KR101755021B1 - SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION - Google Patents

SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION Download PDF

Info

Publication number
KR101755021B1
KR101755021B1 KR1020150073222A KR20150073222A KR101755021B1 KR 101755021 B1 KR101755021 B1 KR 101755021B1 KR 1020150073222 A KR1020150073222 A KR 1020150073222A KR 20150073222 A KR20150073222 A KR 20150073222A KR 101755021 B1 KR101755021 B1 KR 101755021B1
Authority
KR
South Korea
Prior art keywords
terminal
information
caller
identification information
recipient
Prior art date
Application number
KR1020150073222A
Other languages
Korean (ko)
Other versions
KR20160138832A (en
Inventor
한민규
Original Assignee
한민규
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 한민규 filed Critical 한민규
Priority to KR1020150073222A priority Critical patent/KR101755021B1/en
Publication of KR20160138832A publication Critical patent/KR20160138832A/en
Application granted granted Critical
Publication of KR101755021B1 publication Critical patent/KR101755021B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2539Hiding addresses; Keeping addresses anonymous
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Abstract

A system and method for preventing identification information of a receiver and a caller from being leaked is disclosed.
A method for preventing leakage of identification information performed by a hidden server comprises: generating receiver concealment information for concealing identification information of a receiver terminal; Matching the recipient concealment information with the identification information of the recipient terminal; Providing the recipient concealment information to the caller terminal; Generating caller concealment information for concealing identification information of a caller terminal; And transmitting the identification information of the receiver terminal matched with the receiver concealment information and the caller concealment information to the call server.

Description

TECHNICAL FIELD [0001] The present invention relates to a system and method for preventing leakage of identification information of a terminal using temporary identification information,

The present invention relates to a system and method for preventing identification information of a receiver terminal and identification information of a transmitter terminal from being leaked.

For services such as surrogate driving and courier services, calls between the employee and the consumer to provide the service may be required. For example, when a surrogate driver arrives near a place where a surrogate driver is requested, the user may be asked to call to confirm the customer.

However, if identification information of a consumer terminal such as a telephone number for a consumer and a telephone call is disclosed to an employee, a telephone number of the consumer may be leaked to the outside by mistake or deliberation of one of the employees, Consumers may find it unpleasant for a person who does not want to know their phone number.

Accordingly, there is a need for a method of requesting a caller to call a called party while hiding identification information of a receiver terminal such as a consumer to a caller such as an employee to provide a service.

In addition, it may be uncomfortable for a caller to leave his / her telephone number as a call history to a caller who has requested a call in business need. And, if the caller makes a call-back to the caller after talking to the caller, there is a risk that the caller's telephone number is directly exposed to the caller.

In addition, when an application for updating the friend list according to the call history is installed in the receiver terminal, the receiver terminal updates the caller terminal to the friend list, thereby adding the receiver terminal to the friend list of the caller terminal. That is, even if the caller hides the telephone number of the receiver, if the receiver receives the identification information of the caller terminal, the identification information of the receiver terminal may be exposed to the caller.

Therefore, a method is required to conceal the identification information of the receiver terminal to the caller, and to hide the identification information of the caller terminal to the receiver.

The present invention displays identification information of a receiver matched with recipient concealment information in a sender terminal and connects the caller terminal and a receiver terminal using the identification information of the receiver terminal matched with the receiver concealment information, It is possible to provide an apparatus and method for connecting a call between a caller terminal and a receiver terminal without exposing the identification information.

In addition, the present invention displays caller's concealed information generated in correspondence with the identification information of the caller terminal at the receiver terminal, searches the identification information of the caller terminal with the caller's concealed information, and connects the caller terminal with the caller's terminal, It is possible to provide an apparatus and method for connecting a call between a caller terminal and a receiver terminal without exposing identification information of the caller terminal.

The method for preventing leakage of identification information performed by the hidden server according to an embodiment of the present invention includes: generating recipient secret information for concealing identification information of a recipient terminal; Matching the recipient concealment information with the identification information of the recipient terminal; Providing the recipient concealment information to the caller terminal; Generating caller concealment information for concealing identification information of the caller terminal; And transmitting the identification information of the receiver terminal matching the receiver's concealment information and the caller's concealment information to the call server, wherein the call server uses the identification information of the receiver terminal and the caller And the receiver terminal can display the secret information of the sender terminal.

The receiver concealment information of the identification information leakage prevention method according to an embodiment of the present invention includes information on disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, The identification information may be one or more of the disposable identification information temporarily used until the predetermined time period or the identification information which is used for a predetermined period or a predetermined time set by the vendor and is deleted when the period or time expires.

The step of providing the receiver's concealed information of the identification information leakage prevention method according to an embodiment of the present invention may include providing the receiver's concealed information corresponding to the receiver's concealed information to the sender terminal together with the receiver's concealed information And the sender terminal displays the identification information of the receiver and can transmit to the call server the receiver concealment information corresponding to the identification information of the receiver selected by the caller.

The generating of the caller's concealment information in the method of preventing identification information leakage according to an embodiment of the present invention may generate caller's concealment information corresponding to the identification information of the caller terminal.

The transmitting of the caller's concealed information to the call server in the method of preventing identification information leakage according to an embodiment of the present invention may further include, when the caller terminal transmits the concealment information to the call server, And can retrieve the identification information of the receiver terminal matched with the receiver concealment information and transmit the retrieved identification information to the call server.

A method for preventing leakage of identification information performed by a calling terminal according to an exemplary embodiment of the present invention includes: receiving recipient concealment information for concealing identification information of a receiving terminal from a concealed server; And transmitting the recipient's concealment information to a call server to request a call between the caller terminal and the recipient terminal, wherein the concealment server matches identification information of the recipient terminal with the recipient's concealed information, And a transmitter for receiving caller concealment information for concealing identification information of a receiver terminal and identification information of a caller terminal matched with the receiver concealment information from the concealed server, And the recipient terminal can display the caller's concealed information.

A method for preventing leakage of identification information according to an exemplary embodiment of the present invention includes receiving identification information of a recipient corresponding to recipient concealment information from a concealed server; And displaying the identification information of the recipient, wherein the requesting step may transmit the recipient concealment information corresponding to the identification information of the selected recipient to the caller to the call server.

The hidden server of the identification information leakage prevention method according to an embodiment of the present invention generates caller secret information in correspondence with the identification information of the caller terminal received from the call server and transmits the secret information to the recipient secret information It is possible to retrieve the identification information of the matched receiver terminal.

A method for preventing leakage of identification information performed by a call server according to an embodiment of the present invention includes receiving caller's concealment information for concealing identification information of a receiver terminal matched with the recipient's concealment information and identification information of a caller terminal from a concealed server ; And connecting the receiver terminal with the sender terminal using the identification information of the receiver terminal, wherein the receiver concealment information is generated in order to hide identification information of the receiver terminal in the secret server, Information, and the recipient terminal can display the sender concealment information.

A method for preventing leakage of identification information performed by a call server according to an embodiment of the present invention includes: receiving recipient concealment information from a caller terminal; And requesting identification information of the recipient terminal to the concealed server using the recipient concealment information, wherein the step of receiving the sender concealment information comprises: And can receive the identification information of the terminal.

According to an embodiment of the present invention, there is provided an identification information leakage prevention method performed by a hidden server, comprising: receiving caller concealment information and identification information of a receiver terminal from a call server; Retrieving identification information and recipient concealment information of the sender terminal using the sender concealment information and the identification information of the recipient terminal; And transmitting the identification information and recipient concealment information of the searched sender terminal to a call server, wherein the sender concealment information is generated corresponding to the identification information of the sender terminal in order to hide the identification information of the sender terminal The concealment information is generated in order to conceal the identification information of the recipient terminal in the concealed server and is matched with the identification information of the recipient terminal, and the call server receives the concealment information of the caller, received from the recipient terminal, Transmits the identification information to the hidden server, connects the caller terminal and the receiver terminal using the identification information of the caller terminal, and the caller terminal can display the identification information of the receiver using the receiver's secret information .

A method for preventing leakage of identification information performed by a call server according to an embodiment of the present invention includes receiving caller's concealment information and identification information of a receiver terminal from a receiver terminal; Transmitting the secret information of the caller and the identification information of the receiver terminal to the concealed server; Receiving identification information and recipient concealment information of a calling terminal retrieved from the concealed server using the caller concealment information and the identification information of the recipient terminal; And connecting the caller terminal and the receiver terminal using the identification information of the caller terminal, wherein the caller's concealed information includes at least one of a caller ID, And the receiver concealment information is generated in order to conceal the identification information of the receiver terminal in the concealed server and is matched with the identification information of the receiver terminal. The sender terminal uses the receiver concealment information to identify the receiver's identification information Can be displayed.

A method for preventing leakage of identification information performed by a caller terminal according to an embodiment of the present invention includes receiving caller's concealment information from the call server when the call server connects the caller terminal and the caller terminal with identification information of the caller terminal; Displaying identification information of a recipient corresponding to the recipient's concealed information; And performing call communication between the caller terminal and the recipient terminal through the call server when the identification information of the recipient is selected, wherein the caller's concealment information includes at least one of a caller ID, Wherein the secret information is generated in response to the identification information of the terminal and is generated to hide the identification information of the receiver terminal in the hidden server and matched with the identification information of the receiver terminal, Transmits the received caller concealment information and the identification information of the recipient terminal to the concealed server and receives the concealment information from the concealed server and the identification information and recipient concealment information of the caller terminal corresponding to the identification information of the recipient terminal .

According to an embodiment of the present invention, the caller terminal displays the identification information of the receiver matched with the receiver's concealment information, and connects the caller terminal and the receiver terminal using the identification information of the receiver terminal matched with the receiver's concealed information , It is possible to connect the call between the caller terminal and the receiver terminal without exposing the identification information of the receiver terminal to the caller.

In addition, according to an embodiment of the present invention, caller's concealment information generated in correspondence with the identification information of the caller terminal is displayed in the receiver terminal, and the caller's terminal identification information is searched with the caller's concealed information, It is possible to connect the call between the sender terminal and the receiver terminal without exposing the identification information of the sender terminal to the receiver.

1 is a view showing an identification information leakage prevention system according to an embodiment of the present invention.
2 is a diagram illustrating a process in which a calling terminal requests a call to a recipient terminal in an identification information leakage prevention system according to a first embodiment of the present invention.
3 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to the first embodiment of the present invention.
4 is an example of identification information of a receiver displayed by a caller terminal according to an exemplary embodiment of the present invention.
5 is a diagram illustrating a relationship between information managed by a hidden server according to an exemplary embodiment of the present invention.
6 is a diagram illustrating a process in which a caller terminal requests a call to a receiver terminal in an identification information leakage prevention system according to a second embodiment of the present invention.
7 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to a second embodiment of the present invention.
8 is a flowchart illustrating a method for a caller terminal to request a call to a receiver terminal in an identification information leakage prevention system according to an embodiment of the present invention.
10 is a flowchart showing another example of a method for a caller terminal to request a call to a recipient terminal in an identification information leakage prevention system according to an embodiment of the present invention.
11 is a flowchart illustrating a method of requesting a call from a caller terminal to a caller terminal in an identification information leakage prevention system according to an embodiment of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. The identification information leakage prevention method according to an embodiment of the present invention can be performed by the identification information leakage prevention system.

1 is a view showing an identification information leakage prevention system according to an embodiment of the present invention.

The identification information leakage prevention system may include a service server 120, a hidden server 130, and a call server 150 as shown in FIG.

The service server 120 is a server of a company providing a service to a receiver, and can receive a service request from the receiver terminal 110. For example, the service server 120 may be a server of a card company, a substitute driver, an insurance company, a courier, or a mail-order vendor. Also, the sender may be an employee belonging to the business and providing service to the receiver.

At this time, the service server 120 can register the identification information of the receiver terminal 110 and the identification information of the receiver. At this time, the identification information of the recipient terminal 110 may be information that can be used by the originator terminal 140 and connected to the recipient terminal 110. For example, the identification information of the recipient terminal 110 may correspond to the ID of the recipient terminal 110, the network address of the recipient terminal 110, the url corresponding to the recipient terminal 110, (APP-ID) of the application installed in the receiver terminal 110, a telephone number of the receiver terminal 110, and session information of the receiver terminal 110. [ That is, since the identification information of the receiver terminal 110 is information that can be connected to the receiver terminal 110, such as a telephone number, it is necessary for the receiver to conceal the caller in order to prevent an undesired call from occurring. At this time, the application installed in the receiver terminal 110 may be an application for performing the operation of the identification information leakage prevention system.

Further, the identification information of the recipient may be information capable of identifying the recipient. For example, the identification information of the recipient may include the recipient terminal 110, such as the recipient's name, the recipient's title, the recipient's identity, the recipient's service name, and some of the recipient's terminal 110's phone numbers Information that can identify a recipient, or information that can identify a recipient.

At this time, although the identification information of the receiver can identify the receiver holding the receiver terminal 110, it can not be connected to the receiver terminal 110. For example, even if the transmitter knows the receiver's name, The caller terminal 140 can not request the call to the receiver terminal 110 if the telephone number of the caller terminal 110 is unknown. If the telephone number of the recipient terminal 110 is 010-1234-5678, 010-1234- ****, which is a part of the telephone number of the recipient terminal 110 held by the recipient, may be used as identification information of the recipient . 010-1234- ****, which is part of the telephone number of the recipient terminal 110 used as the recipient identification information, can identify whether the recipient is a recipient, but since the back digit of the telephone number is not disclosed, 010 -1234 - **** can not make a call to the recipient terminal 110 alone.

That is, the recipient identification information may be information that can identify the recipient but can not be used to be associated with the recipient terminal 110.

The service server 120 may request the concealment server 130 to receive concealment information for concealing identification information of the recipient terminal 110. [ At this time, the service server 120 may transmit the identification information of the receiver terminal 110 and the identification information of the receiver to the secret server 130. [

The concealment server 130 may generate recipient concealment information for concealing identification information of the recipient terminal 110. [ At this time, the concealed server 130 may receive the identification information of the recipient terminal 110 from the service server 120. Also, the hidden server 130 may receive the identification information of the receiver terminal 110 from the administrator of the hidden server 130. The concealment server 130 may receive the identification information of the recipient terminal 110 from the recipient terminal 110.

At this time, the concealed server 130 may generate recipient concealment information according to the identification information of the recipient terminal 110 or the recipient's identification information. At this time, the receiver concealment information may be disposable identification information temporarily used until the call between the sender terminal 140 and the receiver terminal 110 is terminated. In addition, the recipient secret information may be disposable identification information temporarily used until the service that the company intends to provide to the recipient is completed. The recipient's concealed information may be used for a certain period of time set by the vendor, or for a certain period of time, or may be a period, or identification information deleted when the time expires.

The type of the recipient concealment information generated by the concealment information 130 may be the same as or different from the identification information of the recipient terminal 110. However, the content included in the recipient concealment information may be information that is different in content from the identification information of the recipient terminal 110 and can distinguish the recipient terminal 110 from the other terminal.

For example, when the identification information of the recipient terminal 110 is 010-1111-1111, the concealed server 130 generates 050-2222-2222 which is recipient secret information of the same type as the identification information of the recipient terminal 110 can do. At this time, because the receiver concealment information is the same as the identification information of the receiver terminal 110 and has different numbers, the receiver concealment information 050-2222-2222 is exposed to the caller, and the identification information of the receiver terminal 110 -1111-1111 may not be exposed to the caller.

Also, the concealment server 130 stores the recipient's concealment information cardrcv01 (ID type), 181.111.111.113 (network address type), Hong Kil-dong (recipient's name form), and http: //mvoip.service.com?user=1234 (in the form url of connection for WebRTC or Internet VOIP service). At this time, since the receiver concealment information is information of a type different from that of the receiver terminal 110 (010-1111-1111), even if the receiver concealment information is exposed to the caller, the identification information of the receiver terminal 110 is 010-1111-1111 May not be exposed to the caller.

That is, the receiver concealment information includes at least one of the types that can be used as identification information of the receiver terminal 110, such as a network address, an IP address, a telephone number, an ID, session information, an app ID of an application installed in the receiver terminal 110, It can be created as one type. In addition, since the recipient concealment information is different from the identification information of the recipient terminal 110, the recipient concealment information can identify the recipient, such as recipient identification information, but can not be used for connection with the recipient terminal 110.

In addition, the concealed server 130 may generate recipient concealment information, such as identification information of the recipient, that can identify the recipient but can not be used to be associated with the recipient terminal 110. [

The concealment server 130 may delete the concealment information at a predetermined time interval or delete the concealment information when the call between the caller terminal 140 and the recipient terminal 110 is terminated.

The concealment server 130 may match the generated recipient concealment information with the identification information of the recipient terminal 110. In addition, the concealed server 130 may provide recipient concealment information matched with the identification information of the recipient terminal 110 to the caller terminal 140. [ At this time, the concealed server 130 may provide the identification information of the recipient corresponding to the recipient concealment information to the sender terminal 140 together with the recipient concealment information. At this time, the concealed server 130 may generate different types of recipient concealment information, and may transmit a combination of different types of recipient concealment information to the sender terminal 140. [

For example, when the identification information of the recipient terminal 110 is 010-1111-1111, the concealed server 130 generates 050-2222-2222 which is recipient secret information of the same type as the identification information of the recipient terminal 110 can do. Also, the concealment server 130 stores the recipient's concealment information cardrcv01 (ID type), 181.111.111.113 (network address type), Hong Kil-dong (recipient's name form), and http: //mvoip.service.com?user=1234 (in the form url of the connection for WebRTC or Internet VOIP service). Then, the concealment server 130 may combine a plurality of recipient concealment information such as (Hong, Gong-dong, cardrcv01) and send it to the sender terminal 140.

The originator terminal 140 may transmit the recipient concealment information corresponding to the recipient terminal 110 to the conversation server 150 when the sender desires to communicate with the recipient terminal 110. [ The call server 150 may transmit the receiver concealment information received from the sender terminal 140 to the concealment server 130 to request the identification information of the receiver terminal 110 matching the receiver concealment information. At this time, the concealment server 130 may receive the concealment information of the recipient and the identification information of the caller terminal 140 from the call server 150.

Then, the concealment server 130 may generate caller concealment information for concealing the identification information of the caller terminal. At this time, the concealment server 130 may generate caller concealment information corresponding to the identification information of the caller terminal, which is received from the call server 150. [ For example, the identification information of the sender terminal 140 may include the ID of the sender terminal 140, the network address of the sender terminal 140, the url corresponding to the sender terminal 140, (APP-ID) of the application installed in the caller terminal 140, the telephone number of the caller terminal 140, and session information of the caller terminal 140. [ That is, since the identification information of the sender terminal 140 is information that can be connected to the sender terminal 140, such as a telephone number, it is necessary to conceal the receiver. At this time, the app installed in the caller terminal 140 may be an app for performing an operation of the identification information leakage prevention system.

The caller's concealment information generated by the concealment information 130 may be the same as or different from the identification information of the caller terminal 140. [ However, the content included in the sender concealment information may be information that is different from the identification information of the sender terminal 140 and distinguishable between the other terminal and the sender terminal 140.

For example, when the identification information of the sender terminal 140 is 010-3333-3333, the concealed server 130 generates 050-4444-4444 which is the same type of sender secret information as the identification information of the sender terminal 140 can do. At this time, since the caller's concealed information is the same as the identification information of the caller terminal 140 and the numbers are different, the caller terminal 140 exposes the receiver's concealed information 050-4444-4444 to the receiver, -3333-3333 may not be exposed to the caller.

Further, concealment server 130 caller terminal identification information and the cardrcv02 (type ID) and secret information originating from other types, 181.111.111.116 (network address form) of 140, jeonwoochi (the sender's name, type), and http : //mvoip.service.com? user = 1234 (in the form url of the connection for WebRTC or Internet VOIP service). At this time, since the caller's concealed information is different from the identification information of the caller terminal 140, 010-3333-3333, the caller's concealed information is exposed to the caller, and the identification information of the caller terminal 140 is 010-3333-3333 May not be exposed to the caller.

That is, the caller's concealed information includes at least one of the types that can be used as identification information of the calling terminal 140, such as a network address, an IP address, a telephone number, an ID, session information, an app ID of an application installed in the calling terminal 110, It can be created as one type. Also, since the caller's concealed information is different from the identification information of the caller terminal 140, the caller's concealed information can identify the caller as the caller identification information, but can not be used to be connected to the caller terminal 140. [

In addition, the concealment server 130 may generate information that can identify the caller, such as caller identification information, but can not be used for connection with the caller terminal 140, as caller secret information. For example, the identification information of the caller may include the name of the caller, the name of the company to which the caller belongs, the name of the department to which the caller belongs, the department number of the department to which the caller belongs, the nickname of the caller, the ID of the caller, The app's app id, and the service name provided by the caller.

Next, the concealment server 130 may transmit to the call server 150 the identification information of the recipient terminal matched with the recipient concealment information received from the conversation server 150 and the generated sender concealment information.

The concealed server 130 may also provide the call server 150 with the identification information of the recipient terminal 110 corresponding to the recipient identification information, the recipient concealment information, and the recipient concealment information with the caller terminal 140 . At this time, the concealed server 130 may generate caller concealment information for concealing the identification information of the calling terminal. For example, the concealed server 130 may generate caller concealment information corresponding to the identification information of the calling terminal 140 held by the caller belonging to the business. Then, the concealed server 130 may transmit the caller's concealed information to the call server 150 together with the identification information of the receiver terminal 110 corresponding to the receiver's identification information, the receiver's concealed information, and the receiver's concealed information.

Thereafter, when the sender terminal 140 transmits the recipient identification information or the recipient concealment information to the conversation server 150, the conversation server 150 transmits the identification information of the recipient received from the concealment server 130, It can identify the identification information of the receiver terminal 110 and request a call with the receiver terminal 110. [ In addition, the call server 150 may replace the caller's concealed information received from the concealment server 130 with the identification information of the caller terminal 140 that has transmitted the receiver identification information or the recipient's concealment information.

The sender terminal 140 may receive recipient concealment information from the concealment server 130. [ At this time, the sender terminal 140 can receive the receiver's concealment information from the concealment server 130 and the receiver's identification information corresponding to the receiver's concealment information.

Then, the sender terminal 140 can display the identification information of the received recipient. That is, the sender terminal 140 can prevent the identification information of the receiver terminal 110 from being leaked to the sender by displaying the identification information of the receiver terminal 110 instead of the identification information of the receiver terminal 110 to which the caller should request the call .

When the sender selects the identification information of the receiver displayed by the sender, the sender terminal 140 transmits the receiver's concealment information corresponding to the identification information of the receiver selected to the sender to the concealed server 130 or the call server 150 And may request a call between the recipient terminal 110 and the caller terminal 140.

The recipient concealment information and the identification information of the recipient terminal 110 are transmitted to the recipient terminal 110 through the call server 150 such as a network address, an IP address, a telephone number, Can be classified into a second type that can identify the recipient, such as type and ID, session information, and the app ID of the app installed in the recipient terminal 110, but can not directly communicate with the recipient terminal 110 have.

When the recipient concealment information is of the first type, the sender terminal 140 transmits the recipient concealment information corresponding to the identification information of the selected recipient to the caller server 150, and transmits the concealment information corresponding to the identification information of the recipient terminal 110 to the sender terminal 140 You can request a call.

When the recipient's concealed information is of the second type, the sender terminal 140 transmits the recipient's concealment information corresponding to the selected recipient's identification information to the concealed server 130 and the recipient terminal 110 and the sender terminal 140 ). ≪ / RTI > At this time, the concealed server 130 transmits to the call server 150 the identification information of the receiver terminal matched with the receiver concealment information received from the sender terminal 140 and the caller concealment information to the receiver terminal 110 and the caller terminal 140 ). ≪ / RTI >

The concealment server 130 also transmits the concealment information to the recipient terminal 110 using the identification information of the recipient terminal matched with the recipient concealment information received from the caller terminal 140 to the caller terminal 140 and the recipient terminal 110 You can also request a call set-up. At this time, the concealed server 130 may transmit the caller's concealment information corresponding to the calling terminal 140 to the recipient terminal 110. In addition, the concealed server 130 requests the caller terminal 140 to set up a call between the caller terminal 140 and the recipient terminal 110 to establish a call connection between the caller terminal 140 and the recipient terminal 110 .

The sender terminal 140 may include a location confirmation function and may transmit the location of the sender terminal 140 identified by the location confirmation function to the service server 120 or the concealed server 130. At this time, the service server 120 or the concealed server 130 may provide the location of the sender terminal 140 to the receiver terminal 110.

The function of the originator terminal 140 to display the identification information of the recipient and the location confirmation function may be included in the software of the originator terminal 140 or the software or application installed in the originator terminal 140.

When the call server 150 receives the receiver concealment information from the caller terminal 140, the call server 150 can confirm the identification information of the caller terminal 140 that transmitted the receiver concealment information. For example, the call server 150 may be one of a server providing a VoIP service, an exchange providing a voice call service, a web server, or a message server. At this time, the web server can provide real-time communication between the sender terminal 140 and the receiver terminal 110 using the WebRTC. In addition, the message server may provide a connection between the caller terminal 140 and the recipient terminal 110 using a voice call.

The call server 150 can request the secret server 130 for the identification information of the receiver terminal 110 using the receiver secret information received from the sender terminal 140. [ At this time, the call server 150 may transmit the identification information of the verified sender terminal 140 and the recipient concealment information received from the caller terminal 140 to the concealed server 130.

The call server 150 may also receive the identification information of the receiver terminal 110 matched with the caller's concealed information and the receiver's concealed information generated corresponding to the identification information of the calling terminal 140 from the concealed server 130 . At this time, the call server 150 may connect the receiver terminal 110 and the caller terminal 140 using the identification information of the receiver terminal 110, and may transmit caller secret information to the receiver terminal 110.

When the concealed server 130 provides the caller terminal 140 with the identification information of the recipient terminal 110 corresponding to the recipient identification information, the recipient concealment information and the recipient concealment information, the conversation server 150 also conceals From the server 130, the identification information of the recipient terminal 110 corresponding to the identification information of the recipient, the recipient concealment information, and the recipient concealment information. At this time, the call server 150 may further receive the caller's concealment information for concealing the identification information of the caller terminal from the concealed server 130. [

When the call server 150 receives the receiver identification information or the receiver concealment information from the caller terminal 140, the call server 150 transmits the identification information of the receiver received from the concealment server 130, And can request a call with the receiver terminal 110 by identifying the identification information of the receiver terminal 110. In addition, the call server 150 may replace the caller's concealed information received from the concealment server 130 with the identification information of the caller terminal 140 that has transmitted the receiver identification information or the recipient's concealment information.

At this time, the recipient terminal 110 can notify the recipient that the call between the sender terminal 140 and the recipient terminal 110 is requested. Also, the receiver terminal 110 may display the caller concealment information received from the call server 150 to notify the receiver of the caller requesting the call between the caller terminal 140 and the receiver terminal 110.

That is, the receiver terminal 110 displays the caller's concealed information instead of the identification information of the caller terminal 140 or the caller terminal 140 to prevent the receiver's identification information of the caller terminal 140 from being leaked .

Also, when the receiver selects the caller's concealed information included in the call history of the receiver terminal 110, the receiver terminal 110 transmits the caller's concealed information to the call server 150 so as to communicate with the caller terminal 130 Can be requested.

At this time, the call server 150 may receive the caller's concealment information and the identification information of the receiver terminal 110 from the receiver terminal 110. The call server 150 may transmit the secret information of the caller and the identification information of the receiver terminal 110 to the secret server 130.

The concealment server 130 may search recipient concealment information matched with the identification information of the sender terminal corresponding to the sender concealment information and the identification information of the recipient terminal and transmit the concealment concealment information to the conversation server 150. [

The call server 150 may connect the caller terminal 140 and the receiver terminal 110 using the identification information of the caller terminal and may transmit the receiver concealment information to the caller terminal 140. [

At this time, the sender terminal 140 can display the identification information of the receiver corresponding to the receiver's secret information. When the identification information of the receiver is selected for the caller, the caller terminal 140 and the receiver terminal 150 can communicate with each other through the call server 150.

That is, when the caller terminal 140 and the recipient terminal 110 are connected according to a call request of the recipient terminal 110, the caller terminal 140 uses the recipient concealment information received from the call server 150, By displaying the identification information, it is possible for the sender to identify the recipient.

In addition, the concealed server 130 and the call server 150 may be configured as one concealed call server. At this time, the hidden call server may include a concealed unit performing the same operation as the concealed server 130 and a call unit performing the same operation as the call server 150. [

2 is a diagram illustrating a process in which a calling terminal requests a call to a recipient terminal in an identification information leakage prevention system according to a first embodiment of the present invention.

2 is a flow chart illustrating an example of a call between a caller terminal 140 and a recipient terminal 110 by providing recipient concealment information to the sender terminal 140 to inform the sender that there is a recipient to provide a service, Thereby making it possible for the caller to talk with the receiver while hiding the identification information of the receiver terminal 110. [

In step 210, the service server 120 may transmit the identification information of the receiver terminal 110 requesting the service and the identification information of the receiver to the secret server 130.

In operation 220, the concealment server 130 generates recipient concealment information for concealing the identification information of the recipient terminal 110 and may match the identification information of the recipient terminal 110. For example, the concealment server 130 may manage recipient conceal information such as SID (service identity) with the identification information of the recipient terminal 110 such as 010.

The concealment server 130 may provide recipient concealment information matched with the identification information of the recipient terminal 110 to the caller terminal 140. [ At this time, the concealed server 130 may provide the identification information of the recipient corresponding to the recipient concealment information to the sender terminal 140 together with the recipient concealment information.

In step 230, the caller terminal 140 may display the identification information of the received recipient. For example, the caller terminal 140 displays the identification information of the receiver such as Kim xx instead of the identification information of the receiver terminal 110 such as 010, thereby preventing the caller from leaking the identification information of the receiver terminal 110 To identify the recipient. At this time, the sender terminal 140 can simultaneously display identification information of a plurality of different receivers.

The sender terminal 140 transmits recipient concealment information corresponding to the identification information of the recipient selected by the sender to the call server 150 among the identification information of the recipient terminal 110 and the caller terminal 140 You can request a call.

In step 240, the call server 150 may transmit the receiver concealment information received in step 230 to the concealment server 130 to request the identification information of the receiver terminal 110 matched with the receiver concealment information. At this time, the concealment server 130 may receive the concealment information of the recipient and the identification information of the caller terminal 140 from the call server 150.

In operation 250, the concealment server 130 generates caller's concealment information for concealing the caller's terminal identification information, and transmits identification information of the receiver terminal matched with the recipient's concealed information received from the call server 150, And may transmit concealment information to the call server 150. At this time, the concealed server 130 may generate caller concealment information corresponding to the identification information of the caller terminal 140. [ For example, the identification information of the sender terminal 140 may be information capable of identifying the sender terminal 140 on the network, such as APPID, and the sender secret information may be a secure number such as 015.

The call server 150 may request the connection between the receiver terminal 110 and the caller terminal 140 to the exchange 200 of the mobile communication company using the identification information of the receiver terminal 110 in step 260. In addition, the call server 150 may send caller concealment information to the exchange 220. [

The concealment server 130 may also provide the caller server 150 with recipient concealment information matched with the identification information of the recipient terminal 110 in step 220 together with the caller terminal 140. [ At this time, the concealment server 130 may generate caller concealment information for concealing the identification information of the caller terminal and transmit the concealment concealment information to the call server 150. At this time, the call server 150 may skip step 240 and step 250, and perform step 260. The call server 150 transmits the identification information of the recipient terminal 110 and the sender terminal 110 to the exchange 200 of the mobile communication company 200 using the identification information of the recipient terminal 110 received from the concealment server 130 in step 220. [ 140). In addition, the call server 150 may send the caller concealment information received in step 220 to the exchange 220.

In step 270, the exchange 200 connects the recipient terminal 110 with the sender terminal 140 using the identification information of the recipient terminal 110, and can transmit the sender concealment information to the recipient terminal 110.

At this time, the recipient terminal 110 may display received caller concealment information to notify the recipient of the caller requesting the call between the caller terminal 140 and the recipient terminal 110. At this time, the receiver terminal 110 displays only the safety number 015 without displaying the APPID, which is the identification information of the transmitter terminal 140, so that the receiver terminal 110 transmits the caller terminal 140 to the receiver terminal 110 to the contact of the user.

When the call server 150 is a server providing VoIP service, the caller terminal 140 and the call server 150 are connected to the WebRTC-VoIP network 201, and the call server 150 and the receiver terminal 110 Lt; RTI ID = 0.0 > VoIP / mobile < / RTI > Accordingly, the caller terminal 140 can connect the call with the recipient terminal 110 using the Internet telephone charge.

The concealment server 130 or the call server 150 may add the call volume between the recipient terminal 110 and the caller terminal 140 by using SID which is recipient concealment information or APPID which is identification information of the sender terminal 140 .

For example, the service server 120 sets the number of outgoing calls, which is the number of times that a call can be requested to the recipient terminal 110 by APPID, which is identification information of the caller terminal 140, The amount of money can be settled. At this time, the call server 150 can settle the connection charge of the VoIP / mobile switching center 202 to the mobile communication company used by the receiver terminal 110 from the calculated amount.

3 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to the first embodiment of the present invention.

3 is a flowchart illustrating a method of transmitting call information between a caller terminal 140 and a recipient terminal 110 by using caller's concealment information for concealing identification information of a caller terminal 140, And making a call with the caller possible while hiding the identification information of the caller terminal 140.

In step 310, the recipient terminal 110 may send caller concealment information to the exchange 200 and request a connection between the recipient terminal 110 and the caller terminal 140. At this time, the exchange 200 may be at least one of an exchange of a mobile communication company, an exchange of a wired telephone network, or a server and an exchange of an Internet telephone. Then, the exchange 200 can confirm the identification information of the recipient terminal 110.

In step 320, the exchange 200 may send caller concealment information and identification information of the recipient terminal 110 to the call server 150.

The call server 150 may transmit the caller's concealment information received at step 320 and the identification information of the receiver terminal 110 to the concealed server 130 at step 330. [

In operation 340, the concealment server 130 searches recipient concealment information matched with the identification information of the sender terminal corresponding to the sender concealment information and the identification information of the recipient terminal, and transmits the concealment concealment information to the conversation server 150.

In step 350, the call server 150 connects the caller terminal 140 and the recipient terminal 110 using the identification information of the caller terminal received in step 340, and transmits the recipient secret information to the caller terminal 140 Can be transmitted.

At this time, the sender terminal 140 can display the identification information of the receiver corresponding to the receiver's secret information. For example, the caller terminal 140 may display the identification information of the receiver, such as the name of the receiver, so that the caller can identify the receiver of the call without providing identification information of the receiver terminal 110 to the caller .

4 is an example of identification information of a receiver displayed by a caller terminal according to an exemplary embodiment of the present invention.

When the sender terminal 140 receives the identification information 400 of the receiver corresponding to the receiver's concealed information together with the receiver concealment information from the concealment server 130, Can be displayed.

When the originator terminal 140 receives only the recipient concealment information from the concealment server 130, the originator terminal 140 transmits the recipient concealment information to the concealment server 130 to receive the recipient's identification information 400 corresponding to the recipient's concealment information , And display identification information 400 of the received recipient.

If the sender has a plurality of recipients to whom the service should be provided, the sender terminal 140 can receive the recipient identification information 400 corresponding to a plurality of recipient concealment information and recipient concealment information. At this time, the sender terminal 140 can sort and display the identification information 400 of the receiver according to the order in which the sender provides the service or the order in which the receiver requests the service.

5 is a diagram illustrating a relationship between information managed by a hidden server according to an exemplary embodiment of the present invention.

The concealment server 130 can match the identification information 510 of the receiver and the identification information of the receiver terminal 110 such as 010 with the receiver concealment information 530 such as the SID have.

When receiving the recipient concealment information 530 from the call server 150, the concealment server 130 transmits the identification information 520 of the recipient terminal 110 matching the recipient concealment information 530 to the call server 150 ). When receiving the identification information 520 of the receiver terminal 110 from the call server 150, the concealed server 130 stores the receiver concealment information 530 matched with the identification information 520 of the receiver terminal 110, To the call server 150.

In addition, when receiving the recipient concealment information 530 from the sender terminal 140, the concealed server 130 may transmit the recipient's identification information 510 matched to the recipient concealment information 530 to the originator terminal 140 have.

The concealment server 130 may generate the caller's concealment information 550 such as the safety number 015 corresponding to the identification information 540 of the calling terminal 140 such as APPID.

When receiving the caller's concealment information 550 from the call server 150, the concealed server 130 transmits the identification information 540 of the caller terminal 140 corresponding to the caller's concealed information 550 to the call server 150 ).

6 is a diagram illustrating a process in which a caller terminal requests a call to a receiver terminal in an identification information leakage prevention system according to a second embodiment of the present invention.

The second embodiment of the present invention is a process for preventing leakage of the identification information of the receiver terminal 110 when the provider operating the hidden server 130 and the provider operating the Internet telephone server 600 are different.

In step 610, the service server 120 may transmit the identification information 010-01 of the receiver terminal 110 requesting the service and the identification information of the receiver (Hong xx) to the hidden server 130.

In step 620, the concealment server 130 generates recipient concealment information 015-01 for concealing the identification information 010-01 of the recipient terminal 110 and matches it with the identification information of the recipient terminal 110 . For example, the recipient concealment information may be a safety number such as 015-01.

At this time, the concealment server 130 may issue the identification information 015-02 of the calling terminal 140 at the time when the calling terminal 140 installs an application for operation of the identification information leakage prevention system. The concealment server 130 may generate caller's concealment information 070-02 corresponding to the identification information 015-02 of the calling terminal 140. [ For example, the identification information 015-02 of the sender terminal 140 may be information capable of identifying the sender terminal 140 on the network, such as APPID, and the sender secret information may be a security number such as 070-02 . The caller concealment information 070-02 can also be used in correspondence with the identification information 015-02 of the caller terminal 140 while the caller terminal 140 is subscribed to the identification information leak prevention system.

The concealment server 130 may provide the caller terminal 140 with the recipient concealment information 015-01 matched with the identification information 010-01 of the recipient terminal 110. [ At this time, the concealment server 130 may provide the caller terminal 140 with the identification information (Hong xx) of the receiver corresponding to the receiver concealment information 015-01, together with the receiver concealment information 015-01. For example, the concealed server 130 may transmit concealment information 015-01 to the calling terminal 140 using the WebRTC.

In step 630, the sender terminal 140 may display the identification information (red xx) of the received recipient. For example, the caller terminal 140 may display the identification information (Hong xx) of the receiver instead of the identification information 010-01 of the receiver terminal 110 to inform the caller of the identification information 010-01 Can be prevented from leaking and the recipient can be identified. In addition, the sender terminal 140 may display the receiver secret information 015-01.

When the identification information (Hong xx) of the indicated recipient is selected for the caller, the caller terminal 140 transmits the receipt concealment information 015-01 corresponding to the identification information (Hong xx) of the recipient to the call server 150 And may request a call between the recipient terminal 110 and the caller terminal 140. [

In step 640, the call server 150 transmits the receipt concealment information 015-01 received in step 630 to the concealment server 130 and transmits the concealment information 015-01 matching the recipient concealment information 015-01 to the recipient terminal 110 The identification information 010 - 01 of the mobile terminal 10 can be requested. At this time, the concealment server 130 may receive the concealment information 015-01 from the call server 150 and the identification information 015-02 of the caller terminal 140.

In step 650, the concealment server 130 transmits the identification information 010-01 of the recipient terminal matched with the recipient concealment information 015-01 received from the call server 150 and the generated sender concealment information 070-02 To the call server 150.

The call server 150 may request the connection between the receiver terminal 110 and the caller terminal 140 to the Internet telephone server 600 using the identification information 010-01 of the receiver terminal 110 in step 660 have. In addition, the call server 150 may send the caller's concealed information (070-02) to the Internet telephone server 620. [ At this time, the call server 150 and the Internet telephone server 600 may be connected to the Internet telephone VoIP.

The Internet telephone server 600 may request the connection between the receiver terminal 110 and the sender terminal 140 to the exchange of the mobile communication company using the identification information 010-01 of the receiver terminal 110 in step 670 . In addition, the Internet telephone server 600 can transmit the caller's concealed information (070-02) to the exchange.

In step 680, the exchange connects the recipient terminal 110 and the caller terminal 140 using the identification information 010-01 of the recipient terminal 110 and transmits the caller's concealed information 070- 02 < / RTI >

At this time, the recipient terminal 110 may display the received caller's concealment information 070-02 to notify the recipient of the caller requesting the call between the caller terminal 140 and the recipient terminal 110.

7 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to a second embodiment of the present invention.

The second embodiment of the present invention is a process for preventing leakage of the identification information of the receiver terminal 110 when the provider operating the hidden server 130 and the provider operating the Internet telephone server 600 are different.

In step 710, the recipient terminal 110 may transmit caller's concealment information 070-02 to the exchange of the mobile communication company and request a connection between the recipient terminal 110 and the caller terminal 140. [ At this time, the exchange can confirm the identification information 010-01 of the recipient terminal 110.

In step 720, the exchange may send the caller's concealed information (070-02) and the identification information (010-01) of the recipient terminal (110) to the Internet telephone server (200).

The Internet telephone server 200 may transmit the caller's concealment information 070-02 received from the exchange and the identification information 010-01 of the recipient terminal 110 to the call server 150 in step 730.

The call server 150 may transmit the caller's concealed information 070-02 received in step 730 and the identification information 010-01 of the receiver terminal 110 to the concealed server 130 in step 740 .

The concealment server 130 stores the identification information 015-02 of the caller terminal 140 and the identification information 010-01 of the receiver terminal 110 corresponding to the caller's concealed information 070-02 in step 750 It can search for the matching recipient concealment information 015-01 and transmit it to the call server 150. [

In step 760, the call server 150 connects the caller terminal 140 and the recipient terminal 110 using the identification information of the caller terminal received in step 750, and transmits to the caller terminal 140 recipient secret information (015-01).

At this time, the sender terminal 140 can display the identification information (red xx) of the receiver corresponding to the receiver's secret information 015-01.

8 is a flowchart illustrating a method for a caller terminal to request a call to a receiver terminal in an identification information leakage prevention system according to an embodiment of the present invention.

In operation 810, the concealment server 130 may generate recipient concealment information for concealing identification information of the recipient terminal 110. At this time, the recipient concealment information generated by the concealment server 130 may be disposable identification information. The concealment server 130 may delete the concealment information at a predetermined time interval or delete the concealment information when the call between the caller terminal 140 and the recipient terminal 110 is terminated. In addition, the type of the recipient concealment information generated by the concealment server 130 can directly communicate with the recipient terminal 110 through the call server 150, such as a network address, an IP address, a telephone number, Lt; / RTI >

In operation 820, the concealment server 130 may match the concealment information generated in operation 810 with the identification information of the recipient terminal 110.

In step 830, the concealment server 130 may provide recipient concealment information matched with the identification information of the recipient terminal 110 to the caller terminal 140. [ At this time, the concealed server 130 may provide the caller terminal 140 with the identification information of the receiver corresponding to the receiver concealment information.

At this time, the concealment server 130 may automatically provide recipient concealment information to the predetermined sender terminal 140. Specifically, the concealment server 130 identifies a sender who can provide a service to a recipient among the senders, and can provide recipient concealment information to the sender terminal 140 of the identified sender. For example, if the service is a surrogate operation service, the surveillance server 130 moves from the surrogate driver (sender) to the surrogate driver, identifies the surrogate driver who is not acting as a surrogate driver, The receiver can send concealment information to the recipient who requested the operation.

In addition, the concealed server 130 may receive the concealment information of the recipient from the sender terminal 140. At this time, the concealed server 130 may transmit concealment information to the calling terminal 140 requesting the concealed concealment information. For example, if the service is a surrogate operation service, the caller terminal 140 may receive an input from the surrogate driver (caller) whose surrogate operation is terminated to indicate that the surrogate operation has ended. At this time, the sender terminal 140 can receive recipient concealment information, which can be used to communicate with the recipient to provide the proxy operation service, by requesting the concealment server 130 to receive the recipient concealment information.

In step 840, the caller terminal 140 may display the identification information of the recipient received in step 830. In addition, if the identification information of the indicated recipient is selected for the caller, the caller terminal 140 may perform step 850. [

In step 850, the caller terminal 140 may send the recipient concealment information corresponding to the selected recipient's identification information to the call server 150 in step 840.

In step 855, the call server 150 may transmit the recipient concealment information received in step 850 to the concealed server 130. At this time, the call server 150 can confirm the identification information of the sender terminal 140 that has transmitted the receiver concealment information, and can transmit the identification information of the sender terminal 140 to the concealment server 130 together with the receiver concealment information.

In step 860, the concealment server 130 may generate sender concealment information for concealing the identification information of the calling terminal in response to the identification information of the calling terminal received in step 855. [ In addition, the concealment server 130 may retrieve the identification information of the recipient terminal 110 matching the recipient concealment information received in step 855. [

In step 870, the concealment server 130 may transmit the identification information of the receiver terminal matched with the receiver concealment information and the caller concealment information to the call server 150. [

In step 880, the call server 150 connects the recipient terminal 110 and the caller terminal 140 using the identification information of the recipient terminal 110 received in step 870, Concealment information can be transmitted.

At step 890, the recipient terminal 110 may display the caller concealment information received from the call server 150 to inform the recipient of the caller requesting the call between the caller terminal 140 and the recipient terminal 110.

9 is a flowchart illustrating a method for a caller terminal to request a call to a recipient terminal in an identification information leakage prevention system according to an embodiment of the present invention.

In step 910, the concealment server 130 may generate recipient concealment information for concealing the identification information of the recipient terminal 110. At this time, the type of the recipient's concealed information generated by the concealment server 130 can identify the recipient, such as the ID, the session information, and the app ID of the app installed in the recipient terminal 110, , And a second type that can not perform communication.

In operation 920, the concealment server 130 may match the recipient concealment information generated in operation 810 with the identification information of the recipient terminal 110.

In operation 930, the concealment server 130 may provide recipient concealment information matched with the identification information of the recipient terminal 110 to the caller terminal 140. [ At this time, the concealed server 130 may provide the caller terminal 140 with the identification information of the receiver corresponding to the receiver concealment information.

In step 940, the caller terminal 140 may display the identification information of the recipient received in step 930. In addition, if the identification information of the indicated recipient is selected for the caller, the caller terminal 140 may perform step 950. [

In step 950, the sender terminal 140 may send the recipient's concealment information corresponding to the selected recipient's identification information to the concealed server 130 in step 940.

In step 960, the concealment server 130 may retrieve the identification information of the recipient terminal 110 matching the recipient concealment information received from the sender terminal 140. [

In step 970, the concealment server 130 notifies the recipient terminal 110 of the call between the caller terminal 140 and the recipient terminal 110 using the identification information of the recipient terminal 110 retrieved in step 960 You can also request a setup. At this time, the concealed server 130 may transmit the caller's concealment information corresponding to the calling terminal 140 to the recipient terminal 110. The receiver terminal 110 may also display the caller's concealment information received from the concealment server 130 to notify the receiver of the caller requesting the call between the caller terminal 140 and the receiver terminal 110. [

The concealment server 130 requests the caller terminal 140 to set up a call for the call between the caller terminal 140 and the recipient terminal 110 in step 975 so that the conversation between the caller terminal 140 and the recipient terminal 110 . Also, steps 970 and 975 may be performed simultaneously.

In step 980, the caller terminal 140 and the recipient terminal 110 perform a call between the caller terminal 140 and the recipient terminal 110 according to the call setup requested in step 970 and step 975 .

10 is a flowchart showing another example of a method for a caller terminal to request a call to a recipient terminal in an identification information leakage prevention system according to an embodiment of the present invention.

10 is a flow chart illustrating the operation of the concealment server 130 in the case where the concealment server 130 provides the caller terminal 140 with identification information of the recipient terminal 110 corresponding to the recipient identification information, recipient concealment information, A caller terminal requests a call to a receiver terminal when the caller terminal provides identification information of the receiver terminal 110 corresponding to the identification information, the receiver concealment information, and the receiver concealment information.

In operation 1010, the concealment server 130 may generate recipient concealment information for concealing identification information of the recipient terminal 110 received from the service server 120. [ At this time, the recipient concealment information generated by the concealment server 130 may be disposable identification information. Also, the concealment server 130 may delete the concealment information at a predetermined time interval, or delete the concealment information when the call between the calling terminal 140 and the recipient terminal 110 is terminated.

In operation 1020, the concealment server 130 may match the recipient concealment information generated in operation 1010 with the identification information of the recipient terminal 110.

In step 1030, the concealment server 130 may generate caller concealment information for concealing the identification information of the caller terminal. At this time, the concealed server 130 may generate caller concealment information corresponding to the identification information of the calling terminal 140 held by the caller belonging to the business.

In step 1040, the concealed server 130 transmits the caller's concealed information to the caller terminal 140 corresponding to the calling party's concealed information, including the identification information of the calling terminal 140, the identification information of the receiver, the concealment information of the recipient, To the call server 150 together with the information.

In operation 1050, the concealed server 130 may provide recipient concealment information matched with the identification information of the recipient terminal 110 to the caller terminal 140. [ At this time, the concealed server 130 may provide the caller terminal 140 with the identification information of the receiver corresponding to the receiver concealment information. At this time, steps 1040 and 1050 can be performed simultaneously.

In step 1060, the caller terminal 140 may display the identification information of the recipient received in step 1050. In addition, if the identification information of the indicated recipient is selected for the caller, the caller terminal 140 may perform step 1070. [

In step 1070, the caller terminal 140 may send the recipient concealment information corresponding to the selected recipient's identification information to the call server 150 in step 1060.

In step 1080, the call server 150 compares the recipient concealment information received in step 1050 with the identification information of the recipient terminal corresponding to the recipient concealment information received in step 1040, The identification information of the receiver terminal corresponding to the receiver concealment information can be retrieved. The calling server 150 also compares the identification information of the calling terminal 140 that transmitted the receiver's concealed information with the identification information of the calling terminal 140 corresponding to the calling party's concealed information received in step 1040, Can search for the sender's concealment information corresponding to the identification information of the sender terminal 140 which transmitted the concealment information.

The call server 150 may connect the receiver terminal 110 and the caller terminal 140 using the identification information of the searched receiver terminal 110 and may transmit the caller's concealed information to the receiver terminal 110 have.

In step 1090, the recipient terminal 110 may display the caller's concealment information received from the call server 150 to inform the recipient of the caller requesting the call between the caller terminal 140 and the recipient terminal 110.

11 is a flowchart illustrating a method of requesting a call from a caller terminal to a caller terminal in an identification information leakage prevention system according to an embodiment of the present invention.

In step 1110, the recipient terminal 110 may send caller concealment information to the call server 150 to request a call with the caller terminal 130. At this time, the receiver terminal 110 may transmit the identification information of the receiver terminal to the call server 150.

In step 1120, the call server 150 may transmit the caller's concealment information received in step 1110 and the identification information of the receiver terminal 110 to the concealed server 130.

In step 1130, the concealment server 130 may retrieve the identification information of the caller terminal corresponding to the caller concealment information received in step 1120. [ In addition, the concealment server 130 may retrieve recipient concealment information matched with the identification information of the recipient terminal received in step 1120. [

In step 1140, the concealment server 130 may transmit the recipient concealment information retrieved in step 1130 and the identification information of the calling terminal to the call server 150. [

In step 1150, the call server 150 connects the caller terminal 140 and the recipient terminal 110 using the identification information of the caller terminal received in step 1140, Information can be transmitted.

In step 1130, the calling terminal 140 may display the identification information of the recipient corresponding to the recipient's concealed information. When the identification information of the receiver is selected for the caller, the caller terminal 140 and the receiver terminal 150 can communicate with each other through the call server 150.

The present invention displays identification information of a receiver matched with recipient concealment information in a sender terminal and connects the caller terminal and a receiver terminal using the identification information of the receiver terminal matched with the receiver concealment information, The call between the sender terminal and the receiver terminal can be connected without exposing the identification information.

In addition, the present invention displays caller's concealed information generated in correspondence with the identification information of the caller terminal at the receiver terminal, searches the identification information of the caller terminal with the caller's concealed information, and connects the caller terminal with the caller's terminal, It is possible to connect the call between the sender terminal and the receiver terminal without exposing the identification information of the sender terminal.

The method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.

While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. This is possible.

Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the equivalents of the claims, as well as the claims.

110:
120: service server
130: hidden server
140: caller terminal
150: call server

Claims (22)

A method for preventing leakage of identification information performed by a hidden server,
Generating recipient concealment information for concealing identification information of a recipient terminal;
Matching the recipient concealment information with the identification information of the recipient terminal;
Providing the recipient concealment information to the caller terminal;
Generating caller concealment information for concealing identification information of the caller terminal; And
And transmitting the caller's concealment information and the identification information of the receiver terminal matched with the receiver's concealed information received from the call server to the call server
Lt; / RTI >
Wherein the call server comprises:
Transmitting the concealment information received from the caller terminal to the concealed server, connecting the receiver terminal with the caller terminal using the identification information of the receiver terminal received from the concealed server, Lt; / RTI >
The receiver terminal,
Displays secret information of the caller terminal,
Wherein the step of generating the recipient concealment information comprises:
If the identification number of the receiver terminal is a telephone number, one of a network address, an IP address, an ID of the receiver, session information, an app ID of the application installed in the receiver terminal, and a URL, which is different from the identification information of the receiver terminal, The recipient generates secret information,
Wherein the generating of the sender concealment information comprises:
An IP address, an ID of a caller, session information, an app ID of an app installed in a caller terminal, and a URL, which are different types of information from the calling terminal's identification information, when the calling terminal's identification number is a telephone number And generating a secret number, which is a type of information different from the identification information of the sender terminal, as caller secret information when the identification number of the sender terminal is an app ID of an app installed in the caller terminal, Way.
The method according to claim 1,
The recipient concealment information includes:
Disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, disposable identification information temporarily used until the service to be provided to the receiver is completed by the vendor, Wherein the identification information is used up to a predetermined time, and the identification information is deleted when the period or time expires.
The method according to claim 1,
The step of providing the recipient concealment information to the caller terminal comprises:
Providing identification information of the recipient corresponding to the recipient concealment information to the sender terminal together with the recipient concealment information,
The caller terminal,
And transmitting recipient concealment information corresponding to the identification information of the recipient selected to the caller to the call server.
The method according to claim 1,
The identification information of the receiver
Such as the name of the recipient, the name of the recipient, the identity of the recipient, the name of the service to which the recipient subscribed, the telephone number of the recipient terminal, information that can identify the recipient owning the recipient terminal, And the identification information leakage prevention method.
The method according to claim 1,
Wherein the generating of the sender concealment information comprises:
And generating caller concealment information corresponding to the identification information of the caller terminal.
The method according to claim 1,
Wherein the step of transmitting the sender concealment information to the call server comprises:
And when the caller terminal transmits the concealment information to the call server, the caller terminal receives the concealment information from the call server, retrieves the identification information of the receiver terminal matched with the receiver concealment information, How to prevent leakage.
The method according to claim 1,
The identification information of the recipient terminal includes:
(ID) of the receiver terminal, the network address of the receiver terminal, the url corresponding to the receiver terminal, the IP address corresponding to the receiver terminal, the APP ID of the application installed in the receiver terminal, the receiver's terminal number, Wherein the identification information is at least one of session information of a receiver terminal.
The method according to claim 1,
Wherein the identification information of the sender terminal
(ID) of the calling terminal, the network address of the calling terminal, the url corresponding to the calling terminal, the IP address corresponding to the calling terminal, the APP ID of the app installed in the calling terminal, the phone number of the calling terminal, Wherein the identification information is at least one of session information of an originator terminal.
delete delete A method for preventing leakage of identification information performed by a caller terminal,
Receiving recipient concealment information for concealing identification information of a recipient terminal from a concealed server; And
Transmitting the receiver concealment information to a call server and requesting a call between the caller terminal and the receiver terminal
Lt; / RTI >
Wherein the hidden server comprises:
The identification information of the receiver terminal is matched with the receiver concealment information,
Wherein the call server comprises:
Receiving caller's concealment information for concealing the identification information of the receiver terminal and the identification information of the receiver terminal matched with the recipient's concealed information from the concealed server and using the identification information of the receiver terminal to identify the receiver terminal and the caller terminal ≪ / RTI &
The receiver terminal,
Displays the caller's concealed information,
The recipient concealment information includes:
If the identification number of the receiver terminal is a telephone number, one of the network address, IP address, receiver ID, session information, app ID of the application installed in the receiver terminal, and url is different from the identification information of the receiver terminal The recipient is generated with concealment information,
The sender concealment information includes:
If the identification number of the caller terminal is a telephone number, one of the network address, the IP address, the sender's ID, the session information, the app ID of the application installed in the sender terminal, and the url, which is different from the identification information of the sender terminal, Wherein the caller identification information is generated by caller concealment information, and when the identification number of the caller terminal is an app ID of an app installed in the caller terminal, a safety number, which is different type information from the caller terminal identification information, Way.
12. The method of claim 11,
Receiving identification information of the recipient corresponding to the recipient's concealment information from the concealed server; And
Displaying identification information of the recipient;
Further comprising:
The requesting step
To the calling server, recipient concealment information corresponding to the identification information of the selected recipient to the caller.
12. The method of claim 11,
The recipient concealment information includes:
Disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, disposable identification information temporarily used until the service to be provided to the receiver is completed by the vendor, Wherein the identification information is used up to a predetermined time, and the identification information is deleted when the period or time expires.
12. The method of claim 11,
Wherein the hidden server comprises:
Generating caller concealment information corresponding to the caller terminal identification information received from the call server and retrieving the identification information of the receiver terminal matched with the recipient concealment information received from the call server.
A method for preventing leakage of identification information performed by a call server,
Receiving caller's concealment information for concealing identification information of a receiver terminal matched with recipient concealment information and identification information of a caller terminal from a concealed server; And
And connecting the receiver terminal and the caller terminal using the identification information of the receiver terminal
Lt; / RTI >
The recipient concealment information includes
The secret server generates secret information for concealing the identification information of the receiver terminal and is matched with the identification information of the receiver terminal. When the identification number of the receiver terminal is a telephone number, An address, an IP address, an ID of the receiver, session information, an app ID of the application installed in the receiver terminal, or url is generated as recipient secret information,
The recipient terminal
Displays the caller's concealed information,
The sender concealment information includes:
If the identification number of the caller terminal is a telephone number, one of the network address, the IP address, the sender's ID, the session information, the app ID of the application installed in the sender terminal, and the url, which is different from the identification information of the sender terminal, Wherein the caller identification information is generated by caller concealment information, and when the identification number of the caller terminal is an app ID of an app installed in the caller terminal, a safety number, which is different type information from the caller terminal identification information, Way.
16. The method of claim 15,
The recipient concealment information includes:
Disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, disposable identification information temporarily used until the service to be provided to the receiver is completed by the vendor, Wherein the identification information is used up to a predetermined time, and the identification information is deleted when the period or time expires.
16. The method of claim 15,
Receiving recipient concealment information from a sender terminal; And
Requesting identification information of the receiver terminal to the secret server using the receiver secret information
Further comprising:
Wherein the step of receiving the sender concealment information comprises:
And receiving the identification information of the recipient terminal matched with the recipient concealment information used in the requesting step.
A method for preventing leakage of identification information performed by a call server,
Receiving recipient concealment information from a sender terminal;
Requesting identification information of the receiver terminal to the secret server using the receiver secret information;
Receiving caller concealment information for concealing the identification information of the receiver terminal and the identification information of the caller terminal matched with the receiver concealment information from the concealed server; And
Transmitting the identification information of the receiver terminal and the caller concealment information to the Internet telephone server
Lt; / RTI >
Wherein the hidden server comprises:
Generating concealment information for concealing identification information of the recipient terminal, matching the recipient concealment information with identification information of the recipient terminal, generating sender concealment information corresponding to the identification information of the sender terminal,
The Internet telephone server,
Wherein the caller is connected to the receiver terminal using the identification information of the receiver terminal, transmits the caller concealment information to the receiver terminal,
The recipient terminal
Displays the caller's concealed information,
The recipient concealment information includes:
If the identification number of the receiver terminal is a telephone number, one of the network address, IP address, receiver ID, session information, app ID of the application installed in the receiver terminal, and url is different from the identification information of the receiver terminal The recipient is generated with concealment information,
The sender concealment information includes:
If the identification number of the caller terminal is a telephone number, one of the network address, the IP address, the sender's ID, the session information, the app ID of the application installed in the sender terminal, and the url, which is different from the identification information of the sender terminal, Wherein the caller identification information is generated by caller concealment information, and when the identification number of the caller terminal is an app ID of an app installed in the caller terminal, a safety number, which is different type information from the caller terminal identification information, Way.
A method for preventing leakage of identification information performed by a hidden server,
Receiving caller concealment information and identification information of a receiver terminal from a call server;
Retrieving identification information and recipient concealment information of the sender terminal using the sender concealment information and the identification information of the recipient terminal; And
Transmitting the identification information and recipient's concealed information of the searched sender terminal to a call server
Lt; / RTI >
The sender concealment information includes:
Wherein the caller terminal is generated in correspondence with the identification information of the caller terminal to hide identification information of the caller terminal, and when the identification number of the caller terminal is a telephone number, An address of an originator, an ID of a caller, information of an app of an app installed in a caller terminal, url is generated as caller concealment information, and the identification number of the caller terminal is an app ID of an app installed in the caller terminal, Which is different from the identification information of the caller, is generated as caller secret information,
The recipient concealment information includes:
The secret server generates secret information to hide the identification information of the receiver terminal and is matched with the identification information of the receiver terminal. If the identification number of the receiver terminal is a telephone number, One of the network address, the IP address, the receiver's ID, the session information, the app ID of the application installed in the receiver terminal, and the url is generated as recipient secret information,
Wherein the call server comprises:
Transmitting the secret information of the caller and the identification information of the receiver terminal received from the receiver terminal to the secret server, connecting the caller terminal and the receiver terminal using the identification information of the transmitter terminal,
The sender terminal
And displaying the identification information of the receiver using the receiver concealment information.
A method for preventing leakage of identification information performed by a call server,
Receiving caller concealment information and identification information of a receiver terminal from a receiver terminal;
Transmitting the secret information of the caller and the identification information of the receiver terminal to the concealed server;
Receiving identification information and recipient concealment information of a calling terminal retrieved from the concealed server using the caller concealment information and the identification information of the recipient terminal; And
Connecting the sender terminal and the receiver terminal using the identification information of the sender terminal
Lt; / RTI >
The sender concealment information includes:
Wherein the caller terminal is generated in correspondence with the identification information of the caller terminal to hide identification information of the caller terminal, and when the identification number of the caller terminal is a telephone number, An address of an originator, an ID of a caller, information of an app of an app installed in a caller terminal, url is generated as caller concealment information, and the identification number of the caller terminal is an app ID of an app installed in the caller terminal, Which is different from the identification information of the caller, is generated as caller secret information,
The recipient concealment information includes:
The secret server generates secret information to hide the identification information of the receiver terminal and is matched with the identification information of the receiver terminal. If the identification number of the receiver terminal is a telephone number, One of the network address, the IP address, the receiver's ID, the session information, the app ID of the application installed in the receiver terminal, and the url is generated as recipient secret information,
The sender terminal
And displaying the identification information of the receiver using the receiver concealment information.
21. The method of claim 20,
The receiver terminal,
Transmits caller concealment information and identification information of the receiver terminal to the Internet telephone server through the exchange,
The Internet telephone server,
And transmitting the received caller concealment information and the identification information of the receiver terminal to the call server.
A method for preventing leakage of identification information performed by a caller terminal,
Receiving recipient concealment information from the call server when the call server connects the caller terminal and the recipient terminal with identification information of the caller terminal; And
Displaying identification information of a recipient corresponding to the recipient's concealed information; And
Performing a call between the caller terminal and the receiver terminal through the call server when the identification information of the receiver is selected
Lt; / RTI >
The recipient concealment information includes:
A secret server for storing identification information of the recipient terminal and matching the identification information of the recipient terminal, and when the identification number of the recipient terminal is a telephone number, An address, an IP address, an ID of the receiver, session information, an app ID of the application installed in the receiver terminal, or url is generated as recipient secret information,
Wherein the call server comprises:
And transmitting the identification information of the caller terminal and the identification information of the receiver terminal received from the receiver terminal to the secret server and receiving the identification information of the caller terminal and the receiver secret information corresponding to the caller secret information and the identification information of the receiver terminal from the secret server and,
The sender concealment information includes:
Wherein the caller terminal is generated in correspondence with the identification information of the caller terminal to hide identification information of the caller terminal, and when the identification number of the caller terminal is a telephone number, An address of an originator, an ID of a caller, information of an app of an app installed in a caller terminal, url is generated as caller concealment information, and the identification number of the caller terminal is an app ID of an app installed in the caller terminal, The secret number being information of a different type from the identification information of the caller.
KR1020150073222A 2015-05-26 2015-05-26 SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION KR101755021B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150073222A KR101755021B1 (en) 2015-05-26 2015-05-26 SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150073222A KR101755021B1 (en) 2015-05-26 2015-05-26 SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION

Publications (2)

Publication Number Publication Date
KR20160138832A KR20160138832A (en) 2016-12-06
KR101755021B1 true KR101755021B1 (en) 2017-07-06

Family

ID=57576229

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150073222A KR101755021B1 (en) 2015-05-26 2015-05-26 SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION

Country Status (1)

Country Link
KR (1) KR101755021B1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11128563B2 (en) 2018-06-22 2021-09-21 Sorenson Ip Holdings, Llc Incoming communication routing

Also Published As

Publication number Publication date
KR20160138832A (en) 2016-12-06

Similar Documents

Publication Publication Date Title
US10171678B2 (en) Systems and methods of call-based data communication
CN105119877B (en) Speech verification method, apparatus and system
US9420097B2 (en) Automated traversal of interactive voice response systems
CN107749930B (en) Call processing method, server and storage medium for binding virtual numbers for calling and called parties respectively
EP3162104B1 (en) A method to authenticate calls in a telecommunication system
US8625763B2 (en) Telecommunications calls
US20230353672A1 (en) Call content management for mobile devices
US20210144521A1 (en) Call content management for mobile devices
US10453160B2 (en) Embeddable communications software module
KR100455864B1 (en) System for transmitting service of character and text message for identifying caller
US10244107B1 (en) Systems and methods for causing display of a reputation indicator associated with a called party
US20130259215A1 (en) Discovering and using phone number location information
US20210144243A1 (en) Call content management for mobile devices
KR101879785B1 (en) The method to syncronize both web/app session and phone channel on Visual-IVR systems
KR101755021B1 (en) SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION
US20190045062A1 (en) System and method for voice call setup
CN108270931A (en) The anti-anti-harassment method of swindle of mobile phone based on IMEI labels
KR20190119898A (en) Two-way call connection system
US9712683B2 (en) Communication agent method
US9042528B2 (en) Data communication
KR20130049601A (en) Call control method according to the presence information
WO2011113481A1 (en) Establishing a telecommunications conference
KR100942417B1 (en) Receiver number hiding call service method and service system thereof
KR20060110720A (en) Method and apparatus for providing mobile homepage to the mobile terminal
CN103716902B (en) A kind of method for call connection, relevant device and system

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right