open functional entity can quickly acquire the second rule for replacing the number of the call requiring number replacement after detecting the call requiring number replacement according to the first rule, thereby improving the efficiency of number replacement.
It should be understood that the above six indications are merely examples and are not limiting.
In a possible implementation, the network open function entity provides the capability to set the first rule externally in the form of an interface (such as an API). The first request message is used for requesting to call a first interface of the network open function entity, wherein the first interface is used for realizing a function of setting a first rule, and the first parameter information in the first request message is input parameter information of the first interface. Optionally, after receiving the first request message, the network open functional entity may return a first response message, where the first response message is used to indicate a result of the first server invoking the first interface, for example, that the first rule is set successfully or fails. Optionally, if the calling result is that the first rule fails to be set, the first response message may also carry a reason for the failure, for example, a parameter format error, so that the first server resets the first rule.
Referring to table 1, the relevant parameter examples of the first interface are shown in the table, where "sessionmatch" is an identifier of the first interface, the input parameter is a parameter carried in the first request message, and the return parameter is used to indicate a call result of the first server to the first interface.
TABLE 1
Figure 1
It will be appreciated that there may be two different sessions between two communicating end devices depending on the call initiator. As shown in fig. 1, when the first terminal device is used as a caller and the second terminal device is used as a callee, one session is corresponding, and when the second terminal device is used as a caller and the first terminal device is used as a callee, the other session is corresponding, and the two sessions may respectively correspond to a set of first rules.
Optionally, the first service may further provide an interface for setting a number group, see table 2, showing parameters related to the interface, where numbergroup is the identifier of the interface.
TABLE 2
Figure BDA0003383580400000131
S302, the network opening function entity sets a first rule according to the first parameter information.
In one possible implementation manner, the network open function entity stores a first rule template, after receiving the first request message, the network open function entity may store the first parameter information into the first rule template, where the first rule template storing the first parameter information is the first rule.
In one possible design, the first rule template includes basic information of the first rule. The base information may for example comprise logic of the first rule, the logic for example: when the matching time arrives, detecting whether the calling number corresponding to the call to be detected is matched with the target calling number corresponding to the call needing to be subjected to number replacement according to the matching mode of the calling number, and/or detecting whether the called number corresponding to the call to be detected is matched with the target called number corresponding to the call needing to be subjected to number replacement according to the matching mode of the called calling number. The first parameter information may for example comprise a variable of the first rule, such as: matching time, a matching mode of a calling number, a target calling number, a matching mode of a called calling number, a target called number, an identification of a second rule and the like. The network opening functional entity combines the logic, variable and other information of the first rule to obtain the complete information of the first rule.
Optionally, after completing the setting of the first rule (for example, after saving the first parameter information to the first rule template), the network open functional entity further returns a first response message to the first server, and correspondingly, the first server receives the first response message, where the first response message is used to indicate that the setting of the first rule is successful or failed.
S303, the first server sends a second request message for setting a second rule to the network opening functional entity, and the network opening functional entity receives the second request message correspondingly.
The second rule is used for processing an original calling number and/or an original called number corresponding to the call needing number replacement, for example, replacing the original calling number and/or the original called number corresponding to the call needing number replacement. The second rule may also be referred to as a call handling policy.
In the embodiment of the present application, the network open function entity provides the capability for setting the second rule externally, for example, the first server may set the second rule by sending the second request message. The second request message carries second parameter information for generating a second rule.
Illustratively, the second parameter information includes one or more of:
1) Seventh indication information for indicating an identification of the second rule;
2) Eighth indication information for indicating a waiting tone before a call;
i.e. the waiting audio before the call is put on, e.g. a sound of the default audio "beep", or a song.
3) Ninth indication information, which is used to indicate the processing mode of the original calling number, the processing mode of the original calling number includes: replacing the original calling number with the new calling number, or keeping the original calling number unchanged;
4) Tenth indication information for indicating a new calling number for replacing the original calling number;
5) Eleventh indication information, configured to indicate a processing manner of an original called number, where the processing manner of the original called number includes: replacing the original called number with the new called number, or keeping the original called number unchanged;
6) Twelfth indication information for indicating a new called number for replacing the original called number.
It should be understood that the above six indications are merely examples and are not limiting.
In a possible implementation, the network open function entity provides the capability to set the second rule externally in the form of an interface (e.g. API). The second request message is used for requesting to call a second interface of the network open function entity, wherein the second interface is used for realizing a function of setting a second rule, and the second parameter information in the second request message is input parameter information of the second interface. Optionally, after receiving the second request message, the network open functional entity may return a second response message, where the second response message is used to indicate a result of the first server invoking the second interface, for example, that the second rule is set successfully or fails. Optionally, if the calling result is that the second rule fails to be set, the second response message may also carry a reason for the failure, for example, a parameter format error, so that the first server resets the second rule.
Referring to table 3, the "callprocess set" is an identifier of the second interface, the input parameter is a parameter carried in the second request message, and the return parameter is a parameter carried in a second response message returned by the network open function entity to the first server in response to the second request message.
TABLE 3 Table 3
Figure BDA0003383580400000141
/>
Figure BDA0003383580400000151
Similarly, there may be two different sessions between two communicating terminal devices according to the difference of call originators, and the corresponding different sessions may have different second rules. As shown in fig. 1, when the first terminal device is used as a caller and the second terminal device is used as a callee, one session is corresponding, and when the second terminal device is used as a caller and the first terminal device is used as a callee, the other session is corresponding, and the two sessions may respectively correspond to a set of second rules.
S304, the network opening function entity sets a second rule according to the second parameter information.
In a possible implementation manner, the network open function entity stores a second rule template, after receiving the second request message, the network open function entity may store the second parameter information into the second rule template, where the second rule template storing the second parameter information is the second rule.
In one possible design, the second rule template includes base information for the second rule. The base information may for example comprise logic of the second rule, the logic for example: the original calling number is processed according to the processing mode of the original calling number, and/or the original called number is processed according to the processing mode of the original called number. The second parameter information may include, for example, variables of a second rule, such as a processing manner of an original calling number, a new calling number for replacing the original calling number, a processing manner of an original called number, a new called number for replacing the original called number, and the like. And combining the logic, variable and other information of the second rule by the network open function entity to obtain the complete information of the second rule.
Optionally, after completing the setting of the second rule (for example, after saving the second parameter information to the second rule template), the network open function entity further returns a second response message to the first server, and correspondingly, the first server receives the second response message, where the second response message is used to indicate that the setting of the second rule is successful or failed.
It will be appreciated that setting the first rule, the second rule at the first server requires the use of virtual numbers of the calling user and/or the called user.
As an optional implementation manner, before the first server sends the first request message and the second request message to the network opening functional entity, a third request message for obtaining the virtual number is also sent to the network opening functional entity, and correspondingly, the network opening functional entity receives the third request message from the first server, the third request message carries at least one user number, returns a third response message to the first server, and the third response message carries at least one virtual number.
More specifically, after receiving a fourth request message from the second server (such as the application server shown in fig. 1) for requesting the virtual number, the first server may send a third request message to the network open function entity according to the fourth request message, where the fourth request message is used for requesting the virtual number, and the fourth request message carries at least one user number; after receiving the third response message, the first server returns a fourth response message to the second server, wherein the fourth response message carries at least one virtual number, and the second server can send the virtual number to the terminal equipment for the terminal equipment to talk.
Optionally, the third request message may further carry: thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
In one possible implementation, the network open function entity provides the capability to obtain the virtual number externally in the form of an interface (e.g., API). The first request message is used for requesting to call a third interface of the network open function entity, wherein the third interface is used for realizing the function of acquiring the virtual number, and the third parameter information in the third request message is input parameter information of the third interface. After receiving the third request message, the network open functional entity may return a third response message, where the third response message is used to indicate a result of the first server invoking the third interface, for example, at least one virtual number allocated for at least one user number.
Referring to table 4, the "getvirtual number" is an identifier of the third interface, the input parameter is a parameter carried in the third request message, and the return parameter is a parameter carried in a third response message returned by the network open function entity to the first server in response to the third request message.
TABLE 4 Table 4
Figure BDA0003383580400000161
Where e.164 is an international public telephone code number scheme defined by the international telecommunications union for use in PSTN and some data networks, and defines the format of specific code numbers. E.164 defines a maximum of 15 digits, the complete number having an international call prefix. The e.164 number is an MSISDN number, which is the number the calling subscriber needs to dial for calling a subscriber in the mobile communication network. The format is as follows: cc+ndc+sn, also denoted: country code +n1n2n3+h0h1h2h3+abcd (cc=country code, china 86; ndc=domestic destination code; sn=user number).
The virtual number allocation method is different in different privacy protection modes.
As an alternative embodiment, the third request message and the fourth request message further carry a privacy protection mode, where the privacy protection mode is used to indicate a number that needs to be converted from a number in the at least one user number.
Several privacy preserving modes are exemplified below.
1) In the AXB mode, the user numbers carried in the third request message and the fourth request message are A, B, and the indication information for indicating the AXB mode, and the network open function entity allocates the virtual number X to the user number A, B according to the indication information.
2) In the AXYB mode, the user number carried in the third request message and the fourth request message is A, B, and the indication information is used for indicating the AXYB mode, and the network open functional entity allocates a virtual number X for the user number a and allocates a virtual number Y for the user number a according to the indication information.
3) In the AX mode, the user number carried in the third request message and the fourth request message is A, and the indication information is used for indicating the AX mode, and the network opening functional entity allocates a virtual number X for the user number A according to the indication information.
4) In AXG mode, the user numbers carried in the third request message and the fourth request message are a and the number group G (including numbers G1, G2, G3, etc.), and indication information for indicating AXG mode, and the network open function entity allocates a virtual number X to the user number a and the number group G according to the indication information.
It should be understood that the above several modes are merely examples and are not limiting.
As an alternative embodiment, the third request message and the fourth request message may not carry a privacy protection mode, for example, the privacy protection mode defaults to an AXB mode or an AX mode. The network open function entity may assign virtual numbers to the subscriber numbers according to a default mode.
As an alternative embodiment, the first server may determine the first parameter information, the second parameter information according to the privacy protection mode, the at least one user number, and the at least one virtual number. For example, in the AXB mode, taking an example of a call initiated by a, a target calling number to be detected is a, a target called number is X, the processing mode of the calling number is replaced by a called number (i.e., a→x), and the processing mode of the called number is replaced by a new number (i.e., a→b). For example, in the AX mode, taking an example of an a-initiated call, the target calling number to be detected is a, the target called number is any one number of the number group G (including the numbers G1, G2, and G3), the processing mode of the calling number is replaced by a called number (i.e., a→x), and the processing mode of the called number is not performed any processing.
And S305, after the first rule and the second rule are set successfully, the network opening functional entity provides the number replacement service for the first server according to the first rule and the second rule.
In a possible implementation manner, the network opening function entity detects a call requiring number replacement according to a first rule and performs number replacement on the call requiring number replacement according to a second rule. For example, after a network function entity (such as a first network function entity or a second network function entity shown in fig. 1) for controlling a call receives a call, invoking privacy protection call service provided by a network opening function entity, sending related information (such as a calling number is a first user number and a called number virtual number) of the call to the network opening function entity, the network opening function entity uses any call as a call to be detected, judges whether the call is a call needing to be subjected to number replacement according to a first rule, if so, performs number replacement on the call needing to be subjected to number replacement according to a second rule, and returns a number replacement result to the network function entity for controlling the call, wherein the network function entity for controlling the call continues a subsequent call flow according to the replaced number.
In another possible implementation manner, the network opening function entity sends the first rule and the second rule to other network function entities, for example, a network function entity (such as the first network function entity or the second network function entity shown in fig. 1) for controlling a call in a network, after receiving a call, the network function entity for controlling a call determines whether the call is a call needing number replacement according to the first rule, if so, performs number replacement on the call needing number replacement according to the second rule, and then continues a subsequent call flow according to the replaced number.
It should be understood that the above two operations are merely examples and are not specifically limited, and that other network functional entities may perform operations of detecting a call requiring number replacement according to the first rule and performing number replacement for a call requiring number replacement according to the second rule in practical applications, which is not limited in this application.
It can be understood that the final purpose of the network open function entity to provide the number replacement service for the first server based on the first rule and the second rule may be to hide the real number of the user, that is, to provide the privacy protection call function for the user, in the process that the application server provides the service (such as taxi taking service, take-away service, etc.) for the user.
According to the technical scheme provided by the embodiment of the application, according to the public elements or links (such as detecting calls needing number replacement, carrying out number replacement on calls needing number replacement and the like) of the privacy protection call function in different privacy protection modes, the network opening functional entity carries out atomic-level arrangement on the capability provided by the outside, so that the network opening functional entity externally provides atomic-level capability such as capability for setting a first rule and capability for setting a second rule, and the atomic-level capability is not influenced by a business process or a privacy protection mode and the like, for example, for any business process or privacy protection mode, the first server can set the first rule only by providing the first parameter information for the network opening functional entity and can set the second rule only by providing the second parameter information for the network opening functional entity, thereby meeting the different requirements of various industries well and improving the popularity of privacy protection call business. When a new business process or a new privacy protection mode occurs, the network opening functional entity can be free from modifying or adding interfaces, so that the new business experience can be well supported to be rapidly online, and the business cost is reduced.
In order to more clearly understand the above technical solution, two specific examples are given below.
Example 1 the above scheme is exemplified below in connection with privacy preserving mode AXB.
Referring to fig. 4, a flowchart of a privacy preserving call method based on an AXB mode is provided in an embodiment of the present application.
The method comprises the following steps:
s400: the first server receives a virtual number request of the second server, carries real user numbers A and B, and has a privacy mode of AXB;
s401: the first server invokes a third interface (i.e., getvirtual number) of the network open function entity: the first virtual number configuration request is sent to the network open function entity, and parameters carried in the request are shown in table 5:
TABLE 5
Figure BDA0003383580400000181
S402: the network opening functional entity obtains the virtual number X' which is the same as the home domain of the A number from the number pool according to the A number, returns a first virtual number configuration response to the first server, and relevant parameters carried in the response are shown in Table 6:
TABLE 6
Figure BDA0003383580400000182
S403: the first server invokes a first interface of the network open function entity (i.e., sessionmachset): and sending a first session matching setting request to the network opening functional entity, and receiving a first session matching setting response returned by the network opening functional entity to realize the session matching setting of A for the calling party and X' for the called party. The relevant parameters carried in the request and response are shown in table 7:
TABLE 7
Figure BDA0003383580400000191
S404: the first server invokes a second interface (i.e., callProcessSet) of the network open function entity: and sending a first call processing strategy setting request to the network opening functional entity, and receiving a first call processing strategy setting response returned by the network opening functional entity to realize the call processing strategy setting of A for a calling party and X' for a called party. The parameters carried in the response returned by the network open function entity and the request sent by the first server are shown in table 8:
TABLE 8
Figure BDA0003383580400000192
/>
Figure BDA0003383580400000201
S405: the first server invokes a first interface of the network open function entity (i.e., sessionmachset): and sending a second session matching request to the network opening functional entity, and receiving a second session matching response returned by the network opening functional entity to realize the session matching setting of B for the calling and X' for the called. The relevant parameters carried in the request and response are shown in table 9:
TABLE 9
Figure BDA0003383580400000202
S406: the first server invokes a second interface (i.e., callProcessSet) of the network open function entity: and sending a second call processing strategy setting request to the network opening functional entity, and receiving a second call processing strategy setting response returned by the network opening functional entity to realize the call processing strategy setting of the calling party B and the called party X'. The parameters carried in the response returned by the network open function entity and the request sent by the first server are shown in table 10:
Table 10
Figure BDA0003383580400000203
/>
Figure BDA0003383580400000211
S407: the first server sends a virtual number response message to the second server, carrying the number X'.
After the above-described method flow is completed, the terminal device having the number A, B can obtain the virtual number X 'and call the counterpart using the virtual number X'.
Example 2 the above scheme is exemplified below in connection with privacy preserving mode AX.
Let a be the business party and its virtual number X', the user with whom to make a call includes B, C, D.
Referring to fig. 5, a flowchart of a privacy preserving call method based on an AX mode is provided in an embodiment of the present application. The method comprises the following steps:
s500: the first server receives a virtual number request of the second server, carries a real number A, and users B, C and D in private conversation, and the privacy mode is an AX mode;
s501: the first server invokes a third interface (i.e., getvirtual number) of the network open function entity: sending a second virtual number configuration request to the network open function entity, wherein parameters carried in the request are shown in table 11:
TABLE 11
Figure BDA0003383580400000212
S502: the network opening function entity obtains the virtual number X' which is the same as the home domain of the A number from the number pool according to the A number, returns a second virtual number configuration response to the first server, and relevant parameters carried in the response are shown in table 12:
Table 12
Figure BDA0003383580400000213
S503: the first server invokes a first interface of the network open function entity (i.e., sessionmachset): and sending a third session matching setting request to the network opening functional entity, and receiving a third session matching setting response returned by the network opening functional entity to realize that A is a calling party and the number group B, C, D is a called session matching setting. The relevant parameters carried in the request and response are shown in table 13:
TABLE 13
Figure BDA0003383580400000221
S504: the first server invokes a second interface (i.e., callProcessSet) of the network open function entity: and sending a third call processing strategy setting request to the network opening functional entity, and receiving a third call processing strategy setting response returned by the network opening functional entity to realize the call processing strategy setting of A for a calling party and B/C/D for a called party. The parameters carried in the response returned by the network open function entity and the request sent by the first server are shown in table 14:
TABLE 14
Figure BDA0003383580400000222
/>
Figure BDA0003383580400000231
S505: the first server invokes a first interface of the network open function entity (i.e., sessionmachset): and sending a fourth session matching request to the network opening functional entity, and receiving a fourth session matching response returned by the network opening functional entity to realize the session matching setting of B or C or D for the calling party and X' for the called party. The relevant parameters carried in the request and response are shown in table 15:
TABLE 15
Figure BDA0003383580400000232
S506: the first server invokes a second interface (i.e., callProcessSet) of the network open function entity: and sending a fourth call processing strategy setting request to the network opening functional entity, and receiving a fourth call processing strategy setting response returned by the network opening functional entity to realize the call processing strategy setting of the calling party B and the called party X'. The parameters carried in the response returned by the network open function entity and the request sent by the first server are shown in table 16:
table 16
Figure BDA0003383580400000241
S507: the first server sends a virtual number response message to the second server, carrying the number X'.
As can be seen from comparing the above examples 1 and 2, in the interfaces given in the embodiments of the present application, the calling manner of the first server to the interface of the network open function entity is common for different privacy protection modes, except that the values of the parameters to be filled into the interfaces are different. Therefore, when aiming at different privacy protection call demands, the first server can quickly realize various customized privacy protection call demands of the industry only by modifying the parameter values filled in each interface.
For example, the following exemplifies two possible new scenarios:
Scene 1: and (5) protecting the privacy of the number of the taxi taking place. In the case of calling a car by a child, the old and the child are in an AX (BC) mode if the driver A is assumed to be B and C respectively, namely, the child and the old can reach the driver when calling X, and the driver contacts the child A when calling X.
In this scenario, the call flow of the first server to each interface may refer to example 1, and only the difference is that the number B in the relevant parameter related to each interface in example 1 needs to be replaced by B, C.
Scene 2: number privacy protection of designated number segments. Employee a has business to and from a company where all phones begin with a particular number segment, such as the number beginning with segment 8763, then a can be set to call all the numbers of that segment to change to X.
In this scenario, the call flow of the first server to each interface may refer to example 2, and only the difference is that the number group (B, C, D) in the relevant parameters related to each interface in example 2 needs to be replaced with the number group beginning with 8763.
Based on the same technical concept, referring to fig. 6, the embodiment of the present application further provides a privacy preserving call device, where the privacy preserving call device includes a transceiver module 601 and a processing module 602, and the transceiver module 601 and the processing module 602 cooperate to perform part or all of the operations performed by the network open function entity or the first server in the above method embodiment.
Illustratively, when the apparatus is applied to a network open function entity, the transceiver module 601 is configured to receive a first request message from a first server, where the first request message is used to set a first rule, and the first rule is used to detect a call requiring number replacement, and the first request message carries first parameter information; a processing module 602, configured to set a first rule according to the first parameter information; the transceiver module 601 is further configured to receive a second request message from the first server, where the second request message is used to set a second rule, where the second rule is used to replace an original calling number and/or an original called number corresponding to a call that needs to be subjected to number replacement, and the second request message carries second parameter information; the processing module 602 is further configured to set a second rule according to the second parameter information; the processing module 602 is further configured to provide a number replacement service for the first server based on the first rule and the second rule.
Illustratively, when the apparatus is applied to the first server, the transceiver module 601 is configured to send, to the network open function entity, a first request message for setting a first rule, where the first rule is used to detect a call requiring number replacement, and the first request message carries first parameter information; the transceiver module 601 is further configured to send a second request message for setting a second rule to the network open function entity, where the second rule is used to replace an original calling number and/or an original called number corresponding to a call that needs to be subjected to number replacement, and the second request message carries second parameter information.
The more detailed description of the transceiver module 601 and the processing module 602 may be directly obtained by referring to the related description in the above method embodiments, which is not repeated herein.
Based on the same technical concept, referring to fig. 7, an embodiment of the present application further provides a communication apparatus, including: at least one processor 701; and a memory 702 communicatively coupled to the at least one processor 701, a communication interface 703; wherein the memory 702 stores instructions executable by the at least one processor 701, and the at least one processor 701 causes the apparatus to perform, through the communication interface 703, part or all of the operations performed by the network open function entity or the first server, etc. in the above method embodiments by executing the instructions stored in the memory 702.
The specific connection medium between the processor 701, the memory 702, and the communication interface 703 is not limited in the embodiments of the present application. In the embodiment of the present application, the processor 701, the memory 702 and the communication interface 703 are connected by a bus 704 in fig. 7, where the bus is indicated by a thick line in fig. 7, and the connection manner between other components is only schematically illustrated, but not limited thereto. The buses may be classified as address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 7, but not only one bus or one type of bus.
It should be understood that the processors mentioned in the embodiments of the present application may be implemented by hardware or may be implemented by software. When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented in software, the processor may be a general purpose processor, implemented by reading software code stored in a memory.
By way of example, the processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should be understood that the memories mentioned in the embodiments of the present application may be volatile memories or nonvolatile memories, or may include both volatile and nonvolatile memories. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data rate Synchronous DRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), and Direct RAM (DR RAM).
It should be noted that when the processor is a general purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, the memory (storage module) may be integrated into the processor.
It should be noted that the memory described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
Based on the same technical concept, the embodiments of the present application also provide a computer readable storage medium including a program or instructions, which when executed on a computer, cause part or all of operations performed by a network open function entity or a first server or the like in the above-described method embodiments to be performed.
Based on the same technical concept, the embodiments of the present application further provide a chip, where the chip is coupled to the memory, and is configured to read and execute the program instructions stored in the memory, so that part or all of the operations performed by the network open functional entity or the first server in the embodiments of the method described above are performed.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (28)

1. A privacy preserving call method, comprising:
the network opening function entity receives a first request message from a first server, wherein the first request message is used for setting a first rule, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information;
the network opening function entity sets the first rule according to the first parameter information;
The network opening function entity receives a second request message from the first server, wherein the second request message is used for setting a second rule, the second rule is used for replacing an original calling number and/or an original called number corresponding to a call needing number replacement, and the second request message carries second parameter information;
the network opening function entity sets the second rule according to the second parameter information;
the network open function entity provides a number replacement service for the first server based on the first rule and the second rule.
2. The method of claim 1, wherein the first parameter information comprises one or more of:
a first indication information for indicating a timing of detecting a call requiring number replacement, the timing including an originating stage or a terminating stage of the call requiring number replacement;
the second indication information is used for indicating the matching mode of the calling number; the matching mode of the calling number comprises the following steps: matching a calling number corresponding to a call to be detected with one target calling number, wherein the original calling number is the one target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, and the original calling number is any one of the plurality of target calling numbers;
The third indication information is used for indicating the target calling number or the target calling numbers;
fourth indication information for indicating the matching mode of the called calling number; the matching mode of the called calling number comprises the following steps: the method comprises the steps that a called number corresponding to a call to be detected is matched with one target called number, the original called number is the target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
fifth indication information for indicating the one target called number or the plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
3. The method of claim 1, wherein the second parameter information comprises one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, configured to indicate a processing manner of the original calling number, where the processing manner of the original calling number includes: replacing the original calling number with a new calling number, or keeping the original calling number unchanged;
Tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of the original called number, where the processing manner of the original called number includes: replacing the original called number with a new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
4. A method according to any one of claims 1-3, wherein the method further comprises:
the network opening function entity receives a third request message from the first server, wherein the third request message is used for acquiring the virtual number and carries at least one user number;
and the network opening functional entity returns a third response message to the first server, wherein the third response message carries at least one virtual number.
5. The method of claim 4, wherein the third request message further carries:
thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
6. The method of any of claims 1-5, wherein the network opening function entity provides a number replacement service for the first server based on the first rule and the second rule, comprising:
The network opening functional entity detects a call needing number replacement according to the first rule;
and the network opening functional entity replaces the original calling number and/or the original called number corresponding to the call needing to be subjected to number replacement according to the second rule.
7. A privacy preserving call method, comprising:
the method comprises the steps that a first server sends a first request message for setting a first rule to a network opening functional entity, wherein the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information;
the first server sends a second request message for setting a second rule to the network opening functional entity, the second rule is used for replacing an original calling number and/or an original called number corresponding to a call needing number replacement, and the second request message carries second parameter information.
8. The method of claim 7, wherein the first parameter information comprises one or more of:
a first indication information for indicating a timing of detecting a call requiring number replacement, the timing including an originating stage or a terminating stage of the call requiring number replacement;
The second indication information is used for indicating a matching mode of the calling number, and the matching mode of the calling number comprises the following steps: matching a calling number corresponding to a call to be detected with one target calling number, wherein the original calling number is the one target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, and the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating the target calling number or the target calling numbers;
fourth indication information, which is used for indicating the matching mode of the called calling number, wherein the matching mode of the called calling number comprises: the method comprises the steps that a called number corresponding to a call to be detected is matched with one target called number, the original called number is the target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
fifth indication information for indicating the one target called number or the plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
9. The method of claim 7, wherein the second parameter information includes one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, configured to indicate a processing manner of the original calling number, where the processing manner of the original calling number includes: replacing the original calling number with a new calling number, or keeping the original calling number unchanged;
tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of the original called number, where the processing manner of the original called number includes: replacing the original called number with a new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
10. The method of any one of claims 7-9, wherein the method further comprises:
the first server sends a third request message for acquiring the virtual number to the network opening functional entity, wherein the third request message carries at least one user number;
And the first server receives a third response message returned by the network opening functional entity, wherein the third response message carries at least one virtual number.
11. The method of claim 10, wherein the third request message further carries:
thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
12. The method of claim 10, wherein the method further comprises:
the first server receives a fourth request message from the second server for requesting the virtual number, wherein the fourth request message is used for requesting the virtual number, and the fourth request message carries the at least one user number;
the first server sends the third request message to the network opening functional entity according to the fourth request message;
and after receiving the third response message, the first server returns a fourth response message to the second server, wherein the fourth response message carries the at least one virtual number.
13. The method of claim 12, wherein the fourth request message further carries a privacy preserving mode for indicating a number of the at least one user number that requires number translation;
The method further comprises the steps of:
the first server determines the first parameter information and the second parameter information according to the privacy protection mode, the at least one user number and the at least one virtual number.
14. A privacy preserving call device, comprising:
the receiving and transmitting module is used for receiving a first request message from a first server, wherein the first request message is used for setting a first rule, the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information;
the processing module is used for setting the first rule according to the first parameter information;
the transceiver module is further configured to receive a second request message from the first server, where the second request message is used to set a second rule, where the second rule is used to replace an original calling number and/or an original called number corresponding to a call that needs to be subjected to number replacement, and the second request message carries second parameter information;
the processing module is further configured to set the second rule according to the second parameter information;
the processing module is further configured to provide a number replacement service for the first server based on the first rule and the second rule.
15. The apparatus of claim 14, wherein the first parameter information comprises one or more of:
a first indication information for indicating a timing of detecting a call requiring number replacement, the timing including an originating stage or a terminating stage of the call requiring number replacement;
the second indication information is used for indicating the matching mode of the calling number; the matching mode of the calling number comprises the following steps: matching a calling number corresponding to a call to be detected with one target calling number, wherein the original calling number is the one target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, and the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating the target calling number or the target calling numbers;
fourth indication information for indicating the matching mode of the called calling number; the matching mode of the called calling number comprises the following steps: the method comprises the steps that a called number corresponding to a call to be detected is matched with one target called number, the original called number is the target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
Fifth indication information for indicating the one target called number or the plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
16. The apparatus of claim 14, wherein the second parameter information comprises one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, configured to indicate a processing manner of the original calling number, where the processing manner of the original calling number includes: replacing the original calling number with a new calling number, or keeping the original calling number unchanged;
tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of the original called number, where the processing manner of the original called number includes: replacing the original called number with a new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
17. The apparatus of any one of claims 14-16, wherein,
The receiving and transmitting module is further configured to receive a third request message from the first server, where the third request message is used to obtain a virtual number, and the third request message carries at least one user number; and returning a third response message to the first server, wherein the third response message carries at least one virtual number.
18. The apparatus of claim 17, wherein the third request message further carries:
thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
19. The apparatus according to any of claims 14-18, wherein the processing module, when providing a number replacement service for the first server based on the first rule and the second rule, is specifically configured to:
detecting a call requiring number replacement according to the first rule; and replacing the original calling number and/or the original called number corresponding to the call requiring number replacement according to the second rule.
20. A privacy preserving call device, comprising:
the receiving and transmitting module is used for sending a first request message for setting a first rule to the network opening functional entity, wherein the first rule is used for detecting a call needing number replacement, and the first request message carries first parameter information;
The transceiver module is further configured to send a second request message for setting a second rule to the network open function entity, where the second rule is used to replace an original calling number and/or an original called number corresponding to a call that needs to be subjected to number replacement, and the second request message carries second parameter information.
21. The apparatus of claim 20, wherein the first parameter information comprises one or more of:
a first indication information for indicating a timing of detecting a call requiring number replacement, the timing including an originating stage or a terminating stage of the call requiring number replacement;
the second indication information is used for indicating a matching mode of the calling number, and the matching mode of the calling number comprises the following steps: matching a calling number corresponding to a call to be detected with one target calling number, wherein the original calling number is the one target calling number, or matching the calling number corresponding to the call to be detected with a plurality of target calling numbers, and the original calling number is any one of the plurality of target calling numbers;
the third indication information is used for indicating the target calling number or the target calling numbers;
Fourth indication information, which is used for indicating the matching mode of the called calling number, wherein the matching mode of the called calling number comprises: the method comprises the steps that a called number corresponding to a call to be detected is matched with one target called number, the original called number is the target called number, or the called number corresponding to the call to be detected is matched with a plurality of target called numbers, and the original called number is any one of the target called numbers;
fifth indication information for indicating the one target called number or the plurality of target called numbers;
and sixth indication information for indicating the identification of the second rule.
22. The apparatus of claim 20, wherein the second parameter information comprises one or more of:
seventh indication information for indicating an identification of the second rule;
eighth indication information for indicating a waiting tone before a call;
ninth indication information, configured to indicate a processing manner of the original calling number, where the processing manner of the original calling number includes: replacing the original calling number with a new calling number, or keeping the original calling number unchanged;
Tenth indication information for indicating a new calling number for replacing the original calling number;
eleventh indication information, configured to indicate a processing manner of the original called number, where the processing manner of the original called number includes: replacing the original called number with a new called number, or keeping the original called number unchanged;
twelfth indication information for indicating a new called number for replacing the original called number.
23. The apparatus of any one of claims 20-22,
the transceiver module is further configured to send a third request message for obtaining a virtual number to the network open function entity, where the third request message carries at least one user number; and receiving a third response message returned by the network opening functional entity, wherein the third response message carries at least one virtual number.
24. The apparatus of claim 23, wherein the third request message further carries:
thirteenth indication information for indicating yes/no recording of the call after the call requiring number replacement is put through.
25. The apparatus of claim 23, wherein the device comprises,
The transceiver module is further configured to receive a fourth request message from the second server, where the fourth request message is used for requesting a virtual number, and the fourth request message carries the at least one user number; sending the third request message to the network opening function entity according to the fourth request message; and after receiving the third response message, returning a fourth response message to the second server, wherein the fourth response message carries the at least one virtual number.
26. The apparatus of claim 25, wherein the fourth request message further carries a privacy preserving mode for indicating a number of the at least one user number that requires number translation;
the apparatus further comprises:
and the processing module is used for determining the first parameter information and the second parameter information according to the privacy protection mode, the at least one user number and the at least one virtual number.
27. A communication device, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor, a communication interface;
Wherein the memory stores instructions executable by the at least one processor, which, by executing the instructions stored by the memory, cause the apparatus to perform the method of any of claims 1-6 or 7-13 via the communication interface.
28. A computer readable storage medium comprising a program or instructions which, when run on a computer, cause the method of any of claims 1-6 or 7-13 to be performed.
CN202111441479.9A 2021-11-30 2021-11-30 Privacy protection communication method and device Pending CN116208708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111441479.9A CN116208708A (en) 2021-11-30 2021-11-30 Privacy protection communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111441479.9A CN116208708A (en) 2021-11-30 2021-11-30 Privacy protection communication method and device

Publications (1)

Publication Number Publication Date
CN116208708A true CN116208708A (en) 2023-06-02

Family

ID=86506353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111441479.9A Pending CN116208708A (en) 2021-11-30 2021-11-30 Privacy protection communication method and device

Country Status (1)

Country Link
CN (1) CN116208708A (en)

Similar Documents

Publication Publication Date Title
CN103220323B (en) For the device of Service controll
US9119058B2 (en) Network servers, systems, and methods for multiple personas on a mobile device
US8462670B2 (en) Internet based communication system and method
AU2014370307B2 (en) Tunneling VoIP call control on cellular networks
JP6168572B2 (en) Online charging method, apparatus and system based on number portability service
EP3262816B1 (en) Realm translation in an ims network
CN101843081B (en) Accommodation of two independent telephony systems
US8423652B2 (en) Service templates for an IP multimedia subsystem
US9756494B2 (en) Method and system for providing a service at a current location
CN104768135A (en) Group communication
KR100938624B1 (en) Method and element for service control
CN110971583B (en) Communication method, device and system
CN116208708A (en) Privacy protection communication method and device
US20090296607A1 (en) Computer Telephony for Cellular Phones
CN112104616B (en) Communication method and device
CN109274820A (en) A kind of implementation method and equipment, communication system of urgent call
US11653334B2 (en) Systems and methods for reducing transcoding resource allocation during call setup to multiple terminations
CN112448938B (en) Call routing method, network communication node and system
CN112087547B (en) Call connection method, network side system and system
US20170272939A1 (en) Method, apparatus and computer program product for provisioning multiple user identities in an ip multimedia subsystem
EP4341921A1 (en) System and method for facilitating simultaneous communication with emergency services
CN115277944A (en) Privacy protection conversation method and corresponding device
CN115529375A (en) Interface display method and device and electronic equipment
CN116963001A (en) Calling method, system and P-CSCF network element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication