CN117014884A - Number using method and related equipment - Google Patents

Number using method and related equipment Download PDF

Info

Publication number
CN117014884A
CN117014884A CN202210483149.4A CN202210483149A CN117014884A CN 117014884 A CN117014884 A CN 117014884A CN 202210483149 A CN202210483149 A CN 202210483149A CN 117014884 A CN117014884 A CN 117014884A
Authority
CN
China
Prior art keywords
virtual number
terminal
virtual
terminal device
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210483149.4A
Other languages
Chinese (zh)
Inventor
李琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202210483149.4A priority Critical patent/CN117014884A/en
Publication of CN117014884A publication Critical patent/CN117014884A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/42Security arrangements using identity modules using virtual identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a number using method and a related device, wherein a terminal device can support a user to apply for a virtual number and correlate the virtual number with a real number, the user can register the virtual number to a third party, and when the third party calls the virtual number, the terminal device can display the virtual number, so that the user can know the initiator of the call. In addition, the terminal equipment can also support the user to call other terminal equipment by using the virtual number, and the called terminal equipment can display the virtual number instead of the real number, so that the real number can be effectively hidden, and the safety is improved.

Description

Number using method and related equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a number usage method and related devices.
Background
In social production and life, a user cannot avoid registering a telephone number in various places such as banks, property, malls, and the like. However, some institutions sell personal information such as telephone numbers registered by users to other institutions, for example, intermediaries, which use a telemarketing strategy to make a call to each user, so that the users are often disturbed by telephone nuisances of intermediaries such as loans and sales houses, which brings great trouble to the users and has poor user experience.
Disclosure of Invention
The embodiment of the application provides a number using method and related equipment, which can effectively avoid the leakage of telephone numbers and improve the safety.
In a first aspect, an embodiment of the present application provides a number usage method, which is applied to a first terminal, where the method includes:
the method comprises the steps that a first terminal detects operation of selecting a first virtual number by a user, calls a second terminal through the first virtual number, and establishes first communication connection with the second terminal; the first communication connection is a communication connection between a first number of the first terminal and a second number of the second terminal, and the first virtual number is associated with the first number.
By implementing the method provided in the first aspect, the terminal device can support the user to call other terminal devices by using the virtual number, so that the real number of the user (namely, the telephone number corresponding to the SIM card inserted into the terminal device) can be effectively hidden, and the security is improved.
In one possible implementation, the method further includes: the first virtual number is called by a second terminal, the first terminal and the second terminal establish a second communication connection, the second communication connection being a communication connection between the first number and the second number.
Thus, the virtual number of the terminal equipment can be called by other terminal equipment, and the leakage of the real number can be effectively avoided.
In one possible implementation, the method further includes: in the case that the first virtual number is called by the second terminal, the first terminal displays a first user interface, and the first user interface includes the second number and the first virtual number.
Thus, when the virtual number of the terminal device is called by other terminal devices, the terminal device can display the virtual number, so that the user who is the calling initiator can be known, and the channel of revealing the virtual number can be further known.
In one possible implementation, in case the first terminal calls the second terminal through the first virtual number, the first virtual number is used for display on the second terminal.
In this way, when the terminal device calls other terminal devices by using the virtual number, the virtual number can be displayed on other terminal devices instead of the real number of the terminal device, so that the real number can be effectively hidden, and the security is improved.
In one possible implementation, after the first terminal calls the second terminal through the first virtual number, the method further includes: the first terminal displays a second user interface, wherein the second user interface comprises a first call record, and the first call record comprises a first virtual number and a second number.
In this way, the user is facilitated to know which virtual number the call record was generated.
In one possible implementation, before the first terminal detects the operation of selecting the first virtual number by the user, the method further includes: the method comprises the steps that a first terminal detects operation of a user for applying for a virtual number, the first terminal sends a first request to a first server, the first request comprises the first number, the first request is used for indicating the first server to determine the first virtual number based on the first number, and the first virtual number is sent to the first terminal; the first terminal receives and stores the first virtual number sent by the first server.
Thus, the user can apply for the virtual number on the terminal device, and the virtual number can be used after the application is completed.
In one possible implementation manner, after the first terminal receives the first virtual number sent by the first server, the method further includes: the first terminal stores a first name, wherein the first name is a remark name of the first virtual number; or the first terminal stores the remark name of the second number as the first virtual number based on the first call record.
In this way, the terminal device can support virtual number addition of the remark name.
In one possible implementation, the first user interface further includes a first name.
Thus, in the called scene of the virtual number, the terminal device can display the remark name of the virtual number.
In one possible implementation manner, after the first terminal saves the first name, the method further includes: the first terminal displays a third user interface, wherein the third user interface comprises a first name and a first identifier, and the first identifier is used for indicating that the first virtual number is associated with the first number.
In this way, in the case that the user applies for completing the virtual number, the terminal device may display the remark name of the virtual number and the identification of the real number associated with the virtual number (for example, the identification of the SIM card), so that the user may conveniently learn with which real number the virtual number is associated and the remark name corresponding to the virtual number.
In one possible implementation manner, after the first terminal receives and stores the first virtual number sent by the first server, the method further includes: the first terminal detects the operation of modifying the state of the first virtual number from the first state to the second state by the user, and sends a second request to the first server, wherein the second request is used for indicating the first server to modify the first state to the second state; the first state is a state that the first virtual number allows the called party and allows the calling party, and the second state is any one of the following states: a state in which the called party is permitted but the calling party is not permitted, a state in which the calling party is permitted but the called party is not permitted, a suspended state, and a deactivated state.
In this way, the user can modify the state of the virtual number on the terminal device. For example, the user does not want the other terminal device to call the virtual number, and then the user may modify the state of the virtual number to a state in which the caller is permitted but the callee is not permitted.
In one possible implementation, the first virtual number is called by the second terminal, including: the first terminal receives a first message sent by the second server, wherein the first message comprises a first number and a second number.
In this way, the terminal device can ring based on the first message.
In one possible implementation, the first virtual number is called by the second terminal, including:
the first terminal sends a third request to the first server, wherein the third request comprises a first number and a second number, and the third request is used for indicating the first server to determine a first virtual number associated with the first number based on the first number and the second number; the first terminal receives a second message sent by the first server, wherein the second message comprises the first virtual number.
In this way, the terminal device may learn that the other terminal device is calling the virtual number, and further, the terminal device may display the virtual number so that the user learns the initiator of the call.
In one possible implementation, the first terminal calls the second terminal through the first virtual number, including: the first terminal sends a fourth request to the second server, wherein the fourth request comprises a first virtual number and a second number, the first virtual number is used for the second server to acquire a first number corresponding to the first virtual number, and a first communication connection is established through the first number and the second number.
In this way, the terminal device may instruct the second server to acquire the first number corresponding to the first virtual number and further establish the first communication connection through the first number and the second number in the case of calling other terminal devices with the first virtual number.
In one possible implementation, the first number is a phone number corresponding to a first SIM card inserted into the first terminal, and the second number is a phone number corresponding to a second SIM card inserted into the second terminal.
In the first aspect described above, the first terminal may be the terminal device 100, the second terminal may be the terminal device 200, the operation of selecting the first virtual number (e.g., virtual number 1) by the user may be the operation shown in fig. 14B, the first communication connection and the second communication connection may be the communication connection established between the first terminal and the second terminal after the call link is completed through the first number and the second number, the first number may be a phone number corresponding to the first SIM card (e.g., SIM card 1) inserted into the first terminal, the second number may be a phone number corresponding to the second SIM card (e.g., SIM card 1) inserted into the second terminal, the first user interface may be the user interface shown in fig. 12E, the second user interface may be the user interface shown in fig. 14F, the first call record may be call record 1421 shown in fig. 14F, the first request may be a request for applying for a virtual number shown in fig. 4, the first name may be a remark name of the virtual number (for example, XX office), the third user interface may be a user interface shown in fig. 6H, the first identifier may be identifier 681a, the second request may be a request for modifying the current state of the virtual number or disabling the virtual number, the first message may be ringing message 1 shown in fig. 11, the third request may be a request for inquiring about the latest call record of real number 2 shown in fig. 11, the second message may be inquiry result 1' shown in fig. 11, and the fourth request may be call request 2 shown in fig. 13.
In a second aspect, an embodiment of the present application provides a number usage method, which is applied to a second server, where the method includes:
the second server receives a first request sent by the calling terminal, wherein the first request comprises a first virtual number and a second number, the first virtual number is associated with the first number, the first number is a telephone number corresponding to a first SIM card inserted into the calling terminal, and the second number is a telephone number corresponding to a second SIM card inserted into the called terminal; the second server obtains a first number from the first server based on the first virtual number; the second server sends a first message to the called terminal based on the first number and the second number, the first message being used to instruct the called terminal to ring and to display the first virtual number.
In one possible implementation, before the second server sends the second message to the called terminal, the method further includes: the second server determines that the charge generated by the calling terminal for initiating the call by using the first virtual number is calculated according to the charge generated by initiating the call by using the first virtual number.
In the above second aspect, the first request may be a call request (e.g., call request 1 shown in fig. 11 or call request 2 shown in fig. 13), and the first message may be a ringing message (e.g., ringing message 1 shown in fig. 11 or ringing message 2 shown in fig. 13).
In a third aspect, an embodiment of the present application provides a number usage method, applied to a first server, where the method includes:
the first server receives a first request sent by a first terminal, wherein the first request comprises a first number which is a telephone number corresponding to a first SIM card inserted into the first terminal; the method comprises the steps that a first server obtains a first virtual number, stores the association relation between the first virtual number and the first number, and stores the state of the first virtual number as a first state, wherein the first state is a state allowing a called party and allowing a calling party; the first server sends the first virtual number to the first terminal.
In one possible implementation, after the first server sends the first virtual number to the first terminal, the method further includes: under the condition that the first virtual number is called by the second terminal, the first server receives a second request sent by the second server, wherein the second request comprises the first virtual number; the first server determines that the first virtual number is associated with the first number based on the first virtual number, determines that the first virtual number allows the called party, and stores a first call record, wherein the first call record is a record of the first virtual number called by the second terminal; the first server sends a first message to the second server, wherein the first message comprises a first number.
In one possible implementation, after the first server sends the first virtual number to the first terminal, the method further includes: the first server receives a third request sent by the first terminal, wherein the third request comprises the first number and a second number of the second terminal; the first server determines that the second terminal calls a first virtual number associated with the first number last time based on the first number, the second number and the first call record; the first server sends a second message to the first terminal, wherein the second message comprises the first virtual number.
In one possible implementation, after the first server sends the first virtual number to the first terminal, the method further includes: when the second terminal is called by the first terminal by using the first virtual number, the first server receives a fourth request sent by the second server, wherein the fourth request comprises the first virtual number; the first server determines that the first virtual number is associated with the first number based on the first virtual number, and determines that the first virtual number allows the calling party; the first server sends a third message to the second server, wherein the third message comprises the first number.
In one possible implementation, after the first server sends the first virtual number to the first terminal, the method further includes: the first server receives a fifth request sent by the first terminal; the first server modifies the first state into a second state based on the fifth request, and saves the second state, wherein the second state is any one of the following: a state in which the called party is permitted but the calling party is not permitted, a state in which the calling party is permitted but the called party is not permitted, a suspended state, and a deactivated state.
In the above third aspect, the first terminal may be the terminal device 100, the second terminal may be the terminal device 200, the first request may be a request for a user to apply for a virtual number, the second request may be a request for inquiring a real number associated with the virtual number, the first message may be an inquiry result 1 shown in fig. 11, the first call record may be a call record 1 shown in fig. 11, the third request may be a request for inquiring a latest call record of the real number 2 shown in fig. 11, the second message may be an inquiry result 1' shown in fig. 11, the fourth request may be a request for inquiring a real number associated with the virtual number 1 shown in fig. 13, the third message may be an inquiry result 2 shown in fig. 13, and the fifth request may be a request for modifying a current state of the virtual number or a request for disabling the virtual number.
In a fourth aspect, embodiments of the present application provide an electronic device comprising one or more processors and one or more memories; wherein the one or more memories are coupled to the one or more processors, the one or more memories being operable to store computer program code comprising computer instructions that, when executed by the one or more processors, cause the electronic device to perform the method of any of the possible implementations of the first or second or third aspects described above.
In a fifth aspect, embodiments of the present application provide a computer storage medium storing a computer program comprising program instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of the possible implementations of the first, second or third aspects described above.
In a sixth aspect, embodiments of the present application provide a computer program product which, when run on a computer, causes the computer to perform the method as described in any one of the possible implementations of the first or second or third aspects.
Drawings
FIGS. 1A-1D are diagrams of user interfaces involved in a set of user-set blacklists provided by an embodiment of the present application;
FIGS. 2A-2B are diagrams of user interfaces involved in a set of user-set interception rules provided by an embodiment of the present application;
fig. 3 is a schematic architecture diagram of a communication system according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a specific number usage method in a virtual number application process according to an embodiment of the present application;
fig. 5A to 5E are schematic views of a user interface involved in a process of opening a virtual number function on a terminal device 100 by a group of users according to an embodiment of the present application;
Fig. 6A-6I are schematic views of a user interface involved in a process of applying for a virtual number on a terminal device 100 by a group of users according to an embodiment of the present application;
fig. 7 is a schematic diagram of a specific flow of a number usage method in a virtual number disabling process according to an embodiment of the present application;
fig. 8A-8E are schematic views of a user interface involved in a process of virtual number deactivation performed on a terminal device 100 by a group of users according to an embodiment of the present application;
fig. 9 is a schematic diagram of a specific flow of a number usage method in a virtual number status management process according to an embodiment of the present application;
fig. 10A-10B are schematic views of a user interface involved in a process of performing virtual number status management on a terminal device 100 by a group of users according to an embodiment of the present application;
fig. 10C is a schematic diagram of a user interface involved in a process of performing real number status management on the terminal device 100 by a user according to an embodiment of the present application;
fig. 11 is a schematic diagram of a specific flow of a number usage method in a virtual number called process according to an embodiment of the present application;
fig. 12A to 12E are schematic views of user interfaces involved in a process of calling a virtual number of a terminal device 100 by a group of users using a real number of the terminal device 200 according to an embodiment of the present application;
Fig. 13 is a schematic diagram of a specific flow of a number usage method in a process of calling a real number by a virtual number according to an embodiment of the present application;
fig. 14A to 14F are diagrams of user interfaces involved in a process of calling a real number of a terminal device 200 by a group of users using a virtual number of the terminal device 100 according to an embodiment of the present application;
fig. 15 is a schematic flowchart of a specific number usage method in a process of calling another virtual number by a virtual number according to an embodiment of the present application;
fig. 16A to 16E are diagrams illustrating user interfaces involved in a process of calling a virtual number of a terminal device 200 by a group of users using the virtual number of the terminal device 100 according to an embodiment of the present application;
fig. 17 is a schematic software structure of a terminal device according to an embodiment of the present application;
fig. 18 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Wherein, in the description of the embodiments of the present application, unless otherwise indicated, "/" means or, for example, a/B may represent a or B; the text "and/or" is merely an association relation describing the associated object, and indicates that three relations may exist, for example, a and/or B may indicate: the three cases where a exists alone, a and B exist together, and B exists alone, and furthermore, in the description of the embodiments of the present application, "plural" means two or more than two.
It should be understood that the terms first, second, and the like in the description and in the claims and drawings are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the described embodiments of the application may be combined with other embodiments.
The term "User Interface (UI)" in the following embodiments of the present application is a media interface for interaction and information exchange between an application program or an operating system and a user, which enables conversion between an internal form of information and a form acceptable to the user. The user interface is a source code written in a specific computer language such as java, extensible markup language (extensible markup language, XML) and the like, and the interface source code is analyzed and rendered on the electronic equipment to finally be presented as content which can be identified by a user. A commonly used presentation form of the user interface is a graphical user interface (graphic user interface, GUI), which refers to a user interface related to computer operations that is displayed in a graphical manner. It may be a visual interface element of text, icons, buttons, menus, tabs, text boxes, dialog boxes, status bars, navigation bars, widgets, etc., displayed in a display of the electronic device.
In social production and life, a user cannot avoid registering a telephone number in various places such as banks, property, malls, and the like. However, some institutions sell personal information such as telephone numbers registered by users to other institutions, for example, intermediaries, which use a telemarketing strategy to call each user, so that the users are often disturbed by telephone calls of intermediaries such as loans and sales houses, which brings great trouble to the users and has poor user experience.
In order to solve the above problems, there are two methods currently generally employed:
the method comprises the following steps: setting a blacklist
For example, referring to fig. 1A-1B, taking the example that the terminal device 100 is a mobile phone, if the user of the terminal device 100 does not want to receive a call to a certain phone number (for example, the phone number "199xxxx6246" of the intermediary) after receiving the call to the certain phone number, the terminal device 100 may detect an operation (for example, a clicking operation) of the user with respect to "more options" shown in fig. 1A, in response to the operation, the terminal device 100 may display a pop window shown in fig. 1B, which may include a "add blacklist" option, and the terminal device 100 may detect an operation (for example, a clicking operation) of the user with respect to the "add blacklist" option, in response to the operation, the terminal device 100 may add the phone number to the blacklist, and the phone number may not be dialed to the phone number of the terminal device 100 any more.
1C-1D, if the user of the terminal device 100 wants to remove the blacklisted phone number, the terminal device 100 may detect an operation (e.g., a clicking operation) of the user with respect to the "more options" shown in FIG. 1C, and in response to the operation, the terminal device 100 may display a pop-up window shown in FIG. 1D, which may include the "remove from blacklist" option, and the terminal device 100 may detect an operation (e.g., a clicking operation) of the user with respect to the "remove from blacklist" option, in response to which the terminal device 100 may remove the phone number from blacklist, and may subsequently initiate a call to the phone number of the terminal device 100.
The second method is as follows: setting interception rules
Currently, a mobile phone can identify the type of an incoming call number (such as a harassment call, a fraud call, an advertisement promotion call, a house property agency call) by using an intelligent identification library provided by a mobile phone manufacturer, and a user can set an interception rule to intercept an incoming call of a corresponding type.
Illustratively, referring to fig. 2A, taking the example that the terminal device 100 is a mobile phone, the terminal device 100 may detect an operation (e.g., a click operation) of the user for the "phone interception rule" option, and in response to the operation, the terminal device 100 may display the user interface shown in fig. 2B. For example, if the user wants to intercept the advertisement promotion, the "intercept advertisement promotion" option in the user interface may be placed in an on (e) state, such that the user turns on the intercept advertisement promotion function. In this case, if a certain caller number is recognized by the terminal device 100 as an advertisement promotion call, the caller number is intercepted when calling the telephone number of the terminal device 100, and cannot be connected, so that harassment can be isolated.
It can be seen that both the above methods are implemented by using basic functions provided by handset manufacturers, and both the methods have respective disadvantages.
For one of the above methods, if the intermediary structure uses different telephone numbers to make a call to the user, the user cannot be effectively prevented from being disturbed by setting the blacklist.
For the second method, if the user turns on the function of intercepting the advertisement sales call, all the calls identified as the advertisement sales call are intercepted, however, some advertisement sales calls may be required by the user, in which case, a phenomenon of interception may occur, which is easy to bring inconvenience to the user.
In addition, the two methods have a common disadvantage that the user cannot know what channel the own telephone number is leaked through or by which business, and thus doubt and security risks are easily brought to the user.
In order to solve the above problems, an embodiment of the present application provides a number usage method, where a terminal device may support a user to apply for a virtual number and associate the virtual number with a real number, and the user may register the virtual number to a third party, and when the third party calls the virtual number, the terminal device may display the virtual number, so that the user may learn about an initiator of the call. In addition, the terminal equipment can also support the user to call other terminal equipment by using the virtual number, and the called terminal equipment can display the virtual number instead of the real number, so that the real number can be effectively hidden, and the safety is improved.
The number using method provided by the embodiment of the application is mainly applied to the following three scenes:
1. virtual number management scenario
In this scenario, three embodiments are mainly included: virtual number application, virtual number deactivation, virtual number status management (e.g., management of status of suspended, stopped caller, stopped callee, etc.).
2. Virtual number called scene
In this scenario, assuming that the terminal apparatus 100 is a called terminal and the terminal apparatus 200 is a calling terminal, when the terminal apparatus 200 calls a virtual number of the terminal apparatus 100, the terminal apparatus 100 may display the virtual number.
3. Virtual number calling scenario
In this scenario, assuming that the terminal apparatus 100 is a calling terminal and the terminal apparatus 200 is a called terminal, when the terminal apparatus 100 calls the terminal apparatus 200 using the virtual number of the terminal apparatus 100, the terminal apparatus 200 may display the virtual number.
The detailed implementation process of the number usage method in the three scenarios will be described in the following embodiments, and will not be expanded here.
Next, a communication system provided by an embodiment of the present application will be first described.
Fig. 3 illustrates a communication system provided by an embodiment of the present application.
As shown in fig. 3, the communication system may include: terminal equipment, mobile switching center (Mobile Switching Center, MSC), gateway office (GatewayMobile Switching Center, GMSC), number center. Wherein:
The terminal device (e.g., terminal device 100, terminal device 200) may be an intelligent electronic device, such as a mobile phone, a watch, or the like, in which one or more subscriber identity cards (Subscriber Identity Module, SIM) are installed and the phone number corresponding to the SIM card is in a normal networking state for the operator.
In the embodiment of the present application, taking the example that the terminal device 100 and the terminal device 200 are mobile phones, the terminal device 100 and the terminal device 200 can be used to turn on/off the virtual number function, request a virtual number application, virtual number deactivation, virtual number status management, etc. from the number center. The two terminal devices can answer or dial a call through a virtual number (i.e. a telephone number manually set by a user through a virtual number function) or a real number (i.e. a telephone number corresponding to the SIM card).
Mobile switching centers (e.g., mobile switching center 300, mobile switching center 400), which may also be referred to as end offices, are the core of the overall global system for mobile communications (Global System for Mobile communications, GSM) network, and are devices that provide call transfer services and call control between telephone and data systems, control the traffic of all base station controllers (Base Station Controller, BSC), provide switching functions and connectivity to other functions within the system; it can also be used for data interaction with databases in the system, such as home location register (Home Location Register, HLR), visitor location register (Visitor Location Register, VLR), etc.; and can also be used to control the establishment, monitoring, release of user calls, such as initiating a call, receiving a call, ending a call, etc.; the method can also be used for carrying out call charging; etc.
In the embodiment of the application, the mobile switching center can also be used for carrying out data interaction with the number center, for example, when a user uses the virtual number to carry out call service, the mobile switching center can inquire the number center of the real number associated with the virtual number.
The gateway office, which may also be called a gateway mobile switching center, may be configured to query the HLR for current location information of the called terminal device, and select, according to the location information, to which called MSC to route the call message; and can also be used to transfer answer messages between the called MSC and the calling MSC; etc.
In embodiments of the present application, the gateway may be two devices independent of a mobile switching center (e.g., mobile switching center 300 or mobile switching center 400); in some examples, the gateway may also be integrated with a mobile switching center (e.g., mobile switching center 300 or mobile switching center 400) as the same device; in other examples, mobile switching center 300, mobile switching center 400 may be integrated into the same device; in other examples, mobile switching center 300, mobile switching center 400, and gateway may be integrated into the same device; the embodiment of the present application is not limited thereto.
The number center can be used for distributing virtual numbers to the terminal equipment and recording the association relationship between the virtual numbers and the real numbers; the method can also be used for recording the life cycle state of the virtual number; the method can also be used for carrying out data interaction with terminal equipment and a mobile switching center; etc.
In embodiments of the present application, the number center and the operator devices (e.g., mobile switching center 300, mobile switching center 400) may be separate devices, and any operator device that complies with standard development may interact with the number center.
In the embodiment of the present application, the terminal device 100 may be referred to as a first terminal, the terminal device 200 may be referred to as a second terminal, and the mobile switching center 300, the mobile switching center 400, the gateway, and the number center may be referred to as servers, where the number center may be referred to as a first server, and the mobile switching center 300, the mobile switching center 400, and the gateway may be collectively referred to as a second server.
It should be understood that fig. 3 is only a schematic architecture diagram of the communication system and should not be construed as limiting the present application. The embodiment of the application does not limit the number of the terminal equipment, the mobile switching center, the gateway and the number center included in the mobile communication system.
1. Virtual number management scenario:
example (1): virtual number application
The specific implementation process of the number using method provided by the embodiment of the application in the virtual number application process is described below.
Fig. 4 illustrates a specific flow of the number usage method provided by the embodiment of the present application in the virtual number application process.
As shown in fig. 4, the method may be applied to a communication system including a terminal device 100 and a number center, wherein the terminal device 100 may establish a communication connection with the number center, and the specific steps of the method are described in detail below:
S401-S402, the terminal device 100 detects an operation of applying for a virtual number by the user, and in response to the operation, the terminal device 100 transmits a request for applying for a virtual number to the number center, the request including the real number (i.e., real number 1) of the terminal device 100.
The specific procedure of the user to turn on the virtual number function on the terminal device 100 will be described first.
Fig. 5A-5E illustrate a series of user interfaces involved in a process in which a user turns on a virtual number function on the terminal device 100.
Referring to fig. 5A, user interface 510 is one of the "phone" applications on terminal device 100, and option 511 may be included in user interface 510. The terminal device 100 may detect an operation (e.g., a click operation) of the option 511 by the user, and in response to the operation, the terminal device 100 may display a pop-up window 520 exemplarily shown in fig. 5B.
Referring to fig. 5B, one or more options (e.g., a "talk recording" option, a "bulk delete" option, a "harassment intercept" option, a "set" option, etc.) may be included in the pop 520. The terminal device 100 may detect an operation (e.g., a click operation) of the user for the "set" option, and in response to the operation, the terminal device 100 may display a user interface 530 exemplarily shown in fig. 5C.
Referring to fig. 5C, one or more options (e.g., a "virtual number set" option, etc.) may be included in the user interface 530. The terminal device 100 may detect an operation (e.g., a click operation) of the user for the "virtual number setting" option, and in response to the operation, the terminal device 100 may display a user interface 540 exemplarily shown in fig. 5D.
Referring to fig. 5D, one or more options (e.g., a "virtual number function" switch option, a "virtual number application" option, a "virtual number management" option, etc.) may be included in the user interface 540. As can be seen from fig. 5D, the "virtual number function" switching option is in an off state, that is, the terminal device 100 has not turned on the virtual number function yet. In addition, the option of "virtual number application" and the option of "virtual number management" are also grayed out, and cannot support user operation. The terminal device 100 may detect an operation (e.g., a click operation) of the user on the "virtual number function" switch option, and in response to the operation, as shown in fig. 5E, the terminal device 100 may turn on the virtual number function.
Referring to fig. 5E, it can be seen that the "virtual number function" switch option is in the on state, that is, the terminal device 100 turns on the virtual number function. In addition, the "virtual number application" option and the "virtual number management" option are not grayed out any more, and user operations (e.g., applying for virtual numbers, managing virtual numbers) can be supported.
It should be noted that, the opening entry and the opening procedure of the virtual number function shown in fig. 5A to 5E are merely exemplary, and the opening entry of the virtual number function may be integrated in other application programs (such as a "setup" application program) of the terminal device 100, and similarly, the process of opening the virtual number function may also be in other forms, which are not limited in the embodiment of the present application.
The following describes a specific procedure for applying a virtual number to the terminal device 100 by the user.
Fig. 6A-6I illustrate a series of user interfaces involved in the process of a user making a virtual number application on the terminal device 100.
After the user opens the virtual number function on the terminal device 100, a virtual number application can be performed.
With continued reference to fig. 5E, the terminal device 100 may detect an operation (e.g., a click operation) of the user for the "virtual number application" option, in response to which the terminal device 100 may display the user interface 610 exemplarily shown in fig. 6A.
Referring to fig. 6A, an option 611 may be included in the user interface 610 that may be used to support a user applying for a virtual number.
The terminal device 100 may detect an operation of applying for the virtual number by the user (e.g., a click operation of the user on the option 611), and in response to this operation, the terminal device 100 may send a request for applying for the virtual number to the number center, where the request may include the real number of the terminal device 100 (i.e., the real number 1), where the real number of the terminal device 100 may be a phone number corresponding to the SIM card of the terminal device 100.
S403-S404, the number center acquires the virtual number 1 and stores the association relation between the virtual number 1 and the real number 1. After that, the number center transmits the virtual number 1 to the terminal device 100.
Specifically, since the number center may maintain a resource pool of all virtual numbers to be allocated, after receiving a request for applying for a virtual number sent by the terminal device 100, the number center may randomly allocate, lock and acquire any one virtual number to be allocated for the terminal device 100 in the resource pool based on the real number and the application time of the terminal device 100.
The setting rule of the virtual number can be preset by the number center and needs to be distinguished from the real number.
In the embodiment of the present application, it is assumed that the number of digits of the virtual number is 11 digits, beginning with the digit 2, followed by ten digits, such as 2 xxxxxx xxx.
Further, after the number center assigns a virtual number to the terminal device 100, the association relationship between the virtual number (i.e., virtual number 1) and the real number (i.e., real number 1) of the terminal device 100 may be stored.
Assuming that virtual number 1 is 2111xxxx 1111 and real number 1 is 186xxxx 3516, table 1 below exemplarily shows the association between virtual number 1 and real number 1 stored in the number center.
Wherein, the "status" in table 1 is marked as "normal", and may indicate that: the terminal device 100 may call other terminal devices using the virtual number, i.e. the virtual number may support a virtual number calling scenario; other terminal devices may also call terminal device 100 by dialing the virtual number, i.e., the virtual number may support a virtual number called scenario.
TABLE 1
Further, after the number center assigns a virtual number to the terminal device 100, the virtual number may also be sent to the terminal device 100, so that the terminal device 100 may save the virtual number.
S405, the terminal device 100 stores the virtual number 1.
Illustratively, after receiving virtual number 1 sent by the number center, the terminal device 100 may display a user interface 620 shown in fig. 6B, where the user interface 620 may include an option 621, where the option 621 may be used to support the user to save the virtual number. The user interface 620 may also have displayed therein virtual numbers: 2111xxxx 1111 (i.e. virtual number 1) so that the user can be informed of what virtual number the number center allocates for the terminal device 100.
Further, referring to fig. 6B, the terminal device 100 may detect an operation (e.g., a click operation) of the user with respect to the option 621, and in response to the operation, the terminal device 100 may display an edit option 631 in the user interface shown in fig. 6C, which may be used to support the user to edit the remark name of the virtual number 1, where the remark name may be the name where the user retains the virtual number 1 (i.e., the number retaining party). Assuming that the user has left virtual number 1 at XX office, the user may input "XX office" at edit option 631, and after completion of the input, terminal device 100 may display a user interface exemplarily shown in fig. 6D in which the remark name of virtual number 1 that the user has edited may be displayed: XX office. An option 641 for enabling the user to save virtual number 1 and the remark name of virtual number 1 (i.e., the name of the number retainer associated with virtual number 1) may also be included in the user interface.
Further, referring to fig. 6D, the terminal device 100 may detect an operation (e.g., a click operation) of the user with respect to the option 641, in response to which the terminal device 100 may save the virtual number 1 and the remark name of the virtual number 1, and display the user interface 650 exemplarily shown in fig. 6E.
Referring to fig. 6E, options 651, 652 may be included in user interface 650.
The option 651 may be used to support the user to view the applied virtual number and the remark name of the virtual number, and may also be used to support the user to click on the option to modify the remark name of the virtual number and save again through the user interface shown in fig. 6D.
Option 652 may be used to support the user applying for more virtual numbers for terminal device 100, among other things. In this way, the terminal device 100 may support the user to apply for a plurality of virtual numbers, that is, one real number of the terminal device 100 may be associated with a plurality of virtual numbers.
If the user also wants to apply for more virtual numbers after applying for virtual number 1, the terminal device 100 may detect an operation (e.g., a click operation) of the user with respect to the option 652 shown in fig. 6E, in response to which the terminal device 100 may continue to send a request to the number center for applying for a virtual number. The subsequent process is similar to the process of applying for virtual number 1, and reference may be made to fig. 6B-6D and related content in the embodiment shown in fig. 4, which is not repeated here.
Assuming that after the user applies for the virtual number 1, the virtual number applied again is 2111xxxx 1112, and the remark name of the virtual number is XX supermarket, the terminal device 100 may display an option 661 in the user interface exemplarily shown in fig. 6F, where the option 661 may be used to support the user to view the applied virtual number and the remark name of the virtual number, and may also support the user to click on the option to modify and save the remark name of the virtual number again.
It is easy to understand that the virtual number applied by the user for the terminal device 100 and the association relationship between the virtual number and the real number may be stored in the number center. Assume that the user has applied for two virtual numbers for the real number 1 of the terminal device 100: 2111xxxx 1111, 2111xxxx 1112, and real number 1 is 186xxxx 3516, then the association between the virtual number and the real number stored in the number center may be the association exemplarily shown in table 2 below.
TABLE 2
In some examples, the terminal device 100 may also store the association of the real number with the virtual number.
It should be noted that, when only one SIM card is installed on the terminal device 100, the user may default that the real number of the terminal device 100 is the phone number corresponding to the SIM card when applying for the virtual number for the terminal device 100, that is, the virtual number applied by the user is associated with the phone number corresponding to the SIM card, however, when a plurality of SIM cards are installed on the terminal device 100, for example, when two SIM cards are installed on the terminal device 100, the user may be prompted by the terminal device 100 to select which phone number corresponding to which SIM applies for the virtual number when applying for the virtual number for the terminal device 100.
Illustratively, referring to fig. 6G, after detecting an operation of applying for a virtual number by the user (e.g., the user clicks on the option 611 shown in fig. 6A, or the user clicks on the option 652 shown in fig. 6E), the terminal device 100 may display a pop-up window 670 shown in fig. 6G, which may include therein options (e.g., the option 671, the option 672) of a phone number corresponding to a SIM card (e.g., the phone number 186xxxx 3516 corresponding to SIM card 1, the phone number 87xxxx 3516 corresponding to SIM card 2) installed on the terminal device 100. It is easy to understand that if the user wants to apply for a virtual number for the phone number 186xxxx 3516 corresponding to the SIM card 1, the option 671 may be clicked, and then the terminal device 100 may apply for a virtual number for the phone number 186xxxx 3516 corresponding to the SIM card 1 in the center of the number. The subsequent process is similar to the process of applying for the virtual number, and will not be described in detail herein.
After the user has applied for completing a virtual number for each of SIM card 1 and SIM card 2, terminal apparatus 100 may display user interface 680 shown in fig. 6H, which may include options 681 and 682. Wherein, option 681 is an option corresponding to virtual number 2111xxxx 1111, and option 682 is an option corresponding to virtual number 2111xxxx 1114. It can be seen that at option 681, an identifier 681a is displayed, and that identifier 681a may be used to indicate that the SIM card corresponding to the real number associated with virtual number 2111xxxx 1111 is SIM card 1, and at option 682, an identifier 682a is displayed, and that identifier 682a may be used to indicate that the SIM card corresponding to the real number associated with virtual number 2111xxxx 1114 is SIM card 2. Thus, the user can conveniently know which phone number corresponding to which SIM card is respectively associated with each virtual number.
In the foregoing fig. 6D, the remark name of the virtual number is manually input by the user, in other examples, when the user applies to complete the virtual number, after the virtual number is called by another terminal device, the terminal device 100 may automatically associate the virtual number with the phone number of the terminal device and automatically add the virtual number to the remark name of the virtual number, in other examples, the remark name of the virtual number may also automatically identify the attribution person or the attribution unit of the phone number through the terminal device 100 according to yellow page information on the network, and add the attribution person or the attribution unit of the phone number.
For example, referring to fig. 6I, assuming that the virtual number 2111xxxx 1111 of the terminal device 100 is called by another terminal device through the telephone number 180xxxx0001, the terminal device 100 may automatically associate the virtual number 2111xxxx 1111 with the telephone number 180xxxx0001, automatically add the virtual number 2111xxxx 1111 to the remark name, and display the same in the user interface 690 shown in fig. 6I.
Example (2): virtual number deactivation
The specific implementation process of the number using method provided by the embodiment of the application in the virtual number disabling process is described below.
It is easy to understand that the virtual number deactivation process is performed after the completion of the virtual number application process in the foregoing embodiment (1).
Fig. 7 illustrates a specific flow of the number usage method provided in the embodiment of the present application in the virtual number disabling process.
As shown in fig. 7, the method may be applied to a communication system including a terminal device 100 and a number center, wherein the terminal device 100 may establish a communication connection with the number center, and the specific steps of the method are described in detail below:
S701-S702, the terminal device 100 detects an operation of disabling the virtual number 1 by the user, and in response to the operation, the terminal device 100 transmits a request for disabling the virtual number 1 to the number center, the request including the real number 1 and the virtual number 1.
Fig. 8A-8E illustrate a series of user interfaces involved in the process of virtual number deactivation by a user on terminal device 100.
Taking the example of disabling virtual number 1 (e.g., 2111xxxx 1111), the terminal device 100 may illustratively detect a user operation (e.g., a click operation) for the "virtual number management" option in the user interface shown in fig. 5E, in response to which the terminal device 100 may display the user interface 810 illustratively shown in fig. 8A.
Referring to fig. 8A, options corresponding to one or more virtual numbers that the user has applied for, e.g., option 811, may be included in the user interface 810. As can be seen, option 811 is the option corresponding to virtual number 2111xxxx 1111, with the remark name: XX office.
Optionally, an identifier 811a of the SIM card may also be displayed at option 811, where identifier 811a may be used to indicate the SIM card (e.g., SIM card 1) corresponding to the real number associated with the virtual number, so that the user may be facilitated to know with which phone number the virtual number corresponds to.
With continued reference to fig. 8A, the terminal device 100 may detect an operation (e.g., a click operation) by the user on the option 811, in response to which the terminal device 100 may display a user interface 820 exemplarily shown in fig. 8B.
Referring to fig. 8B, options 821, 822 may be included in user interface 820; a virtual number (e.g., 2111xxxx 1111) and a remark name (e.g., XX office) for the virtual number may also be included.
Wherein, option 821 may be used to support the user to re-edit the remark name of the virtual number, that is, after the user clicks option 821, the user may re-edit the remark name of the current virtual number, for example, modify the name "XX office of sale" of the current virtual number to another name.
Options 822 may be used to support more settings for the virtual number by the user, such as disabling, managing the status of the virtual number, etc.
With continued reference to fig. 8B, the terminal device 100 may detect a user operation (e.g., a click operation) with respect to the option 822, in response to which the terminal device 100 may display a pop-up window 830 as exemplarily shown in fig. 8C.
Referring to fig. 8C, the pop-up window 830 may include an option 831 and an option 832.
Wherein, option 831 can be used to support the user to deactivate the virtual number, i.e., to put the state of the virtual number into a deactivated state.
Option 832 may be used to support a user in managing virtual numbers, such as managing the status of suspending, stopping a caller, stopping a callee, etc. for virtual numbers.
Assume that virtual number 1 is virtual number 2111xxxx 1111 currently shown in fig. 8C, and that the real number associated with virtual number 1 is real number 1. If the user wants to deactivate virtual number 1, terminal device 100 may detect an operation of deactivating virtual number 1 by the user (e.g., an operation of clicking option 831 shown in fig. 8C by the user), in response to which terminal device 100 may send a request to deactivate virtual number 1 to the number center, the request including real number 1 and virtual number 1.
S703-S704, the number center performs identity verification based on the real number 1 and the virtual number 1, if the identity verification is passed, the current state of the virtual number 1 is modified to be in a disabled state, and recovery of the virtual number 1 after a preset time period is confirmed. After that, the number center transmits a result of disabling virtual number 1, including the indication information that virtual number 1 is disabled, to the terminal device 100.
Specifically, since the number center stores the association relationship between the virtual number and the real number when each terminal device applies for the virtual number, after receiving the request for disabling the virtual number 1 sent by the terminal device 100, the number center may perform identity verification on the terminal device 100 based on the real number 1 and the virtual number 1, for example, the number center may determine whether there is the association relationship between the real number 1 and the virtual number 1 based on the stored association relationship between the virtual number and the real number, if yes, the number center may determine that the terminal device 100 actually has the real number 1 and the virtual number 1, and further, the number center may determine that the identity verification of the terminal device 100 passes.
After the identity verification passes, as exemplarily shown in table 3 below, the number center may modify the current state (e.g., normal state) of the virtual number 1 into a deactivated state, and may also record the deactivation time of the virtual number 1.
TABLE 3 Table 3
Further, table 4 below exemplarily shows the function limitation in the virtual number deactivated state, the number center may confirm that the virtual number 1 is recovered after a preset period (e.g., 30 days) of the deactivation time of the virtual number 1, for example, after 30 days of the deactivation time of the virtual number 1, the number center may recover the virtual number 1 into the resource pool, so that the virtual number 1 becomes the virtual number to be allocated again, so that the virtual number 1 may be applied again for use.
TABLE 4 Table 4
As can be seen from table 4 above, the virtual number is placed in a disabled state, which may represent: the terminal device 100 can no longer use the virtual number to call other terminal devices, i.e. the virtual number can no longer support the virtual number calling scenario; other terminal devices cannot call the terminal device 100 by dialing the virtual number, i.e. the virtual number cannot support the virtual number called scenario any more. The number center may reclaim the number resources of the virtual number after being deactivated for a preset period of time (e.g., 30 days).
Further, after modifying the current state of the virtual number 1 to the deactivated state, the number center may also send a result of deactivating the virtual number 1 to the terminal device 100, where the result includes indication information that the virtual number 1 is deactivated.
In the embodiment of the present application, once the virtual number 1 is deactivated, the terminal device 100 cannot reuse the virtual number 1.
S705, the terminal device 100 displays the result of disabling the virtual number 1.
Specifically, after receiving the result of disabling virtual number 1 transmitted from the number center, the terminal device 100 may display the result of disabling virtual number 1, for example, referring to fig. 8D, the terminal device 100 may grayscaling the option 831 shown in fig. 8C, and thus may indicate that virtual number 1 has been placed in a disabled state.
Alternatively, after the virtual number 1 is placed in the deactivated state, the terminal device 100 may also grayscaling the option 832 shown in fig. 8C.
Alternatively, referring to fig. 8E, after the virtual number 1 is placed in the deactivated state, the terminal device 100 may also grayscalize the option 811 shown in fig. 8A.
Example (3): virtual number state management
The following describes a specific implementation procedure of the number usage method provided by the embodiment of the present application in a virtual number state management (such as management of suspending, stopping calling, stopping called, etc.) process.
It is easy to understand that the virtual number state management process is performed after the completion of the virtual number application process in the foregoing embodiment (1).
Fig. 9 illustrates a specific flow of the number usage method provided in the embodiment of the present application in the virtual number status management process.
As shown in fig. 9, the method may be applied to a communication system including a terminal device 100 and a number center, wherein the terminal device 100 may establish a communication connection with the number center, and specific steps of the method are described in detail below:
S901-S902, the terminal device 100 detects an operation of modifying the current state of the virtual number 1 to the target state by the user, and in response to the operation, the terminal device 100 sends a request for modifying the current state of the virtual number 1 to the number center, where the request includes the real number 1, the virtual number 1, and the target state.
Fig. 10A-10B illustrate a series of user interfaces involved in the process of virtual number status management by a user on a terminal device 100.
Also taking virtual number 1 (e.g., 2111xxxx 1111) as an example, the terminal device 100 can detect a user operation (e.g., a click operation) on an option 832 in the user interface shown in fig. 8C, in response to which the terminal device 100 can display a pop-up window 1010 exemplarily shown in fig. 10A.
Referring to fig. 10A, a pop-up window 1010 may include one or more options for status management of virtual numbers, e.g., option 1011, option 1012, option 1013, option 1014.
Option 1011 may be used, among other things, to support the user modifying the current state of the virtual number (e.g., normal state, stop-call state, stop-called state) to a suspended state.
Option 1012 may be used, among other things, to support the user modifying the current state (e.g., normal state, suspended state, parked called state) of the virtual number to a parked calling state.
Option 1013 may be used to support a user modifying the current state of the virtual number (e.g., normal state, suspended state, stop-and-call state) to a stop-and-call state, among other things.
Wherein option 1014 may be used to support the user to restore the current state of the virtual number (e.g., suspended state, stopped calling state, stopped called state) to a normal state.
Assuming that the current state of the virtual number 1 is a normal state, the target state (i.e., the state in which the user modifies the current state of the virtual number) is a suspended state, the terminal device 100 may detect an operation in which the user modifies the current state of the virtual number 1 to the target state (e.g., the user clicks an option 1011 shown in fig. 10A), and in response to this operation, the terminal device 100 may send a request for modifying the current state of the virtual number 1, including the real number 1, the virtual number 1, and the target state (e.g., the suspended state), to the number center.
It is readily appreciated that if the target state is the off-call state, then the user may click on option 1012 shown in FIG. 10A; if the target state is the stop-and-call state, the user may click on option 1013 shown in FIG. 10A.
S903-S904, the number center carries out identity verification based on the real number 1 and the virtual number 1, if the identity verification is passed, the current state of the virtual number 1 is modified into a target state, and the virtual number 1 is confirmed not to be recovered. After that, the number center transmits a result of modifying the current state of the virtual number 1, including the indication information that the current state of the virtual number 1 is modified to the target state, to the terminal device 100.
Specifically, since the number center stores the association relationship between the virtual number and the real number when each terminal device applies for the virtual number, after receiving the request for modifying the current state of the virtual number sent by the terminal device 100, the number center may perform identity verification on the terminal device 100 based on the real number 1 and the virtual number 1, for example, the number center may determine whether there is the association relationship between the real number 1 and the virtual number 1 based on the stored association relationship between the virtual number and the real number, if yes, the number center may determine that the terminal device 100 actually has the real number 1 and the virtual number 1, and further, the number center may determine that the identity verification of the terminal device 100 passes.
After the identity verification passes, the number center may modify the current state (e.g., normal state) of virtual number 1 to the target state.
Assuming that the target state is a pause state, then the column "state" in Table 5 below may be marked as "pause".
It will be readily appreciated that if the target state is the stop-and-call state, then the "state" column in Table 5 below may be labeled as "stop-and-call"; if the target state is a stop-and-call state, then the "state" column in Table 5 below may be marked as "stop-and-call".
TABLE 5
Further, table 6 below illustrates functional limitations of virtual numbers in different states (e.g., normal state, suspended state, stop-call state), and the number center may confirm that virtual number 1 is not reclaimed (i.e., number resources of virtual number 1 are reserved) based on table 6 below.
TABLE 6
As can be seen from table 6 above:
the virtual number is placed in a suspended state, which may represent: the terminal device 100 can no longer use the virtual number to call other terminal devices, i.e. the virtual number can no longer support the virtual number calling scenario; other terminal devices cannot call the terminal device 100 by dialing the virtual number, i.e. the virtual number cannot support the virtual number called scenario any more. The number center will still reserve the number resources of the virtual number.
The virtual number is placed in the stop-call state, and may represent: the terminal device 100 can no longer use the virtual number to call other terminal devices, i.e. the virtual number can no longer support the virtual number calling scenario; other terminal devices may call terminal device 100 by dialing the virtual number, i.e., the virtual number may support a virtual number called scenario. The number center will still reserve the number resources of the virtual number.
The virtual number is placed in a stop-and-call state, and may represent: the terminal device 100 may call other terminal devices using the virtual number, i.e. the virtual number may support a virtual number calling scenario; other terminal devices cannot call the terminal device 100 by dialing the virtual number, i.e. the virtual number cannot support the virtual number called scenario any more. The number center will still reserve the number resources of the virtual number.
Further, after modifying the current state of the virtual number 1 to the target state, the number center may also send a result of modifying the current state of the virtual number 1 to the terminal device 100, where the result includes indication information that the current state of the virtual number 1 is modified to the target state.
S905, the terminal device 100 displays the result of modifying the current state of the virtual number 1.
Specifically, after receiving the result of modifying the current state of the virtual number 1 transmitted from the number center, the terminal device 100 may display the result of modifying the current state of the virtual number 1, for example, referring to fig. 10B, if the user modifies the current state of the virtual number 1 to the suspended state, the terminal device 100 may grayscaled the option 1011 shown in fig. 10A, and thus may indicate that the virtual number 1 has been placed in the suspended state.
It is easy to understand that if the user modifies the current state of the virtual number 1 to the stop-and-call state, the terminal device 100 may grayscaling the option 1012 shown in fig. 10A; if the user modifies the current state of the virtual number 1 to the stopped-called state, the terminal device 100 may grayscalize the option 1013 shown in fig. 10A.
With continued reference to fig. 10B, after the user finishes modifying the current state of the virtual number 1, the terminal device 100 may further support the user to restore the state (e.g., the suspended state, the stopped calling state, the stopped called state) of the virtual number 1 after modification to the normal state. Illustratively, the terminal device 100 may detect an operation (e.g., a click operation) of the user with respect to the option 1021, and in response to the operation, the terminal device 100 may restore the current suspended state of the virtual number 1 to the normal state. After the virtual number 1 resumes the normal state, the terminal device 100 can display the pause option in fig. 10B without graying out.
It is easy to understand that, in the specific implementation process of restoring the virtual number to the normal state, the process of modifying the current state of the virtual number to the target state is similar to the foregoing process, and the foregoing related content may be referred to specifically, and will not be repeated herein.
It is to be understood that, similar to the above scenario of stopping a caller and stopping a callee on a virtual number in the prior art, referring to fig. 10C, fig. 10C is an exemplary user interface for managing states of a real number, for example, stopping a caller (for example, stopping initiating all calls, international long-distance roaming calls) and stopping a callee (for example, stopping answering all calls, and calling while roaming) on a real number, the specific setting process is the prior art and will not be repeated herein.
In the embodiment of the present application, the terminal device 100 may implement application, deactivation, and status management of the virtual number by calling a restful interface (e.g., a post interface) of a number center standard (e.g., sending a request for applying the virtual number to the number center, a request for deactivating the virtual number, a request for modifying the current status of the virtual number, etc.). The restful interface is an interface conforming to the REST (Representational State Transfer) architecture constraint and principle, and further description of the restful interface provided by the prior art may refer to related information in the prior art, which is not described herein. The application, the deactivation and the state management of the virtual numbers are realized by using the interface provided by the prior art, so that the development cost can be reduced, and the development efficiency is improved.
It should be noted that, the embodiment (1), the embodiment (2), and the embodiment (3) in the virtual number management scenario are described by taking the terminal device 100 as an example, and it is to be understood that the embodiment (1), the embodiment (2), and the embodiment (3) in the virtual number management scenario may be applied to other terminal devices (e.g., the terminal device 200) as well, and will not be described herein.
2. Virtual number called scene: real number calling virtual number
The specific implementation process of the number using method provided by the embodiment of the application in the virtual number called process is described below.
Fig. 11 illustrates a specific flow of the number usage method provided in the embodiment of the present application in the process of the virtual number being called.
As shown in fig. 11, the method can be applied to a communication system including a terminal device 100 (called terminal), a terminal device 200 (calling terminal), a mobile switching center 400 (calling MSC), a gateway office (GMSC), a mobile switching center 300 (called MSC), and a number center, and the specific steps of the method are described in detail below:
S1101-S1102, the terminal device 200 detects an operation in which the user calls the virtual number (i.e., virtual number 1) of the terminal device 100 using the real number (i.e., real number 2) of the terminal device 200, and in response to the operation, the terminal device 200 transmits a call request 1 including the real number 2 and the virtual number 1 to the mobile switching center 400.
Fig. 12A to 12E exemplarily show a series of user interfaces involved in a process in which a user calls a virtual number of the terminal device 100 using a real number of the terminal device 200.
If the user wants to call the virtual number of the terminal apparatus 100 (i.e., virtual number 1) with the terminal apparatus 200, assuming that the virtual number 1 is 2111xxxx 1111, for example, referring to fig. 12A, the terminal apparatus 200 may detect an operation (e.g., a click operation) of the user with respect to the option 1211, and in response to this operation, the terminal apparatus 200 may display a pop-up window 1220 exemplarily shown in fig. 12B.
Referring to fig. 12B, a plurality of options (e.g., option 1221, option 1222) may be included in the pop-up window 1220 that may be used to support the user in selecting which telephone number to utilize to call virtual number 1.
Among other things, option 1221 may be used to support a user calling virtual number 1 with the real number of terminal device 200. Illustratively, the real number of the terminal device 200 (i.e., real number 2) may be 199xxxx 6246.
Option 1222 may be used to support a user calling virtual number 1 with the virtual number of terminal device 200, among other things. For example, the virtual number of the terminal device 200 (i.e., virtual number 2) may be 2111xxxx 1113.
If the user wants to call the virtual number (i.e., virtual number 1) of the terminal device 100 using the real number (i.e., real number 2) of the terminal device 200, the terminal device 200 may detect an operation (e.g., an operation in which the user clicks the option 1221 shown in fig. 12B) in which the user calls the virtual number 1 using the real number 2, and in response to the operation, the terminal device 200 may transmit a call request 1 including the real number 2, the virtual number 1 to the mobile switching center 400. Meanwhile, the terminal device 200 may also display a user interface exemplarily shown in fig. 12C, in which indication information that the terminal device 200 is calling the virtual number 1 (e.g., "calling") may be displayed.
It is easy to understand that, when only one SIM card is installed on the terminal apparatus 200 and no virtual number is applied, the pop-up window 1220 shown in fig. 12B may not be displayed when the user calls other terminal apparatuses using the terminal apparatus 200, that is, the terminal apparatus 200 may call other terminal apparatuses using the telephone number corresponding to the installed SIM card by default.
S1103-S1106, the mobile switching center 400 determines that the virtual number 1 is a virtual number, and then, the mobile switching center 400 sends a request for inquiring the real number associated with the virtual number 1 to the number center, where the request includes the virtual number 1 and the real number 2. The number center queries the status of virtual number 1 and the real number associated therewith (i.e., real number 1), determines that virtual number 1 allows the call to be made, and saves call record 1, which is a record that real number 2 calls virtual number 1. The number center then sends a query result 1 to the mobile switching center 400, which includes the real number 1.
Specifically, since the mobile switching center (e.g., the mobile switching center 300, the mobile switching center 400) may pre-define the setting rule of the virtual number with the number center, the mobile switching center 400 may determine that the virtual number 1 is a virtual number based on the pre-defined setting rule of the virtual number after receiving the call request 1 transmitted from the terminal device 200.
Further, the mobile switching center 400 may send a request to the number center for inquiring the real number associated with the virtual number 1, where the request may include the virtual number 1 and the real number 2, and may further include identification information of the mobile switching center 400, so that the number center knows that the request is from the mobile switching center 400. After receiving the request, the number center may query the state (e.g., normal state, deactivated state, suspended state, deactivated state) of the virtual number 1 based on the stored state information of the virtual number, and may query the real number associated with the virtual number 1 based on the stored association relationship between the virtual number and the real number.
Further, after determining that virtual number 1 (e.g., 2111xxxx 1111) allows the call to be made (i.e., virtual number 1 is not in a suspended state, deactivated state, and stopped-called state), and that the real number associated with virtual number 1 is real number 1 (e.g., 186xxxx 3516), the number center may maintain call record 1, which is a record of real number 2 (e.g., 199xxxx 6246) calling virtual number 1, and the data storage structure of which may be in the form exemplarily shown in table 7 below.
TABLE 7
Further, the number center may also send a query result 1 to the mobile switching center 400, where the result may include the real number 1. In this way, the mobile switching center 400 may perform subsequent steps based on the real number 1.
It is easy to understand that, in the case that the query result 1 sent by the number center to the mobile switching center 400 does not include the real number associated with the virtual number 1 (i.e., the real number 1), that is, in the case that the number center does not find the real number associated with the virtual number 1, or in the case that the state of the virtual number 1 is in the deactivated state or the suspended state or the stopped state, the mobile switching center 400 may end the call and no further subsequent steps are performed.
S1107-S1113, the mobile switching center 400 sends a call request 1' to the gateway, where the request includes a real number 2 and a real number 1. The gateway office sends a call request 1' to the mobile switching center 300, and the mobile switching center 300 sends a ringing message 1 to the terminal device 100, wherein the ringing message includes a real number 2 and a real number 1. The mobile switching center 300 transmits the response message 1 to the gateway, the gateway transmits the response message 1 to the mobile switching center 400, and the mobile switching center 400 transmits the ringback tone message 1 to the terminal device 200. After that, the terminal apparatus 200 and the terminal apparatus 100 connect the call link.
Specifically, after receiving the real number 1 transmitted from the number center, the mobile switching center 400 may determine that the call request 1 needs to be modified to the call request 1', where the call request 1 indicates that the real number of the terminal device 200 (i.e., the real number 2) calls the virtual number of the terminal device 100, and the call request 1' indicates that the real number of the terminal device 200 calls the real number of the terminal device 100 (i.e., the real number 1).
Further, the mobile switching center 400 may send a call request 1' to the gateway office, where the request includes the real number 2 and the real number 1.
The gateway, after receiving the call request 1 'sent by the mobile switching center 400, may determine that the call request 1' needs to be sent to the mobile switching center 300. The gateway may then send the call request 1' to the mobile switching center 300.
The mobile switching center 300, after receiving the call request 1' transmitted from the gateway, may determine that a call needs to be initiated to the terminal device 100. Thereafter, the mobile switching center 300 may transmit a ringing message 1, which may include the real number 2, the real number 1, to the terminal device 100.
Further, the mobile switching center 300 may also send a response message 1 to the gateway, and the gateway may send the response message 1 to the mobile switching center 400.
The mobile switching center 400 may transmit the ringback tone message 1 to the terminal device 200 after receiving the reply message 1 transmitted by the gateway.
After receiving the ring back tone message 1 transmitted from the mobile switching center 400, the terminal device 200 may display a user interface exemplarily shown in fig. 12D in which indication information that the terminal device 100 has been ringing (e.g., "the counterpart has been ringing") may be displayed.
Further, a call link may be established between the terminal device 200 and the terminal device 100 to establish a communication connection, which may be a communication connection established between the real number 2 of the terminal device 200 and the real number 1 of the terminal device 100.
It should be noted that, in the embodiment of the present application, the specific execution process of the data interaction between the mobile switching center 400, the gateway and the mobile switching center 300 (i.e. the call and answer process shown in step S1107-step S1112) is similar to the specific execution process of the data interaction between the mobile switching center 400, the gateway and the mobile switching center 300 in the prior art, and the detailed contents may refer to the related data in the prior art and will not be repeated here.
S1114-S1117, the terminal device 100 sends a request for inquiring the latest call record of the real number 2 to the number center, where the request includes the real number 1 and the real number 2. The number center then determines, based on call record 1, that real number 2 was last called virtual number 1 associated with real number 1. After that, the number center transmits a query result 1' including the virtual number 1 to the terminal device 100. The terminal device 100 displays the virtual number 1.
Specifically, after receiving the ringing message 1 sent by the mobile switching center 300, the terminal device 100 may send a request for inquiring about the latest call record of the real number 2 to the number center, so as to determine whether the real number of the terminal device 200 (i.e., the real number 2) is the real number (i.e., the real number 1) for calling the terminal device 100 by using the virtual number of the terminal device 100, where the request includes the real number 1 and the real number 2. After the number center receives the request, since the number center has previously saved a call record of the real number of the terminal device 200 calling the virtual number of the terminal device 100 (i.e., call record 1), the number center can determine that the real number 2 was last called the virtual number 1 associated with the real number 1 based on the call record 1. Thereafter, the number center may transmit a query result 1' to the terminal device 100, and the result may include the virtual number 1 therein. After receiving the query result 1' transmitted from the number center, the terminal device 100 may determine that the real number 2 is called the real number 1 by using the virtual number 1, and further, the terminal device 100 may display the virtual number 1.
The manner in which the terminal device 100 displays the virtual number 1 may be the manner illustrated in fig. 12E by way of example: after receiving the query result 1' sent by the number center, the terminal device 100 may locally find the remark name of the virtual number 1 based on the virtual number 1, and then may display the virtual number 1 (for example, 2111xxxx 1111 shown in fig. 12E) and the remark name of the virtual number 1 (for example, XX office building shown in fig. 12E). Meanwhile, the terminal device 100 rings.
Alternatively, the terminal device 100 may also display only the remark name of the virtual number 1, without displaying the virtual number 1.
Optionally, the terminal device 100 may also display a telephone number to initiate a call to the terminal device 100, i.e., the real number of the terminal device 200 (e.g., 199xxxx 6246 shown in fig. 12E).
By implementing the method in the embodiment shown in fig. 11, when the calling terminal (e.g., the terminal device 200) calls the virtual number of the called terminal (e.g., the terminal device 100), the called terminal can display to which virtual number of the called terminal the calling terminal originated the call, and further, the user of the called terminal can know who the number retainer of the virtual number is, so that the number leaked from which channel can be known. In addition, the called terminal can actively inquire the virtual number from the number center and display the virtual number when ringing, so that excessive improvement of equipment (such as the mobile switching center 300, the mobile switching center 400, a gateway office and the like) by an operator is not required, and development cost is reduced.
In practical application, if a certain virtual number applied by a user is frequently called and the user does not want to be disturbed excessively, the user can put the virtual number into a deactivated state or a suspended state or a called state by using the method described in the virtual number management scenario.
3. Virtual number caller scenario:
example (1): virtual number calls real number
The specific implementation process of the number using method provided by the embodiment of the application in the process of calling the real number by the virtual number is described below.
Fig. 13 illustrates a specific flow of the number usage method provided in the embodiment of the present application in the process of calling the real number by the virtual number.
As shown in fig. 13, the method can be applied to a communication system including a terminal device 100 (calling terminal), a terminal device 200 (called terminal), a mobile switching center 300 (calling MSC), a gateway office (GMSC), a mobile switching center 400 (called MSC), and a number center, and the specific steps of the method are described in detail below:
S1301-S1302, the terminal device 100 detects an operation in which the user calls the real number (i.e., real number 2) of the terminal device 200 using the virtual number (i.e., virtual number 1) of the terminal device 100, and in response to the operation, the terminal device 100 transmits a call request 2 including the virtual number 1 and the real number 2 to the mobile switching center 300.
Fig. 14A to 14E exemplarily show a series of user interfaces involved in a process in which a user calls a real number of the terminal device 200 using a virtual number of the terminal device 100.
If the user wants to call the real number of the terminal device 200 (i.e., real number 2) with the terminal device 100, assuming that the real number 2 is 199xxxx 6246, referring to fig. 14A, for example, the terminal device 100 may detect an operation (e.g., a click operation) of the user with respect to the option 1411, in response to which the terminal device 100 may display a pop-up window 1420 exemplarily shown in fig. 14B.
Referring to fig. 14B, a number of options (e.g., options 1421, 1422) may be included in the pop-up window 1420, which may be used to support the user in selecting which telephone number to utilize to call real number 2.
Among other things, option 1421 may be used to support the user calling real number 2 with the real number of terminal device 100. Illustratively, the real number of the terminal device 100 (i.e., real number 1) may be 186xxxx 3516.
Among other things, option 1422 may be used to support the user calling real number 2 with the virtual number of terminal device 100. For example, the virtual number of the terminal device 100 (i.e., virtual number 1) may be 2111xxxx 1111.
If the user wants to call the real number (i.e., real number 2) of the terminal device 200 using the virtual number (i.e., virtual number 1) of the terminal device 100, the terminal device 100 may detect an operation (e.g., an operation in which the user clicks the option 1422 shown in fig. 14B) in which the user calls the real number 2 using the virtual number 1, and in response to the operation, the terminal device 100 may transmit a call request 2 including the virtual number 1, the real number 2 to the mobile switching center 300. Meanwhile, the terminal device 100 may also display a user interface exemplarily shown in fig. 14C, in which indication information (e.g., "calling") that the terminal device 100 is calling the real number 2 may be displayed.
S1303-S1306, the mobile switching center 300 determines that the virtual number 1 is a virtual number, and then, the mobile switching center 300 sends a request for inquiring the real number associated with the virtual number 1 to the number center, the request including the virtual number 1. The number center queries the status of virtual number 1 and the real number associated therewith (i.e., real number 1), determining that virtual number 1 allows the caller. The number center then sends a query result 2 to the mobile switching center 300, which includes the real number 1.
Specifically, since the mobile switching center (e.g., the mobile switching center 300, the mobile switching center 400) may pre-define the setting rule of the virtual number with the number center, the mobile switching center 300 may determine that the virtual number 1 is the virtual number based on the pre-defined setting rule of the virtual number after receiving the call request 2 transmitted from the terminal device 100.
Further, the mobile switching center 300 may send a request to the number center for inquiring the real number associated with the virtual number 1, where the request may include the virtual number 1, and may further include identification information of the mobile switching center 300, so that the number center knows that the request is from the mobile switching center 300. After receiving the request, the number center may query the state (e.g., normal state, deactivated state, suspended state, deactivated state) of the virtual number 1 based on the stored state information of the virtual number, and may query the real number associated with the virtual number 1 based on the stored association relationship between the virtual number and the real number.
Further, after determining that virtual number 1 (e.g., 2111xxxx 1111) allows the caller (i.e., virtual number 1 is not in a suspended state, deactivated state, parked state) and that the real number associated with virtual number 1 is real number 1 (e.g., 186xxxx 3516), the number center may send query result 2 to mobile switching center 300, which may include real number 1. In this way, the mobile switching center 300 may perform subsequent steps based on the real number 1.
It is easy to understand that in the case that the query result 2 sent by the number center to the mobile switching center 300 does not include the real number associated with the virtual number 1 (i.e., the real number 1), that is, in the case that the number center does not find the real number associated with the virtual number 1, or in the case that the state of the virtual number 1 is in the deactivated state or the suspended state or the stopped calling state, the mobile switching center 300 may end the call and no further subsequent steps are performed.
S1307, the mobile switching center 300 determines to charge with the real number 1.
Specifically, after receiving the real number 1 sent by the number center, the mobile switching center 300 may determine that the cost generated by the call initiated by the terminal device 100 using the virtual number 1 needs to be calculated according to the cost generated by the call initiated by the real number (i.e., the real number 1) of the terminal device 100, that is, the terminal device 100 needs to perform charging processing using the real number of the terminal device 100 when the call is initiated using the virtual number. In this way, the complexity of the operator system design may be reduced.
S1308-S1314, the mobile switching center 300 sends a call request 2' to the gateway, the request including virtual number 1 and real number 2. The gateway office sends a call request 2' to the mobile switching center 400, and the mobile switching center 400 sends a ringing message 2 to the terminal device 200, wherein the ringing message includes a virtual number 1 and a real number 2. The mobile switching center 400 transmits the response message 2 to the gateway, the gateway transmits the response message 2 to the mobile switching center 300, and the mobile switching center 300 transmits the ringback tone message 2 to the terminal device 100. After that, the terminal device 100 and the terminal device 200 connect the call link.
Specifically, after receiving the real number 1 sent by the number center, the mobile switching center 300 may send a call request 2' to the gateway, where the request includes the virtual number 1 and the real number 2.
The gateway, after receiving the call request 2 'sent by the mobile switching center 300, may determine that the call request 2' needs to be sent to the mobile switching center 400. The gateway may then send the call request 2' to the mobile switching center 400.
After receiving the call request 2' sent by the gateway, the mobile switching center 400 may determine that a call needs to be initiated to the terminal device 200. Thereafter, the mobile switching center 400 may transmit a ringing message 2, which may include the virtual number 1, the real number 2, to the terminal device 200.
Further, the mobile switching center 400 may also send a response message 2 to the gateway, and the gateway may send the response message 2 to the mobile switching center 300.
The mobile switching center 300 may transmit the ringback tone message 2 to the terminal device 100 after receiving the reply message 2 transmitted by the gateway.
After receiving the ringback tone message 2 transmitted by the mobile switching center 300, the terminal device 100 may display a user interface exemplarily shown in fig. 14D in which indication information that the terminal device 200 has ringing (e.g., "the counterpart has ringing") may be displayed.
Further, a call link may be established between the terminal device 100 and the terminal device 200 to establish a communication connection, which may be a communication connection established between the real number 1 of the terminal device 100 and the real number 2 of the terminal device 200.
It should be noted that, in the embodiment of the present application, the specific execution process of the data interaction between the mobile switching center 300, the gateway and the mobile switching center 400 (i.e. the call and response process shown in step S1308-step S1314) is similar to the specific execution process of the data interaction between the mobile switching center 300, the gateway and the mobile switching center 400 in the prior art, and the detailed contents may refer to the related data in the prior art, which is not repeated here.
S1315, the terminal device 200 displays the virtual number 1.
After receiving the ringing message 2 transmitted from the mobile switching center 400, the terminal device 200 may display the virtual number 1 included in the ringing message 2.
Illustratively, after receiving the ringing message 2 sent by the mobile switching center 400, the terminal device 200 may display the virtual number 1 (e.g., 2111xxxx 1111) in the user interface shown in fig. 14E.
That is, when the terminal device 100 calls the terminal device 200 using the virtual number, the terminal device 200 displays only the virtual number of the terminal device 100, so that the real number of the terminal device 100 is not exposed, improving security.
By implementing the method of the embodiment shown in fig. 13, when the calling terminal (e.g., the terminal device 200) calls the called terminal (e.g., the terminal device 100) using the virtual number, the called terminal may display only the virtual number of the calling terminal, and not the real number of the calling terminal, so that the real number of the calling terminal is not exposed, and safety is improved. In addition, when the calling terminal calls the called terminal by using the virtual number, the equipment (such as a mobile switching center) of the operator can actively acquire the real number of the calling terminal from the number center, and the charging and service control are still processed according to the real number of the calling terminal, so that the complexity of the system design of the operator is not increased.
After the terminal device 100 calls the terminal device 200 through the virtual number 1 (e.g., 2111xxxx 1111), or after the virtual number 1 is called by the terminal device 200, the terminal device 100 may display a user interface 1420 exemplarily shown in fig. 14F, where a call record 1421 may be included in the user interface 1420, where the call record 1421 is a call record of the virtual number 1 of the terminal device 100 and a telephone number of the terminal device 200, and the call record 1421 may include the virtual number 1 (e.g., 2111xxxx 1111) of the terminal device 100 and a telephone number (e.g., 199xxxx 6246) of the terminal device 200. In this way, the user is facilitated to know which virtual number of the terminal device 100 the call record was generated.
Example (2): the virtual number calls another virtual number (e.g., the virtual number of terminal device 100 calls the virtual number of terminal device 200)
The following describes a specific implementation procedure of the number usage method provided by the embodiment of the present application in a procedure of calling another virtual number by a virtual number.
Fig. 15 illustrates a specific flow of the number usage method provided in the embodiment of the present application in a process of calling another virtual number by a virtual number.
As shown in fig. 15, the method may be applied to a communication system including a terminal device 100 (calling terminal), a terminal device 200 (called terminal), a mobile switching center 300 (calling MSC), a gateway office (GMSC), a mobile switching center 400 (called MSC), and a number center, and the specific steps of the method will be described in detail below:
S1501-S1502, the terminal device 100 detects an operation in which the user calls the virtual number (i.e., virtual number 2) of the terminal device 200 using the virtual number (i.e., virtual number 1) of the terminal device 100, and in response to the operation, the terminal device 100 transmits a call request 3 including the virtual number 1 and the virtual number 2 to the mobile switching center 300.
Fig. 16A to 16E exemplarily show a series of user interfaces involved in a process in which a user calls a virtual number of the terminal device 200 using the virtual number of the terminal device 100.
If the user wants to call the virtual number (i.e., virtual number 2) of the terminal device 200 with the terminal device 100, assuming that the virtual number 2 is 2111xxxx 1113, referring to fig. 16A, for example, the terminal device 100 may detect an operation (e.g., a click operation) of the user with respect to the option 1611, in response to which the terminal device 100 may display a pop-up window 1620 exemplarily shown in fig. 16B.
Referring to fig. 16B, a number of options (e.g., option 1621, option 1622) may be included in the pop-up window 1620, which may be used to support the user in selecting which telephone number to utilize to call virtual number 2.
Option 1621 may be used, among other things, to support the user calling virtual number 2 with the real number of terminal device 100. Illustratively, the real number of the terminal device 100 (i.e., real number 1) may be 186xxxx 3516.
Option 1622 may be used, among other things, to support the user calling virtual number 2 with the virtual number of terminal device 100. For example, the virtual number of the terminal device 100 (i.e., virtual number 1) may be 2111xxxx 1111.
If the user wants to call the virtual number (i.e., virtual number 2) of the terminal device 200 using the virtual number (i.e., virtual number 1) of the terminal device 100, the terminal device 100 may detect an operation (e.g., an operation in which the user clicks the option 1622 shown in fig. 16B) in which the user calls the virtual number 2 using the virtual number 1, and in response to the operation, the terminal device 100 may transmit a call request 3 including the virtual number 1, the virtual number 2 to the mobile switching center 300. Meanwhile, the terminal device 100 may also display a user interface exemplarily shown in fig. 16C, in which indication information that the terminal device 100 is calling the virtual number 2 (e.g., "calling") may be displayed.
S1503-S1506, the mobile switching center 300 determines that virtual number 2 is a virtual number, and then, the mobile switching center 300 sends a request to the number center to query the real number associated with virtual number 2, including virtual number 1 and virtual number 2. The number center queries the status of virtual number 2 and the real number associated with it (i.e., real number 2), determines that virtual number 2 is permitted to be called, and saves call record 2, which is a record that virtual number 1 calls virtual number 2. The number center then sends a query result 3 to the mobile switching center 300, which includes the real number 2.
Specifically, since the mobile switching center (e.g., the mobile switching center 300, the mobile switching center 400) may pre-define the setting rule of the virtual number with the number center, the mobile switching center 300 may determine that the virtual number 2 is the virtual number based on the pre-defined setting rule of the virtual number after receiving the call request 3 transmitted from the terminal device 100.
Further, the mobile switching center 300 may send a request to the number center for inquiring the real number associated with the virtual number 2, where the request may include the virtual number 1 and the virtual number 2, and may further include identification information of the mobile switching center 300, so that the number center knows that the request is from the mobile switching center 300. After receiving the request, the number center may query the state of the virtual number 2 (e.g., normal state, deactivated state, suspended state, deactivated state) based on the state information of the saved virtual number, and may query the real number associated with the virtual number 1 based on the association of the saved virtual number and the real number.
Further, after determining that virtual number 2 (e.g., 2111xxxx 1113) allows the call to be made (i.e., virtual number 2 is not in a suspended state, deactivated state, parked state), and that the real number associated with virtual number 2 is real number 2 (e.g., 199xxxx 6246), the number center may maintain call record 2, which is a record of virtual number 1 (e.g., 2111xxxx 1111) calling virtual number 2, the data storage structure of which may be in the form exemplarily shown in table 8 below.
TABLE 8
Further, the number center may also send a query result 3 to the mobile switching center 300, where the result may include the real number 2. In this way, the mobile switching center 300 may perform subsequent steps based on the real number 2.
It is easy to understand that, in the case that the query result 3 sent by the number center to the mobile switching center 300 does not include the real number associated with the virtual number 2 (i.e., the real number 2), that is, in the case that the number center does not find the real number associated with the virtual number 2, or in the case that the state of the virtual number 2 is in the deactivated state or the suspended state or the stopped called state, the mobile switching center 300 may end the call and no further subsequent steps are performed.
S1507-S1510, the mobile switching center 300 determines that the virtual number 1 is a virtual number, and then, the mobile switching center 300 sends a request for inquiring the real number associated with the virtual number 1 to the number center, the request including the virtual number 1. The number center queries the status of virtual number 1 and the real number associated therewith (i.e., real number 1), determining that virtual number 1 allows the caller. The number center then sends a query result 3' to the mobile switching center 300, which includes the real number 1.
Specifically, since the mobile switching center (e.g., the mobile switching center 300, the mobile switching center 400) may pre-define the setting rule of the virtual number with the number center, the mobile switching center 300 may determine that the virtual number 1 is the virtual number based on the pre-defined setting rule of the virtual number after receiving the call request 3 transmitted from the terminal device 100.
Further, the mobile switching center 300 may send a request to the number center for inquiring the real number associated with the virtual number 1, where the request may include the virtual number 1, and may further include identification information of the mobile switching center 300, so that the number center knows that the request is from the mobile switching center 300. After receiving the request, the number center may query the state (e.g., normal state, deactivated state, suspended state, deactivated state) of the virtual number 1 based on the stored state information of the virtual number, and may query the real number associated with the virtual number 1 based on the stored association relationship between the virtual number and the real number.
Further, after determining that virtual number 1 (e.g., 2111xxxx 1111) allows the caller (i.e., virtual number 1 is not in a suspended state, deactivated state, parked state) and that the real number associated with virtual number 1 is real number 1 (e.g., 186xxxx 3516), the number center may send query result 3' to mobile switching center 300, which may include real number 1. In this way, the mobile switching center 300 may perform subsequent steps based on the real number 1.
It is easy to understand that, in the case that the query result 3' sent by the number center to the mobile switching center 300 does not include the real number associated with the virtual number 1 (i.e., the real number 1), that is, in the case that the number center does not find the real number associated with the virtual number 1, or in the case that the state of the virtual number 1 is in the deactivated state or the suspended state or the stopped calling state, the mobile switching center 300 may end the call and no further steps are performed.
The time sequence of executing steps S1503 to S1506 and steps S1507 to S1510 is not limited in the embodiment of the present application. In some examples, steps S1503-S1506 may also be performed after steps S1507-S1510; in other examples, steps S1503-S1506 may also be performed concurrently with steps S1507-S1510.
S1511, the mobile switching center 300 determines to charge with the real number 1.
Specifically, after receiving the real number 1 sent by the number center, the mobile switching center 300 may determine that the cost generated by the call initiated by the terminal device 100 using the virtual number 1 needs to be calculated according to the cost generated by the call initiated by the real number (i.e., the real number 1) of the terminal device 100, that is, the terminal device 100 needs to perform charging processing using the real number of the terminal device 100 when the call is initiated using the virtual number. In this way, the complexity of the operator system design may be reduced.
S1512-S1518, the mobile switching center 300 sends a call request 3' to the gateway, the request including the virtual number 1 and the real number 2. The gateway office sends a call request 3' to the mobile switching center 400, and the mobile switching center 400 sends a ringing message 3 to the terminal device 200, wherein the ringing message includes a virtual number 1 and a real number 2. The mobile switching center 400 transmits the response message 3 to the gateway, the gateway transmits the response message 3 to the mobile switching center 300, and the mobile switching center 300 transmits the ringback tone message 3 to the terminal device 100. After that, the terminal device 100 and the terminal device 200 connect the call link.
Specifically, after receiving the real number 2 transmitted from the number center, the mobile switching center 300 may determine that the call request 3 needs to be modified to the call request 3', where the call request 3 indicates that the virtual number of the terminal device 100 (i.e., the virtual number 1) calls the virtual number of the terminal device 200 (i.e., the virtual number 2), and the call request 3' indicates that the virtual number of the terminal device 100 calls the real number of the terminal device 200 (i.e., the real number 2).
Further, the mobile switching center 300 may send a call request 3' to the gateway office, where the request includes a virtual number 1 and a real number 2.
After receiving the call request 3 'sent by the mobile switching center 300, the gateway can determine that the call request 3' needs to be sent to the mobile switching center 400. The gateway may then send the call request 3' to the mobile switching center 400.
After receiving the call request 3' sent by the gateway, the mobile switching center 400 may determine that a call needs to be initiated to the terminal device 200. Thereafter, the mobile switching center 400 may transmit a ringing message 3, which may include the virtual number 1, the real number 2, to the terminal device 200.
Further, the mobile switching center 400 may also send a response message 3 to the gateway, and the gateway may send the response message 3 to the mobile switching center 300.
The mobile switching center 300 may transmit the ringback tone message 3 to the terminal device 100 after receiving the reply message 3 transmitted by the gateway.
After receiving the ring back tone message 3 transmitted from the mobile switching center 300, the terminal device 100 may display a user interface exemplarily shown in fig. 16D in which indication information that the terminal device 200 has been ringing (e.g., "the counterpart has been ringing") may be displayed.
Further, a call link may be established between the terminal device 100 and the terminal device 200 to establish a communication connection, which may be a communication connection established between the real number 1 of the terminal device 100 and the real number 2 of the terminal device 200.
It should be noted that, in the embodiment of the present application, the specific execution process of the data interaction between the mobile switching center 300, the gateway and the mobile switching center 400 (i.e. the call and response process shown in step S1512-step S1517) is similar to the specific execution process of the data interaction between the mobile switching center 300, the gateway and the mobile switching center 400 in the prior art, and the detailed details may refer to the related data in the prior art and will not be repeated here.
S1519-S1522, the terminal device 200 queries the number center for a request of the latest call record of virtual number 1, where the request includes virtual number 1 and real number 2. The number center then determines, based on call record 2, that virtual number 1 was last called virtual number 2 associated with real number 2. After that, the number center transmits a query result 3″ including the virtual number 2 to the terminal device 100. The terminal device 100 displays the virtual number 2.
Specifically, after receiving the ringing message 3 sent by the mobile switching center 400, the terminal device 200 may send a request for inquiring about the latest call record of the virtual number 1 to the number center, so as to determine whether the virtual number of the terminal device 100 (i.e., the virtual number 1) is the real number (i.e., the real number 2) for calling the terminal device 200 by using the virtual number of the terminal device 200, where the request includes the virtual number 1 and the real number 2. After the number center receives the request, since the number center has previously saved a call record of the virtual number of the terminal device 100 (i.e., call record 2) calling the virtual number of the terminal device 200, the number center can determine that the virtual number 1 was last called the virtual number 2 associated with the real number 2 based on the call record 2. Thereafter, the number center may transmit a query result 3″ to the terminal device 200, and the virtual number 2 may be included in the result. After receiving the query result 3″ transmitted from the number center, the terminal device 200 may determine that the real number 2 is called the real number 2 using the virtual number 2, and further, the terminal device 200 may display the virtual number 2.
The manner in which the terminal device 200 displays the virtual number 2 may be the manner illustrated in fig. 16E by way of example: after receiving the query result 3″ sent by the number center, the terminal device 200 may find the remark name of the virtual number 2 locally based on the virtual number 2, and may then display the virtual number 2 (for example, 2111xxxx 1113 shown in fig. 16E) and the remark name of the virtual number 2 (for example, XXX sales office shown in fig. 16E). Meanwhile, the terminal device 200 rings.
Alternatively, the terminal device 200 may also display only the remark name of the virtual number 2, without displaying the virtual number 2.
Optionally, the terminal apparatus 200 may also display a telephone number that initiates a call to the terminal apparatus 200, i.e., a virtual number of the terminal apparatus 100 (e.g., 2111xxxx 1111 shown in fig. 16E).
The following describes a software structure of the electronic device 100 (i.e., the terminal device 100) provided in the embodiment of the present application.
Fig. 17 exemplarily shows a software structure of an electronic device 100 provided in an embodiment of the present application.
As shown in fig. 17, the software system of the electronic device 100 may employ a layered architecture, an event driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. In the embodiment of the application, taking an Android system with a layered architecture as an example, a software structure of the electronic device 100 is illustrated.
The layered architecture divides the software into several layers, each with distinct roles and branches. The layers communicate with each other through a software interface. In some examples, the Android system is divided into four layers, from top to bottom, an application layer, an application framework layer, an Zhuoyun row (Android run) and system libraries, and a kernel layer, respectively.
The application layer may include a series of application packages.
As shown in fig. 17, the application package may include applications for cameras, gallery, calendar, phone, map, weather, WLAN, bluetooth, music, video, short message, etc.
Wherein the telephony application may perform a variety of functions, for example, may be used to call other terminal devices using virtual or real numbers; the method can also be used for receiving calls initiated by other terminal equipment by using the virtual number or the real number; the method can also be used for applying for virtual numbers, disabling virtual numbers and managing virtual numbers; etc.
It should be noted that, the name of the phone application is only a word used in the embodiments of the present application, and the meaning of the term is already described in the embodiments of the present application, and the name of the term should not be construed as limiting the embodiments of the present application.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions.
As shown in fig. 17, the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is used to provide the communication functions of the electronic device 100. Such as the management of call status (including on, hung-up, etc.).
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
Android run time includes a core library and virtual machines. Android run time is responsible for scheduling and management of the Android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing the functions of object life cycle management, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), etc.
The surface manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
Media libraries support a variety of commonly used audio, video format playback and recording, still image files, and the like. The media library may support a variety of audio and video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The kernel layer at least comprises a display driver, a camera driver, a Bluetooth driver and a sensor driver.
The workflow of the electronic device 100 software and hardware is illustrated below in connection with capturing a photo scene.
When touch sensor 180K receives a touch operation, a corresponding hardware interrupt is issued to the kernel layer. The kernel layer processes the touch operation into the original input event (including information such as touch coordinates, time stamp of touch operation, etc.). The original input event is stored at the kernel layer. The application framework layer acquires an original input event from the kernel layer, and identifies a control corresponding to the input event. Taking the touch operation as a touch click operation, taking a control corresponding to the click operation as an example of a control of a camera application icon, the camera application calls an interface of an application framework layer, starts the camera application, further starts a camera driver by calling a kernel layer, and captures a still image or video by the camera 193.
The software structure of the electronic device 200 (may also be referred to as the terminal device 200) may be the same as or similar to the structure of the electronic device 100, and the related content of the software structure of the electronic device 200 may refer to the related text description of the software structure of the electronic device 100 shown in fig. 17, which is not repeated herein.
A schematic structural diagram of an electronic device 100 (may also be referred to as a terminal device 100) provided in an embodiment of the present application is described below.
Fig. 18 exemplarily shows a structure of an electronic apparatus 100 provided in an embodiment of the present application.
As shown in fig. 18, the electronic device 100 may include: processor 110, external memory interface 120, internal memory 121, universal serial bus (universal serial bus, USB) interface 130, charge management module 140, power management module 141, battery 142, antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headset interface 170D, sensor module 180, keys 190, motor 191, indicator 192, camera 193, display 194, and subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It should be understood that the illustrated structure of the embodiment of the present application does not constitute a specific limitation on the electronic device 100. In other examples of the application, electronic device 100 may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a memory, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The controller may be a neural hub and a command center of the electronic device 100, among others. The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some examples, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some examples, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The I2C interface is a bi-directional synchronous serial bus comprising a serial data line (SDA) and a serial clock line (derail clock line, SCL). In some examples, the processor 110 may contain multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, charger, flash, camera 193, etc., respectively, through different I2C bus interfaces. For example: the processor 110 may be coupled to the touch sensor 180K through an I2C interface, such that the processor 110 communicates with the touch sensor 180K through an I2C bus interface to implement a touch function of the electronic device 100.
The I2S interface may be used for audio communication. In some examples, the processor 110 may contain multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some examples, the audio module 170 may communicate audio signals to the wireless communication module 160 through the I2S interface to implement a function of answering a phone call through a bluetooth headset.
PCM interfaces may also be used for audio communication to sample, quantize and encode analog signals. In some examples, the audio module 170 and the wireless communication module 160 may be coupled by a PCM bus interface. In some examples, the audio module 170 may also communicate audio signals to the wireless communication module 160 via the PCM interface to enable phone answering via a bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus for asynchronous communications. The bus may be a bi-directional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some examples, UART interfaces are typically used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some examples, the audio module 170 may communicate audio signals to the wireless communication module 160 through a UART interface to implement a function of playing music through a bluetooth headset.
The MIPI interface may be used to connect the processor 110 to peripheral devices such as a display 194, a camera 193, and the like. The MIPI interfaces include camera serial interfaces (camera serial interface, CSI), display serial interfaces (display serial interface, DSI), and the like. In some examples, processor 110 and camera 193 communicate through a CSI interface to implement the photographing functions of electronic device 100. The processor 110 and the display 194 communicate via a DSI interface to implement the display functionality of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal or as a data signal. In some examples, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, an MIPI interface, etc.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transfer data between the electronic device 100 and a peripheral device. And can also be used for connecting with a headset, and playing audio through the headset. The interface may also be used to connect other terminal devices, such as AR devices, etc.
It should be understood that the interfacing relationship between the modules illustrated in the embodiments of the present application is only illustrative, and is not meant to limit the structure of the electronic device 100. In other examples of the present application, the electronic device 100 may also use different interfacing manners, or a combination of multiple interfacing manners, in the above embodiments.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device 100 through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other examples, the power management module 141 may also be provided in the processor 110. In other examples, the power management module 141 and the charge management module 140 may also be provided in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other examples, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc., applied to the electronic device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some examples, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some examples, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some examples, the modem processor may be a stand-alone device. In other examples, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc., as applied to the electronic device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some examples, antenna 1 and mobile communication module 150 of electronic device 100 are coupled, and antenna 2 and wireless communication module 160 are coupled, such that electronic device 100 may communicate with a network and other devices through wireless communication techniques. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some examples, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also optimize the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some examples, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some examples, electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning. Applications such as intelligent awareness of the electronic device 100 may be implemented through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, etc.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the electronic device 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The processor 110 executes various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an application program (such as a sound playing function, an image playing function, etc.) required for at least one function of the operating system, etc. The storage data area may store data created during use of the electronic device 100 (e.g., audio data, phonebook, etc.), and so on. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like.
The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some examples, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals. The electronic device 100 may listen to music, or to hands-free conversations, through the speaker 170A.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal. When electronic device 100 is answering a telephone call or voice message, voice may be received by placing receiver 170B in close proximity to the human ear.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can sound near the microphone 170C through the mouth, inputting a sound signal to the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In other examples, the electronic device 100 may be provided with two microphones 170C, and may implement a noise reduction function in addition to collecting sound signals. In other examples, the electronic device 100 may also be provided with three, four, or more microphones 170C to enable collection of sound signals, noise reduction, identification of sound sources, directional recording functions, etc.
The earphone interface 170D is used to connect a wired earphone. The earphone interface 170D may be a USB interface 130 or a 3.5mm open mobile terminal platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some examples, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A is of various types, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a capacitive pressure sensor comprising at least two parallel plates with conductive material. The capacitance between the electrodes changes when a force is applied to the pressure sensor 180A. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the touch operation intensity according to the pressure sensor 180A. The electronic device 100 may also calculate the location of the touch based on the detection signal of the pressure sensor 180A. In some examples, touch operations that act on the same touch location, but at different touch operation strengths, may correspond to different operation instructions. For example: and executing an instruction for checking the short message when the touch operation with the touch operation intensity smaller than the first pressure threshold acts on the short message application icon. And executing an instruction for newly creating the short message when the touch operation with the touch operation intensity being greater than or equal to the first pressure threshold acts on the short message application icon.
The gyro sensor 180B may be used to determine a motion gesture of the electronic device 100. In some examples, the angular velocity of electronic device 100 about three axes (i.e., x, y, and z axes) may be determined by gyro sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects the shake angle of the electronic device 100, calculates the distance to be compensated by the lens module according to the angle, and makes the lens counteract the shake of the electronic device 100 through the reverse motion, so as to realize anti-shake. The gyro sensor 180B may also be used for navigating, somatosensory game scenes.
The air pressure sensor 180C is used to measure air pressure. In some examples, electronic device 100 calculates altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip cover using the magnetic sensor 180D. In some examples, when the electronic device 100 is a flip machine, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the detected opening and closing state of the leather sheath or the opening and closing state of the flip, the characteristics of automatic unlocking of the flip and the like are set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity may be detected when the electronic device 100 is stationary. The method can also be used for identifying the gesture of the electronic equipment 100, and can be applied to applications such as horizontal and vertical screen switching, pedometers and the like.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some examples, the scene is photographed and the electronic device 100 can range using the distance sensor 180F to achieve quick focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light outward through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it may be determined that there is an object in the vicinity of the electronic device 100. When insufficient reflected light is detected, the electronic device 100 may determine that there is no object in the vicinity of the electronic device 100. The electronic device 100 can detect that the user holds the electronic device 100 close to the ear by using the proximity light sensor 180G, so as to automatically extinguish the screen for the purpose of saving power. The proximity light sensor 180G may also be used in holster mode, pocket mode to automatically unlock and lock the screen.
The ambient light sensor 180L is used to sense ambient light level. The electronic device 100 may adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect whether electronic device 100 is in a pocket to prevent false touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 may utilize the collected fingerprint feature to unlock the fingerprint, access the application lock, photograph the fingerprint, answer the incoming call, etc.
The temperature sensor 180J is for detecting temperature. In some examples, the electronic device 100 performs a temperature processing strategy using the temperature detected by the temperature sensor 180J. For example, when the temperature reported by temperature sensor 180J exceeds a threshold, electronic device 100 performs a reduction in the performance of a processor located in the vicinity of temperature sensor 180J in order to reduce power consumption to implement thermal protection. In other examples, when the temperature is below another threshold, the electronic device 100 heats the battery 142 to avoid low temperatures causing the electronic device 100 to be abnormally shut down. In other examples, when the temperature is below a further threshold, the electronic device 100 performs boosting of the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperatures.
The touch sensor 180K, also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other examples, touch sensor 180K may also be disposed on a surface of electronic device 100 in a different location than display 194.
The bone conduction sensor 180M may acquire a vibration signal. In some examples, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal. In some examples, bone conduction sensor 180M may also be provided in a headset, in combination with an osteoinductive headset. The audio module 170 may analyze the voice signal based on the vibration signal of the sound portion vibration bone block obtained by the bone conduction sensor 180M, so as to implement a voice function. The application processor may analyze the heart rate information based on the blood pressure beat signal acquired by the bone conduction sensor 180M, so as to implement a heart rate detection function.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device 100 may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also correspond to different vibration feedback effects by touching different areas of the display screen 194. Different application scenarios (such as time reminding, receiving information, alarm clock, game, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device 100. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 195 may be used to insert multiple cards simultaneously. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to realize functions such as communication and data communication. In some examples, the electronic device 100 employs esims, i.e.: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
It should be understood that the electronic device 100 shown in fig. 18 is only one example, and that the electronic device 100 may have more or fewer components than shown in fig. 18, may combine two or more components, or may have a different configuration of components. The various components shown in fig. 18 may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The structure of the electronic device 200 (may also be referred to as a terminal device 200) may be the same as or similar to the structure of the electronic device 100, and the related content of the structure of the electronic device 200 may refer to the related text description of the structure of the electronic device 100 shown in fig. 18, which is not repeated herein.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
Those of ordinary skill in the art will appreciate that implementing all or part of the above-described method embodiments may be accomplished by a computer program to instruct related hardware, the program may be stored in a computer readable storage medium, and the program may include the above-described method embodiments when executed. And the aforementioned storage medium includes: ROM or random access memory RAM, magnetic or optical disk, etc.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.

Claims (16)

1. A number usage method applied to a first terminal, the method comprising:
the first terminal detects the operation of selecting a first virtual number by a user, calls a second terminal through the first virtual number, and establishes a first communication connection with the second terminal;
The first communication connection is a communication connection between a first number of the first terminal and a second number of the second terminal, and the first virtual number is associated with the first number.
2. The method according to claim 1, wherein the method further comprises:
the first virtual number is called by the second terminal, and a second communication connection is established between the first terminal and the second terminal, wherein the second communication connection is a communication connection between the first number and the second number.
3. The method according to claim 2, wherein the method further comprises:
and displaying a first user interface by the first terminal under the condition that the first virtual number is called by the second terminal, wherein the first user interface comprises the second number and the first virtual number.
4. The method of claim 1, wherein the first virtual number is for display on the second terminal in the event that the first terminal calls the second terminal through the first virtual number.
5. The method according to any of claims 1-4, wherein after the first terminal calls a second terminal through the first virtual number, the method further comprises:
The first terminal displays a second user interface, wherein the second user interface comprises a first call record, and the first call record comprises the first virtual number and the second number.
6. The method according to any one of claims 1-5, wherein before the first terminal detects the operation of selecting the first virtual number by the user, the method further comprises:
the first terminal detects the operation of applying for the virtual number by the user, and sends a first request to a first server, wherein the first request comprises the first number, and the first request is used for indicating the first server to determine the first virtual number based on the first number and sending the first virtual number to the first terminal;
the first terminal receives and stores the first virtual number sent by the first server.
7. The method of claim 6, wherein after the first terminal receives the first virtual number sent by the first server, the method further comprises:
the first terminal stores a first name, wherein the first name is the remark name of the first virtual number; or the first terminal stores the remark name of the second number as the first virtual number based on the first call record.
8. The method of claim 7, wherein the first name is further included in the first user interface.
9. The method according to claim 7 or 8, characterized in that after the first terminal saves the first name, the method further comprises:
the first terminal displays a third user interface, wherein the third user interface comprises the first name and a first identifier, and the first identifier is used for indicating that the first virtual number is associated with the first number.
10. The method according to any of claims 6-9, wherein after the first terminal receives and saves the first virtual number sent by the first server, the method further comprises:
the first terminal detects an operation of modifying the state of the first virtual number from a first state to a second state by a user, and sends a second request to the first server, wherein the second request is used for indicating the first server to modify the first state to the second state;
the first state is a state that the first virtual number allows the called party and allows the calling party, and the second state is any one of the following states: a state in which the called party is permitted but the calling party is not permitted, a state in which the calling party is permitted but the called party is not permitted, a suspended state, and a deactivated state.
11. The method according to any of the claims 2-10, wherein the first virtual number is called by the second terminal, comprising:
the first terminal receives a first message sent by a second server, wherein the first message comprises the first number and the second number.
12. The method according to any of claims 2-11, wherein the first virtual number is called by the second terminal, comprising:
the first terminal sends a third request to a first server, wherein the third request comprises the first number and the second number, and the third request is used for indicating the first server to determine the first virtual number associated with the first number based on the first number and the second number;
the first terminal receives a second message sent by the first server, wherein the second message comprises the first virtual number.
13. The method according to any of claims 1-12, wherein the first terminal calls a second terminal through the first virtual number, comprising:
the first terminal sends a fourth request to a second server, wherein the fourth request comprises the first virtual number and the second number, and the first virtual number is used for the second server to acquire the first number corresponding to the first virtual number and establish the first communication connection through the first number and the second number.
14. The method according to any of claims 1-13, wherein the first number is a phone number corresponding to a first SIM card inserted into the first terminal, and the second number is a phone number corresponding to a second SIM card inserted into the second terminal.
15. An electronic device comprising one or more processors and one or more memories; wherein the one or more memories are coupled to the one or more processors, the one or more memories for storing computer program code comprising computer instructions that, when executed by the one or more processors, cause the electronic device to perform the method of any of claims 1-14.
16. A computer storage medium storing a computer program comprising program instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of claims 1-14.
CN202210483149.4A 2022-04-29 2022-04-29 Number using method and related equipment Pending CN117014884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210483149.4A CN117014884A (en) 2022-04-29 2022-04-29 Number using method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210483149.4A CN117014884A (en) 2022-04-29 2022-04-29 Number using method and related equipment

Publications (1)

Publication Number Publication Date
CN117014884A true CN117014884A (en) 2023-11-07

Family

ID=88573336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210483149.4A Pending CN117014884A (en) 2022-04-29 2022-04-29 Number using method and related equipment

Country Status (1)

Country Link
CN (1) CN117014884A (en)

Similar Documents

Publication Publication Date Title
CN113885759B (en) Notification message processing method, device, system and computer readable storage medium
US11683850B2 (en) Bluetooth reconnection method and related apparatus
CN114173204B (en) Message prompting method, electronic equipment and system
CN113170019B (en) Incoming call display method and terminal equipment based on application
US11863701B2 (en) Method for presenting video on electronic device when there is incoming call and electronic device
US11843712B2 (en) Address book-based device discovery method, audio and video communication method, and electronic device
CN114079893B (en) Bluetooth communication method, terminal device and computer readable storage medium
CN112887926B (en) Calling method and device
US11973895B2 (en) Call method and apparatus
CN114079892A (en) Bluetooth communication method, wearable device and system
CN113973398B (en) Wireless network connection method, electronic equipment and chip system
WO2020133006A1 (en) Communication method based on bluetooth low energy, and related apparatus
US11792631B2 (en) Emergency call method and user terminal
CN117014884A (en) Number using method and related equipment
CN110737916A (en) Communication terminal and processing method
CN115460445B (en) Screen projection method of electronic equipment and electronic equipment
CN116709220B (en) Network connection method, network connection device, electronic equipment and computer readable storage medium
CN116346982B (en) Method for processing audio, electronic device and readable storage medium
US12004072B2 (en) Network search method and terminal device
CN111801931B (en) Method for switching on and hanging up telephone when call occurs SRVCC switch
US20220159551A1 (en) Network Search Method and Terminal Device
CN116170782A (en) Screen projection method, related device and system
CN116700556A (en) Card generation method and related device
CN118158313A (en) Method, electronic device and system for displaying electric quantity
CN116663044A (en) Cross-device application program management method, electronic device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination