KR20160138832A - SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION - Google Patents
SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION Download PDFInfo
- Publication number
- KR20160138832A KR20160138832A KR1020150073222A KR20150073222A KR20160138832A KR 20160138832 A KR20160138832 A KR 20160138832A KR 1020150073222 A KR1020150073222 A KR 1020150073222A KR 20150073222 A KR20150073222 A KR 20150073222A KR 20160138832 A KR20160138832 A KR 20160138832A
- Authority
- KR
- South Korea
- Prior art keywords
- terminal
- identification information
- information
- recipient
- caller
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2539—Hiding addresses; Keeping addresses anonymous
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
A system and method for preventing identification information of a receiver and a caller from being leaked is disclosed.
A method for preventing leakage of identification information performed by a hidden server comprises: generating receiver concealment information for concealing identification information of a receiver terminal; Matching the recipient concealment information with the identification information of the recipient terminal; Providing the recipient concealment information to the caller terminal; Generating caller concealment information for concealing identification information of a caller terminal; And transmitting the identification information of the receiver terminal matched with the receiver concealment information and the caller concealment information to the call server.
Description
The present invention relates to a system and method for preventing identification information of a receiver terminal and identification information of a transmitter terminal from being leaked.
For services such as surrogate driving and courier services, calls between the employee and the consumer to provide the service may be required. For example, when a surrogate driver arrives near a place where a surrogate driver is requested, the user may be asked to call to confirm the customer.
However, if identification information of a consumer terminal such as a telephone number for a consumer and a telephone call is disclosed to an employee, a telephone number of the consumer may be leaked to the outside by mistake or deliberation of one of the employees, Consumers may find it unpleasant for a person who does not want to know their phone number.
Accordingly, there is a need for a method of requesting a caller to call a called party while hiding identification information of a receiver terminal such as a consumer to a caller such as an employee to provide a service.
In addition, it may be uncomfortable for a caller to leave his / her telephone number as a call history to a caller who has requested a call in business need. And, if the caller makes a call-back to the caller after talking to the caller, there is a risk that the caller's telephone number is directly exposed to the caller.
In addition, when an application for updating the friend list according to the call history is installed in the receiver terminal, the receiver terminal updates the caller terminal to the friend list, thereby adding the receiver terminal to the friend list of the caller terminal. That is, even if the caller hides the telephone number of the receiver, if the receiver receives the identification information of the caller terminal, the identification information of the receiver terminal may be exposed to the caller.
Therefore, a method is required to conceal the identification information of the receiver terminal to the caller, and to hide the identification information of the caller terminal to the receiver.
The present invention displays identification information of a receiver matched with recipient concealment information in a sender terminal and connects the caller terminal and a receiver terminal using the identification information of the receiver terminal matched with the receiver concealment information, It is possible to provide an apparatus and method for connecting a call between a caller terminal and a receiver terminal without exposing the identification information.
In addition, the present invention displays caller's concealed information generated in correspondence with the identification information of the caller terminal at the receiver terminal, searches the identification information of the caller terminal with the caller's concealed information, and connects the caller terminal with the caller's terminal, It is possible to provide an apparatus and method for connecting a call between a caller terminal and a receiver terminal without exposing identification information of the caller terminal.
The method for preventing leakage of identification information performed by the hidden server according to an embodiment of the present invention includes: generating recipient secret information for concealing identification information of a recipient terminal; Matching the recipient concealment information with the identification information of the recipient terminal; Providing the recipient concealment information to the caller terminal; Generating caller concealment information for concealing identification information of the caller terminal; And transmitting the identification information of the receiver terminal matching the receiver's concealment information and the caller's concealment information to the call server, wherein the call server uses the identification information of the receiver terminal and the caller And the receiver terminal can display the secret information of the sender terminal.
The receiver concealment information of the identification information leakage prevention method according to an embodiment of the present invention includes information on disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, The identification information may be one or more of the disposable identification information temporarily used until the predetermined time period or the identification information which is used for a predetermined period or a predetermined time set by the vendor and is deleted when the period or time expires.
The step of providing the receiver's concealed information of the identification information leakage prevention method according to an embodiment of the present invention may include providing the receiver's concealed information corresponding to the receiver's concealed information to the sender terminal together with the receiver's concealed information And the sender terminal displays the identification information of the receiver and can transmit to the call server the receiver concealment information corresponding to the identification information of the receiver selected by the caller.
The generating of the caller's concealment information in the method of preventing identification information leakage according to an embodiment of the present invention may generate caller's concealment information corresponding to the identification information of the caller terminal.
The transmitting of the caller's concealed information to the call server in the method of preventing identification information leakage according to an embodiment of the present invention may further include, when the caller terminal transmits the concealment information to the call server, And can retrieve the identification information of the receiver terminal matched with the receiver concealment information and transmit the retrieved identification information to the call server.
A method for preventing leakage of identification information performed by a calling terminal according to an exemplary embodiment of the present invention includes: receiving recipient concealment information for concealing identification information of a receiving terminal from a concealed server; And transmitting the recipient's concealment information to a call server to request a call between the caller terminal and the recipient terminal, wherein the concealment server matches identification information of the recipient terminal with the recipient's concealed information, And a transmitter for receiving caller concealment information for concealing identification information of a receiver terminal and identification information of a caller terminal matched with the receiver concealment information from the concealed server, And the recipient terminal can display the caller's concealed information.
A method for preventing leakage of identification information according to an exemplary embodiment of the present invention includes receiving identification information of a recipient corresponding to recipient concealment information from a concealed server; And displaying the identification information of the recipient, wherein the requesting step may transmit the recipient concealment information corresponding to the identification information of the selected recipient to the caller to the call server.
The hidden server of the identification information leakage prevention method according to an embodiment of the present invention generates caller secret information in correspondence with the identification information of the caller terminal received from the call server and transmits the secret information to the recipient secret information It is possible to retrieve the identification information of the matched receiver terminal.
A method for preventing leakage of identification information performed by a call server according to an embodiment of the present invention includes receiving caller's concealment information for concealing identification information of a receiver terminal matched with the recipient's concealment information and identification information of a caller terminal from a concealed server ; And connecting the receiver terminal with the sender terminal using the identification information of the receiver terminal, wherein the receiver concealment information is generated in order to hide identification information of the receiver terminal in the secret server, Information, and the recipient terminal can display the sender concealment information.
A method for preventing leakage of identification information performed by a call server according to an embodiment of the present invention includes: receiving recipient concealment information from a caller terminal; And requesting identification information of the recipient terminal to the concealed server using the recipient concealment information, wherein the step of receiving the sender concealment information comprises: And can receive the identification information of the terminal.
According to an embodiment of the present invention, there is provided an identification information leakage prevention method performed by a hidden server, comprising: receiving caller concealment information and identification information of a receiver terminal from a call server; Retrieving identification information and recipient concealment information of the sender terminal using the sender concealment information and the identification information of the recipient terminal; And transmitting the identification information and recipient concealment information of the searched sender terminal to a call server, wherein the sender concealment information is generated corresponding to the identification information of the sender terminal in order to hide the identification information of the sender terminal The concealment information is generated in order to conceal the identification information of the recipient terminal in the concealed server and is matched with the identification information of the recipient terminal, and the call server receives the concealment information of the caller, received from the recipient terminal, Transmits the identification information to the hidden server, connects the caller terminal and the receiver terminal using the identification information of the caller terminal, and the caller terminal can display the identification information of the receiver using the receiver's secret information .
A method for preventing leakage of identification information performed by a call server according to an embodiment of the present invention includes receiving caller's concealment information and identification information of a receiver terminal from a receiver terminal; Transmitting the secret information of the caller and the identification information of the receiver terminal to the concealed server; Receiving identification information and recipient concealment information of a calling terminal retrieved from the concealed server using the caller concealment information and the identification information of the recipient terminal; And connecting the caller terminal and the receiver terminal using the identification information of the caller terminal, wherein the caller's concealed information includes at least one of a caller ID, And the receiver concealment information is generated in order to conceal the identification information of the receiver terminal in the concealed server and is matched with the identification information of the receiver terminal. The sender terminal uses the receiver concealment information to identify the receiver's identification information Can be displayed.
A method for preventing leakage of identification information performed by a caller terminal according to an embodiment of the present invention includes receiving caller's concealment information from the call server when the call server connects the caller terminal and the caller terminal with identification information of the caller terminal; Displaying identification information of a recipient corresponding to the recipient's concealed information; And performing call communication between the caller terminal and the recipient terminal through the call server when the identification information of the recipient is selected, wherein the caller's concealment information includes at least one of a caller ID, Wherein the secret information is generated in response to the identification information of the terminal and is generated to hide the identification information of the receiver terminal in the hidden server and matched with the identification information of the receiver terminal, Transmits the received caller concealment information and the identification information of the recipient terminal to the concealed server and receives the concealment information from the concealed server and the identification information and recipient concealment information of the caller terminal corresponding to the identification information of the recipient terminal .
According to an embodiment of the present invention, the caller terminal displays the identification information of the receiver matched with the receiver's concealment information, and connects the caller terminal and the receiver terminal using the identification information of the receiver terminal matched with the receiver's concealed information , It is possible to connect the call between the caller terminal and the receiver terminal without exposing the identification information of the receiver terminal to the caller.
In addition, according to an embodiment of the present invention, caller's concealment information generated in correspondence with the identification information of the caller terminal is displayed in the receiver terminal, and the caller's terminal identification information is searched with the caller's concealed information, It is possible to connect the call between the sender terminal and the receiver terminal without exposing the identification information of the sender terminal to the receiver.
1 is a view showing an identification information leakage prevention system according to an embodiment of the present invention.
2 is a diagram illustrating a process in which a calling terminal requests a call to a recipient terminal in an identification information leakage prevention system according to a first embodiment of the present invention.
3 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to the first embodiment of the present invention.
4 is an example of identification information of a receiver displayed by a caller terminal according to an exemplary embodiment of the present invention.
5 is a diagram illustrating a relationship between information managed by a hidden server according to an exemplary embodiment of the present invention.
6 is a diagram illustrating a process in which a caller terminal requests a call to a receiver terminal in an identification information leakage prevention system according to a second embodiment of the present invention.
7 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to a second embodiment of the present invention.
8 is a flowchart illustrating a method for a caller terminal to request a call to a receiver terminal in an identification information leakage prevention system according to an embodiment of the present invention.
10 is a flowchart showing another example of a method for a caller terminal to request a call to a recipient terminal in an identification information leakage prevention system according to an embodiment of the present invention.
11 is a flowchart illustrating a method of requesting a call from a caller terminal to a caller terminal in an identification information leakage prevention system according to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings. The identification information leakage prevention method according to an embodiment of the present invention can be performed by the identification information leakage prevention system.
1 is a view showing an identification information leakage prevention system according to an embodiment of the present invention.
The identification information leakage prevention system may include a
The
At this time, the
Further, the identification information of the recipient may be information capable of identifying the recipient. For example, the identification information of the recipient may include the
At this time, although the identification information of the receiver can identify the receiver holding the
That is, the recipient identification information may be information that can identify the recipient but can not be used to be associated with the
The
The
At this time, the concealed
The type of the recipient concealment information generated by the
For example, when the identification information of the
Also, the
That is, the receiver concealment information includes at least one of the types that can be used as identification information of the
In addition, the
The
The
For example, when the identification information of the
The
Then, the
The caller's concealment information generated by the
For example, when the identification information of the
Further,
That is, the caller's concealed information includes at least one of the types that can be used as identification information of the calling
In addition, the
Next, the
The
Thereafter, when the
The
Then, the
When the sender selects the identification information of the receiver displayed by the sender, the
The recipient concealment information and the identification information of the
When the recipient concealment information is of the first type, the
When the recipient's concealed information is of the second type, the
The
The
The function of the
When the
The
The
When the
When the
At this time, the
That is, the
Also, when the receiver selects the caller's concealed information included in the call history of the
At this time, the
The
The
At this time, the
That is, when the
In addition, the
2 is a diagram illustrating a process in which a calling terminal requests a call to a recipient terminal in an identification information leakage prevention system according to a first embodiment of the present invention.
2 is a flow chart illustrating an example of a call between a
In step 210, the
In
The
In
The
In
In
The
The
In
At this time, the
When the
The
For example, the
3 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to the first embodiment of the present invention.
3 is a flowchart illustrating a method of transmitting call information between a
In
In
The
In
In
At this time, the
4 is an example of identification information of a receiver displayed by a caller terminal according to an exemplary embodiment of the present invention.
When the
When the
If the sender has a plurality of recipients to whom the service should be provided, the
5 is a diagram illustrating a relationship between information managed by a hidden server according to an exemplary embodiment of the present invention.
The
When receiving the
In addition, when receiving the
The
When receiving the caller's
6 is a diagram illustrating a process in which a caller terminal requests a call to a receiver terminal in an identification information leakage prevention system according to a second embodiment of the present invention.
The second embodiment of the present invention is a process for preventing leakage of the identification information of the
In
In
At this time, the
The
In
When the identification information (Hong xx) of the indicated recipient is selected for the caller, the
In step 640, the
In
The
The
In
At this time, the
7 is a diagram illustrating a process in which a receiver terminal requests a call to a caller terminal in an identification information leakage prevention system according to a second embodiment of the present invention.
The second embodiment of the present invention is a process for preventing leakage of the identification information of the
In
In
The
The
The
In
At this time, the
8 is a flowchart illustrating a method for a caller terminal to request a call to a receiver terminal in an identification information leakage prevention system according to an embodiment of the present invention.
In
In
In
At this time, the
In addition, the
In
In
In
In
In
In step 880, the
At
9 is a flowchart illustrating a method for a caller terminal to request a call to a receiver terminal in an identification information leakage prevention system according to an embodiment of the present invention.
In
In
In
In
In
In
In
The
In
10 is a flowchart showing another example of a method for a caller terminal to request a call to a recipient terminal in an identification information leakage prevention system according to an embodiment of the present invention.
10 is a flow chart illustrating the operation of the
In
In
In
In
In
In
In
In
The
In
11 is a flowchart illustrating a method of requesting a call from a caller terminal to a caller terminal in an identification information leakage prevention system according to an embodiment of the present invention.
In
In
In
In
In
In
The present invention displays identification information of a receiver matched with recipient concealment information in a sender terminal and connects the caller terminal and a receiver terminal using the identification information of the receiver terminal matched with the receiver concealment information, The call between the sender terminal and the receiver terminal can be connected without exposing the identification information.
In addition, the present invention displays caller's concealed information generated in correspondence with the identification information of the caller terminal at the receiver terminal, searches the identification information of the caller terminal with the caller's concealed information, and connects the caller terminal with the caller's terminal, It is possible to connect the call between the sender terminal and the receiver terminal without exposing the identification information of the sender terminal.
The method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. This is possible.
Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the equivalents of the claims, as well as the claims.
110:
120: service server
130: hidden server
140: caller terminal
150: call server
Claims (22)
Generating recipient concealment information for concealing identification information of a recipient terminal;
Matching the recipient concealment information with the identification information of the recipient terminal;
Providing the recipient concealment information to the caller terminal;
Generating caller concealment information for concealing identification information of the caller terminal; And
Transmitting the identification information of the receiver terminal matched with the receiver concealment information and the caller concealment information to the call server
Lt; / RTI >
Wherein the call server comprises:
The receiver terminal and the caller terminal using the identification information of the receiver terminal,
The receiver terminal,
And displaying concealment information of the caller terminal.
The recipient concealment information includes:
Disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, disposable identification information temporarily used until the service to be provided to the receiver is completed by the vendor, Wherein the identification information is used up to a predetermined time, and the identification information is deleted when the period or time expires.
The step of providing the recipient concealment information to the caller terminal comprises:
Providing identification information of the recipient corresponding to the recipient concealment information to the sender terminal together with the recipient concealment information,
The caller terminal,
And transmitting recipient concealment information corresponding to the identification information of the recipient selected to the caller to the call server.
The identification information of the receiver
Such as the name of the recipient, the name of the recipient, the identity of the recipient, the name of the service to which the recipient subscribed, the telephone number of the recipient terminal, information that can identify the recipient owning the recipient terminal, And the identification information leakage prevention method.
Wherein the generating of the sender concealment information comprises:
And generating caller concealment information corresponding to the identification information of the caller terminal.
Wherein the step of transmitting the sender concealment information to the call server comprises:
And when the caller terminal transmits the concealment information to the call server, the caller terminal receives the concealment information from the call server, retrieves the identification information of the receiver terminal matched with the receiver concealment information, How to prevent leakage.
The identification information of the recipient terminal includes:
(ID) of the receiver terminal, the network address of the receiver terminal, the url corresponding to the receiver terminal, the IP address corresponding to the receiver terminal, the APP ID of the application installed in the receiver terminal, the receiver's terminal number, Wherein the identification information is at least one of session information of a receiver terminal.
Wherein the identification information of the sender terminal
(ID) of the calling terminal, the network address of the calling terminal, the url corresponding to the calling terminal, the IP address corresponding to the calling terminal, the APP ID of the app installed in the calling terminal, the phone number of the calling terminal, Wherein the identification information is at least one of session information of an originator terminal.
The recipient concealment information includes:
Wherein the identification information is generated as at least one of a telephone number, an ID, session information, an app ID, and a url, and is different from identification information of the receiver terminal.
The sender concealment information includes:
Wherein the identification information is generated as at least one of a telephone number, an ID, a session information, an app ID, and a url, and is different from identification information of the caller terminal.
Receiving recipient concealment information for concealing identification information of a recipient terminal from a concealed server; And
Transmitting the receiver concealment information to a call server and requesting a call between the caller terminal and the receiver terminal
Lt; / RTI >
Wherein the hidden server comprises:
The identification information of the receiver terminal is matched with the receiver concealment information,
Wherein the call server comprises:
Receiving caller's concealment information for concealing the identification information of the receiver terminal and the identification information of the receiver terminal matched with the recipient's concealed information from the concealed server and using the identification information of the receiver terminal to identify the receiver terminal and the caller terminal ≪ / RTI &
The receiver terminal,
And displaying the caller's concealed information.
Receiving identification information of the recipient corresponding to the recipient's concealment information from the concealed server; And
Displaying identification information of the recipient;
Further comprising:
The requesting step
To the calling server, recipient concealment information corresponding to the identification information of the selected recipient to the caller.
The recipient concealment information includes:
Disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, disposable identification information temporarily used until the service to be provided to the receiver is completed by the vendor, Wherein the identification information is used up to a predetermined time, and the identification information is deleted when the period or time expires.
Wherein the hidden server comprises:
Generating caller concealment information corresponding to the caller terminal identification information received from the call server and retrieving the identification information of the receiver terminal matched with the recipient concealment information received from the call server.
Receiving caller's concealment information for concealing identification information of a receiver terminal matched with recipient concealment information and identification information of a caller terminal from a concealed server; And
And connecting the receiver terminal and the caller terminal using the identification information of the receiver terminal
Lt; / RTI >
The recipient concealment information includes
The secret server generates secret information for identifying the receiver terminal and matches the identification information of the receiver terminal.
The recipient terminal
And displaying the caller's concealed information.
The recipient concealment information includes:
Disposable identification information temporarily used until the call between the caller terminal and the receiver terminal is terminated, disposable identification information temporarily used until the service to be provided to the receiver is completed by the vendor, Wherein the identification information is used up to a predetermined time, and the identification information is deleted when the period or time expires.
Receiving recipient concealment information from a sender terminal; And
Requesting identification information of the receiver terminal to the secret server using the receiver secret information
Further comprising:
Wherein the step of receiving the sender concealment information comprises:
And receiving the identification information of the recipient terminal matched with the recipient concealment information used in the requesting step.
Receiving recipient concealment information from a sender terminal;
Requesting identification information of the recipient terminal to the secret server using the recipient concealment information;
Receiving caller concealment information for concealing the identification information of the receiver terminal and the identification information of the caller terminal matched with the receiver concealment information from the concealed server; And
Transmitting the identification information of the receiver terminal and the caller concealment information to the Internet telephone server
Lt; / RTI >
Wherein the hidden server comprises:
Generating concealment information for concealing identification information of the recipient terminal, matching the recipient concealment information with identification information of the recipient terminal, generating sender concealment information corresponding to the identification information of the sender terminal,
The Internet telephone server,
Wherein the caller terminal is connected to the receiver terminal using the identification information of the receiver terminal, transmits the caller concealment information to the receiver terminal,
The recipient terminal
And displaying the caller's concealed information.
Receiving caller concealment information and identification information of a receiver terminal from a call server;
Retrieving identification information and recipient concealment information of the sender terminal using the sender concealment information and the identification information of the recipient terminal; And
Transmitting the identification information and recipient's concealed information of the searched sender terminal to a call server
Lt; / RTI >
The sender concealment information includes:
Wherein the caller terminal is generated in response to identification information of the caller terminal to hide identification information of the caller terminal,
The recipient concealment information includes:
The secret server generates secret information for matching the identification information of the receiver terminal with the identification information of the receiver terminal,
Wherein the call server comprises:
Transmitting the secret information of the caller and the identification information of the receiver terminal received from the receiver terminal to the secret server, connecting the caller terminal and the receiver terminal using the identification information of the transmitter terminal,
The sender terminal
And displaying the identification information of the receiver using the receiver concealment information.
Receiving caller concealment information and identification information of a receiver terminal from a receiver terminal;
Transmitting the secret information of the caller and the identification information of the receiver terminal to the concealed server;
Receiving identification information and recipient concealment information of a calling terminal retrieved from the concealed server using the caller concealment information and the identification information of the recipient terminal; And
Connecting the sender terminal and the receiver terminal using the identification information of the sender terminal
Lt; / RTI >
The sender concealment information includes:
Wherein the caller terminal is generated in response to identification information of the caller terminal to hide identification information of the caller terminal,
The recipient concealment information includes:
The secret server generates secret information for matching the identification information of the receiver terminal with the identification information of the receiver terminal,
The sender terminal
And displaying the identification information of the receiver using the receiver concealment information.
The receiver terminal,
Transmits caller concealment information and identification information of the receiver terminal to the Internet telephone server through the exchange,
The Internet telephone server,
And transmitting the received caller concealment information and the identification information of the receiver terminal to the call server.
Receiving recipient concealment information from the call server when the call server connects the caller terminal and the recipient terminal with identification information of the caller terminal; And
Displaying identification information of a recipient corresponding to the recipient's concealed information; And
Performing a call between the caller terminal and the receiver terminal through the call server when the identification information of the receiver is selected
Lt; / RTI >
The sender concealment information includes:
Wherein the caller terminal is generated in response to identification information of the caller terminal to hide identification information of the caller terminal,
The recipient concealment information includes:
The secret server generates secret information for matching the identification information of the receiver terminal with the identification information of the receiver terminal,
Wherein the call server comprises:
And transmitting the identification information of the caller terminal and the identification information of the receiver terminal received from the receiver terminal to the secret server and receiving the identification information of the caller terminal and the receiver secret information corresponding to the caller secret information and the identification information of the receiver terminal from the secret server A method for preventing leakage of identification information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150073222A KR101755021B1 (en) | 2015-05-26 | 2015-05-26 | SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150073222A KR101755021B1 (en) | 2015-05-26 | 2015-05-26 | SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20160138832A true KR20160138832A (en) | 2016-12-06 |
KR101755021B1 KR101755021B1 (en) | 2017-07-06 |
Family
ID=57576229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150073222A KR101755021B1 (en) | 2015-05-26 | 2015-05-26 | SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101755021B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11128563B2 (en) | 2018-06-22 | 2021-09-21 | Sorenson Ip Holdings, Llc | Incoming communication routing |
-
2015
- 2015-05-26 KR KR1020150073222A patent/KR101755021B1/en active IP Right Grant
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11128563B2 (en) | 2018-06-22 | 2021-09-21 | Sorenson Ip Holdings, Llc | Incoming communication routing |
US11700197B2 (en) | 2018-06-22 | 2023-07-11 | Sorenson Ip Holdings, Llc | Incoming communication routing |
Also Published As
Publication number | Publication date |
---|---|
KR101755021B1 (en) | 2017-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10171678B2 (en) | Systems and methods of call-based data communication | |
CN105119877B (en) | Speech verification method, apparatus and system | |
US9420097B2 (en) | Automated traversal of interactive voice response systems | |
EP3162104B1 (en) | A method to authenticate calls in a telecommunication system | |
CN101635772A (en) | Methods and system thereof for managing calling information | |
US20230353672A1 (en) | Call content management for mobile devices | |
US8625763B2 (en) | Telecommunications calls | |
US20210144521A1 (en) | Call content management for mobile devices | |
US10453160B2 (en) | Embeddable communications software module | |
KR100455864B1 (en) | System for transmitting service of character and text message for identifying caller | |
US20130259215A1 (en) | Discovering and using phone number location information | |
JP2011502426A (en) | Method and system for automatically switching between free directory assistance service and paid directory assistance service | |
US20070254637A1 (en) | Device, Method and Computer Program Product Readable Medium for Establishing a Communication Session | |
KR101879785B1 (en) | The method to syncronize both web/app session and phone channel on Visual-IVR systems | |
KR101755021B1 (en) | SYSTEM AND METHOD FOR LEAKAGE PREVENTING IDENTIFICATION INFORMATION of mobile USING THE TEMPORARY IDENTIFICATION INFORMATION | |
US20190045062A1 (en) | System and method for voice call setup | |
CN108270931A (en) | The anti-anti-harassment method of swindle of mobile phone based on IMEI labels | |
US9154633B2 (en) | Data communication | |
KR20190119898A (en) | Two-way call connection system | |
US9042528B2 (en) | Data communication | |
KR20130049601A (en) | Call control method according to the presence information | |
US20150281946A1 (en) | Communication Agent Method | |
WO2011113481A1 (en) | Establishing a telecommunications conference | |
CN103716902B (en) | A kind of method for call connection, relevant device and system | |
KR101564874B1 (en) | Method and system for providing communication security service for preventing exposure of personal phone number information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right |