CN117479172A - Privacy number binding method and device, electronic equipment and storage medium - Google Patents

Privacy number binding method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117479172A
CN117479172A CN202311412163.6A CN202311412163A CN117479172A CN 117479172 A CN117479172 A CN 117479172A CN 202311412163 A CN202311412163 A CN 202311412163A CN 117479172 A CN117479172 A CN 117479172A
Authority
CN
China
Prior art keywords
binding
privacy
mobile phone
bound
privacy number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311412163.6A
Other languages
Chinese (zh)
Inventor
张�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Information Technology Co Ltd
Original Assignee
Jingdong Technology Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Information Technology Co Ltd filed Critical Jingdong Technology Information Technology Co Ltd
Priority to CN202311412163.6A priority Critical patent/CN117479172A/en
Publication of CN117479172A publication Critical patent/CN117479172A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning

Abstract

The disclosure provides a privacy number binding method, a privacy number binding device, electronic equipment and a storage medium, and relates to the technical field of communication. The method comprises the steps of obtaining a binding request sent by a user side, wherein the binding request comprises a mobile phone number to be bound; extracting a number to be checked from the mobile phone number to be bound; and determining a privacy number according to the number to be checked, and binding the privacy number with the number of the mobile phone to be bound, wherein the privacy number has the same number of digits as the number of the mobile phone to be bound and is consistent with the position and the character of the number to be checked in the number of the mobile phone to be bound. The method and the device determine the privacy number capable of binding the extension number according to the number to be verified of the mobile phone number transmitted by the user, so that the bound privacy number is identical to the number to be verified of the mobile phone number of the user, the problem that the number verification cannot be carried out by randomly distributing the privacy number is solved, and the privacy number service can be unfolded smoothly.

Description

Privacy number binding method and device, electronic equipment and storage medium
Technical Field
The disclosure relates to the technical field of communication, and in particular relates to a privacy number binding method, a privacy number binding device, electronic equipment and a storage medium.
Background
The privacy number is a communication technology for protecting the privacy of a user, and can establish a virtual privacy number between the user and a communication counterpart to be used for replacing the real number of the user to carry out communication. The privacy number can be communicated without revealing the user's real number, thereby protecting the privacy and security of the user. Technically, privacy numbers are typically implemented through virtualization techniques. Specifically, when a user needs to communicate with a communication partner via a private number, the system automatically generates a virtual number for the user and maps it to the user's real number. In the communication process, the system can automatically convert the virtual number of the user into a real number and forward the communication content to the communication counterpart. Privacy numbers are a very important communication technology that can effectively protect the privacy and security of users.
In the related art, after the user applies for binding, a private number and four extension numbers are randomly allocated to bind, and the extension number bound by the user is inconsistent with the last four digits of the mobile phone of the user. The verification can not be carried out according to the extension number in daily use, which is not beneficial to the popularization of the privacy number.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The disclosure provides a privacy number binding method, a privacy number binding device, an electronic device and a storage medium, which at least overcome the problem that the number verification cannot be performed due to random allocation of privacy numbers in the related art to a certain extent.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to one aspect of the present disclosure, there is provided a privacy number binding method including: acquiring a binding request sent by a user side, wherein the binding request comprises a mobile phone number to be bound; extracting a number to be checked from the mobile phone numbers to be bound; and determining a privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound, wherein the privacy number has the same digits as the mobile phone number to be bound and is consistent with the position and characters of the number to be checked in the mobile phone number to be bound.
In some embodiments, the determining the privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound includes: determining the number to be checked as a target extension number; determining a number pool according to the region information corresponding to the mobile phone number to be bound, wherein the number pool comprises a plurality of extension numbers, one extension number corresponds to one available privacy number queue, and the available privacy number queue comprises at least one available privacy number; and determining an available privacy number queue corresponding to the target extension number in a number pool, selecting an available privacy number from the available privacy number queue, and binding the available privacy number with the mobile phone number to be bound.
In some embodiments, before the determining the number pool according to the region information corresponding to the mobile phone number to be bound, the method further includes: a pool of numbers for different areas is built.
In some embodiments, the binding the one available privacy number with the mobile phone number to be bound includes: moving the one available privacy number from the available privacy number queue to the bound queue; and when the mobile phone number is successfully moved, binding the available privacy number with the mobile phone number to be bound.
In some embodiments, the method further comprises: when the movement fails, judging whether the number of times of movement reaches a preset threshold value; and when the number of times of movement does not reach a preset threshold, executing the operation of selecting one available privacy number from the available privacy number queue and binding the available privacy number with the mobile phone number to be bound.
In some embodiments, after the binding the privacy number with the mobile phone number to be bound, the method further includes: binding the privacy number with the mobile phone number to be bound to generate a binding message; and carrying out asynchronous database dropping processing on the binding message, wherein the asynchronous database dropping processing comprises the steps of storing the binding message into a first database, and simultaneously sending the binding message to a distributed release subscription message system, so that the distributed release subscription message system stores the binding message into a second database.
In some embodiments, after the obtaining the binding request sent by the user side, the method further includes: performing legal verification on the binding request; and when the legal verification is passed, extracting the number to be verified in the mobile phone number to be bound according to the number to be verified in the mobile phone number to be bound.
According to another aspect of the present disclosure, there is also provided a privacy number binding apparatus, including: the binding request acquisition module is used for acquiring a binding request sent by a user side, wherein the binding request comprises a mobile phone number to be bound; the number to be checked extracting module is used for extracting the number to be checked in the mobile phone number to be bound; and the privacy number binding module is used for determining a privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound, wherein the privacy number has the same digits as the mobile phone number to be bound, and is consistent with the position and the character of the number to be checked in the mobile phone number to be bound.
According to another aspect of the present disclosure, there is also provided an electronic device including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the privacy number binding method of any of the above via execution of the executable instructions.
According to another aspect of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the privacy number binding method of any one of the above.
According to another aspect of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements the privacy number binding method of any of the above.
According to the privacy number binding method provided by the embodiment of the disclosure, a binding request sent by a user side is obtained, wherein the binding request comprises a mobile phone number to be bound; extracting a number to be checked from the mobile phone number to be bound; and determining a privacy number according to the number to be checked, and binding the privacy number with the number of the mobile phone to be bound, wherein the privacy number has the same number of digits as the number of the mobile phone to be bound and is consistent with the position and the character of the number to be checked in the number of the mobile phone to be bound. The method and the device determine the privacy number capable of binding the extension number according to the number to be verified of the mobile phone number transmitted by the user, so that the bound privacy number is identical to the number to be verified of the mobile phone number of the user, the problem that the number verification cannot be carried out by randomly distributing the privacy number is solved, and the privacy number service can be unfolded smoothly.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
FIG. 1 illustrates an exemplary application architecture diagram of a privacy number binding method in an embodiment of the present disclosure;
FIG. 2 is a system architecture diagram illustrating a specific example of a privacy number binding method in an embodiment of the present disclosure;
FIG. 3 illustrates a binding server schematic diagram in an embodiment of the present disclosure;
FIG. 4 illustrates a flow chart of a privacy number binding method in an embodiment of the present disclosure;
FIG. 5 is a flowchart of a specific example of a method for binding privacy numbers in an embodiment of the present disclosure;
FIG. 6 is a flowchart showing a further embodiment of a privacy number binding method in an embodiment of the present disclosure;
FIG. 7 is a flowchart showing still another embodiment of a privacy number binding method in an embodiment of the present disclosure;
FIG. 8 is a flowchart of another embodiment of a method for binding privacy numbers according to an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of a privacy number binding device according to an embodiment of the present disclosure;
FIG. 10 illustrates a block diagram of a computer device in an embodiment of the present disclosure;
fig. 11 shows a schematic diagram of a computer-readable storage medium in an embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
For ease of understanding, before describing embodiments of the present disclosure, several terms referred to in the embodiments of the present disclosure are first explained as follows:
AXE: x represents a privacy number, E represents an extension number, A represents a service benefit user, and the number externally presented by the A user is replaced by X+E;
extension number: one privacy number in the AXE mode can be bound with a plurality of extension numbers, and the extension number (for example 0000-9999) mode increases the recycling rate of the privacy number;
kafka: apache Kafka, high throughput distributed publish-subscribe messaging system;
redis: a data structure server;
ES: an Elastic search, search server;
SIM: subscriber Identification Module, user identification card;
APP: application, mobile phone software;
key Value: key is a key, value is a value, and the value is taken according to the key.
The following detailed description of embodiments of the present disclosure refers to the accompanying drawings.
Fig. 1 illustrates an exemplary application system architecture diagram to which a privacy number binding method of embodiments of the present disclosure may be applied. As shown in fig. 1, the system architecture may include a terminal device 101, a network 102, and a server 103.
The medium used by the network 102 to provide a communication link between the terminal device 101 and the server 103 may be a wired network or a wireless network.
Alternatively, the wireless network or wired network described above uses standard communication techniques and/or protocols. The network is typically the Internet, but may be any network including, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or wireless network, private network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including HyperText Mark-up Language (HTML), extensible markup Language (Extensible MarkupLanguage, XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as secure sockets layer (Secure Socket Layer, SSL), transport layer security (Transport Layer Security, TLS), virtual private network (Virtual Private Network, VPN), internet security protocol (Internet Protocol Security, IPSec), etc. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of or in addition to the data communication techniques described above.
The terminal device 101 may be a variety of electronic devices including, but not limited to, smart phones, tablet computers, laptop portable computers, desktop computers, smart speakers, smart watches, wearable devices, augmented reality devices, virtual reality devices, and the like.
Alternatively, the clients of the applications installed in different terminal devices 101 are the same or clients of the same type of application based on different operating systems. The specific form of the application client may also be different based on the different terminal platforms, for example, the application client may be a mobile phone client, a PC client, etc.
The server 103 may be a server providing various services, such as a background management server providing support for devices operated by the user with the terminal apparatus 101. The background management server can analyze and process the received data such as the request and the like, and feed back the processing result to the terminal equipment.
Optionally, the server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), basic cloud computing services such as big data and artificial intelligence platforms, and the like.
Those skilled in the art will appreciate that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative, and that any number of terminal devices, networks, and servers may be provided as desired. The embodiments of the present disclosure are not limited in this regard.
In the related art, delivery services such as express delivery, takeaway and the like in real life are generally screened according to the last four digits of the mobile phone number of the user when delivered, so that randomly allocated four-digit extensions cannot be suitable for the daily scene, and the mode of randomly allocating the privacy number increases the labor cost of daily delivery, and is not beneficial to popularization of the privacy number.
In order to at least partially solve the above technical problems, the present disclosure provides a privacy number binding method and related devices. The method and the device determine the privacy number capable of binding the extension number according to the number to be verified of the mobile phone number transmitted by the user, so that the bound privacy number is identical to the number to be verified of the mobile phone number of the user, the problem that the number verification cannot be carried out by randomly distributing the privacy number is solved, and the privacy number service can be unfolded smoothly.
The following first describes a system architecture of a specific example of a privacy number binding method.
Fig. 2 is a system architecture diagram of a specific example of a privacy number binding method in an embodiment of the present disclosure. As shown in fig. 2, the system architecture may include a binding platform gateway 201, a binding server 202, and an asynchronous drop server 203.
The binding platform gateway 201 realizes the authentication of the request authority of the platform user, ensures the legality of the request user and avoids malicious network attack; the binding service processes the binding request, and comprises legal verification of the request data, request mode judgment and corresponding binding operation, wherein the binding operation screens numbers based on a redis queue, and timeliness of binding request processing is guaranteed.
In a specific example, the binding platform gateway 201 obtains a binding request sent by a terminal device, where the binding request includes a mobile phone number to be bound; the server extracts a number to be checked from the mobile phone numbers to be bound; the binding platform gateway determines a privacy number according to the number to be checked, and binds the privacy number with the mobile phone number to be bound, wherein the privacy number has the same digits as the mobile phone number to be bound and is consistent with the position and the character of the number to be checked in the mobile phone number to be bound.
The asynchronous database server 203 includes asynchronous binding message writing and binding message consumption, ensuring that binding data is not lost.
The binding server 202, as shown in fig. 3, includes a cache service component 301 and a message queue service component 302:
among them, the cache service component 301 (stores the cache information related to the binding) includes the following cache information: an available privacy number queue corresponding to the extension number is used for specifying the privacy number binding of the extension number; a bound privacy number queue corresponding to the extension number, and data recovery operation when the binding relationship of the user is released; the binding number counter of the privacy number, the binding upper limit value and the like are used for assisting the privacy number to bind the cache.
Message queue service component 302 (to increase the response speed of the binding interface, ensure high availability of services) contains the following service information: message push service: pushing the binding data after successful binding to a corresponding kafka queue, providing asynchronous library-falling capacity for binding message data, and improving the response speed of a binding interface; message receiving service: and receiving and processing the pushed binding information, storing the binding information into a database, and ensuring the consistency of the number data in the database and a cache system, wherein the number data is streamed in the whole system to form a closed loop.
Under the system architecture, the embodiment of the disclosure provides a privacy number binding method, which can be executed by any electronic device with computing processing capability.
In some embodiments, the privacy number binding method provided in the embodiments of the present disclosure may be performed by a terminal device of the above system architecture; in other embodiments, the privacy number binding method provided in the embodiments of the present disclosure may be performed by a server in the system architecture described above; in other embodiments, the privacy number binding method provided in the embodiments of the present disclosure may be implemented by the terminal device and the server in the system architecture in an interactive manner.
Fig. 4 shows a flowchart of a method for binding privacy numbers in an embodiment of the present disclosure, as shown in fig. 4, the method for binding privacy numbers provided in the embodiment of the present disclosure includes the following steps:
s402, a binding request sent by a user terminal is obtained, wherein the binding request comprises a mobile phone number to be bound.
It should be noted that the user side may be a program corresponding to a server, for example, a mobile phone or a tablet computer loaded with a SIM card, which provides local services for clients. The binding request may be a network request, such as an HTTP request, an AJAX network request, a Fetch network request. The mobile phone number to be bound may be a phone number of the user, for example, a mobile phone (mobile phone) number, a fixed phone (fixed phone) number. The mobile phone number can be composed of 11 digits, and the fixed phone number can be composed of 4-8 digits.
In a specific example, a client clicks a call button on an APP, the APP sends a binding request to a privacy number platform, and after the privacy number platform obtains the binding request, the binding request is parsed to obtain a mobile phone number transmitted by the user.
S404, extracting the number to be checked in the mobile phone number to be bound.
It should be noted that, the number to be verified may be a number for verification, and the length of the number is smaller than the number of digits of the mobile phone number to be bound. For example, the number to be checked may be the last four digits, the last three digits, or the third last and fourth last digits of the mobile phone number.
S406, determining a privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound, wherein the privacy number has the same digits as the mobile phone number to be bound and is consistent with the position and the character of the number to be checked in the mobile phone number to be bound.
It should be noted that, the privacy number may be a number privacy protection intermediate number. For example, the mobile phone number is 13311112222, the number to be checked is the last four bits 2222, and the privacy number may be 18800002222.
In the embodiment of the disclosure, the privacy number capable of binding the extension number is determined according to the number to be verified of the mobile phone number transmitted by the user, so that the binding privacy number is the same as the number to be verified of the mobile phone number of the user, the problem that the number verification cannot be performed by randomly distributing the privacy number is solved, and the privacy number service can be smoothly unfolded.
In one embodiment of the present disclosure, as shown in fig. 5, the privacy number binding method provided in the embodiment of the present disclosure may bind a privacy number with a mobile phone number to be bound, so that efficient and accurate binding and query binding relationships may be established, and real-time performance of interface return is ensured, so that the binding privacy number is adapted to a "binding and calling" scenario:
s502, determining the number to be checked as a target extension number;
s504, determining a number pool according to region information corresponding to mobile phone numbers to be bound, wherein the number pool comprises a plurality of extension numbers, one extension number corresponds to one available privacy number queue, and the available privacy number queue comprises at least one available privacy number;
s506, an available privacy number queue corresponding to the target extension number is determined in the number pool, one available privacy number is selected from the available privacy number queue, and the available privacy number is bound with the mobile phone number to be bound.
For example, after the number is filled into the number pool, data preparation work is performed in Redis:
pool number is: pool1;
the city is: taiyuan City of Shanxi province;
because of the 4-bit extension number mode, after the number is entered into the pool, an available extension number queue Key is created according to the city to which the number belongs (if Key exists, extension numbers are added in Value corresponding to Key):
Pool 1-AXEPRO-ENABLE-E, taiyuan, shanxi province; AXEPRO represents the code number of the privacy number binding method of the present application, and ENABLE-E represents available.
The Value corresponding to the whole Key contains all extension numbers:
0000 0001, 9998, 9999 (10000 extensions total);
simultaneously creating a corresponding available privacy number queue (directly adding Value if Key exists);
pool 1-mountain and west Taiyuan City-AXEPRO-ENABLE-0000-X, pool 1-mountain and west Taiyuan City-AXEPRO-ENABLE-0001-X, pool 1-mountain and west Taiyuan City-AXEPRO-ENABLE-0002-X, pool 1-mountain and west Taiyuan City-AXEPRO-ENABLE-9989-X, pool 1-mountain and west Taiyuan City-AXEPRO-ENABLE-9999-X. The 10000 keys, then the Value stored under these keys are all available privacy numbers of the taiyuan city of shanxi province.
For example, 200 numbers such as X1, X2, & gt, X200 and the like are newly added, the above values of 10000 keys all contain the 200 privacy numbers.
In a specific example, before determining the number pool according to the region information corresponding to the mobile phone number to be bound, the privacy number binding method further includes: a pool of numbers for different areas is built.
For example, according to city information, four types of number pools are constructed: an available extension number queue corresponding to a city in a number pool; an unavailable extension number queue corresponding to a city in a number pool; an available privacy number queue corresponding to an extension number of a city in a number pool; an unavailable privacy number queue corresponding to an extension number of a city in a number pool. Corresponding number pool setting can be performed for different cities.
Specifically, a work queue is prepared:
1. pool number-city-pattern-available-extension number flag (the available extension number queue corresponding to a certain city of this pool of numbers);
2. pool number-city-pattern-unavailable-extension number flag (the unavailable extension number queue corresponding to a certain city of this pool of numbers);
3. pool number-city-pattern-extension number-available-privacy number flag (available privacy number queue corresponding to an extension number of a certain city of this pool of numbers);
4. pool number-city-pattern-extension number-unavailable-privacy number flag (the unavailable privacy number queue corresponding to an extension number of a certain city of this pool of numbers).
In one embodiment of the present disclosure, as shown in fig. 6, the privacy number binding method provided in the embodiment of the present disclosure may determine the binding between the privacy number and the mobile phone number to be bound through the following steps, so as to avoid the occurrence of a situation that the privacy number is repeatedly bound, resulting in abnormal call:
s602, moving an available privacy number from an available privacy number queue to a bound queue;
s604, when the mobile is successful, binding an available privacy number with the mobile phone number to be bound.
In one embodiment of the present disclosure, as shown in fig. 7, the privacy number binding method provided in the embodiment of the present disclosure may determine the binding between the privacy number and the mobile phone number to be bound through the following steps, so as to avoid that the memory is occupied for a long time and the user call experience is affected:
S702, judging whether the moving times reach a preset threshold value or not when the moving fails;
and S704, when the number of times of movement does not reach a preset threshold, an operation of selecting an available privacy number from the available privacy number queue and binding the available privacy number with the mobile phone number to be bound is executed.
In a specific example, according to the 4-bit extension number, searching in a cache to find an available privacy number queue corresponding to the 4-bit extension number, and randomly acquiring a privacy number from the queue; attempting to move the privacy number from the available queue to the bound queue, and if the privacy number is successfully moved, establishing a binding relation corresponding to the cache; if the movement fails (under the condition of high concurrency, the condition of simultaneously operating the same privacy number in the same extension number queue exists), judging whether the upper limit of the retry times is reached; the random privacy number operation of the extension number available privacy number queue in the cache is carried out again when the upper limit is not reached; if the upper limit is reached, a binding failure is returned.
In one embodiment of the present disclosure, as shown in fig. 7, the privacy number binding method provided in the embodiment of the present disclosure may perform asynchronous database dropping processing on a binding message through the following steps, so that when a problem occurs in a certain database, it is able to prevent a call of a client from being reachable:
S702, binding the mobile phone number to be bound according to the privacy number, and generating a binding message;
and S704, carrying out asynchronous database dropping processing on the binding message, wherein the asynchronous database dropping processing comprises storing the binding message in a first database, and simultaneously sending the binding message to a distributed publish-subscribe message system, so that the distributed publish-subscribe message system stores the binding message in a second database.
In one specific example, the asynchronous falling process includes sending binding data to Kafka, which is stored by the message consumer service into ES (corresponding to the second database) such that there is a binding relationship in Redis (corresponding to the first database) and there is a binding relationship in ES. (joining Redis causes Redis to be unavailable for some reason, and when a client makes a call, the ES can be queried to obtain binding relations, ensuring that the client's call is reachable).
In an embodiment of the disclosure, after obtaining the binding request sent by the user side, the privacy number binding method further includes: performing legal verification on the binding request; and when the legal verification is passed, extracting the number to be verified in the mobile phone number to be bound according to the number to be verified in the mobile phone number to be bound.
For example: checking whether the pool number transferred in the binding request is matched with the own splitting information of the client in the request, and checking whether the A, B number is the same (binding is not allowed as the same) by the client in the AXB mode (A is an A-way call and can be a mobile phone number, B is a B-way call and can be a mobile phone number; X is often called a virtual number, privacy protection number or small number and must be a mobile phone number); checking whether a binding city transferred during binding really exists or not; whether the expiration time of the binding relationship is within an allowable range (the range of expiration times is set, and when the mobile phone number is already bound and in a time period which is not expired, the verification is not passed). Through the legal verification mode, the service capacity of the enterprise and the security guarantee of user information can be ensured.
Fig. 8 is a flowchart illustrating a specific example of a method for binding a privacy number in an embodiment of the disclosure, and as shown in fig. 8, the method for binding a privacy number provided in the embodiment of the disclosure includes the following steps:
s801, four digits after the number of the client mobile phone is acquired, and an extension number is determined;
s802, obtaining privacy numbers from corresponding extension number queues through cache service;
s803, judging whether the privacy number can be moved to the bound queue, if so, jumping to S804, and if not, jumping to S805;
S804, asynchronously falling the library and binding data, and ending the flow;
s805, judging whether the moving times reach the upper limit of the retry times, if so, jumping to S806, otherwise, jumping to S802;
s806, the binding fails, and the process is ended.
Wherein S804 includes:
s8041, binding data is returned, and the binding data is locally stored (corresponding to the binding information being stored in the first database);
s8042, the binding database (corresponding to storing the binding message to the second database as described above) is dropped.
Wherein S8042 includes:
s80421, packaging binding data and transmitting the binding data to a message sending service at the same time, and sending binding messages;
s80422, after receiving the binding message, the binding message accepting service parses the message and drops the binding database (corresponding to storing the binding message in the second database as described above).
Specifically, after the binding is started, firstly, the corresponding parameter validity is checked, then the last four digits (extension numbers) of the mobile phone numbers participating in the binding are transmitted to the binding service, and the binding is started; according to the input 4-bit extension numbers, searching a corresponding available privacy number queue of the extension numbers in a cache, and randomly acquiring the privacy numbers from the queue; attempting to move the privacy number from the available queue to the bound queue, and if the privacy number is successfully moved, establishing a binding relation corresponding to the cache; if the movement fails (under the condition of high concurrency, the condition that the same privacy number in the same extension number queue is operated simultaneously can exist), judging whether the upper limit of the retry times is reached; the random privacy number operation of the extension number available privacy number queue in the cache is carried out again when the upper limit is not reached; if the upper limit is reached, returning to the binding failure; after the buffer binding relation is established, binding data is returned, and meanwhile, the binding data is encapsulated and transferred to a message sending service to send binding messages; after the binding message acceptance service receives the binding message, it parses the message and drops the binding database.
The method and the device use the extension numbers to locate the privacy numbers, ensure that the extension numbers corresponding to the bound privacy numbers are matched with the back four bits of the client mobile phone numbers, and simultaneously ensure the timeliness of the interface and the high availability of the service.
It should be noted that, in the technical solution of the present disclosure, the acquiring, storing, using, processing, etc. of data all conform to relevant regulations of national laws and regulations, and various types of data such as personal identity data, operation data, behavior data, etc. relevant to individuals, clients, crowds, etc. acquired in the embodiments of the present disclosure have been authorized.
Based on the same inventive concept, the embodiment of the disclosure also provides a privacy number binding device, as described in the following embodiment. Since the principle of solving the problem of the embodiment of the device is similar to that of the embodiment of the method, the implementation of the embodiment of the device can be referred to the implementation of the embodiment of the method, and the repetition is omitted.
Fig. 9 shows a schematic diagram of a privacy number binding device in an embodiment of the disclosure, as shown in fig. 9, the device includes: the device comprises a binding request acquisition module 91, a number to be checked extraction module 92, a privacy number binding module 93, a number pool construction module 94, an asynchronous database processing module 95 and a legal checking module 96.
The binding request acquiring module 91 is configured to acquire a binding request sent by a user terminal, where the binding request includes a mobile phone number to be bound;
the number to be checked extracting module 92 is configured to extract a number to be checked in the mobile phone number to be bound;
the privacy number binding module 93 is configured to determine a privacy number according to the number to be checked, and bind the privacy number with the mobile phone number to be bound, where the privacy number has the same number of digits as the mobile phone number to be bound, and is consistent with the position and the character of the number to be checked in the mobile phone number to be bound.
In one embodiment of the present disclosure, the above privacy number binding module 93 is further configured to determine a number to be checked as a target extension number; determining a number pool according to region information corresponding to mobile phone numbers to be bound, wherein the number pool comprises a plurality of extension numbers, one extension number corresponds to one available privacy number queue, and the available privacy number queue comprises at least one available privacy number; and determining an available privacy number queue corresponding to the target extension number in the number pool, selecting one available privacy number from the available privacy number queue, and binding the available privacy number with the mobile phone number to be bound.
In one embodiment of the present disclosure, the privacy number binding apparatus further includes a number pool construction module 94 for constructing number pools for different areas.
In one embodiment of the present disclosure, the above-mentioned privacy number binding module 93 is further configured to move an available privacy number from the available privacy number queue to the bound queue; and when the mobile phone number is successfully moved, binding an available privacy number with the mobile phone number to be bound.
In one embodiment of the present disclosure, the privacy number binding module 93 is further configured to determine, when the movement fails, whether the number of movements reaches a preset threshold; when the number of times of movement does not reach a preset threshold, an operation of selecting an available privacy number from the available privacy number queue and binding the available privacy number with the mobile phone number to be bound is executed.
In one embodiment of the present disclosure, the privacy number binding device further includes an asynchronous database processing module 95, configured to bind the privacy number with the mobile phone number to be bound to generate a binding message; and carrying out asynchronous database dropping processing on the binding message, wherein the asynchronous database dropping processing comprises the steps of storing the binding message into a first database, and simultaneously sending the binding message to a distributed publish-subscribe message system, so that the distributed publish-subscribe message system stores the binding message into a second database.
In one embodiment of the present disclosure, the privacy number binding device further includes a legal verification module 96, configured to perform legal verification on the binding request; and when the legal verification is passed, extracting the number to be verified in the mobile phone number to be bound according to the number to be verified in the mobile phone number to be bound.
It should be noted that, the above binding request obtaining module 91, the number to be checked extracting module 92, and the privacy number binding module 93 correspond to S402 to S406 in the method embodiment, and the above modules are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the method embodiment. It should be noted that the modules described above may be implemented as part of an apparatus in a computer system, such as a set of computer-executable instructions.
Those skilled in the art will appreciate that the various aspects of the present disclosure may be implemented as a system, method, or program product. Accordingly, various aspects of the disclosure may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 1000 according to such an embodiment of the present disclosure is described below with reference to fig. 10. The electronic device 1000 shown in fig. 10 is merely an example and should not be construed as limiting the functionality and scope of use of the disclosed embodiments.
As shown in fig. 10, the electronic device 1000 is embodied in the form of a general purpose computing device. Components of electronic device 1000 may include, but are not limited to: the at least one processing unit 1010, the at least one memory unit 1020, and a bus 1030 that connects the various system components, including the memory unit 1020 and the processing unit 1010.
Wherein the storage unit stores program code that is executable by the processing unit 1010 such that the processing unit 1010 performs steps according to various exemplary embodiments of the present disclosure described in the above section of the present specification.
For example, the processing unit 1010 may perform the following steps of the method embodiment described above: acquiring a binding request sent by a user side, wherein the binding request comprises a mobile phone number to be bound; extracting a number to be checked from the mobile phone number to be bound; and determining a privacy number according to the number to be checked, and binding the privacy number with the number of the mobile phone to be bound, wherein the privacy number has the same number of digits as the number of the mobile phone to be bound and is consistent with the position and the character of the number to be checked in the number of the mobile phone to be bound.
The memory unit 1020 may include readable media in the form of volatile memory units such as Random Access Memory (RAM) 10201 and/or cache memory unit 10202, and may further include Read Only Memory (ROM) 10203.
The storage unit 1020 may also include a program/utility 10204 having a set (at least one) of program modules 10205, such program modules 10205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 1030 may be representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 1000 can also communicate with one or more external devices 1040 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 1000, and/or with any device (e.g., router, modem, etc.) that enables the electronic device 1000 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 1050. Also, electronic device 1000 can communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 1060. As shown, the network adapter 1060 communicates with other modules of the electronic device 1000 over the bus 1030. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with the electronic device 1000, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In particular, according to embodiments of the present disclosure, the process described above with reference to the flowcharts may be implemented as a computer program product comprising: and a computer program which, when executed by the processor, implements the privacy number binding method described above.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium, which may be a readable signal medium or a readable storage medium, is also provided. Fig. 11 illustrates a schematic diagram of a computer-readable storage medium having stored thereon a program product capable of implementing the method of the present disclosure, as illustrated in fig. 11, according to an embodiment of the present disclosure. In some possible implementations, various aspects of the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the disclosure as described in the "exemplary methods" section of this specification, when the program product is run on the terminal device.
More specific examples of the computer readable storage medium in the present disclosure may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In this disclosure, a computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Alternatively, the program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In particular implementations, the program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Furthermore, although the steps of the methods in the present disclosure are depicted in a particular order in the drawings, this does not require or imply that the steps must be performed in that particular order or that all illustrated steps be performed in order to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform, etc.
From the description of the above embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A method for binding privacy numbers, comprising:
acquiring a binding request sent by a user side, wherein the binding request comprises a mobile phone number to be bound;
extracting a number to be checked from the mobile phone numbers to be bound;
and determining a privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound, wherein the privacy number has the same digits as the mobile phone number to be bound and is consistent with the position and characters of the number to be checked in the mobile phone number to be bound.
2. The method for binding the privacy number according to claim 1, wherein the determining the privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound, comprises:
determining the number to be checked as a target extension number;
determining a number pool according to the region information corresponding to the mobile phone number to be bound, wherein the number pool comprises a plurality of extension numbers, one extension number corresponds to one available privacy number queue, and the available privacy number queue comprises at least one available privacy number;
and determining an available privacy number queue corresponding to the target extension number in a number pool, selecting an available privacy number from the available privacy number queue, and binding the available privacy number with the mobile phone number to be bound.
3. The method for binding privacy numbers according to claim 2, wherein before determining the number pool according to the region information corresponding to the mobile phone number to be bound, the method further comprises:
a pool of numbers for different areas is built.
4. The method for binding privacy numbers according to claim 2, wherein the binding the one available privacy number with the mobile phone number to be bound comprises:
moving the one available privacy number from the available privacy number queue to the bound queue;
and when the mobile phone number is successfully moved, binding the available privacy number with the mobile phone number to be bound.
5. The privacy number binding method of claim 4, further comprising:
when the movement fails, judging whether the number of times of movement reaches a preset threshold value;
and when the number of times of movement does not reach a preset threshold, executing the operation of selecting one available privacy number from the available privacy number queue and binding the available privacy number with the mobile phone number to be bound.
6. The method for binding a privacy number according to any one of claims 1 to 5, further comprising, after said binding the privacy number with the mobile phone number to be bound:
Binding the privacy number with the mobile phone number to be bound to generate a binding message;
and carrying out asynchronous database dropping processing on the binding message, wherein the asynchronous database dropping processing comprises the steps of storing the binding message into a first database, and simultaneously sending the binding message to a distributed release subscription message system, so that the distributed release subscription message system stores the binding message into a second database.
7. The method for binding a privacy number according to any one of claims 1 to 5, wherein after the obtaining the binding request sent by the user side, the method further comprises:
performing legal verification on the binding request;
and when the legal verification is passed, extracting the number to be verified in the mobile phone number to be bound according to the number to be verified in the mobile phone number to be bound.
8. A privacy number binding apparatus, comprising:
the binding request acquisition module is used for acquiring a binding request sent by a user side, wherein the binding request comprises a mobile phone number to be bound;
the number to be checked extracting module is used for extracting the number to be checked in the mobile phone number to be bound;
and the privacy number binding module is used for determining a privacy number according to the number to be checked, and binding the privacy number with the mobile phone number to be bound, wherein the privacy number has the same digits as the mobile phone number to be bound, and is consistent with the position and the character of the number to be checked in the mobile phone number to be bound.
9. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the privacy number binding method of any of claims 1-7 via execution of the executable instructions.
10. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the privacy number binding method of any of claims 1 to 7.
CN202311412163.6A 2023-10-27 2023-10-27 Privacy number binding method and device, electronic equipment and storage medium Pending CN117479172A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311412163.6A CN117479172A (en) 2023-10-27 2023-10-27 Privacy number binding method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311412163.6A CN117479172A (en) 2023-10-27 2023-10-27 Privacy number binding method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117479172A true CN117479172A (en) 2024-01-30

Family

ID=89626728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311412163.6A Pending CN117479172A (en) 2023-10-27 2023-10-27 Privacy number binding method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117479172A (en)

Similar Documents

Publication Publication Date Title
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN111382168B (en) Node group creating method and node group-based transaction method in alliance chain network
US8843646B2 (en) Multi-desktop interaction using nested remote desktop sessions
CN110839087B (en) Interface calling method and device, electronic equipment and computer readable storage medium
WO2019205555A1 (en) Method and apparatus for pushing message
CN111833507A (en) Visitor authentication method, device, equipment and computer readable storage medium
CN112835632B (en) Method and equipment for calling end capability and computer storage medium
US20180046393A1 (en) Dynamic compression for runtime services
CN110908921A (en) Game problem positioning method and device, electronic equipment and storage medium
CN112015383A (en) Login method and device
US9948694B2 (en) Addressing application program interface format modifications to ensure client compatibility
CN116700907B (en) Service call demand document storage method, device, electronic equipment and readable medium
CN111818179A (en) User request processing method and device, computing equipment and medium
CN108900562B (en) Login state sharing method and device, electronic equipment and medium
CN114449523B (en) Flow filtering method, device, equipment and medium for satellite measurement and control system
CN110035099B (en) Multisystem management method, terminal equipment and storage medium
CN113079085B (en) Business service interaction method, business service interaction device, business service interaction equipment and storage medium
CN117479172A (en) Privacy number binding method and device, electronic equipment and storage medium
CN113132400B (en) Business processing method, device, computer system and storage medium
CN112929453A (en) Method and device for sharing session data
CN113283891A (en) Information processing method and device and electronic equipment
CN108848398B (en) Method, device, terminal and storage medium for distributing local barrage messages
CN110489276B (en) Disaster recovery method and device for verification service based on business page
CN112632022B (en) Object storage method and device, computer readable storage medium and electronic equipment
CN111324888B (en) Verification method and device for application program starting, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination