CN117041424A - Method, device, system, equipment and storage medium for displaying calling information - Google Patents

Method, device, system, equipment and storage medium for displaying calling information Download PDF

Info

Publication number
CN117041424A
CN117041424A CN202311108468.8A CN202311108468A CN117041424A CN 117041424 A CN117041424 A CN 117041424A CN 202311108468 A CN202311108468 A CN 202311108468A CN 117041424 A CN117041424 A CN 117041424A
Authority
CN
China
Prior art keywords
information
calling
auid
terminal
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311108468.8A
Other languages
Chinese (zh)
Inventor
许锡明
庄仁峰
庄严
杨汉坤
郝兵兵
熊伟
施俊典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202311108468.8A priority Critical patent/CN117041424A/en
Publication of CN117041424A publication Critical patent/CN117041424A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a method, a device, a system, equipment and a storage medium for displaying calling information. Wherein the method comprises the following steps: receiving a first authentication user identification AUID and call information sent by a calling terminal; performing caller identity verification based on the first AUID and the call information; and responding to the passing of the calling identity verification, and providing the calling information of the calling terminal to the called terminal associated with the calling information. By the technical scheme of the application, the authentication and information display of the calling user can be realized through the network side equipment, the terminal types of the called terminal and the called terminal are not limited, the application software is not relied on, and the realization method is simpler.

Description

Method, device, system, equipment and storage medium for displaying calling information
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, a system, a device, and a storage medium for displaying caller information.
Background
In the related art, when a user receives a call request, if the number sending the call request is stored in the address book in advance, related information in the address book is displayed, and if the number sending the call request is not stored in the address book any more, basic information such as the attribution of the number can only be displayed according to the setting of an operator. Or the calling information of the calling terminal can be displayed through related application software, but the method needs to pre-install the application software in the calling terminal and the called terminal in advance.
Disclosure of Invention
In order to at least partially solve the problems in the related art, the application provides a method, a device, a system, equipment and a storage medium for displaying calling information.
In a first aspect, an embodiment of the present application provides a method for displaying calling information, where the method is applied to a network side device, and the method includes: receiving a first authentication user identification AUID and call information sent by a calling terminal; performing caller identity verification based on the first AUID and the call information; and responding to the passing of the calling identity verification, and providing the calling information of the calling terminal to the called terminal associated with the calling information.
In one implementation, before the receiving the first AUID and the call information sent by the calling terminal, the method further includes: receiving identity information sent by the calling terminal; identity verification is carried out based on the identity information sent by the calling terminal; generating the first AUID based on the identity information in response to the identity verification passing; and sending the first AUID to the calling terminal.
In an alternative implementation manner, the network side device and the calling terminal are preconfigured with a first key and/or a second key, and the sending the first AUID to the calling terminal includes: encrypting the first AUID using the first key and/or the second key; packaging the encrypted first AUID to a first safety short message; and sending the first safety short message to the calling terminal.
Optionally, the receiving the first AUID and the call information sent by the calling terminal includes: receiving a second safety short message sent by the calling terminal; the second secure short message comprises the call information and the first AUID encrypted by using the second key; analyzing the second safety short message to obtain the call information and the first AUID encrypted by using the second key; and decrypting the first AUID encrypted by using the second key based on the second key to obtain the first AUID.
In one implementation, the call information includes first identification information of the calling terminal, and the performing caller identity verification based on the first AUID and the call information includes: acquiring identity information of the calling terminal based on the first identification information; generating a second AUID based on the identity information; matching the first AUID with the second AUID to obtain a matching result; and responding to the matching result to meet a first condition, and determining that the calling identity verification is passed.
In one implementation, the call information includes second identification information of the called terminal, and the providing the calling information of the calling terminal to the called terminal associated with the call information includes: determining a display mode of calling information corresponding to the calling terminal; determining the called terminal based on the second identification information; according to the display mode, the calling information of the calling terminal is provided for the called terminal; wherein the calling information comprises identity information of the calling terminal.
In an alternative implementation, the presentation means includes at least one of: the universal user authentication module applies a USAT popup window display of the suite; and (5) displaying the webpage.
Optionally, the display manner is the USAT popup window display, and the providing, according to the display manner, the calling information of the calling terminal to the called terminal includes: and sending the calling information of the calling terminal to the called terminal.
Optionally, the displaying mode is the web page displaying, and the providing the calling information of the calling terminal to the called terminal according to the displaying mode includes: generating a display webpage of the calling information of the calling terminal; and sending the URL of the webpage to the called terminal.
In one implementation, the call information includes second identification information of the called terminal, and the providing the calling information of the calling terminal to the called terminal associated with the call information includes: determining whether the second identification information is contained in a preset identification information list; and providing the calling information of the calling terminal to a called terminal associated with the calling information in response to the second identification information being included in the identification information list.
In a second aspect, an embodiment of the present application provides a method for displaying caller information, where the method is applied to a caller terminal, and the method includes: responding to a call request sent to a called terminal through the calling terminal, and sending a first authentication user identification AUID and call information to network side equipment; the first AUID and the call information are used for the network side equipment to carry out calling identity authentication, and the call information is also used for the network side equipment to provide the calling information of the calling terminal to the called terminal associated with the call information after the calling identity authentication is passed.
In one implementation, the method further comprises: providing an interactive interface; acquiring identity information set through the interactive interface; transmitting the identity information to the network side equipment; the network side equipment can carry out identity authentication based on the identity information, and can also generate the first AUID based on the identity information after the identity authentication is passed; and acquiring the first AUID from the network side equipment.
In an alternative implementation, the method further comprises: acquiring a display mode of calling information set through the interactive interface; transmitting the display mode of the calling information to the network side equipment; the display mode is used for the network side equipment to provide the calling information of the calling terminal for the called terminal associated with the calling information according to the display mode.
In an optional implementation manner, the network side device and the calling terminal are preconfigured with a first key and/or a second key, and the acquiring the first AUID from the network side device includes: receiving a first safety short message sent by the network side equipment; the first secure short message comprises the first AUID encrypted by using the first key and/or the second key; analyzing the first secure short message to obtain the first AUID encrypted by using the first key and/or the second key; and decrypting the first AUID encrypted by using the first key and/or the second key based on the first key and/or the second key to acquire the first AUID.
Optionally, the sending the first AUID and the call information to the network side device includes: encrypting the first AUID using the second key; packaging the first AUID encrypted by the second key and the call information into a second secure short message; and sending the second safety short message to the network side equipment.
In one implementation, the call information includes at least one of: first identification information of the calling terminal; and second identification information of the called terminal.
In one implementation, the sending the first AUID and the call information to the network side device includes: acquiring second identification information of the called terminal; determining whether second identification information of the called terminal is contained in a preset identification information list; and sending the first AUID and call information to the network side equipment in response to the second identification information being contained in the identification information list.
In a third aspect, an embodiment of the present application provides a method for displaying calling information, where the method is applied to a called terminal, and the method includes: acquiring calling information of a calling terminal provided by network side equipment; the calling information is provided for the called terminal after the network equipment performs calling identity verification based on a first authentication user identifier AUID and call information sent by the calling terminal; and displaying the calling information.
In one implementation manner, the obtaining the calling information of the calling terminal provided by the network side device includes: and receiving the calling information of the calling terminal sent by the network side equipment.
In an alternative implementation manner, the displaying the calling information includes: generating a universal user authentication module application suite USAT popup window based on the calling information; the USAT popup window is displayed.
In one implementation manner, the obtaining the calling information of the calling terminal provided by the network side device includes: and receiving a Uniform Resource Locator (URL) sent by the network side equipment, wherein a webpage corresponding to the URL is used for displaying the calling information of the calling terminal.
In an alternative implementation manner, the displaying the calling information includes: invoking a browser program; and opening the webpage corresponding to the URL in the browser program.
Optionally, before the invoking the browser program, the method further comprises: providing a prompt interface, wherein the prompt interface is used for determining whether to display a webpage corresponding to the URL; and calling a browser program in response to the fact that the webpage corresponding to the URL is confirmed to be displayed through the prompt interface.
In a fourth aspect, an embodiment of the present application provides a device for displaying calling information, where the device is applied to a network side device, and the device includes: the first receiving module is used for receiving a first authentication user identification AUID and call information sent by the calling terminal; the first processing module is used for checking the identity of the calling party based on the first AUID and the calling information; and the second processing module is used for responding to the passing of the calling identity verification and providing the calling information of the calling terminal to the called terminal associated with the calling information.
In one implementation, the apparatus further comprises: the second receiving module is used for receiving the identity information sent by the calling terminal; the verification module is used for carrying out identity verification based on the identity information sent by the calling terminal; a third processing module configured to generate the first AUID based on the identity information in response to the identity verification passing; and the sending module is used for sending the first AUID to the calling terminal.
In an optional implementation manner, the network side device and the calling terminal are preconfigured with a first key and/or a second key, and the sending module is specifically configured to: encrypting the first AUID using the first key and/or the second key; packaging the encrypted first AUID to a first safety short message; and sending the first safety short message to the calling terminal.
Optionally, the first receiving module is specifically configured to: receiving a second safety short message sent by the calling terminal; the second secure short message comprises the call information and the first AUID encrypted by using the second key; analyzing the second safety short message to obtain the call information and the first AUID encrypted by using the second key; and decrypting the first AUID encrypted by using the second key based on the second key to obtain the first AUID.
In one implementation manner, the call information includes first identification information of the calling terminal, and the verification module is specifically configured to include: acquiring identity information of the calling terminal based on the first identification information; generating a second AUID based on the identity information; matching the first AUID with the second AUID to obtain a matching result; and responding to the matching result to meet a first condition, and determining that the calling identity verification is passed.
In one implementation manner, the call information includes second identification information of the called terminal, and the second processing module is specifically configured to: determining a display mode of calling information corresponding to the calling terminal; determining the called terminal based on the second identification information; according to the display mode, the calling information of the calling terminal is provided for the called terminal; wherein the calling information comprises identity information of the calling terminal.
In an alternative implementation, the presentation means includes at least one of: the universal user authentication module applies a USAT popup window display of the suite; and (5) displaying the webpage.
Optionally, the display manner is the USAT popup window display, and the second processing module is specifically configured to: and sending the calling information of the calling terminal to the called terminal.
Optionally, the displaying manner is the web page displaying, and the second processing module is specifically configured to: generating a display webpage of the calling information of the calling terminal; and sending the URL of the webpage to the called terminal. In one implementation, the second processing module is specifically configured to:
determining whether the second identification information is contained in a preset identification information list; and providing the calling information of the calling terminal to a called terminal associated with the calling information in response to the second identification information being included in the identification information list.
In a fifth aspect, an embodiment of the present application provides a device for displaying caller information, where the device is applied to a caller terminal, and the device includes: the first sending module is used for responding to a call request sent to a called terminal through the calling terminal and sending a first authentication user identifier AUID and call information to network side equipment; the first AUID and the call information are used for the network side equipment to carry out calling identity authentication, and the call information is also used for the network side equipment to provide the calling information of the calling terminal to the called terminal associated with the call information after the calling identity authentication is passed.
In one implementation, the apparatus further comprises: the interaction module is used for providing an interaction interface; the first acquisition module is used for acquiring the identity information set through the interactive interface; the second sending module is used for sending the identity information to the network side equipment; the network side equipment can carry out identity authentication based on the identity information, and can also generate the first AUID based on the identity information after the identity authentication is passed; and the second acquisition module is used for acquiring the first AUID from the network side equipment.
In an optional implementation manner, the first obtaining module is further configured to obtain a display manner of the calling information set through the interactive interface; the second sending module is further configured to send the display manner of the calling information to the network side device; the display mode is used for the network side equipment to provide the calling information of the calling terminal for the called terminal associated with the calling information according to the display mode.
In an optional implementation manner, the network side device and the calling terminal are preconfigured with a first key and/or a second key, and the second acquisition module is specifically configured to: receiving a first safety short message sent by the network side equipment; the first secure short message comprises the first AUID encrypted by using the first key and/or the second key; analyzing the first secure short message to obtain the first AUID encrypted by using the first key and/or the second key; and decrypting the first AUID encrypted by using the first key and/or the second key based on the first key and/or the second key to acquire the first AUID.
Optionally, the first sending module is specifically configured to: encrypting the first AUID using the second key; packaging the first AUID encrypted by the second key and the call information into a second secure short message; and sending the second safety short message to the network side equipment.
In one implementation, the call information includes at least one of: first identification information of the calling terminal; and second identification information of the called terminal.
In one implementation manner, the first sending module is specifically configured to: acquiring second identification information of the called terminal; determining whether second identification information of the called terminal is contained in a preset identification information list; and sending the first AUID and call information to the network side equipment in response to the second identification information being contained in the identification information list.
In a sixth aspect, an embodiment of the present application provides a device for displaying calling information, where the device is applied to a called terminal, and the device includes: the acquisition module is used for acquiring the calling information of the calling terminal provided by the network side equipment; the calling information is provided for the called terminal after the network equipment performs calling identity verification based on a first authentication user identifier AUID and call information sent by the calling terminal; and the display module is used for displaying the calling information.
In one implementation, the obtaining module is specifically configured to: and receiving the calling information of the calling terminal sent by the network side equipment.
Optionally, the display module is specifically configured to: generating a universal user authentication module application suite USAT popup window based on the calling information; the USAT popup window is displayed.
In one implementation, the obtaining module is specifically configured to: and receiving a Uniform Resource Locator (URL) sent by the network side equipment, wherein a webpage corresponding to the URL is used for displaying the calling information of the calling terminal.
Optionally, the display module is specifically configured to: invoking a browser program; and opening the webpage corresponding to the URL in the browser program.
Optionally, the display module is specifically configured to: providing a prompt interface, wherein the prompt interface is used for determining whether to display a webpage corresponding to the URL; and calling a browser program in response to the fact that the webpage corresponding to the URL is confirmed to be displayed through the prompt interface.
In a seventh aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of presenting caller information as described in the first aspect.
In an eighth aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of presenting caller information as described in the second aspect.
In a ninth aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of presenting caller information as described in the third aspect.
In a tenth aspect, the present application provides a system for displaying caller information, where the system includes the caller information display device according to the fourth aspect, the caller information display device according to the fifth aspect, and the caller information display device according to the sixth aspect, or the system includes the electronic device according to the seventh aspect, the electronic device according to the eighth aspect, and the electronic device according to the ninth aspect.
In an eleventh aspect, an embodiment of the present application provides a computer readable storage medium storing instructions that, when executed, cause a method according to the first aspect to be implemented.
In a twelfth aspect, embodiments of the present application provide a computer readable storage medium storing instructions that, when executed, cause a method as described in the second aspect to be implemented.
In a thirteenth aspect, an embodiment of the present application provides a computer-readable storage medium storing instructions that, when executed, cause a method according to the third aspect to be implemented.
In a fourteenth aspect, an embodiment of the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the method of presenting caller information as described in the first aspect.
In a fifteenth aspect, embodiments of the present application provide a computer program product comprising a computer program which, when executed by a processor, implements the steps of the method of presenting caller information as described in the second aspect.
In a sixteenth aspect, an embodiment of the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the method of presenting caller information as described in the third aspect.
The technical scheme provided by the embodiment of the application can comprise the following beneficial effects: the calling terminal can provide identity information for the network side equipment to carry out identity authentication, and acquire a first authentication user identifier sent by the network side equipment after the identity authentication is passed so as to send the first authentication user identifier and call information to the network side equipment when a call request is initiated to the called terminal, and the network side equipment can carry out calling identity authentication based on the received first authentication user identifier and call information of the calling terminal and provide the calling information of the calling terminal for the called terminal when the calling identity verification is passed so as to enable the called terminal to display the calling information. Authentication and information display of a calling user can be realized through network side equipment, the limitation of terminal types of a called terminal and a called terminal is avoided, and the realization method is simpler.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Drawings
The drawings are included to provide a better understanding of the present application and are not to be construed as limiting the application. Wherein:
Fig. 1 is a schematic diagram of a method for displaying caller information according to an embodiment of the present application;
fig. 2 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 3 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 4 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 5 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 6 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 7 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 8 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 9 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application;
fig. 10 is a flowchart of a caller authentication and display mechanism provided by an embodiment of the present application;
fig. 11 is a schematic diagram of a caller information display device according to an embodiment of the present application;
fig. 12 is a schematic diagram of another caller information display apparatus according to an embodiment of the present application;
Fig. 13 is a schematic diagram of another caller information display device according to an embodiment of the present application;
fig. 14 is a schematic view of yet another caller information display apparatus according to an embodiment of the present application;
fig. 15 is a schematic diagram of a display device of calling information according to another embodiment of the present application;
FIG. 16 is a schematic block diagram of an example electronic device that may be used to implement embodiments of the present application.
Detailed Description
Exemplary embodiments of the present application will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present application are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Wherein, in the description of the present application, "/" means or is meant unless otherwise indicated, for example, a/B may represent a or B; "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. The first, second, etc. numbers referred to in the present application are merely for convenience of description and are not intended to limit the scope of the embodiments of the present application, nor represent the sequence.
Referring to fig. 1, fig. 1 is a schematic diagram of a method for displaying caller information according to an embodiment of the present application. The method can be applied to network side equipment. As shown in fig. 1, the method may include, but is not limited to, the steps of:
step S101: a first AUID (Authenticated User Identity, authenticated user identification) and call information sent by the calling terminal are received.
For example, a first AUID sent by a calling terminal that sent a call request, and call information associated with the call request are received.
Step S102: and carrying out calling identity verification based on the first AUID and the calling information.
For example, at least one AUID corresponding to the terminal device after identity verification is prestored in the network side device, so that the network side device can obtain the AUID corresponding to the calling terminal according to the call information, and compare the AUID corresponding to the calling terminal with the first AUID to perform the identity verification of the calling.
Step S103: and responding to the passing of the calling identity verification, and providing the calling information of the calling terminal to the called terminal associated with the calling information.
For example, in response to the caller identity verification passing, the caller information of the caller terminal configured in advance is provided to the called terminal associated with the caller information, so that the called terminal displays the caller information of the caller.
By implementing the embodiment of the application, the network side equipment can carry out the caller identity authentication based on the received first AUID and the call information of the caller terminal, and provide the caller information of the caller terminal to the callee terminal when the caller identity verification passes, so that the callee terminal displays the caller information. Authentication and information display of a calling user can be realized through network side equipment, the limitation of terminal types of a called terminal and a called terminal is avoided, and the realization method is simpler.
In one implementation, the network side device may obtain identity information corresponding to the calling terminal, and generate the first AUID based on the identity information. As an example, please refer to fig. 2, fig. 2 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. The method can be applied to network side equipment. As shown in fig. 2, the method may include, but is not limited to, the steps of:
step S201: and receiving the identity information sent by the calling terminal.
In this embodiment of the present application, the identity information may be identity information of the user using the calling terminal.
Wherein, in the embodiment of the present application, the identity information may include at least one of the following: real name identity information such as the name, telephone number, identity card number and the like of the user, and work identity information such as the work unit, department, position and the like of the user.
Step S202: and carrying out identity verification based on the identity information sent by the calling terminal.
Specifically, the authenticity of the identity information sent by the calling terminal is checked.
Step S203: in response to the identity verification passing, a first AUID is generated based on the identity information.
For example, in response to the identity verification passing, a preset method is used to calculate in combination with the identity information, so as to obtain a first AUID.
In some embodiments of the present application, the first AUID may be generated based on the identity information by the following steps.
The original key K is preset in the network side equipment. The network side equipment fills the original key with byte 0x00 according to the block size, and hashes the original key after filling to obtain a key K 1 . The above steps can be expressed as follows:
K 1 =H 1 (K)
then the key K is used 1 Exclusive or is carried out with the expanded identity information, and a second step of hash calculation is carried out. The above steps can be expressed as follows:
Padding=expand(0x80,blockSize)
wherein, packing is the result obtained by expanding the identity information according to the block length of the hash algorithm, expansion () represents the expansion of the identity information according to the block length of the hash algorithm, 0x80 is the value of the identity information, and block size is the block length of the hash algorithm, H 2 () Representative will K 1 And performing hash operation after exclusive OR with the packing to obtain a result of the hash operation of the second step.
As an example, the identity information includes real name information such as a mobile phone number, a name, an identification card number, and the like. The input information is obtained by sequentially arranging the information items in the identity information, and the input information can be specifically expressed as follows:
Info=Number:Name:ID
the Info is input information, the Number is a mobile phone Number, the Name is a Name, and the ID is an identity card Number. And splicing the input information info with the result of the second hash operation, and performing the third hash operation to obtain a first AUID. The method can be concretely represented as follows:
wherein, the AUID is the first AUID.
As another example, the identity information includes real name information such as a mobile phone number, a name, an identification card number, etc., and professional information such as a company, a department, a job position, etc. And sequentially arranging the real-name information to obtain input information info, sequentially arranging the professional information to obtain professional input information jobInfo, splicing the input information and the professional input information with the result of the second hash operation, and performing the third hash operation to obtain the first AUID. The method can be concretely represented as follows:
wherein, AUID is first AUID.
In some embodiments of the present application, the calculated AUID may be intercepted according to actual situations, and a part of the calculated AUID is used as the first AUID.
Step S204: and sending the first AUID to the calling terminal.
In an alternative implementation manner, the network side device and the calling terminal are preconfigured with a first key and/or a second key, and the sending the first AUID to the calling terminal includes: encrypting the first AUID using the first key and/or the second key; packaging the encrypted first AUID to a first safety short message; and sending the first safety short message to the calling terminal.
Wherein, in the embodiment of the application, the first key and the second key can be preset in a USIM (Universal Subscriber Identity Module, universal user authentication module) of the calling terminal.
Wherein, in the embodiment of the present application, the first key may be an ENC (Encryption) key, and the second key may be a DEK (Data Encryption Key ).
For example, the network side device performs symmetric encryption on the first AUID by using the DEK key, performs symmetric encryption on the encrypted first AUID and other information (for example, an identity verification result) by using the ENC key, encapsulates the information encrypted by the ENC key into a secure short message, and sends the secure short message to the calling terminal through a preset port number.
Step S205: and receiving the first AUID and the call information sent by the calling terminal.
In an optional implementation manner, the receiving the first AUID and the call information sent by the calling terminal may include the following steps: receiving a second safety short message sent by a calling terminal; analyzing the second safety short message to obtain calling information and a first AUID encrypted by using a second key; and decrypting the first AUID encrypted by using the second key based on the second key to obtain the first AUID.
The second secure short message includes call information and a first AUID encrypted by using a second key.
For example, a second secure short message sent by the calling terminal is received, where the second secure short message includes call information and a first AUID encrypted by using a second key; analyzing the second secure short message to obtain call information encapsulated in the second secure short message and a first AUID encrypted by using a second key; and decrypting the first AUID encrypted by the second key by using the second key to obtain the first AUID.
Step S206: and carrying out calling identity verification based on the first AUID and the calling information.
In the embodiment of the present application, step S206 may be implemented in any manner of each embodiment of the present application, which is not limited to this embodiment, and is not described in detail.
Step S207: and responding to the passing of the calling identity verification, and providing the calling information of the calling terminal to the called terminal associated with the calling information.
In the embodiment of the present application, step S207 may be implemented in any manner of each embodiment of the present application, which is not limited to this embodiment, and is not described in detail.
By implementing the embodiment of the application, the network side equipment can generate the first AUID based on the identity information of the calling terminal and send the first AUID to the calling terminal, so that the calling identity authentication can be performed based on the first AUID of the calling terminal and the calling information, and the calling information of the calling terminal is provided for the called terminal when the calling identity verification is passed, so that the called terminal displays the calling information. Authentication and information display of a calling user can be realized through network side equipment, the limitation of terminal types of a called terminal and a called terminal is avoided, and the realization method is simpler.
In one implementation, the network side device may obtain identity information of the calling terminal based on the call information, and perform identity verification based on the identity information of the calling terminal. As an example, please refer to fig. 3, fig. 3 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. As shown in fig. 3, the method may include, but is not limited to, the steps of:
Step S301: and receiving the first AUID and the call information sent by the calling terminal.
In an embodiment of the present application, the call information includes first identification information of the calling terminal.
In this embodiment of the present application, the first identification information may include, but is not limited to, an IMEI (International Mobile Equipment Identity ) of the calling terminal, an ICCID (Integrate Circuit Card Identity, integrated circuit card identity) of the USIM in the calling terminal, a phone number corresponding to the USIM card in the calling terminal, and the like.
Step S302: and acquiring the identity information of the calling terminal based on the first identification information.
For example, the network side device stores a plurality of pieces of identity information corresponding to a plurality of terminals in advance, so that the network side device can determine, from the plurality of terminals, a target terminal corresponding to the calling terminal based on the first identification information, and thus take the identity information of the target terminal as the identity information of the calling terminal.
Step S303: a second AUID is generated based on the identity information.
For example, the second AUID may be generated according to the method provided in step S203 in the foregoing embodiment, based on the identity information of the calling terminal acquired in the foregoing step.
Step S304: and matching the first AUID with the second AUID to obtain a matching result.
For example, the specific content of the first AUID and the specific content of the second AUID are matched, and a matching result is obtained.
Step S305: and determining that the caller identity verification is passed in response to the matching result meeting the first condition.
In the embodiment of the present application, the first condition is a preset condition for determining whether the identity information of the calling terminal passes the caller identity verification.
For example, in response to the matching result of the first AUID and the second AUID being the same as the first AUID and the second AUID, it is determined that the identity information of the calling terminal passes the caller identity verification.
Step S306: and responding to the passing of the calling identity verification, and providing the calling information of the calling terminal to the called terminal associated with the calling information.
In the embodiment of the present application, step S306 may be implemented in any manner of each embodiment of the present application, which is not limited to this embodiment, and is not described in detail.
By implementing the embodiment of the application, the network side equipment can acquire the identity information of the calling terminal based on the received call information of the calling terminal and perform the calling identity verification based on the identity information of the calling terminal, so that the calling information of the calling terminal is provided for the called terminal when the calling identity verification passes, and the called terminal can display the calling information. Authentication and information display of a calling user can be realized through network side equipment, the limitation of terminal types of a called terminal and a called terminal is avoided, and the realization method is simpler.
In one implementation, the calling information may be provided to the called terminal according to different display modes of the calling information set by the calling terminal. As an example, please refer to fig. 4, fig. 4 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. As shown in fig. 4, the method may include, but is not limited to, the steps of:
step S401: and receiving the first AUID and the call information sent by the calling terminal.
In the embodiment of the application, the calling information comprises second identification information of the called terminal.
In the embodiment of the present application, the second identification information may include, but is not limited to, an IMEI of the called terminal, an ICCID of a USIM card in the called terminal, a phone number corresponding to the USIM card in the called terminal, and the like.
Step S402: and carrying out calling identity verification based on the first AUID and the calling information.
In the embodiment of the present application, step 402 may be implemented in any manner of each embodiment of the present application, which is not limited to this embodiment, and is not repeated.
Step S403: and determining the display mode of the calling information corresponding to the calling terminal in response to the passing of the verification of the calling identity.
In an embodiment of the present application, the display manner includes at least one of the following: USAT (USIM Application Toolkit, universal user authentication module application suite) popup display; and (5) displaying the webpage.
For example, in response to the caller terminal passing the caller identity verification, determining a preset presentation method of caller information of the caller terminal.
As an example, the calling terminal may configure its own display manner of the calling information in advance as web page display.
In some embodiments of the present application, the calling terminal may configure a specific form of the calling information of the calling terminal when performing web page display.
As another example, if the calling terminal does not configure the display manner of the calling information of the calling terminal, it may be determined that the display manner of the calling information corresponding to the calling terminal is USAT popup window display.
Step S404: and determining the called terminal based on the second identification information.
Specifically, a called terminal that needs to display calling information is determined based on the second identification information.
Step S405: and providing the calling information of the calling terminal to the called terminal according to the display mode.
In the embodiment of the application, the calling information comprises identity information of the calling terminal.
In one implementation manner, the display manner corresponding to the calling terminal is USAT popup display, and the providing the calling information of the calling terminal to the called terminal according to the display manner includes: and sending the calling information of the calling terminal to the called terminal.
For example, in response to the display manner of the calling information corresponding to the calling terminal being USAT popup, the calling information of the calling terminal is encoded and assembled according to a Type-length-value (TLV) encoding rule and then sent to the called terminal, so that the called terminal generates the USAT popup based on the calling information, and the calling information of the calling terminal is displayed in the USAT popup manner.
As an example, referring to table 1, table 1 is a schematic diagram of a caller information assembly rule provided in an embodiment of the present application.
Table 1: caller information assembly rule schematic form
The company name, the department name and the job name are provided and transmitted to the called user only after the user completes job authentication, and when the job authentication is performed, the two other items except the company name are selectable items, so that the two items are marked as Optional (O), but related Tag and Length fields still need to be transmitted to the called terminal, and the Length field is set to 0.
In some embodiments of the present application, the calling information may further include additional prompt information, which may be used to provide additional information to the called terminal. For example, messages and the like set by the calling terminal.
In some embodiments of the present application, the name, company name, department name, job name and additional hint information should support two coding modes of ASCII and UCS2, and when related fields use UCS2 coding, one character should be coded with 0x80 beginning in the value field, namely with 0x80 beginning in the Alpha field of the UICC file, and always with the higher byte preceding and the lower byte following in the UCS2 coding mode adopted by the Alpha field of the UICC file. As an example, please refer to table 2, table 2 is a schematic diagram of a caller information coding rule provided in an embodiment of the present application.
Table 2: caller information coding rule schematic form
After the network side equipment completes the assembly of the calling information, the assembled calling information is packaged into a safe short message and sent to the called terminal.
In one implementation manner, the display manner corresponding to the calling terminal is web page display, and the providing the calling information of the calling terminal to the called terminal according to the display manner includes: generating a display webpage of calling information of a calling terminal; the URL (Uniform Resource Locator ) of the presented web page is sent to the called terminal.
For example, in response to the display mode corresponding to the calling terminal being web page display, the network side device sends a URL of a web page for displaying the calling information to the called terminal, and the called terminal may open the web page corresponding to the URL in its own browser to display the calling information.
In some embodiments of the present application, the network side device may send the calling information of the calling terminal and the URL of the display webpage of the calling information of the calling terminal to the called terminal at the same time, and the called terminal may autonomously determine the display mode of the calling information according to its own situation.
By implementing the embodiment of the application, the network side equipment can provide the calling information for the called terminal according to the display modes of different calling information set by the calling terminal so as to enable the called terminal to display the calling information. The method is not limited by the terminal types of the called terminal and the called terminal, and the implementation method is simpler.
In one implementation, the calling information includes the second identification information of the called terminal, and the method in any of the foregoing embodiments provides the calling information of the calling terminal to the called terminal associated with the calling information may include the following steps: determining whether the second identification information is contained in a preset identification information list; in response to the second identification information being included in the identification information list, the calling information of the calling terminal is provided to the called terminal to which the calling information is associated.
For example, a network side device is preconfigured with an identification information list, where the identification information list includes identification information of at least one terminal device. If the identification information of the called terminal is the same as any identification information in the identification information list, the calling information of the calling terminal is provided for the called terminal associated with the calling information; if the identification information of the called terminal is different from any identification information in the identification information list, the calling information of the calling terminal is not provided for the called terminal associated with the calling information.
In other embodiments of the present application, the call information includes second identification information of the called terminal, where in any of the above embodiments, the calling information of the calling terminal is provided to the called terminal associated with the call information, and the method may further include the following steps: determining whether the second identification information is contained in a preset identification information list; in response to the second identification information not being included in the identification information list, the calling information of the calling terminal is provided to the called terminal to which the calling information is associated.
For example, a network side device is preconfigured with an identification information list, where the identification information list includes identification information of at least one terminal device. If the identification information of the called terminal is the same as any identification information in the identification information list, the calling information of the calling terminal is not provided for the called terminal associated with the calling information; if the identification information of the called terminal is different from any identification information in the identification information list, the calling information of the calling terminal is provided for the called terminal associated with the calling information.
In the embodiment of the present application, the method for displaying the caller information provided by the embodiment of the present application is described from the perspective of the network side device, and the method for displaying the caller information provided by the embodiment of the present application is further described from the perspective of the caller terminal.
As an example, please refer to fig. 5, fig. 5 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. The method is performed by a calling terminal, which contains a USIM card. As shown in fig. 5, the method may include, but is not limited to, the steps of:
step S501: and sending the first AUID and call information to the network side equipment in response to sending a call request to the called terminal through the calling terminal.
In the embodiment of the application, the first AUID and the call information are used for the network side equipment to carry out the caller authentication, and the call information is also used for the network side equipment to provide the caller information of the caller terminal to the called terminal associated with the call information after the caller authentication is passed.
For example, a call application on the UISM of the calling terminal initiates a call monitoring event registration procedure, a registration request is initiated to the calling terminal through an APDU (Application Protocol Data Unit ) instruction, and the calling terminal uses the event mechanism of the USAT to notify call information to the call application whenever there is a call outgoing after the registration is completed. Therefore, the call application can send the first AUID acquired in advance and the call information corresponding to the call request to the network side equipment.
Wherein, in the embodiment of the application, the call information includes at least one of the following: first identification information of the calling terminal; and second identification information of the called terminal.
By implementing the embodiment of the application, the calling terminal can send the first AUID and the call information to the network side equipment when receiving the call request of the user. Therefore, the network side equipment can carry out the calling identity verification based on the first AUID and the calling information, and provide the calling information of the calling terminal for the called terminal when the calling identity verification passes, so that the called terminal displays the calling information. The display of the calling information can be conveniently realized, the type of the called terminal is not limited, and the application software is not relied on.
In one implementation, the user may perform identity authentication through an interactive interface provided by the calling terminal to obtain the first AUID. As an example, please refer to fig. 6, fig. 6 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. The method may be performed by a calling terminal. As shown in fig. 6, the method may include, but is not limited to, the following steps:
step S601: an interactive interface is provided.
For example, an interactive interface with the user is provided through the display module of the calling terminal.
Step S602: and acquiring identity information set through the interactive interface.
Specifically, identity information set by a user through an interactive interface is acquired.
Step S603: and sending the identity information to the network side equipment.
The network side device can perform identity authentication based on the identity information, and the network side device can generate a first AUID based on the identity information after the identity authentication is passed.
Step S604: the first AUID is obtained from the network side equipment.
For example, a first AUID sent by a network side device is received.
In one implementation, a first key and/or a second key are preconfigured in the network side device and the calling terminal, and the obtaining the first AUID from the network side device includes: receiving a first safety short message sent by network side equipment; the first secure short message comprises a first AUID encrypted by using a first key and/or a second key; analyzing the first secure short message to obtain a first AUID encrypted by using the first key and/or the second key; and decrypting the first display mode encrypted by using the first key and/or the second key based on the first key and/or the second key to obtain a first AUID.
For example, a call application on a USIM of a calling terminal receives a first secure short message sent by a network side device, where the first secure short message includes a first AUID encrypted by using a first key and/or a second key, and the call application parses the first secure short message to obtain the encrypted first AUID therein, and decrypts the encrypted first AUID based on the first key and/or the second key to obtain the first AUID.
Through implementation of the embodiment of the application, the calling terminal can acquire the identity information of the user through the interactive interface, and sends the identity information to the network side equipment for identity authentication so as to acquire the first AUID through the network side equipment. Therefore, the network side equipment can carry out the calling identity verification based on the first AUID and the calling information, and provide the calling information of the calling terminal for the called terminal when the calling identity verification passes, so that the called terminal displays the calling information. The display of the calling information can be conveniently realized, the type of the called terminal is not limited, and the application software is not relied on.
In one implementation, the method may further include: acquiring a display mode of calling information set through an interactive interface; transmitting the display mode of the calling information to network equipment; the display mode is used for the network side equipment to provide the calling information of the calling terminal for the called terminal associated with the calling information according to the display mode.
For example, the calling terminal obtains a calling information display mode set by the user through the interactive interface, and sends the display method to the network side device, and the network side device can provide the calling information of the calling terminal to the called terminal associated with the calling information according to the display mode.
In an alternative implementation manner, the sending the first AUID and the call information to the network side device in the foregoing embodiment may include the following steps: encrypting the first AUID using the second key; packaging the first AUID encrypted by the second key and the call information into a second secure short message; and sending the second safety short message to the network side equipment.
For example, the calling terminal uses the second key to symmetrically encrypt the first AUID, encapsulates the encrypted first AUID and the call information into a second secure short message, and sends the second secure short message to the network side device.
In one implementation, the method for sending the first AUID and the call information to the network side device may further include the following steps: acquiring second identification information of the called terminal; determining whether second identification information of the called terminal is contained in a preset identification information list; and transmitting the first AUID and the call information to the network side device in response to the identification information being included in the identification information list.
For example, an identification information list is preconfigured in a calling terminal, and second identification information of a called terminal is obtained in response to a call request initiated to the called terminal through the calling terminal; determining whether the identification information of the called terminal is contained in the identification information list; responding to the second identification information of the called terminal contained in the identification information list, and sending a first AUID and call information to network side equipment; or, in response to the second identification information of the called terminal not being included in the identification information list, the first AUID and the call information are not transmitted to the network side device.
It should be noted that, in the embodiment of the present application, the list of identification information in the calling terminal may be the same as or different from the list of identification information of the network side device in the foregoing embodiment.
In some embodiments of the present application, the steps may be performed by a USIM of the calling terminal, and the preset identification information list may be stored in a call application specific file on the USIM of the calling terminal.
In other embodiments of the present application, the second identification information of the called terminal may be included in the identification information list, and the first AUID and the call information may not be sent to the network side device; or, in response to the second identification information of the called terminal not being included in the identification information list, sending the first AUID and the call information to the network side device.
In some embodiments of the present application, the identification information in the identification information list of the calling terminal may be the identification information after transcoding. For example, the identification information in the calling terminal may be information encoded using a BCD (Binary-Coded Decimal) encoding rule.
In the embodiment provided by the application, the method for displaying the calling information provided by the embodiment of the application is introduced from the angles of the network side equipment and the calling terminal respectively, and the method for displaying the calling information provided by the embodiment of the application is further introduced from the angle of the called terminal.
As an example, please refer to fig. 7, fig. 7 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. The method is applied to the called terminal, and the called terminal comprises a USIM card. As shown in fig. 7, the method may include, but is not limited to, the steps of:
step S701: and acquiring calling information of the calling terminal provided by the network side equipment.
In the embodiment of the application, the calling information is provided to the called terminal after the network side equipment performs the verification of the calling identity based on the first AUID and the calling information sent by the calling terminal.
For example, calling information corresponding to a calling terminal provided by the network side device is obtained.
Step S702: and displaying the calling information.
For example, a call application on the USIM of the called terminal analyzes the calling information, fills the analyzed information into a display template adapted to the USAT popup, and displays the USAT popup with the calling information through the display module of the calling terminal.
By implementing the embodiment of the application, the called terminal can acquire the calling information of the calling terminal provided by the network side equipment and display the calling information. The display of the calling information can be realized more conveniently, and the display is not limited by the terminal type of the called terminal.
In one implementation, the called terminal may receive the calling information of the calling terminal sent by the network side device, and display the calling information. As an example, please refer to fig. 8, fig. 8 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. The method is applied to the called terminal. As shown in fig. 8, the method may include, but is not limited to, the steps of:
step S801: and receiving the calling information of the calling terminal sent by the network side equipment.
Specifically, the calling information of the calling terminal directly sent by the network side equipment is received.
Step S802: and generating a USAT popup window based on the calling information.
For example, the calling information after TLV encoding sent by the network side device is obtained, the specific identity information contained in the calling information is obtained, the specific identity information is filled into a preset information display template, and a USAT popup window is generated
Step S803: USAT popups are shown.
By implementing the embodiment of the application, the called terminal can receive the calling information of the calling terminal sent by the network side equipment and display the calling information through the USAT popup window. The calling information presentation independent of application software can be realized, and the terminal type of the called terminal is not limited.
In one implementation, the called terminal may receive the URL sent by the network side device, so as to display the calling information based on the URL. As an example, please refer to fig. 9, fig. 9 is a schematic diagram of another method for displaying caller information according to an embodiment of the present application. The method is applied to the called terminal. As shown in fig. 9, the method may include, but is not limited to, the steps of:
step S901: and receiving the URL sent by the network side equipment.
In the embodiment of the application, the webpage corresponding to the URL is used for displaying the calling information of the calling terminal.
Step S902: a browser program is invoked.
Specifically, a browser program pre-installed in the called terminal is called.
Step S903: and opening the webpage corresponding to the URL in the browser program.
Specifically, a webpage corresponding to the URL is opened in the called browser, so that the calling information of the calling terminal is displayed.
By implementing the embodiment of the application, the called terminal can receive the URL sent by the network side equipment and call the browser program to display the webpage corresponding to the URL, thereby displaying the calling information of the calling terminal. The calling information presentation independent of application software can be realized, and the terminal type of the called terminal is not limited.
In some embodiments of the present application, the called terminal may receive the calling information and URL of the calling terminal sent by the network side device at the same time, and determine the display manner according to the self situation.
For example, when the called terminal cannot call the browser application, the calling information is displayed through a UAST popup window.
In one implementation, before invoking the browser program, the method further includes: providing a prompt interface, wherein the prompt interface is used for determining whether to display a webpage corresponding to the URL; and calling a browser program in response to the fact that the webpage corresponding to the URL is confirmed to be displayed through the prompt interface.
Specifically, the called terminal provides a prompt interface for selecting whether to display the webpage corresponding to the URL, and the browser program is called to display the webpage corresponding to the URL in response to the user selecting to display the webpage corresponding to the URL through the prompt interface.
In some embodiments of the present application, the terminal device may further send the result selected by the user through the prompt interface to the network side device.
Referring to fig. 10, fig. 10 is a schematic diagram of a calling information display scheme according to an embodiment of the present application. As shown in fig. 10, in this technical solution, a user may upload, through a calling terminal, own related identity information on an authentication platform (i.e., the foregoing network side device) to perform identity authentication, where the network side device performs verification and confirmation on the identity information.
After verification and confirmation are passed, the network side equipment generates an AUID for identifying the unique identity of the user according to the identity information provided by the user, encrypts the AUID by using a preset DEK key, symmetrically encrypts the encrypted AUID and an identity verification result by using an ENC key, encapsulates the encrypted AUID and the identity verification result into a safe short message, and transmits the safe short message to the calling terminal through a specific port number.
After receiving the encrypted AUID-containing information sent by the network side equipment, the calling application on the USIM in the calling terminal decrypts the security information by using a preset ENC key to obtain an authentication result and decrypt data by using the preset ENC key, confirms the authentication result and decrypts the AUID by using a DEK key.
When a user initiates a call request to a called terminal through a calling terminal, the calling terminal sends call information to a call application on a USIM through a calling monitoring event, after the call application obtains the information, the current network state is judged through a current signal state field, if network service is normal, a DEK key is used for encrypting an AUID, and the AUID, the dialing information and a base station ID in position information are packaged into a safe short message and uploaded to network side equipment, and if no signal exists at present, the reporting flow is terminated.
The network side equipment analyzes the safe short message sent by the calling terminal after receiving the safe short message, uses the identification information (such as a mobile phone number) of the calling terminal to index personal information and authentication types, obtains the identity information corresponding to the calling terminal, recalculates the AUID based on the identity information, decrypts the AUID of the safe short message by using the DEK key, compares the AUID with the recalculated AUID, confirms the legality of the mobile phone number and the AUID, identifies the user authentication types, ensures the integrity of key data and ensures that the data is not tampered halfway.
The network side equipment decides the display mode of the calling information of the called terminal according to the configuration of the user during authentication. And different information is sent to the called terminal according to different display modes.
And the call application on the USIM in the called terminal analyzes the information content sent by the network side equipment, and decides the display mode of the calling information according to the related parameter field of the short message so as to display the calling information.
Referring to fig. 11, fig. 11 is a schematic diagram of a display device for caller information according to an embodiment of the application. The apparatus 1100 may be applied to a network side device. As shown in fig. 11, the apparatus 1100 includes: a first receiving module 1101, configured to receive a first AUID and call information sent by a calling terminal; a first processing module 1102, configured to perform caller identity verification based on the first AUID and the call information; the second processing module 1103 is configured to provide the calling information of the calling terminal to the called terminal associated with the calling information in response to the passing of the caller identity verification.
In one implementation, the apparatus further includes: the system comprises a second receiving module, a checking module, a third processing module and a sending module. As an example, please refer to fig. 12, fig. 12 is a schematic diagram of a display device for providing another caller information according to an embodiment of the present application. The apparatus 1200 may be applied to a network side device. As shown in fig. 12, the apparatus 1200 includes a second receiving module 1204, configured to receive identity information sent by a calling terminal; the verification module 1205 is used for performing identity verification based on the identity information sent by the calling terminal; a third processing module 1206 for generating a first AUID based on the identity information in response to the identity verification passing; a transmitting module 1207, configured to transmit the first AUID to the calling terminal.
In an alternative implementation manner, the network side device and the calling terminal are preconfigured with the first key and/or the second key, and the sending module 1207 is specifically configured to: encrypting the first AUID using the first key and/or the second key; packaging the encrypted first AUID to a first safety short message; and sending the first safety short message to the calling terminal.
Optionally, the first receiving module 1101 is specifically configured to: receiving a second safety short message sent by a calling terminal; the second secure short message comprises call information and a first AUID encrypted by using a second key; analyzing the second safety short message to obtain calling information and a first AUID encrypted by using a second key; and decrypting the first AUID encrypted by using the second key based on the second key to obtain the first AUID.
In an alternative implementation, the call information includes first identification information of the calling terminal, and the verification module 1205 is specifically configured to include: acquiring identity information of a calling terminal based on the first identification information; generating a second AUID based on the identity information; matching the first AUID with the second AUID to obtain a matching result; and determining that the caller identity verification is passed in response to the matching result meeting the first condition.
In one implementation, the call information includes second identification information of the called terminal, and the second processing module 1103 is specifically configured to: determining a display mode of calling information corresponding to a calling terminal; determining the called terminal based on the second identification information; according to the display mode, the calling information of the calling terminal is provided for the called terminal; the calling information comprises identity information of the calling terminal.
In an alternative implementation, the presentation means includes at least one of: the universal user authentication module applies a USAT popup window display of the suite; and (5) displaying the webpage.
Optionally, the display manner is USAT popup display, and the second processing module 1103 is specifically configured to: and sending the calling information of the calling terminal to the called terminal.
Optionally, the display manner is web page display, and the second processing module 1103 is specifically configured to: generating a display webpage of calling information of a calling terminal; and sending the URL of the uniform resource locator for displaying the webpage to the called terminal.
In one implementation, the second processing module 1103 is specifically configured to: determining whether the second identification information is contained in a preset identification information list; in response to the second identification information being included in the identification information list, the calling information of the calling terminal is provided to the called terminal to which the calling information is associated.
By the device of the embodiment of the application, the network side equipment can carry out the caller identity authentication based on the received first AUID and the call information of the caller terminal, and provide the caller information of the caller terminal to the callee terminal when the caller identity verification passes, so that the callee terminal displays the caller information. Authentication and information display of a calling user can be realized through network side equipment, the limitation of terminal types of a called terminal and a called terminal is avoided, and the realization method is simpler.
Referring to fig. 13, fig. 13 is a schematic diagram of a display device for displaying caller information according to an embodiment of the application. The apparatus 1300 may be applied to a calling terminal. As shown in fig. 13, the apparatus 1300 includes: a first sending module 1301, configured to send a first AUID and call information to a network side device in response to sending a call request to a called terminal through a calling terminal; the first AUID and the call information are used for the network side equipment to carry out the caller authentication, and the call information is also used for the network side equipment to provide the caller information of the caller terminal to the called terminal associated with the call information after the caller authentication is passed.
In one implementation, the apparatus further includes: the device comprises an interaction module, a first acquisition module, a second sending module and a second acquisition module. As an example, please refer to fig. 14, fig. 14 is a schematic diagram of a display device for providing yet another caller information according to an embodiment of the present application. The apparatus 1400 may be applied to a calling terminal. As shown in fig. 14, the apparatus 1400 includes: an interaction module 1402 for providing an interaction interface; a first obtaining module 1403, configured to obtain identity information set through an interactive interface; a second sending module 1404, configured to send the identity information to a network side device; the network side equipment can carry out identity authentication based on the identity information, and can also generate a first AUID based on the identity information after the identity authentication is passed; a second obtaining module 1405, configured to obtain the first AUID from the network side device. The module 1401 in fig. 14 has the same structure and function as the module 1301 in fig. 13.
In an alternative implementation, the first obtaining module 1403 is further configured to: acquiring a display mode of calling information set through an interactive interface; the second sending module is also used for sending the display mode of the calling information to the network side equipment; the display mode is used for the network side equipment to provide the calling information of the calling terminal for the called terminal associated with the calling information according to the display mode.
In an alternative implementation manner, the network side device and the calling terminal are preconfigured with the first key and/or the second key, and the second obtaining module 1403 is specifically configured to: receiving a first safety short message sent by network side equipment; the first secure short message comprises a first AUID encrypted by using a first key and/or a second key; analyzing the first secure short message to obtain a first AUID encrypted by using the first key and/or the second key; and decrypting the first AUID encrypted by using the first key and/or the second key based on the first key and/or the second key to obtain the first AUID.
Optionally, the first sending module 1401 is specifically configured to: encrypting the first AUID using the second key; packaging the first AUID encrypted by the second key and the call information into a second secure short message; and sending the second safety short message to the network side equipment.
In one implementation, the call information includes at least one of: first identification information of the calling terminal; and second identification information of the called terminal.
In one implementation, the first sending module 1301 is specifically configured to: acquiring second identification information of the called terminal; determining whether second identification information of the called terminal is contained in a preset identification information list; and transmitting the first AUID and the call information to the network side device in response to the second identification information being included in the identification information list.
By the device provided by the embodiment of the application, the calling terminal can send the first AUID and the call information to the network side equipment when receiving the call request of the user. Therefore, the network side equipment can carry out the calling identity verification based on the first AUID and the calling information, and provide the calling information of the calling terminal for the called terminal when the calling identity verification passes, so that the called terminal displays the calling information. The display of the calling information can be conveniently realized, the type of the called terminal is not limited, and the application software is not relied on.
Referring to fig. 15, fig. 15 is a schematic diagram of a display device for displaying caller information according to an embodiment of the application. The apparatus 1500 may be applied to a called terminal. As shown in fig. 15, the apparatus 1500 includes: an obtaining module 1501, configured to obtain caller information of a caller terminal provided by a network side device; the calling information is provided for the called terminal after the network side equipment performs calling identity verification based on the first AUID and the calling information sent by the calling terminal; the display module 1502 is configured to display the calling information.
In one implementation, the obtaining module 1501 is specifically configured to: and receiving the calling information of the calling terminal sent by the network side equipment.
Optionally, the display module 1502 is specifically configured to: generating a universal user authentication module application suite USAT popup window based on calling information; USAT popups are shown.
In one implementation, the obtaining module 1501 is specifically configured to: and receiving a Uniform Resource Locator (URL) sent by the network side equipment, wherein a webpage corresponding to the URL is used for displaying calling information of the calling terminal.
Optionally, the display module 1502 is specifically configured to: invoking a browser program; and opening the webpage corresponding to the URL in the browser program.
Optionally, the display module 1502 is specifically configured to: providing a prompt interface, wherein the prompt interface is used for determining whether to display a webpage corresponding to the URL; and calling a browser program in response to the fact that the webpage corresponding to the URL is confirmed to be displayed through the prompt interface.
By the device provided by the embodiment of the application, the called terminal can acquire the calling information of the calling terminal provided by the network side equipment and display the calling information. The display of the calling information can be realized more conveniently, and the display is not limited by the terminal type of the called terminal.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Based on the embodiment of the application, the application also provides electronic equipment, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method for displaying caller information of any of the foregoing embodiments.
Based on the embodiment of the application, the application also provides a computer readable storage medium, wherein, the computer instructions are used for making a computer execute the method for displaying the calling information according to any of the previous embodiments provided by the embodiment of the application.
Referring now to fig. 16, shown in fig. 16 is a schematic block diagram of an example electronic device that may be used to implement an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 16, the apparatus 1600 includes a computing unit 1601 that can perform various appropriate actions and processes according to a computer program stored in a Read-Only Memory (ROM) 1602 or a computer program loaded from a storage unit 1608 into a random access Memory (Random Access Memory, RAM) 1603. In RAM 1603, various programs and data required for operation of device 1600 may also be stored. The computing unit 1601, ROM 1602, and RAM 1603 are connected to each other by a bus 1604. An Input/Output (I/O) interface 1605 is also connected to bus 1604.
Various components in device 1600 are connected to I/O interface 1605, including: an input unit 1606 such as a keyboard, a mouse, and the like; an output unit 1607 such as various types of displays, speakers, and the like; a storage unit 1608, such as a magnetic disk, an optical disk, or the like; and a communication unit 1609, such as a network card, modem, wireless communication transceiver, or the like. Communication unit 1609 allows device 1600 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks.
The computing unit 1601 may be a variety of general purpose and/or special purpose processing components with processing and computing capabilities. Some examples of computing unit 1601 include, but are not limited to, a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, digital signal processors (Digital Signal Process, DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 1601 performs the various methods and processes described above, such as the presentation method of caller information. For example, in some embodiments, the method of presentation of caller information may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 1608. In some embodiments, some or all of the computer programs may be loaded and/or installed onto device 1600 via ROM 1602 and/or communication unit 1609. When the computer program is loaded into RAM 1603 and executed by computing unit 1601, one or more steps of the presentation method of caller information described above may be performed. Alternatively, in other embodiments, the computing unit 1601 may be configured to perform the presentation method of the caller information by any other suitable means (e.g. by means of firmware).
Various implementations of the systems and techniques described here above can be implemented in digital electronic circuitry, integrated circuit systems, field programmable gate arrays (Field Programmable Gate Array, FPGAs), application specific integrated circuits (Application Specific Integrated Circuit, ASICs), application specific standard products (Application Specific Standard Parts, ASSPs), systems On Chip (SOC), load programmable logic devices (Complex Programmable Logic Device, CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present application may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (EPROM) or flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., cathode Ray Tube (CRT) or LCD (Liquid Crystal Display ) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local area network (Local Area Network, LAN), wide area network (Wide Area Network, WAN), the internet and blockchain networks.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS (Virtual Private Server ) service are overcome. The server may also be a server of a distributed system or a server that incorporates a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present application may be performed in parallel, sequentially, or in a different order, provided that the desired results of the technical solution of the present application are achieved, and are not limited herein.
The above embodiments do not limit the scope of the present application. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present application should be included in the scope of the present application.

Claims (29)

1. A method for displaying calling information, wherein the method is applied to a network side device, and the method comprises the following steps:
receiving a first authentication user identification AUID and call information sent by a calling terminal;
performing caller identity verification based on the first AUID and the call information;
and responding to the passing of the calling identity verification, and providing the calling information of the calling terminal to the called terminal associated with the calling information.
2. The method of claim 1, wherein prior to said receiving the first AUID and call information sent by the calling terminal, the method further comprises:
receiving identity information sent by the calling terminal;
identity verification is carried out based on the identity information sent by the calling terminal;
generating the first AUID based on the identity information in response to the identity verification passing;
and sending the first AUID to the calling terminal.
3. The method of claim 2, wherein a first key and/or a second key is preconfigured in the network-side device and the calling terminal, and wherein the sending the first AUID to the calling terminal comprises:
encrypting the first AUID using the first key and/or the second key;
packaging the encrypted first AUID to a first safety short message;
and sending the first safety short message to the calling terminal.
4. The method of claim 3, wherein receiving the first AUID and call information sent by the calling terminal comprises:
receiving a second safety short message sent by the calling terminal; the second secure short message comprises the call information and the first AUID encrypted by using the second key;
Analyzing the second safety short message to obtain the call information and the first AUID encrypted by using the second key;
and decrypting the first AUID encrypted by using the second key based on the second key to obtain the first AUID.
5. The method of claim 1, wherein the call information includes first identification information of the calling terminal, and wherein the performing caller identification verification based on the first AUID and the call information includes:
acquiring identity information of the calling terminal based on the first identification information;
generating a second AUID based on the identity information;
matching the first AUID with the second AUID to obtain a matching result;
and responding to the matching result to meet a first condition, and determining that the calling identity verification is passed.
6. The method of claim 1, wherein the call information includes second identification information of the called terminal, and the providing the calling information of the calling terminal to the called terminal associated with the call information includes:
determining a display mode of calling information corresponding to the calling terminal;
determining the called terminal based on the second identification information;
According to the display mode, the calling information of the calling terminal is provided for the called terminal; wherein the calling information comprises identity information of the calling terminal.
7. The method of claim 6, wherein the presentation means comprises at least one of:
the universal user authentication module applies a USAT popup window display of the suite;
and (5) displaying the webpage.
8. The method of claim 7, wherein the display manner is the USAT popup display, and the providing the calling information of the calling terminal to the called terminal according to the display manner includes:
and sending the calling information of the calling terminal to the called terminal.
9. The method of claim 7, wherein the presentation mode is the web page presentation, and the providing the calling information of the calling terminal to the called terminal according to the presentation mode comprises:
generating a display webpage of the calling information of the calling terminal;
and sending the URL of the webpage to the called terminal.
10. The method according to any one of claims 1 to 9, wherein the call information includes second identification information of the called terminal, and the providing the calling information of the calling terminal to the called terminal to which the call information is associated includes:
Determining whether the second identification information is contained in a preset identification information list;
and providing the calling information of the calling terminal to a called terminal associated with the calling information in response to the second identification information being included in the identification information list.
11. A method for displaying calling information, wherein the method is applied to a calling terminal, and the method comprises the following steps:
responding to a call request sent to a called terminal through the calling terminal, and sending a first authentication user identification AUID and call information to network side equipment; the first AUID and the call information are used for the network side equipment to carry out calling identity authentication, and the call information is also used for the network side equipment to provide the calling information of the calling terminal to the called terminal associated with the call information after the calling identity authentication is passed.
12. The method of claim 11, wherein the method further comprises:
providing an interactive interface;
acquiring identity information set through the interactive interface;
transmitting the identity information to the network side equipment; the network side equipment can carry out identity authentication based on the identity information, and can also generate the first AUID based on the identity information after the identity authentication is passed;
And acquiring the first AUID from the network side equipment.
13. The method of claim 12, wherein the method further comprises:
acquiring a display mode of calling information set through the interactive interface;
transmitting the display mode of the calling information to the network side equipment; the display mode is used for the network side equipment to provide the calling information of the calling terminal for the called terminal associated with the calling information according to the display mode.
14. The method of claim 12, wherein the network side device and the calling terminal are preconfigured with a first key and/or a second key, and the obtaining the first AUID from the network side device comprises:
receiving a first safety short message sent by the network side equipment; the first secure short message comprises the first AUID encrypted by using the first key and/or the second key;
analyzing the first secure short message to obtain the first AUID encrypted by using the first key and/or the second key;
and decrypting the first AUID encrypted by using the first key and/or the second key based on the first key and/or the second key to acquire the first AUID.
15. The method of claim 14, wherein the sending the first AUID and call information to the network-side device comprises:
encrypting the first AUID using the second key;
packaging the first AUID encrypted by the second key and the call information into a second secure short message;
and sending the second safety short message to the network side equipment.
16. The method of claim 11, wherein the call information comprises at least one of:
first identification information of the calling terminal;
and second identification information of the called terminal.
17. The method according to any one of claims 11 to 16, wherein the sending the first AUID and call information to the network side device includes:
acquiring second identification information of the called terminal;
determining whether second identification information of the called terminal is contained in a preset identification information list;
and transmitting the first AUID and the call information to the network side equipment in response to the second identification information being contained in the identification information list.
18. A method for displaying calling information, wherein the method is applied to a called terminal, and the method comprises the following steps:
Acquiring calling information of a calling terminal provided by network side equipment; the calling information is provided for the called terminal after the network equipment performs calling identity verification based on a first authentication user identifier AUID and call information sent by the calling terminal;
and displaying the calling information.
19. The method of claim 18, wherein the obtaining the calling information of the calling terminal provided by the network side device includes:
and receiving the calling information of the calling terminal sent by the network side equipment.
20. The method of claim 19, wherein said presenting said caller information comprises:
generating a universal user authentication module application suite USAT popup window based on the calling information;
the USAT popup window is displayed.
21. The method of claim 18, wherein the obtaining the calling information of the calling terminal provided by the network side device includes:
and receiving a Uniform Resource Locator (URL) sent by the network side equipment, wherein a webpage corresponding to the URL is used for displaying the calling information of the calling terminal.
22. The method of claim 21, wherein said presenting said caller information comprises:
Invoking a browser program;
and opening the webpage corresponding to the URL in the browser program.
23. The method of claim 22, wherein the invoking the browser program comprises:
providing a prompt interface, wherein the prompt interface is used for determining whether to display a webpage corresponding to the URL;
and calling a browser program in response to the fact that the webpage corresponding to the URL is confirmed to be displayed through the prompt interface.
24. A device for displaying calling information, wherein the device is applied to a network side device, and the device comprises:
the first receiving module is used for receiving a first authentication user identification AUID and call information sent by the calling terminal;
the first processing module is used for checking the identity of the calling party based on the first AUID and the calling information;
and the second processing module is used for responding to the passing of the calling identity verification and providing the calling information of the calling terminal to the called terminal associated with the calling information.
25. A presentation apparatus for caller information, the apparatus being applied to a caller terminal, the apparatus comprising:
a sending module, configured to send a first authentication user identifier AUID and call information to a network side device in response to sending a call request to a called terminal through the calling terminal; the first AUID and the call information are used for the network side equipment to carry out calling identity authentication, and the call information is also used for the network side equipment to provide the calling information of the calling terminal to the called terminal associated with the call information after the calling identity authentication is passed.
26. A device for displaying calling information, wherein the device is applied to a called terminal, and the device comprises:
the acquisition module is used for acquiring the calling information of the calling terminal provided by the network side equipment; the calling information is provided for the called terminal after the network equipment performs calling identity verification based on a first authentication user identifier AUID and call information sent by the calling terminal;
and the processing module is used for displaying the calling information.
27. A system for displaying caller information, comprising:
network side device for performing the method of any of claims 1 to 10;
a calling terminal for performing the method of any of claims 11 to 17;
a called terminal for performing the method of any of claims 18 to 23.
28. An electronic device, comprising:
at least one processor;
and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of presenting caller information of any one of claims 1 to 10, or to enable the at least one processor to perform the method of presenting caller information of any one of claims 11 to 17, or to enable the at least one processor to perform the method of presenting caller information of any one of claims 18 to 23.
29. A computer readable storage medium storing instructions which, when executed, cause the method of any one of claims 1 to 10 to be implemented, or cause the method of any one of claims 11 to 17 to be implemented, or cause the method of any one of claims 18 to 23 to be implemented.
CN202311108468.8A 2023-08-30 2023-08-30 Method, device, system, equipment and storage medium for displaying calling information Pending CN117041424A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311108468.8A CN117041424A (en) 2023-08-30 2023-08-30 Method, device, system, equipment and storage medium for displaying calling information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311108468.8A CN117041424A (en) 2023-08-30 2023-08-30 Method, device, system, equipment and storage medium for displaying calling information

Publications (1)

Publication Number Publication Date
CN117041424A true CN117041424A (en) 2023-11-10

Family

ID=88633655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311108468.8A Pending CN117041424A (en) 2023-08-30 2023-08-30 Method, device, system, equipment and storage medium for displaying calling information

Country Status (1)

Country Link
CN (1) CN117041424A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090217039A1 (en) * 2008-02-05 2009-08-27 Sipera Systems, Inc. System, Method and Apparatus for Authenticating Calls
US20140187203A1 (en) * 2013-01-02 2014-07-03 International Business Machines Corporation Authentication of phone caller identity
CN108235314A (en) * 2016-12-09 2018-06-29 中国电信股份有限公司 Identity identifying method, device and system
CN114827354A (en) * 2022-04-21 2022-07-29 微位(深圳)网络科技有限公司 Identity authentication information display method and device, electronic equipment and readable storage medium
CN114900577A (en) * 2022-04-28 2022-08-12 微位(深圳)网络科技有限公司 Calling subscriber identity display method, terminal and system based on super SIM card

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090217039A1 (en) * 2008-02-05 2009-08-27 Sipera Systems, Inc. System, Method and Apparatus for Authenticating Calls
US20140187203A1 (en) * 2013-01-02 2014-07-03 International Business Machines Corporation Authentication of phone caller identity
CN108235314A (en) * 2016-12-09 2018-06-29 中国电信股份有限公司 Identity identifying method, device and system
CN114827354A (en) * 2022-04-21 2022-07-29 微位(深圳)网络科技有限公司 Identity authentication information display method and device, electronic equipment and readable storage medium
CN114900577A (en) * 2022-04-28 2022-08-12 微位(深圳)网络科技有限公司 Calling subscriber identity display method, terminal and system based on super SIM card

Similar Documents

Publication Publication Date Title
US10972908B2 (en) Wireless network connection method, apparatus, and system
CN107249004B (en) Identity authentication method, device and client
CN107888656B (en) Calling method and calling device of server-side interface
CN112039826A (en) Login method and device applied to applet terminal
CN105262592A (en) Data interaction method and API interface
CN112966287B (en) Method, system, device and computer readable medium for acquiring user data
CN109769010A (en) Method, apparatus, equipment and storage medium based on SDK access CloudStack server
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN108574573A (en) Method, encryption device and the virtual VPN service systems of cryptographic service are provided for virtual VPN
CN109995534B (en) Method and device for carrying out security authentication on application program
CN117041424A (en) Method, device, system, equipment and storage medium for displaying calling information
CN112788600B (en) Method and device for realizing authentication and safe connection between Bluetooth devices
CN111984616B (en) Method, device and system for updating shared file
CN114840739A (en) Information retrieval method, information retrieval device, electronic equipment and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN111385750B (en) Communication system and communication method
CN108234678B (en) Data unified access method and system based on request data reconstruction
CN111835734A (en) Information processing method, information processing device, electronic equipment, server and storage medium
CN112926076B (en) Data processing method, device and system
EP4350556A1 (en) Information verification method and apparatus
CN116961906B (en) Network communication method, device, equipment and storage medium
CN116112172B (en) Android client gRPC interface security verification method and device
CN113472785B (en) Data processing method and device, electronic equipment and readable storage medium
CN115348113B (en) Man-in-the-middle attack resisting method
CN111212062B (en) Information completion method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination