WO2017197766A1 - Procédé et dispositif d'appel - Google Patents

Procédé et dispositif d'appel Download PDF

Info

Publication number
WO2017197766A1
WO2017197766A1 PCT/CN2016/092369 CN2016092369W WO2017197766A1 WO 2017197766 A1 WO2017197766 A1 WO 2017197766A1 CN 2016092369 W CN2016092369 W CN 2016092369W WO 2017197766 A1 WO2017197766 A1 WO 2017197766A1
Authority
WO
WIPO (PCT)
Prior art keywords
call
contact
authentication
private contact
user
Prior art date
Application number
PCT/CN2016/092369
Other languages
English (en)
Chinese (zh)
Inventor
张海文
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017197766A1 publication Critical patent/WO2017197766A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Definitions

  • This application relates to, but is not limited to, the field of communication technology.
  • terminals have become an indispensable communication tool for people.
  • anyone can use the terminal to call any contact in the address book, and can also answer the incoming call of any contact.
  • other people may use the lost terminal to make a phone call to the user's relatives and friends to swindle or others to impersonate the user's relatives and friends' numbers to make a call to the user to commit fraud, causing unnecessary losses to the user. .
  • This document provides a method and device for calling to improve the privacy and security of the call.
  • a method of calling including:
  • the method before the receiving the call instruction, the method further includes:
  • the authentication information of the private contact and the private contact is stored.
  • the authentication information is password information or biometric information.
  • a method of calling including:
  • the method further includes:
  • the call is refused to be connected; when the identity authentication of the answering user is successful, and the identity authentication of the calling user fails, the reminder is sent, and the call is connected or according to the The answer is to answer the call selected by the user or not to connect the call.
  • the method before the receiving the call request, the method further includes:
  • the authentication information of the private contact and the private contact is stored.
  • a call device includes: a storage module, a call sending module, and a first authentication module;
  • the storage module is configured to: store authentication information of the private contact and the private contact;
  • the call sending module is configured to: receive a call instruction, determine whether the call contact is a private contact; initiate a call request when the call contact is not the private contact; and when the call contact is the In the case of a private contact, notifying the first authentication module to perform authentication;
  • the first authentication module is configured to: collect identity verification information, and authenticate the identity of the calling user according to the collected identity verification information and the authentication information of the private contact stored by the storage module;
  • the call sending module is further configured to: when the first authentication module authenticates successfully, initiate a call request, and carry the identity verification information in the call request; when the first authentication module When the right fails, the call is rejected.
  • the device further includes:
  • the private contact setting module is configured to: receive a private contact setting instruction, set the currently entered contact or the selected contact as the private contact; obtain two authentication information, and the two authentication information And performing, after the pairing process, setting the authentication information of the private contact; and storing the authentication information of the private contact and the private contact to the storage module.
  • a call device includes: a storage module, a call receiving module, and a second authentication module;
  • the storage module is configured to: store authentication information of the private contact and the private contact;
  • the call receiving module is configured to: receive a call request, determine whether the incoming contact is a private contact when receiving the answering instruction, and connect the incoming call when the incoming contact is not the private contact; And when the incoming contact is the private contact, notifying the second authentication module to perform authentication;
  • the second authentication module is configured to: collect identity verification information, and obtain identity verification information carried in the call request, according to the collected identity verification information, identity verification information carried in the call request, and pre-stored
  • the authentication information of the private contact is used to authenticate the identity of the receiving user and the calling user;
  • the call receiving module is further configured to: when the second authentication module successfully authenticates, Call.
  • the call receiving module is further configured to:
  • the call is refused to be connected; when the identity authentication of the answering user is successful, and the identity authentication of the calling user fails, the reminder is sent, and the call is connected or according to the The answer to the user's choice is to connect the call or not to connect the call.
  • the device further includes:
  • the private contact setting module is configured to: receive a private contact setting instruction, set the currently entered contact or the selected contact as the private contact; obtain two authentication information, and the two authentication information And performing, after the pairing process, setting the authentication information of the private contact; and storing the authentication information of the private contact and the private contact to the storage module.
  • a call method and apparatus provided by an embodiment of the present invention by using a private contact pre-stored in the terminal and the authentication information of the private contact, when calling a private contact, authenticating the identity of the calling user to prevent Others use the calling terminal of the calling user to make a call to the private contact; when answering the call of the private contact, the identity of both the calling user and the receiving user is authenticated, and on the other hand, the receiving terminal of the receiving user can be prevented from receiving the private use.
  • the call made by the contact can prevent others from impersonating the private contact of the calling user to make a call to the receiving user.
  • the embodiment of the invention implements the authentication of the identity of both the calling user and the receiving user during the call and the answering, so that both parties can effectively determine the identity of the other party, ensure the privacy of both parties, and protect the privacy of the user. Improve the privacy and security of the call, greatly improving the user experience.
  • FIG. 1 is a flowchart of a method for calling according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for setting a private contact in a call method according to an embodiment of the present invention
  • FIG. 3 is a flowchart of another method for setting a private contact in a call method according to an embodiment of the present invention.
  • FIG. 4 is a flowchart of another method for calling according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of still another method for calling according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of still another method for calling according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a communication device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of another communication device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of still another communication device according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of still another communication device according to an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of still another communication device according to an embodiment of the present invention.
  • a flowchart of a call method according to an embodiment of the present invention is applied to a call terminal.
  • the call method provided in this embodiment may include the following steps, that is, S11 to S18:
  • the calling terminal after receiving the call instruction, acquires the information of the calling contact, and queries the pre-stored private contact information (for example, a private contact list), when the calling contact and the pre-stored private contact information When a private contact matches, the call contact is determined to be a private contact, otherwise the call contact is determined not to be a private contact.
  • the pre-stored private contact information for example, a private contact list
  • the calling terminal can query whether the private contact information has a number matching the dialed number; when the calling user directly selects the contact in the address book
  • the calling terminal can query whether the private contact information has a name matching the dialed name, or can also obtain the number of the dialed contact, and check whether the private contact information is detected and detected. The number that matches the number.
  • the calling terminal When the caller calling the user is not a private contact, the calling terminal directly initiates a call request.
  • the identity verification information in the embodiment of the present invention may be password information, biometric information, and the like to verify identity.
  • the password information may be a character password, a pattern password, a gesture password, a voice password, etc.
  • the biometric information may be biometric unique identification information such as a fingerprint, an eye pattern, a voiceprint, an iris, and a facial comprehensive feature.
  • the calling terminal may provide a password input interface or prompt the user to input a password, and obtain a password input by the user through a touch screen, a camera, a sound collection device, or the like.
  • the calling terminal may prompt the user to input biometric information, and acquire biometric information input by the user through a fingerprint sensor, a camera, or the like.
  • the calling terminal queries the authentication information of the private contact, compares the collected identity verification information with the authentication information, and determines whether the collected identity verification information matches the authentication information; when the two match, Then, the authentication is successful, and the current calling user is determined to be a legitimate user; when the two do not match, the authentication fails, and the current calling user is determined to be an illegal user.
  • the authentication information may include only the preset identity information of the calling user (usually the identity verification information of the owner), and the calling terminal uses the identity verification.
  • the certificate information authenticates the identity of the calling user.
  • the authentication information may include preset authentication information of the calling user's own and private contacts.
  • the calling terminal authenticates the identity of the calling user by using the identity authentication information of the calling user, and matches the identity authentication information of the calling user with the collected identity verification information. If the authentication information is successful, when the authentication information is not distinguished between the two types of authentication information, the authentication succeeds as long as the collected authentication information matches any of the authentication information.
  • the calling terminal determines that the user of the current calling contact is a legitimate user, initiates a call request, and carries the collected identity verification information in the call request, to send the identity verification information to the receiving terminal. It is convenient for the receiving terminal to authenticate the identity of the calling user.
  • the calling terminal determines that the user of the current calling contact is an illegal user, and then refuses to initiate a call request.
  • the calling terminal may also prompt the calling user to fail authentication, and does not have the right to call the private contact.
  • the private contact pre-stored in the calling terminal and the authentication information of the private contact may be information directly imported from the outside of the calling terminal, or may be set on the calling terminal.
  • the generated information; the calling terminal can ask the user whether to set the currently entered contact code as a private contact when the user enters the contact, or set the existing contact in the terminal as a private contact according to the user instruction, below For details, please provide details.
  • FIG. 2 is a flowchart of a method for setting a private contact in a call method according to an embodiment of the present invention.
  • the method provided in this embodiment is that the terminal sets a private contact when the user enters the contact, and the method may include the following steps, that is, S101 to S106:
  • the terminal When the user chooses to set the currently entered contact as a private contact, the terminal receives the private contact setting instruction, and then the currently entered contact is set as a private contact.
  • the terminal may prompt the user to input two authentication information respectively, where one authentication information is the identity verification information of the private contact, and is used for authenticating the identity of the receiving user; another authentication information is usually The authentication information of the terminal owner is used to authenticate the identity of the calling user.
  • the terminal can directly obtain the authentication information imported from the outside, and can also collect the authentication information on the spot.
  • the terminal may provide a password input interface or prompt the user to input a password, and obtain a password input by the user through a touch screen, a camera, a sound collection device, or the like.
  • the terminal may prompt the user to input biometric information, and acquire biometric information input by the user through a fingerprint sensor, a camera, a sound collection device, or the like.
  • the pairing algorithm can be used to pair the two authentication information, establish a pairing relationship between the two authentication information, and set the two authentication information with the pairing relationship as the private contact's Right information.
  • the terminal may further perform marking and distinguishing the two pieces of authentication information in the authentication information into the first identity verification information and the second identity verification information, where the first identity verification information is the terminal user's own identity verification.
  • the information is used to authenticate the identity of the calling user; the second authentication information is the authentication information of the private contact, which is used to authenticate the identity of the user.
  • the two pieces of authentication information in the authentication information may not be marked and distinguished, and the embodiment of the present invention does not limit this.
  • the terminal stores the information of the private contact and the authentication information of the private contact, and can perform encrypted storage.
  • the stored information includes a private contact list, a correspondence between the private contact and the authentication information, two authentication information in the authentication information, and a pairing relationship thereof.
  • FIG. 3 is a flowchart of another method for setting a private contact in a call method according to an embodiment of the present invention.
  • the method provided in this embodiment is that the terminal sets the existing contact in the terminal as a private contact according to the user instruction, and the method may include the following steps, that is, S201 to S205:
  • the terminal enters an address book interface or a call record interface to display contact information.
  • a specific operation is performed on the terminal, and the specific operation includes, for example, a touch operation, a key operation, a gesture operation, a menu option operation, and the like, so that the terminal receives the private contact setting instruction.
  • the terminal when the user needs to set a private contact, perform specific operations on the terminal, for example, including a touch operation, a key operation, a gesture operation, a menu option operation, etc., so that the terminal receives the private contact setting instruction and enters the communication.
  • Record interface or call record interface to display contact information.
  • the terminal acquires the contact selected by the user and sets the contact as a private contact.
  • the contact selected by the user is a number
  • the number is set as a private contact
  • the contact name is set as a private contact
  • the user calls all the numbers under the contact name. Both are calling private contacts.
  • S203-S205 in this embodiment are the same as S104-S106 in the embodiment shown in FIG. 2, and details are not described herein again.
  • the call method provided by the embodiment of the present invention through the pre-stored private contact and the authentication information of the private contact, when calling the private contact, authenticating the identity of the calling user to prevent him
  • the person uses the calling terminal of the calling user to make a call to the private contact, and additionally carries the authentication information of the calling user in the call request, so that the receiving terminal authenticates the identity of the calling user, so as to prevent others from posing as the calling user to the private contact.
  • the person makes a call.
  • the embodiment of the invention protects user privacy, improves the security of the call, and improves the user experience.
  • FIG. 4 is a flowchart of another method for calling according to an embodiment of the present invention. The method is applied to a receiving terminal.
  • the calling method provided in this embodiment may include the following steps, that is, S21 to S28:
  • the receiving terminal After receiving the call request, the receiving terminal performs an incoming call prompt, including displaying the incoming call information, and may also be accompanied by a prompt such as ringing or vibrating.
  • an incoming call prompt including displaying the incoming call information, and may also be accompanied by a prompt such as ringing or vibrating.
  • the receiving terminal After receiving the call instruction, acquires the information of the incoming contact, and queries the pre-stored private contact information (for example, a private contact list), and when the incoming contact and the pre-stored private contact information are in private contact, When the person matches, the incoming contact is determined to be a private contact, otherwise the incoming contact is determined not to be a private contact.
  • the pre-stored private contact information for example, a private contact list
  • the matching when the matching is performed, the name of the incoming contact can be matched, and the number of the incoming contact can be matched.
  • the receiving terminal can query whether the private contact information has The displayed number matches the number; when the caller displays the contact name, the receiving terminal can query whether the private contact information has a name matching the displayed name, or can also obtain the caller number and query the private contact. Is there a number in the message that matches the caller's number?
  • S24 Collect identity verification information, and obtain identity verification information carried in the call request.
  • the identity verification information in the embodiment of the present invention may be password information, biometric information, and the like to verify identity.
  • the password information may be a character password, a pattern password, a gesture password, a voice password, etc.
  • the biometric information may be a fingerprint, an eye pattern, a voiceprint, an iris, and a facial comprehensive feature. Other creatures uniquely identify information.
  • the receiving terminal may provide a password input interface or prompt the user to input a password, and obtain a password input by the user through a touch screen, a camera, a sound collection device, or the like.
  • the receiving terminal may prompt the user to input biometric information, and acquire biometric information input by the user through a fingerprint sensor, a camera, a sound collecting device, or the like.
  • the receiving terminal can also obtain the identity verification information carried in the call request.
  • S25 Perform authentication on the identity of the receiving user and the calling user according to the collected identity verification information, the identity verification information carried in the call request, and the authentication information of the pre-stored private contact.
  • S26 Determine whether the authentication is successful. When the authentication is successful, execute S27. When the authentication fails, perform S28.
  • the receiving terminal queries the authentication information of the private contact, compares the collected identity verification information and the identity verification information carried in the call request with the authentication information, and determines two identity verification information and authentication. Whether the information matches all; when both match, it determines that the authentication is successful; when any one does not match, it determines that the authentication fails.
  • the identity verification information carried in the call request is empty, that is, when the identity verification information is not carried, the receiving terminal directly determines that the authentication fails.
  • the authentication information may include preset authentication information of the user's own and private contacts.
  • the receiving terminal uses the user's own authentication information to authenticate the identity of the receiving user, and the user's own authentication information matches the collected authentication information.
  • the receiving terminal authenticates the identity of the calling user by using the identity verification information of the private contact, and the identity verification information of the private contact and the identity verification information carried in the call request.
  • the identity authentication of the calling user is successful.
  • the identity of the answering user and the calling user are successfully authenticated, the authentication is determined to be successful.
  • the two pieces of authentication information are not distinguished in the authentication information, if the collected authentication information matches one of the authentication information, and the identity verification information and the authentication information carried in the call request are When another authentication information is matched, it is determined that the authentication is successful.
  • the receiving terminal connects the incoming call.
  • the terminal refuses to connect the incoming call.
  • the terminal may also prompt the user to fail the authentication, and have no right or no access to the incoming call.
  • the call method provided by the embodiment of the present invention through the pre-stored private contact and the authentication information of the private contact, authenticates the identity of the calling user and the answering user when answering the call of the private contact. Prevent others from using the receiving terminal of the receiving user to answer the call made by the private contact, and on the other hand, prevent others from impersonating the private contact of the calling user to make a call to the receiving user.
  • the embodiment of the invention protects user privacy, improves the security of the call, and improves the user experience.
  • FIG. 5 is a flowchart of still another method for calling according to an embodiment of the present invention.
  • the method is applied to a receiving terminal.
  • the calling method provided in this embodiment may include the following steps, that is, S30 to S39:
  • S32 Determine whether the incoming contact is a private contact; when the incoming contact is not a private contact, perform S36; and when the incoming contact is a private contact, perform S33.
  • S33 Collect identity verification information, and obtain identity verification information carried in the call request.
  • S30-S33 are the same as S21-S24 in the embodiment shown in FIG. 4, and details are not described herein again.
  • S34 Perform authentication on the identity of the receiving user and the calling user according to the collected identity verification information, the identity verification information carried in the call request, and the authentication information of the pre-stored private contact.
  • S35 Determine whether the authentication is successful. When the authentication is successful, perform S36. When the authentication fails, perform S37.
  • the receiving terminal queries the authentication information of the private contact, and separately collects the information.
  • the authentication information and the authentication information carried in the call request are compared with the authentication information to determine whether both the authentication information and the authentication information match; when both match, the authentication is successful; when any one does not match At the time, it is determined that the authentication has failed.
  • the authentication information may include preset authentication information of the user's own and private contacts.
  • the receiving terminal uses the user's own authentication information to authenticate the identity of the receiving user, and when the user's own authentication information is matched with the collected authentication information, And determining that the identity authentication of the answering user is successful; in addition, the receiving terminal uses the identity verification information of the private contact to authenticate the identity of the calling user, and the identity verification information of the private contact is related to the identity verification information carried in the call request.
  • matching it is determined that the identity authentication of the calling user is successful.
  • the identity of the answering user and the calling user are successfully authenticated, the authentication is determined to be successful; when any of the answering user and the calling user fails to authenticate, the authentication is determined to be unsuccessful.
  • the terminal determines that the identity authentication of the calling user fails, and determines that the overall authentication fails.
  • the receiving terminal connects the incoming call.
  • S37 Determine whether the identity of the answering user is successful. When the identity authentication of the answering user is successful, perform S38. When the identity authentication of the answering user fails, perform S39.
  • the identity authentication of the answering user is successful, but the identity authentication of the calling user fails; secondly, the identity authentication of the answering user fails, but the identity authentication of the calling user is successful; third, the identity of the receiving user and the calling user All authentication failed.
  • This embodiment separates the first case from the second and third cases and processes it separately.
  • the receiving terminal can connect the incoming call, and notify the receiving user that the identity authentication of the calling user fails, for example, by voice, text, vibration, etc. Answering the user's current calling user may be a fake private contact to alert the receiving user.
  • the receiving terminal refuses to connect the incoming call.
  • the receiving terminal may also prompt to answer the user that the authentication fails, and does not have the right to connect the incoming call.
  • FIG. 6 is a flowchart of still another method for calling according to an embodiment of the present invention. The method is applied to a receiving terminal.
  • the calling method provided in this embodiment may include the following steps, that is, S400 to S411:
  • S401 Determine whether an answering instruction is received; when receiving the answering instruction, execute S402; when receiving the rejecting answering instruction or receiving the answering instruction within the preset time, rejecting the call request, ending the process.
  • S402 Determine whether the incoming contact is a private contact; when the incoming contact is not a private contact, perform S410; and when the incoming contact is a private contact, perform S403.
  • S403. Collect identity verification information, and obtain identity verification information carried in the call request.
  • S400-S403 are the same as S21-S24 in the embodiment shown in FIG. 4, and details are not described herein again.
  • S404 Perform authentication on the identity of the receiving user and the calling user according to the collected identity verification information, the identity verification information carried in the call request, and the authentication information of the pre-stored private contact.
  • S405. Determine whether the authentication is successful. When the authentication is successful, execute S410. When the authentication fails, perform S406.
  • S406. Determine whether the identity of the answering user is successful. When the identity authentication of the answering user is successful, perform S408. When the identity authentication of the answering user fails, perform S407.
  • S404 and S405 are the same as S34 and S37 in the embodiment shown in FIG. 5, and details are not described herein again.
  • the receiving terminal refuses to connect the incoming call.
  • the receiving terminal may also prompt the calling user to fail authentication, and does not have the right to connect the incoming call.
  • the receiving terminal fails to notify the receiving user of the identity authentication of the calling user, for example, by means of voice, text, vibration, etc., to alert the user to the current calling user. It may be a fake private contact to alert the user.
  • the receiving terminal can query whether the answering user connects to the incoming call by displaying an inquiry interface, a voice inquiry, or the like, and recognize the selection of the answering user through the touch screen, the voice device, or the like.
  • the receiving terminal connects the incoming call.
  • the receiving terminal rejects the call request and does not connect the incoming call.
  • the embodiment of the invention takes into account the flexibility of the call and improves the intelligence and humanity of the terminal.
  • the authentication information of the private contact and the private contact pre-stored in the receiving terminal may be information directly imported from the external terminal, or may be The receiving terminal sets the generated information; the receiving terminal can ask the user whether the current contacted contact code needs to be set as a private contact when the user enters the contact, as shown in FIG. 2, or according to the user instruction.
  • the existing contacts in the terminal are set as private contacts. The mode is shown in Figure 3, so it will not be described here.
  • FIG. 7 is a schematic structural diagram of a call device according to an embodiment of the present invention.
  • the device is applied to a call terminal.
  • the call device provided in this embodiment may include: a storage module 10, a call sending module 20, and a first test. Right module 30.
  • the storage module 10 is configured to: store the private contact and the authentication information of the private contact.
  • the call sending module 20 is configured to: receive a call instruction, determine whether the call contact is a private contact; initiate a call request when the call contact is not a private contact; and notify the call when the call contact is a private contact
  • An authentication module performs authentication.
  • the call sending module 20 acquires the information of the call contact, and queries the private contact information (for example, a private contact list) in the storage module 10, when the call contact and the pre-stored call.
  • the private contact information for example, a private contact list
  • the call contact is determined to be a private contact, otherwise the call contact is determined not to be a private contact.
  • the call sending module 20 can match the name of the calling contact, and can also match the number of the calling contact. For example, when the calling user inputs or selects a number to make a call, the call sending module 20 can query. Whether there is a number matching the dialed number in the private contact information; when the calling user directly selects the name of the contact in the address book to make a call, the call sending module 20 can query whether the private contact information has a name associated with the dialed name. The matching name, or the call sending module 20 can also obtain the number of the dialed contact, and query whether the private contact information has a number matching the detected number.
  • the first authentication module 30 is configured to: collect identity verification information, and authenticate the identity of the calling user according to the collected identity verification information and the authentication information of the private contact stored by the storage module 10.
  • the call sending module 20 is further configured to: when the first authentication module 30 successfully authenticates, initiate a call request, and carry the identity verification information in the call request; when the first authentication module 30 fails to authenticate, the call is rejected.
  • the request optionally, the call sending module 20 may also prompt the calling user to fail authentication and have no right to call the private contact.
  • the first authentication module 30 may send the authentication result to the call sending module 20, and the call sending module 20 determines to initiate a call request or refuse to initiate a call request according to the authentication result.
  • the first authentication module 30 may further send an instruction to initiate a call request or refuse to initiate a call request to the call sending module 20 according to the authentication result, and the call sending module 20 performs a corresponding operation according to the instruction.
  • the identity verification information in the embodiment of the present invention may be password information, biometric information, and the like to verify identity.
  • the password information may be a character password, a pattern password, a gesture password, a voice password, etc.
  • the biometric information may be biometric unique identification information such as a fingerprint, an eye pattern, a voiceprint, an iris, and a facial comprehensive feature.
  • the first authentication module 30 may provide a password input interface or prompt the user to input a password, and obtain a password input by the user through a touch screen, a camera, a sound collection device, or the like.
  • the first authentication module 30 may prompt the user to input biometric information, and acquire biometric information input by the user through a fingerprint sensor, a camera, a sound collection device, or the like.
  • the first authentication module 30 queries the authentication information of the private contact, compares the collected identity verification information with the authentication information, and determines the collected identity verification information and the authentication. Whether the information matches; when the two match, it determines that the authentication is successful, and determines that the current calling user is a legitimate user; when the two do not match, it determines that the authentication fails, and determines that the current calling user is an illegal user.
  • the authentication information may include only the preset identity information of the calling user (usually the identity verification information of the owner), and the first authentication module 30 uses the identity verification information.
  • the identity of the calling user is authenticated.
  • the authentication information may include preset authentication information of the calling user's own and private contacts.
  • the first authentication module 30 authenticates the identity of the calling call by using the calling user's own authentication information, and calls the user's own authentication information and the collected information.
  • the authentication information is matched, it is determined that the authentication is successful; when the authentication information is not distinguished from the two types of authentication information, as long as the collected authentication information matches any one of the authentication information, the first The authentication module 30 determines that the authentication is successful.
  • the private contact and the authentication information of the private contact stored in the storage module 10 may be information directly imported from the terminal, or may be generated on the terminal. .
  • FIG. 8 a schematic structural diagram of another communication device according to an embodiment of the present invention.
  • the device provided in this embodiment may further include: a private contact.
  • the module 40 is set.
  • the private contact setting module 40 in this embodiment is configured to: set a private contact, and the private contact setting module 40 can ask the user whether the current entered contact code needs to be set as a private contact when the user enters the contact. It is also possible to set an existing contact in the calling terminal as a private contact according to a user instruction.
  • the private contact setting module 40 receives the private contact setting instruction, and sets the currently entered contact or the selected contact as a private contact; acquires two authentication information, and pairs the two authentication information.
  • the processing is set as the authentication information of the private contact; and the authentication information of the private contact and the private contact is stored in the storage module 10.
  • the manner in which the private contact setting module 40 sets the private contact can be as shown in FIG. 2 and FIG. 3 , and details are not described herein again.
  • the call device provided by the embodiment of the present invention authenticates the identity of the calling user when the private contact is called through the pre-stored private contact and the authentication information of the private contact, so as to prevent others from using the calling terminal of the calling user.
  • the call is made to the private contact.
  • the call request carries the authentication information of the calling user, so that the receiving terminal authenticates the identity of the calling user, so as to prevent others from impersonating the calling user to make a call to the private contact.
  • the embodiment of the invention protects user privacy, improves the security of the call, and improves the user experience.
  • FIG. 9 is a schematic structural diagram of still another type of a call device according to an embodiment of the present invention.
  • the device is applied to a receiving terminal.
  • the call device provided in this embodiment may include: a storage module 10, a call receiving module 50, and a second Authentication module 60.
  • the storage module 10 is configured to store the private contact and the authentication information of the private contact.
  • the call receiving module 50 is configured to: receive a call request, determine whether the incoming contact is a private contact when receiving the answering instruction; and connect when the incoming contact is not a private contact When the incoming contact is a private contact, the second authentication module 60 is notified to perform authentication.
  • the call receiving module 50 After receiving the call instruction, the call receiving module 50 obtains the information of the incoming contact, and queries the pre-stored private contact information (for example, a private contact list), and when the incoming contact and the private contact information are in private contact, When the person matches, the incoming contact is determined to be a private contact, otherwise the incoming contact is determined not to be a private contact.
  • the pre-stored private contact information for example, a private contact list
  • the call receiving module 50 can match the name of the incoming contact, and can also match the number of the incoming contact. For example, when the caller displays the number, the private contact information can be queried. There is a number matching the displayed number; when the caller displays the contact name, you can check whether the private contact information has a name that matches the displayed name, or you can also obtain the caller ID and query the private contact information. Is there a number that matches the caller ID number?
  • the second authentication module 60 is configured to: collect the authentication information, and obtain the identity verification information carried in the call request, according to the collected identity verification information, the identity verification information carried in the call request, and the pre-stored authentication information of the private contact. , authenticate the identity of the receiving user and the calling user.
  • the call receiving module 50 is further configured to: when the second authentication module 60 successfully authenticates, the incoming call is turned on.
  • the second authentication module 60 may send the authentication result to the call receiving module 50, and the call receiving module 50 determines to connect the incoming call, not to connect the incoming call, or refuse to connect the incoming call according to the authentication result.
  • the second authentication module 60 may further send an instruction to the call receiving module 50 to turn on the incoming call, not to connect the incoming call, or refuse to connect the incoming call according to the authentication result, and the call receiving module 50 performs the corresponding operation according to the instruction. .
  • the identity verification information in the embodiment of the present invention may be password information, biometric information, and the like to verify identity.
  • the password information may be a character password, a pattern password, a gesture password, a voice password, etc.
  • the biometric information may be biometric unique identification information such as a fingerprint, an eye pattern, a voiceprint, an iris, and a facial comprehensive feature.
  • the second authentication module 60 may provide a password input interface or prompt the user to input a password, and obtain a password input by the user through a touch screen, a camera, a sound collection device, or the like.
  • the second authentication module 60 may prompt The user inputs biometric information, and acquires biometric information input by the user through a fingerprint sensor, a camera, a sound collecting device, and the like.
  • the second authentication module 60 when the authentication operation is performed, queries the authentication information of the private contact, and compares the collected identity verification information with the identity verification information carried in the call request with the authentication information to determine Whether the two authentication information and the authentication information match; when both match, the authentication is determined to be successful; when any one does not match, the authentication fails.
  • the authentication information carried in the call request is empty, that is, when the authentication information is not carried, the second authentication module 60 directly determines that the identity authentication of the calling user fails, and the overall authentication fails.
  • the authentication information may include preset authentication information of the user's own and private contacts.
  • the second authentication module 60 determines that the authentication is successful.
  • the second authentication module 60 uses the user's own authentication information to authenticate the identity of the receiving user, and listens to the user's own authentication information and the collected information. When the authentication information is matched, it is determined that the identity authentication of the answering user is successful. In addition, the second authentication module 60 authenticates the identity of the calling user by using the identity verification information of the private contact, and the identity verification information of the private contact is When the authentication information carried in the call request matches, it is determined that the identity authentication of the calling user is successful. When the identity of the answering user and the calling user are successfully authenticated, the authentication is determined to be successful.
  • the call receiving module 50 in the embodiment of the present invention is further configured to: when the authentication fails, that is, when the identity of the calling user or/and the identity authentication of the answering user fails, the call is refused to be connected;
  • the call receiving module 50 is further configured to: prompt to answer the user's authentication failure, and has no right to connect the incoming call.
  • the call receiving module 50 is further configured to: determine whether the identity of the answering user is successfully authenticated; and when the identity authentication of the calling user fails but the identity authentication of the answering user is successful, the call receiving module The call receiving module 50 rejects the incoming call when the identity authentication of the answering user fails, and the call receiving module 50 rejects the incoming call regardless of whether the identity of the calling user is successful or not.
  • the call receiving module 50 is further configured to: determine whether the identity of the answering user is successfully authenticated; and when the identity authentication of the calling user fails but the identity authentication of the answering user is successful, the call receiving module 50 to answer the user to remind the calling user of the identity authentication failure, and ask whether the answering user connects to the incoming call, according to the choice of the receiving user to connect or not to connect the incoming call; when the answering user's identity authentication fails, regardless of the calling user If the identity is successfully authenticated, the call receiving module 50 rejects the incoming call.
  • FIG. 10 a schematic structural diagram of another type of a call device according to an embodiment of the present invention is provided.
  • the device provided in this embodiment may further include: a private contact.
  • the module 40 is set.
  • the private contact setting module 40 in this embodiment is configured to: receive a private contact setting instruction, set the currently entered contact or the selected contact as a private contact; obtain two identity verification information, and obtain two identity
  • the authentication information is set as the authentication information of the private contact after the pairing process is performed; and the private contact and the authentication information of the private contact are stored in the storage module 10.
  • the manner in which the private contact setting module 40 sets the private contact can be as shown in FIG. 2 and FIG. 3 , and details are not described herein again.
  • the call device provided by the embodiment of the present invention authenticates the identity of the calling user and the answering user by using the pre-stored private contact and the authentication information of the private contact when answering the phone of the private contact. Prevent others from using the receiving terminal of the receiving user to answer the call made by the private contact, and on the other hand, prevent others from impersonating the private contact of the calling user to make a call to the receiving user.
  • the embodiment of the invention protects user privacy, improves the security of the call, and improves the user experience.
  • FIG. 11 is a schematic structural diagram of a call apparatus according to an embodiment of the present invention.
  • the apparatus may be applied to both a calling terminal and a receiving terminal.
  • the apparatus provided in this embodiment of the present invention may include a storage module 10, The call sending module 20, the first authentication module 30, the call receiving module 50, and the second authentication module 60.
  • the storage module 10 When applied to the calling terminal, the storage module 10, the call sending module 20, and the first authentication module 30 have the same functions as the corresponding modules of the talking device shown in FIG. 7 and FIG. 8; when applied to the receiving terminal, the storage module 10.
  • the call receiving module 50 and the second authentication module 60 function the same as the corresponding modules of the communication device shown in FIGS. 9 and 10 described above. I will not repeat them here.
  • the apparatus provided in this embodiment may further include: a private contact setting module 40, and the function of the private contact setting module 40 is the same as that of the private contact setting module 40 in the calling device shown in FIG. 8 and FIG. The role is the same and will not be described here.
  • the call device provided by the embodiment of the present invention authenticates the identity of the calling user when the private contact is called through the pre-stored private contact and the authentication information of the private contact, so as to prevent others from using the calling terminal of the calling user.
  • it can prevent others from using the receiving terminal of the receiving user to answer the call made by the private contact.
  • it can prevent others from pretending to be the private contact of the calling user to make a call to the receiving user.
  • the embodiment of the invention implements the authentication of the identity of both the calling user and the receiving user during the call and the answering, so that both parties can effectively determine the identity of the other party, ensure the privacy of both parties, and protect the privacy of the user. Improve the security of the call and greatly enhance the user experience.
  • the embodiment of the present invention is the same as that of the embodiment of the present invention.
  • the implementation of the method is as follows. The technical features in the method embodiments are applicable in the device embodiments, and are not described here.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the private contact pre-stored in the terminal and the authentication information of the private contact are used to authenticate the identity of the calling user when the private contact is called, so as to prevent others from using the calling terminal of the calling user to contact the private terminal.
  • the person makes a call; when answering the call of the private contact, the identity of the calling user and the answering user are authenticated, on the one hand, the other party can prevent the receiving terminal of the receiving user from answering the call made by the private contact, and on the other hand, Prevent others from impersonating a private contact who calls the user to make a call to the receiving user.
  • the embodiment of the invention implements the authentication of the identity of both the calling user and the receiving user during the call and the answering, so that both parties can effectively determine the identity of the other party, ensure the privacy of both parties, and protect the privacy of the user. Improve the privacy and security of the call, greatly improving the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé et un dispositif d'appel. Le procédé consiste : à recevoir une instruction d'appel et à déterminer si un contact appelé est un contact privé ; à lancer une demande d'appel lorsque le contact appelé n'est pas le contact privé ; à acquérir des informations de vérification d'identité lorsque le contact appelé est le contact privé ; à authentifier l'identité de l'utilisateur appelé en fonction des informations de vérification d'identité acquises et des informations d'authentification pré-stockées du contact privé ; à lancer la demande d'appel lorsque l'authentification a réussi, et à ajouter les informations de vérification d'identité à la demande d'appel ; et à refuser de lancer la demande d'appel lorsque l'authentification a échoué.
PCT/CN2016/092369 2016-05-17 2016-07-29 Procédé et dispositif d'appel WO2017197766A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610327093.8A CN107396348B (zh) 2016-05-17 2016-05-17 通话方法和装置
CN201610327093.8 2016-05-17

Publications (1)

Publication Number Publication Date
WO2017197766A1 true WO2017197766A1 (fr) 2017-11-23

Family

ID=60324754

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/092369 WO2017197766A1 (fr) 2016-05-17 2016-07-29 Procédé et dispositif d'appel

Country Status (2)

Country Link
CN (1) CN107396348B (fr)
WO (1) WO2017197766A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113015265A (zh) * 2021-02-24 2021-06-22 西安广和通无线软件有限公司 网络会话自愈方法、装置、系统、计算机设备和存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110322660A (zh) * 2019-07-18 2019-10-11 陈硕坚 基于智能手环、大数据和互联网的儿童保护方法和系统
CN110519754B (zh) * 2019-09-03 2023-01-31 西安易朴通讯技术有限公司 呼叫处理方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925519A (zh) * 2006-09-12 2007-03-07 华为技术有限公司 电话呼叫的方法及电话终端
CN101035335A (zh) * 2007-02-13 2007-09-12 中电通信科技有限责任公司 一种手机私密保护方法
CN103974249A (zh) * 2013-01-29 2014-08-06 北京三星通信技术研究有限公司 基于验证信息通信的方法及其设备
CN104954534A (zh) * 2014-03-24 2015-09-30 腾讯科技(深圳)有限公司 通信终端的控制方法、装置及相应的通信终端

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080159488A1 (en) * 2006-12-27 2008-07-03 Chander Raja Voice based caller identification and screening
US20100020952A1 (en) * 2008-07-27 2010-01-28 Yiu Kau Leung Privacy protection and identity verification in online social networks with extension to public switched telephone networks
CN102034060A (zh) * 2010-12-23 2011-04-27 东莞宇龙通信科技有限公司 一种操作权限控制方法、系统及移动终端
CN102123192A (zh) * 2011-02-14 2011-07-13 无锡移讯惠信息科技有限公司 一种含有身份验证允许例外的来电管理方法
CN105025146A (zh) * 2014-04-30 2015-11-04 宇龙计算机通信科技(深圳)有限公司 一种来电接听控制方法、系统及移动终端
CN105491207B (zh) * 2014-09-15 2019-01-29 北京壹人壹本信息科技有限公司 一种私密联系人通信提醒方法、系统及移动终端
CN105338172A (zh) * 2015-09-24 2016-02-17 宇龙计算机通信科技(深圳)有限公司 一种指纹拨号方法以及装置
CN105472093B (zh) * 2015-11-12 2018-07-10 厉政轩 移动终端通话接听鉴权方法及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925519A (zh) * 2006-09-12 2007-03-07 华为技术有限公司 电话呼叫的方法及电话终端
CN101035335A (zh) * 2007-02-13 2007-09-12 中电通信科技有限责任公司 一种手机私密保护方法
CN103974249A (zh) * 2013-01-29 2014-08-06 北京三星通信技术研究有限公司 基于验证信息通信的方法及其设备
CN104954534A (zh) * 2014-03-24 2015-09-30 腾讯科技(深圳)有限公司 通信终端的控制方法、装置及相应的通信终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113015265A (zh) * 2021-02-24 2021-06-22 西安广和通无线软件有限公司 网络会话自愈方法、装置、系统、计算机设备和存储介质
CN113015265B (zh) * 2021-02-24 2023-07-18 西安广和通无线软件有限公司 网络会话自愈方法、装置、系统、计算机设备和存储介质

Also Published As

Publication number Publication date
CN107396348A (zh) 2017-11-24
CN107396348B (zh) 2022-05-06

Similar Documents

Publication Publication Date Title
US10117098B1 (en) User authentication verification service
EP1357727B1 (fr) Terminal portable, procédé de contrôle d'accès et programme de contrôle d'accès
EP2645285A1 (fr) Système d'authentification à apprentissage de caractéristiques de préhension et procédé d'authentification à apprentissage de caractéristiques de préhension
US20100291909A1 (en) Method and apparatus for providing caller recognition based on biometric data and biometric mobile device address book
CN105898743B (zh) 一种网络连接方法、装置及系统
WO2017020426A1 (fr) Procédé, appareil et système de communication reposant sur une identification de caractéristiques biologiques
US20150089635A1 (en) System for correlation of independent authentication mechanisms
US11663306B2 (en) System and method for confirming a person's identity
CN105025146A (zh) 一种来电接听控制方法、系统及移动终端
WO2017197766A1 (fr) Procédé et dispositif d'appel
US8804931B2 (en) Phone number verification
CN108052822A (zh) 终端控制方法、装置及系统
WO2015113351A1 (fr) Procédé, terminal et serveur de traitement d'informations, et procédé et système de communication
WO2016119341A1 (fr) Procédé et dispositif de mise en œuvre d'un mode de connexion multi-utilisateur et support de stockage informatique
US20170339141A1 (en) System and Method of Identity Verification
US20150294106A1 (en) System For Processing Lost Password Using Password Long-Term Memory Of User, and Method For Processing Lost Password
CN105376720B (zh) 呼叫处理的方法、服务器、终端与系统
JP2010119048A (ja) 接続制御装置、及び、接続制御方法
KR101054993B1 (ko) 이동 통신 단말기의 다중 사용자 환경 설정 방법
CN106453257A (zh) 安全验证方法、装置、系统、终端设备和网络服务器
JP2007116545A (ja) 認証方法、認証システム、認証サーバ、通話端末、及び認証プログラム
WO2018010361A1 (fr) Procédé et terminal de communication
WO2014071632A1 (fr) Procédé de réalisation, système et terminal de communication de module d'identité d'abonné virtuel
JP2007258954A (ja) 成りすまし電話防止システム、認証装置および認証装置用プログラム
WO2018157211A1 (fr) Vérification sécurisée d'une communication vocale

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16902146

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16902146

Country of ref document: EP

Kind code of ref document: A1