WO2022227710A1 - 一种隐私保护通话方法及对应装置 - Google Patents

一种隐私保护通话方法及对应装置 Download PDF

Info

Publication number
WO2022227710A1
WO2022227710A1 PCT/CN2022/071624 CN2022071624W WO2022227710A1 WO 2022227710 A1 WO2022227710 A1 WO 2022227710A1 CN 2022071624 W CN2022071624 W CN 2022071624W WO 2022227710 A1 WO2022227710 A1 WO 2022227710A1
Authority
WO
WIPO (PCT)
Prior art keywords
request message
user
virtual
function device
call request
Prior art date
Application number
PCT/CN2022/071624
Other languages
English (en)
French (fr)
Inventor
柳亮亮
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022227710A1 publication Critical patent/WO2022227710A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42348Location-based services which utilize the location information of a target

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a method and a corresponding device for a privacy-protected call.
  • cloud service manufacturers have launched the privacy protection calling function, which is suitable for various scenarios such as online shopping, travel, job hunting, and takeout.
  • the implementation of the current privacy protection calling function is based on the virtual number (or called privacy number) solution.
  • the first step is to initiate a call with the real calling number and connect to the virtual number.
  • the virtual number initiates a call and connects to the real called number.
  • Using a virtual number can make the user's real number not public, and appear as a virtual number to the outside world, realizing privacy protection calls.
  • the embodiments of the present application provide a privacy-protected call method and a corresponding device, which can reduce network cost and load, improve call completion rate, and improve call quality.
  • a privacy-protected calling method which can be applied to a first network function device or a chip in the first network function device.
  • the method includes: the first network function device receives a first number request message from the network open function device, wherein the first number request message carries the first user number, the first number The request message is used to request a virtual number; the first network function device obtains the first virtual number, establishes an association relationship between the first user number and the first virtual number, and the first virtual number and the first user number belong to the same area; A network function device sends a first response message to the network opening function device, and the first response message carries the first virtual number; the first network function device receives the first call request message, and the first call request message carries the first virtual number or The first subscriber number; the first network function device processes the first call request message according to the association relationship.
  • the first network function device assigns the first user number a first virtual number belonging to the same region as the first user number, so that after receiving the first call request message, the first network function device The first user number and the first virtual number can be directly converted in the call request message, so that only one call needs to be reserved in the network, which can effectively reduce network costs compared to the prior art that requires the network to reserve two calls at the same time and load, improve call completion rate, and improve call quality.
  • the first terminal device corresponding to the first user number may be the calling party or the called party, which is not limited in this application.
  • the first network function device is an IP multimedia subsystem where the first subscriber number belongs.
  • the IP multimedia subsystem at the home of the first user number can allocate the first virtual number to the first user number and process the call message, thereby ensuring the reliability of the solution.
  • the IP multimedia subsystem of the home location of the first subscriber number includes a call session control function device.
  • the call message can be processed by the call session control function device in the IP multimedia subsystem where the first user number belongs, and the reliability of the solution can be ensured.
  • the privacy protection mode is a shared private number mode (AXB mode) or a group private number mode (AXG mode).
  • the first number request message also carries the second user number; the first network function device establishes an association relationship between the first user number and the first virtual number specifically: the first network function device establishes the first user number, the first The association relationship between the virtual number and the second user number.
  • the first network function device receives the first call request message from the first terminal device corresponding to the first user number, and the calling party in the first call request message
  • the number is the first user number
  • the called number is the first virtual number
  • the first network function device sends a second call request message to the second network function device to which the second user number belongs according to the association relationship and the first call request message
  • the first network function device sends the second call request message to the second network function device to which the second user number belongs.
  • the calling number in the second call request message is the first virtual number
  • the called number is the second user number.
  • the first network function device receives the first call request message from the second network function device to which the second user number belongs.
  • the called number is the second user number, and the called number is the first virtual number;
  • the first network function device sends the second call request message to the first terminal device corresponding to the first user number according to the association relationship and the first call request message,
  • the calling number in the second call request message is the first virtual number, and the called number is the first user number.
  • the first network function device can allocate a shared virtual number (ie, the first virtual number) for the first user number and the second user number.
  • a shared virtual number ie, the first virtual number
  • the first terminal device and the second terminal device conduct an IMS call
  • the first terminal The numbers presented to each other by the device and the second terminal device are both the first virtual numbers, which can not only maintain the normal conversation between the first terminal device and the second terminal device, but also hide the real numbers of both parties to the call.
  • the privacy protection mode is a one-way private number mode (AX mode).
  • the first network function device receives the first call request message from the first terminal device corresponding to the first user number, and the calling party in the first call request message
  • the number is the first user number
  • the called number is the second user number
  • the second call request message is sent to the second network function device to which the second user number belongs, and the second call request message
  • the calling number in is the first virtual number
  • the called number is the second user number.
  • the first network function device receives the first call request message from the second network function device to which the second user number belongs.
  • the called number is the second user number, and the called number is the first virtual number; according to the association relationship and the first call request message, the second call request message is sent to the first terminal device corresponding to the first user number, and the second call request message
  • the calling number in is the second user number, and the called number is the first user number.
  • the first network function device can allocate the first virtual number to the first user number.
  • the external number of the first terminal device replaces the first user number with the first virtual number. All calls of the first terminal device are established through the first virtual number, which can protect the first user number from being leaked.
  • the privacy protection mode is an independent privacy number mode (AXYB).
  • AXYB independent privacy number mode
  • the first network function device After sending the first response message to the network opening function device and before receiving the first call request message, the first network function device further receives a first notification message from the network opening function device, where the first notification message carries the second virtual number ; Establish an association relationship between the first user number, the first virtual number and the second virtual number.
  • the first network function device receives the first call request message from the first terminal device corresponding to the first user number, and the calling party in the first call request message
  • the number is the first user number
  • the called number is the second virtual number; according to the first user number, the association relationship between the first virtual number and the second virtual number, and the first call request message, the attribution to the second user number
  • the second network function device sends a second call request message, where the calling number in the second call request message is the first virtual number, and the called number is the second virtual number.
  • the first network function device receives the first call request message from the second network function device to which the second user number belongs.
  • the calling number is the second virtual number
  • the called number is the first virtual number; according to the first user number, the association between the first virtual number and the second virtual number, and the first call request message, the first user number
  • the corresponding first terminal device sends a second call request message, where the calling number in the second call request message is the second virtual number, and the called number is the first virtual number.
  • the first network function device to which the first user number belongs can be allocated a first virtual number to the first user number
  • the second network function device to which the second user number belongs can be allocated a second virtual number to the second user number.
  • the first network function device is preconfigured with a virtual number resource pool, the virtual number resource pool contains at least one virtual number, and the first network function device obtains the first virtual number from the virtual number resource pool.
  • the first network function device may also receive a first number release message from the network opening function device, and the first number release message is used to request to release the first number release message.
  • An association between the user number and the first virtual number, the first number release request message carries the first user number and the first virtual number; the first network function device releases the relationship between the first user number and the first virtual number connection relation.
  • association relationship between the first user number and the first virtual number can be released in time, so as to avoid long-term use of the virtual number, and further protect the privacy and security of the first terminal device.
  • the network opening function device and the first network function device are located in the operator's network.
  • virtual numbers can be dynamically allocated and used by the operator's network, without the need for cloud service providers to apply in advance, which greatly saves costs; at the same time, it can also avoid manual control and probabilistic call restriction in the operator's network, and improve the connection rate. .
  • the second network function device is an IP multimedia subsystem where the second subscriber number belongs.
  • the IP multimedia subsystem at the home of the second user number can allocate the second virtual number to the second user number, thereby ensuring the reliability of the solution.
  • a privacy protection calling method which can be applied to a network open function device or a chip in a network open function device.
  • the method includes: receiving a second number request message from an application server, the second number request message carrying the first user number, and the second number request message being used to request a virtual number;
  • the first network function device to which a user number belongs sends a first number request message, where the first number request message carries the first user number, and the first number request message is used to request a virtual number; the first number request message returned by the first network function device is received.
  • Response message the first response message carries the first virtual number allocated by the first network function device, the first virtual number and the first user number belong to the same area; send a second response message to the application server, the second response message carries The first virtual number.
  • the second number request message also carries multiple user numbers, and the multiple user numbers include the first user number; the first number request message is sent to the first network function device to which the first user number belongs, Including: according to the privacy protection mode and/or the service load, sending the first number request message to the first network function device to which the first user number belongs; the privacy protection mode is used to indicate the user number that needs to be converted in the number of the multiple user numbers, The service load is used to indicate the load of the number privacy protection service in the network to which each user number of the multiple user numbers belongs.
  • the first number request message also carries the second user number; after receiving the second number request message from the application server and before sending the second response message to the application server, the method further includes: sending the second number request message to the application server.
  • the second network function device to which the second user number belongs sends a third number request message, where the third number request message carries the second user number, and the third number request message is used to request a virtual number; receives the third number request message returned by the second network function device In the response message, the third response message carries the second virtual number, and the second virtual number and the second user number belong to the same region; the second response message sent by the network opening function device to the application server also carries the second virtual number.
  • the method further includes: sending a second notification message to the second network function device, where the second notification message carries the first virtual number; After receiving the third response message returned by the second network function device, the method further includes: sending a first notification message to the first network function device, where the first notification message carries the second virtual number.
  • the method further includes: receiving a second number release message from the application server, where the second number release message is used to request to release the first user number and the first virtual number.
  • the association relationship between the numbers, the second number release request message carries the first user number and the first virtual number; the first number release message is sent to the first network function device to which the first user number belongs, and the first number release message is used. for requesting to release the association relationship between the first user number and the first virtual number.
  • the network opening function device and the first network function device are located in the operator's network.
  • a third aspect provides a privacy protection call device, the device may be a first network function device or a chip in the first network function device, including the first aspect or any possible implementation manner of the first aspect.
  • the apparatus may include:
  • a communication unit configured to receive a first number request message from the network opening function device, where the first number request message carries the first user number, and the first number request message is used to request a virtual number;
  • a processing unit configured to obtain a first virtual number, establish an association relationship between the first user number and the first virtual number, and the first virtual number and the first user number belong to the same area;
  • the communication unit is further configured to send a first response message to the network opening function device, where the first response message carries the first virtual number; and receive a first call request message, where the first call request message carries the first virtual number or the first user Number; process the first call request message according to the association relationship.
  • the first number request message also carries the second user number; when establishing the association relationship between the first user number and the first virtual number, the processing unit is specifically configured to: establish the first user number , the association relationship between the first virtual number and the second user number;
  • the communication unit When receiving the first call request message, the communication unit is specifically configured to: receive a first call request message from the first terminal device corresponding to the first user number, where the calling number in the first call request message is the first user number, The called number is the first virtual number; when the processing unit processes the first call request message according to the association relationship, it is specifically configured to: control the communication unit to the second network to which the second user number belongs according to the associated relationship and the first call request message The functional device sends a second call request message, where the calling number in the second call request message is the first virtual number, and the called number is the second user number; or,
  • the communication unit When receiving the first call request message, the communication unit is specifically configured to: receive the first call request message from the second network function device to which the second user number belongs, where the calling number in the first call request message is the second user number , the called number is the first virtual number; when the processing unit processes the first call request message according to the association relationship, it is specifically configured to: according to the association relationship and the first call request message, control the communication unit to send the first call request message corresponding to the first user number The terminal device sends a second call request message, where the calling number in the second call request message is the first virtual number, and the called number is the first user number.
  • the communication unit when receiving the first call request message, is specifically configured to: receive the first call request message from the first terminal device corresponding to the first user number, the main call request message in the first call request message.
  • the calling number is the first user number
  • the called number is the second user number
  • the processing unit when the processing unit processes the first call request message according to the association relationship, is specifically configured to: according to the association relationship and the first call request message, control the communication unit to send the message to the first call request message.
  • the second network function device to which the two user numbers belong sends a second call request message, where the calling number in the second call request message is the first virtual number, and the called number is the second user number; or,
  • the communication unit When receiving the first call request message, the communication unit is specifically configured to: receive the first call request message from the second network function device to which the second user number belongs, where the calling number in the first call request message is the second user number , the called number is the first virtual number; when the processing unit processes the first call request message according to the association relationship, it is specifically configured to: according to the association relationship and the first call request message, control the communication unit to send the first call request message corresponding to the first user number The terminal device sends a second call request message, where the calling number in the second call request message is the second user number, and the called number is the first user number.
  • the communication unit is further configured to receive a first notification message from the network opening function device after the communication unit sends the first response message to the network opening function device and before receiving the first call request message,
  • the first notification message carries the second virtual number
  • the processing unit is further configured to: establish an association relationship between the first user number, the first virtual number and the second virtual number.
  • the communication unit when receiving the first call request message, is specifically configured to: receive the first call request message from the first terminal device corresponding to the first user number, the main call request message in the first call request message.
  • the called number is the first user number, and the called number is the second virtual number;
  • the processing unit processes the first call request message according to the association relationship, it is specifically used for: according to the first user number, the first virtual number and the second virtual number and the first call request message, control the communication unit to send the second call request message to the second network function device to which the second user number belongs, and the calling number in the second call request message is the first virtual number , the called number is the second virtual number; or,
  • the communication unit When receiving the first call request message, the communication unit is specifically configured to: receive the first call request message from the second network function device to which the second user number belongs, where the calling number in the first call request message is the second virtual number , the called number is the first virtual number; when the processing unit processes the first call request message according to the association relationship, it is specifically used for: according to the first user number, the association relationship between the first virtual number and the second virtual number, and The first call request message, the control communication unit sends a second call request message to the first terminal device corresponding to the first user number, the calling number in the second call request message is the second virtual number, and the called number is the first virtual number Number.
  • the communication unit is further configured to: after the processing unit processes the first call request message according to the association relationship, receive a first number release message from the network opening function device, and the first number release message is used to request release.
  • the association relationship between the first user number and the first virtual number, the first number release request message carries the first user number and the first virtual number; the processing unit is also used to: release the first user number and the first virtual number. relationship between.
  • the network opening function device and the first network function device are located in the operator's network.
  • a fourth aspect provides a privacy protection communication device
  • the device may be a chip in a network function device or a network open function device, including a device for implementing the second aspect or any possible implementation of the second aspect.
  • the unit/module of the method may be a chip in a network function device or a network open function device, including a device for implementing the second aspect or any possible implementation of the second aspect.
  • the apparatus may include:
  • a communication unit configured to receive a second number request message from the application server, where the second number request message carries the first user number, and the second number request message is used to request a virtual number;
  • a processing unit configured to determine the first network function device to which the first user number belongs; controlling the communication unit to send a first number request message to the first network function device to which the first user number belongs;
  • the communication unit is further configured to send a first number request message to the first network function device to which the first user number belongs, where the first number request message carries the first user number, and the first number request message is used to request a virtual number; A first response message returned by the network function device, the first response message carries the first virtual number allocated by the first network function device, and the first virtual number and the first user number belong to the same area; send a second response to the application server message, the second response message carries the first virtual number.
  • the second number request message also carries multiple user numbers, and the multiple user numbers include the first user number; the processing unit is further configured to: control the communication unit according to the privacy protection mode and/or service load.
  • the first request number message also carries the second user number;
  • the communication unit is further configured to: after receiving the second number request message from the application server and before sending the second response message to the application server , send a third number request message to the second network function device to which the second user number belongs, where the third number request message carries the second user number, and the third number request message is used to request a virtual number; receiving the return from the second network function device
  • the third response message of the third response message carries the second virtual number, and the second virtual number and the second user number belong to the same area; the second response message sent by the communication unit to the application server also carries the second virtual number.
  • the communication unit is further configured to: after receiving the first response message returned by the first network function device, send a second notification message to the second network function device, where the second notification message carries the first virtual number; after receiving the third response message returned by the second network function device, send a first notification message to the first network function device, where the first notification message carries the second virtual number.
  • the communication unit is further configured to: after sending the second response message to the application server, receive a second number release message from the application server, where the second number release message is used to request the release of the first user number and The association relationship between the first virtual numbers, the second number release request message carries the first user number and the first virtual number; the first number release message is sent to the first network function device to which the first user number belongs, the first number The release message is used to request to release the association relationship between the first user number and the first virtual number.
  • the network opening function device and the first network function device are located in the operator's network.
  • a communication device comprising: at least one processor; and a memory and a communication interface communicatively connected to the at least one processor; wherein the memory stores a program executable by the at least one processor. Instructions, the at least one processor, by executing the instructions stored in the memory, causes the apparatus to perform, through the communication interface, any possible implementation of the first aspect or the first aspect or the second aspect or the second aspect The method described in any of the possible implementations.
  • a computer-readable storage medium comprising a program or an instruction, which, when the program or instruction is executed on a computer, enables any possible implementation manner of the first aspect or the first aspect or the second aspect Or the method described in any possible implementation manner of the second aspect is performed.
  • a seventh aspect provides a chip, which is coupled to a memory for reading and executing program instructions stored in the memory, so that the first aspect or any possible implementation manner of the first aspect or the second The method described in any possible implementation of the aspect or the second aspect is performed.
  • a communication system including: a first network function device, configured to execute the method described in the first aspect or any possible implementation manner of the first aspect; for performing the method described in the second aspect or any possible implementation manner of the second aspect.
  • the network open function device may be an open management platform or a service capability open function device in an operator's network.
  • the call request message is an Invite message.
  • FIG. 1 is a schematic diagram of a call scenario in the application
  • FIG. 2 is a network architecture diagram of a communication system provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an IMS in an embodiment of the present application.
  • FIG. 4 is a flowchart of a privacy-preserving call method provided by an embodiment of the present application.
  • FIG. 5 is a flowchart of another privacy protection calling method provided by an embodiment of the present application.
  • FIG. 6 is a flowchart of another privacy protection calling method provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a privacy protection communication device according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • FIG. 9 is a schematic diagram of an interface of a communication single board provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of another communication apparatus provided by an embodiment of the present application.
  • FIG. 1 it is a schematic diagram of a call scenario.
  • Users of user number A (referred to as user A) and/or users of user number B (referred to as user B) can call each other through the application when using the services provided by the same application (such as a taxi application or takeaway application, etc.), and based on privacy
  • the application can hide the real number of the other party from user A and/or user B, that is, user A and user B conduct a privacy-protected call.
  • An implementation solution for privacy protection calls is: the server of the cloud service provider of the terminal device (referred to as the cloud server) applies for a batch of virtual numbers from the operator network in advance (the attribution of these virtual numbers is generally fixed, such as in Shanghai or Hangzhou, etc.) ), when the application server generates the service of user number A and user number B, first obtains a virtual number from the cloud server, such as virtual number X, and then sends it to user A corresponding to user number A and user B corresponding to user number A , so that for user A, X is the number of user B, and for user B, X is the number of user A.
  • the calling party eg number A
  • the operator network connects the call to virtual number X
  • the virtual number initiates a call
  • the operator network then connects the call to the called party (eg user B).
  • the audio and video media of the calling party (eg, user A) and the called party (eg, user B) are forwarded through the virtual number X.
  • the solution has the following pain points: 1) The call connection time is long. Because the original call is divided into two steps, the call connection time is long, which can reach 8S or even more than 10S, which is very different from the 0.5S of the voice over Long-Term Evolution (Voice over Long-Term Evolution, VoLTE) ordinary call; 2) Network cost high. One call needs to be carried in two ordinary calls (that is, the call between A and X, and the call between X and B), which increases the network cost and load; 3) The call quality is poor.
  • VoIP over Long-Term Evolution, VoLTE Voice over Long-Term Evolution
  • the audio and video media during the call needs to be transferred to the virtual number, and the virtual number may be in another place (for example, the calling number A is in Chengdu, the called number B is in Beijing, and the virtual number N is in Shanghai).
  • the transmission network path is long, which leads to prolonged call time and higher probability of packet loss and jitter; 4)
  • the call connection rate is low.
  • the repeated use of virtual numbers can easily be marked as malicious calls by users; second, a large number of virtual numbers are reused, and calls will be restricted due to the influence of the management and control policies in the operator's network; 6)
  • User operation is cumbersome: when a number hides the real number for some other numbers, the user of the one number needs to set other numbers separately through SMS or APP.
  • embodiments of the present application provide a method and a corresponding device for a privacy-protected call.
  • the virtual number is allocated through the operator network, and after receiving the call request, the operator network directly completes the conversion between the user number and the virtual number within the operator network. In this way, only one call needs to be reserved in the operator's network, which can effectively reduce network cost and load, increase connection rate, and improve call quality.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, for example: long term evolution (LTE) system, worldwide interoperability for microwave access (WiMAX) communication system, future fifth generation (5th Generation, 5G) systems, such as new generation radio access technology (NR), and future communication systems, such as 6G systems.
  • LTE long term evolution
  • WiMAX worldwide interoperability for microwave access
  • 5G fifth generation
  • NR new generation radio access technology
  • 6G systems such as new generation radio access technology
  • FIG. 2 it is a network architecture diagram of a communication system according to an embodiment of the present application.
  • the communication system includes:
  • Terminal equipment or user equipment (User Equipment, UE) is used to initiate or answer calls.
  • Terminal devices include devices that provide users with voice and/or data connectivity, specifically, devices that provide users with voice, or devices that provide users with data connectivity, or devices that provide users with voice and data connectivity .
  • it may include a handheld device with wireless connectivity, or a processing device connected to a wireless modem.
  • Specific examples include mobile phones, smart watches, smart earphones, and the like.
  • the various terminal devices described above if they are located on the vehicle (for example, placed in the vehicle or installed in the vehicle), can be considered as on-board terminal equipment.
  • the on-board terminal equipment is also called on-board unit (OBU). ).
  • Application server The backend server corresponding to the application installed on the terminal device is used to provide corresponding services for the terminal device, such as the backend server of the taxi software “Didi”, or the acquired server of the takeaway software “Meituan”, etc. .
  • the application server is used to apply for a virtual number from the cloud server and deliver it to the terminal device.
  • Cloud server the server of the cloud service manufacturer, is a platform established and maintained by the terminal equipment manufacturer or operator to provide the required services in an on-demand and easily scalable manner through the network, such as the server of the mobile phone manufacturer "Huawei" .
  • the cloud server is configured to receive a number request for assigning a virtual number to the user number from the application server, analyze the operator network to which the user number belongs, and obtain the virtual number from the operator network to which the user number belongs.
  • the cloud server is optional.
  • the application server can analyze the carrier network to which the user number belongs, and then directly initiate a request to the carrier network to which the user number belongs to obtain the virtual number.
  • a network opening function device a device used for virtual number management. For example, a number request for assigning a virtual number to a user number is received from the cloud server, the first network function device to which the user number belongs is determined, the virtual number is obtained from the first network function device to which the user number belongs, and the obtained virtual number is fed back to cloud servers, etc.
  • the second network function device is located in the operator's network (ie, as shown in Figure 2).
  • the network open function device may be an open management platform or service capability open function device in the operator's network.
  • the network opening function device may be deployed on the original functional entity of the operator's network, or the functional entity may be deployed independently, which is not limited in this application.
  • the network open function device is deployed outside the operator's network, for example, the network open function device is integrated on a cloud server. This application does not specifically limit the specific implementation form of the network opening function device.
  • the second network function device is located in the operator's network as an example.
  • the first network function device and the second network function device are network function devices that provide a call control function in the operator's network.
  • the first network function device and/or the second network function device is configured with a virtual number resource pool, capable of allocating virtual numbers to subscriber numbers.
  • the difference between the first network function device and the second network function device is that the first network function device and the second network function device are located in different home places, that is, they provide call control functions for subscriber numbers in different home places.
  • the first network function device and the second network function device may be an Internet Protocol Multimedia Subsystem (Internet Protocol Multimedia Subsystem, IMS) or other real-time audio and video networks.
  • IMS Internet Protocol Multimedia Subsystem
  • IMS Internet Protocol Multimedia Subsystem
  • SIP Session Initiation Protocol
  • Communication is independent of access. It can have various media service control functions and bearer capabilities. Separation, separation of applications and services, separation of services and networks, and integration of mobile networks and Internet services.
  • the IMS at the home of the subscriber number may be referred to as the IMS home domain or the home domain IMS
  • the IMS at the destination of the subscriber number may be referred to as the IMS visited domain or the visited domain IMS.
  • the terminal device corresponding to the user number can be attached to the IMS of the home place or the IMS of the visited place.
  • the IMS can be composed of multiple functional devices, which use their functions as short names.
  • the terminal device is connected to the IMS through the core network.
  • the equipment in the IMS1 (that is, the first network function equipment) to which the first terminal equipment (the first user number) belongs may include a proxy-call session control function 1 (proxy-call session control function, P-CSCF1), a service call session control function 1 (service-call session control function, S-CSCF1), query call session control function 1 (interrogating-call session control function, I-CSCF1), home subscriber server 1 (home subscriber server, HSS1) and application server 1 (application server, AS1).
  • proxy-call session control function 1 proxy-call session control function 1
  • S-CSCF1 service call session control function
  • I-CSCF1 query call session control function 1
  • home subscriber server 1 home subscriber server, HSS1
  • application server 1 application server, AS1.
  • the devices in the IMS2 may include P-CSCF2, S-CSCF2, I-CSCF2, HSS2 and AS2.
  • P-CSCF2 the second network function device
  • S-CSCF2 the second terminal device
  • I-CSCF2 HSS2
  • AS2 the second terminal device
  • the above only briefly shows the devices in the IMS, and other devices may also be included in the IMS.
  • the IMS is proposed by the 3rd Generation Partnership Project (3GPP) standard organization on the basis of the R5 version, and is a general network architecture that provides multimedia services on an IP-based network.
  • 3GPP 3rd Generation Partnership Project
  • the specific network structure of the IMS may also change (for example, functional entities are split, or network entities are added, etc.), so the name of the IMS may also change.
  • FIG. 4 a flowchart of a method for a privacy-preserving call provided by an embodiment of the present application is provided.
  • the method is applied to the network architecture shown in FIG. 2 as an example.
  • the specific process includes:
  • the application server sends a second number request message to the network opening function device, and the network opening function device receives the second number request message from the application server, wherein the second number request message carries the first user number, and the second number request message uses to request a virtual number.
  • the application server sends a second number request message to the cloud server, and after the cloud server receives the second number request message, it analyzes the carrier network to which the first user number belongs (for example, China Mobile or China Unicom, etc., this application does not limit), and then forward the second number request message to the first network function device in the operator network to which the first user number belongs.
  • the carrier network for example, China Mobile or China Unicom, etc., this application does not limit
  • the application server may analyze the operator network to which the first user number belongs, and then directly send the second number request message to the operator network in the operator network to which the first user number belongs.
  • a first network capable device may analyze the operator network to which the first user number belongs, and then directly send the second number request message to the operator network in the operator network to which the first user number belongs.
  • the second number request message may not carry the privacy protection mode.
  • the second number request message may also carry the privacy protection mode, such as AXB mode, or AXYB mode, or AC mode, or AXG mode.
  • privacy protection modes applicable to the embodiments of the present application include, but are not limited to, AXB mode, AXYB mode, AC mode, and AXG mode. These modes are described below.
  • a one-to-one relationship is established between user number A and user number B.
  • the two parties do not know the real number of the other party and contact the other party through the private number X.
  • User number A only presents X number to user number B, and user number B presents only X number to user number A.
  • the same X number can be reused in different associations, but the A and B numbers are different.
  • AXB mode mainly for privacy protection in 1-to-1 scenarios, the precondition is that the contact information of A and B is known, such as online taxi booking, short-term rental, takeaway delivery, online doctor consultation, legal consultation, etc.
  • the privacy protection number in AXB mode mainly protects the privacy of both parties in one-to-one scenarios, which not only keeps the two parties in the normal IMS call, but also hides the real numbers of the two parties to the call.
  • the second number request message may also carry the second user number, for example, the first user number is A, and the second user number is B.
  • a one-to-one relationship is established between user number A and user number B.
  • the two parties do not know the real number of the other party and contact each other through private numbers X and Y.
  • User number A only presents X number to user number B, and user number B presents only Y number to user number A.
  • the same group of X and Y numbers can be reused in different associations, but the A and B numbers are different.
  • Examples of applicable scenarios of the AXYB model mainly for scenarios where companies strictly control the privacy of corporate members, such as delivery, car rescue, and car rental.
  • the privacy protection number in the AXYB mode mainly protects the number in the one-to-many interaction scenario. Calls are established through private numbers to ensure that the numbers of both parties are not leaked.
  • the second number request message may also carry the second user number, for example, the first user number is A, and the second user number is B.
  • User number A has an independent privacy number X.
  • Teen can dial the terminal device corresponding to user number A through number X, and the terminal device corresponding to user number A can dial back to one of them.
  • real user number Usually, an X number can only be bound to one user number A.
  • the user of user number A can set multiple numbers that want to hide the real number.
  • the user A number only presents the number as X for the multiple numbers, and for other numbers that are not set, the real user can be displayed. number A.
  • the AX mode takes X as an example for all external numbers.
  • AX mode mainly protects the privacy of the unilateral number in the one-to-N scenario.
  • the external number of user number A is replaced by X, and all calls with user number A are established through X, which protects user number A from being incompatible. Give way.
  • a group-to-one association relationship is established between the user number A and a group of user numbers G.
  • G assigns a corresponding virtual number X
  • members in group G can dial user number A through X
  • user number A can call back to a certain member in G.
  • the same X number can be reused in different associations, but A and G are different.
  • Examples of applicable scenarios for the AXG model mainly for industries with team collaboration scenarios, such as recruitment, banking, insurance, etc.
  • the second number request message can also carry multiple user numbers other than the first user number, for example, the first user number is A, and other user numbers such as G1, G2, G3, etc.
  • the network opening function device sends a first number request message to the first network function device to which the first user number belongs, and the first network function device to which the first user number belongs receives the first number request message from the network opening function device; wherein The first number request message carries the first user number, and the first number request message is used to request a virtual number;
  • the privacy protection mode is AX
  • the first user number such as A
  • the privacy protection mode is other modes such as AXB, AXYB, AXG, etc.
  • the first number request may also carry other user numbers.
  • the first user number A and the second user number B are carried in the first number request.
  • the first number request carries the first user number A and multiple user numbers (such as numbers G1, G2, G3, etc.) other than A.
  • the first number request message also carries the privacy protection mode.
  • the first network function device to which the first user number belongs acquires the first virtual number
  • the attribution of the first virtual number and the attribution of the first user number satisfy a preset relationship, for example, the first virtual number and the first user number belong to the same region. In this way, it can be ensured that the path from any network node to the network node where the first virtual number is located is the same as the path from the network node to the network node where the first user number is located.
  • the first user number and the second user number have the same number segment.
  • each mobile phone number has 11 digits
  • the first three digits of the mobile phone number are the network identification number, which indicates which operator it belongs to
  • the middle four digits are the area code, indicating the area where the number is located.
  • the last four digits are the user number, indicating the user identity.
  • the first user number and the first virtual number have the same four-digit number in the middle.
  • the first network function device is preconfigured with a virtual number resource pool, the virtual number resource pool includes at least one virtual number, and the first network function device obtains the first virtual number from the virtual number resource pool.
  • the first network function device determines a virtual number adjacent to the first user number from the virtual number resource pool as the first virtual number.
  • the virtual numbers in the virtual number resource pool belong to the first network function device, in other words, the virtual numbers in the virtual number resource pool belong to the area served by the first network function device,
  • the first network function device may randomly select a virtual number from the virtual number resource pool as the first virtual number.
  • the first network function device to which the first user number belongs may further establish and save an association relationship between the first user number and the first virtual number.
  • the first network function device to which the first user number belongs can create and save the first user of this domain.
  • the association relationship between the number, the first virtual number, and the foreign domain number For example, in the AXB mode, the association relationship between the first user number A, the first virtual number X, and the second user number B (foreign domain number) is established and saved; in the AXG mode, the first user number A is established and saved.
  • the association relationship with the first virtual number X and other multiple user numbers such as G1, G2, G3, etc.) (foreign domain numbers); special, in the AX mode, the first virtual number X and the first user are established and saved. The relationship between numbers A.
  • the first network function device to which the first user number belongs also saves the privacy protection mode, and associates and saves the privacy protection mode with the above established association relationship.
  • the first network function device sends a first response message to the network opening function device, and the network opening function device receives the first response message returned by the first network function device; wherein the first response message carries the first virtual number;
  • the first network function device may also determine to send a first number request to the first network function device to which at least one user number of the multiple user numbers belongs according to the privacy protection mode and/or service load information.
  • the privacy protection mode is used to indicate a user number that needs to be converted among the multiple user numbers.
  • the service load is used to indicate the load of the number privacy protection service in the network to which each user number of the multiple user numbers belongs.
  • the first network function device sends a first number request message to the first network function device to which at least one user number of the plurality of user numbers belongs according to the privacy protection mode and/or service load. For example:
  • Example 1 when the privacy protection mode is the AXB mode, the second number request message carries both the first user number A and the second user number B.
  • both A and B need to perform number conversion, and the network opening function device sends a first number request message to the first network function device to which the first user number belongs or the second network function device to which the second user number belongs; After receiving the first number request message, the first network function device to which the first user number belongs or the second network function device to which the second user number belongs, determines the first virtual number X from the virtual resource pool according to the privacy protection mode, and establishes and save the association relationship between the first user number A, the second user number B, and the first virtual number X; after that, the first network function device to which the first user number belongs or the second network to which the second user number belongs. The functional device returns the first virtual number to the network opening functional device.
  • the network opening function device may select a network with a lower service load from the first network function device and the second network function device by comparing the service load of the first network function device and the service load of the second network function device.
  • the functional device sends a first number request message.
  • the first network function device to which the first user number belongs or the second network function device to which the second user number belongs also saves the privacy protection mode AXB.
  • Example 2 when the privacy protection mode is the AXYB mode, the second number request message carries both the first user number A and the second user number B.
  • both A and B need to perform number conversion.
  • the network opening function device In addition to sending the first number request message (carrying the first user number A) to the first network function device to which the first user number belongs, the network opening function device also sends the first number request message to the first network function device to which the first user number belongs.
  • the second network function device to which the second user number belongs sends a third number request message (carrying the second user number B).
  • the first network function device to which the first user number belongs allocates a virtual number, such as the first virtual number X, to the first user number according to the privacy protection mode, and establishes the first user number A, the first user number, and the first virtual number X.
  • the association relationship between virtual numbers X, the first network function device carries the first virtual number X in the first response message and sends it to the network open function device.
  • the second network function device to which the second user number belongs allocates a virtual number, such as the second virtual number Y, to the second user number according to the privacy protection mode, and establishes the second user number B, the second user number, and the second virtual number Y.
  • the association relationship between virtual numbers Y, the second network function device carries the second virtual number B in the third response message and sends it to the network open function device.
  • Example 3 when the privacy protection mode is the AX mode, the first user number A is carried in the second number request message.
  • A needs to perform number conversion, and the network opening function device can send a first number request message to the first network function device to which the first user number belongs; the first network function device to which the first user number belongs receives the first number request message.
  • the first virtual number X is determined from the virtual resource pool, and the association relationship between the first user number A and the first virtual number X is established and saved; after that, the first network function device Return the first virtual number to the network open function device.
  • the first network function device also saves the privacy protection mode AX.
  • the second number request message carries a set of user numbers (such as G1, G2, G3, etc.) corresponding to the first user numbers A and A.
  • the network opening function device can send the first number request message to the first network function device to which the first user number belongs.
  • the first network function device to which the first user number belongs determines the first virtual number X from the virtual resource pool according to the privacy protection mode, establishes and saves the first user number A, the first virtual number The association relationship between the number X and the number group (such as G1, G2, G3, etc.); after that, the first network function device returns the first virtual number to the network open function device.
  • the first network function device also saves the privacy protection mode AX.
  • the first network function device when the first network function device sends the first response message to the network open function device, it may be in the form of carrying the mapping relationship between the first virtual number and the first user number in the first response message.
  • the first virtual number of the , and the mapping relationship between the first virtual number and the first user number are notified to the network open function device together.
  • the network opening function device is in the first network to which the first user number A belongs.
  • the functional device When the functional device requests a virtual number, other numbers related to the first user number (the second user number associated with the first user number in AXB mode, multiple other user numbers associated with the first user number in AXG mode (such as G1 , G2, G3, etc.), in AX mode, the first user number may not have other numbers associated) together with the first network function device to which the first user number belongs, and the first network function device to which the first user number belongs is assigned After the virtual number is created, the association relationship between the number group in the local domain and the number in the foreign domain can be directly established and saved.
  • the first network function device to which the first user number A belongs in the AXB mode, after assigning the first virtual number X, creates and saves the first virtual number X, the first user number A, the second virtual number X, and the second virtual number X.
  • association relationship between other multiple user numbers such as G1, G2, G3; special, in AX mode, the network open function device after assigning the first virtual number X, establishes and saves the first virtual number X and the first virtual number X.
  • An association relationship between user numbers A is
  • the network to which each user number belongs can also be notified of the foreign domain number, thereby enabling each first network function device to establish And save the association between the local domain number group and the foreign domain number.
  • the network opening function device after receiving the first response message, the network opening function device also sends a second notification message to the second network function device, where the second notification message carries the first virtual number X (or X and the number). group (B, Y) association), after the second network function device receives the second notification message, establishes and saves the association between X and the number group (B, Y); and sends the first network function device to the first network function device.
  • the first notification message carries the second virtual number Y (or carries the association between Y and the number group (A, X))
  • the first network function device receives the first notification message, establishes and saves Y and the number The association of groups (A, X).
  • the network opening function device can also receive the first response message. After that, send a notification message to the first network function device to which the first user number A belongs, and notify the first network function to which the first user number A belongs to the foreign domain number (or the association between the local domain number group and the foreign domain number)
  • the device, the first network function device to which the first subscriber number A belongs establishes and saves the corresponding association relationship according to the notification message.
  • the first network function device to which the first user number A belongs does not establish an association relationship, but directly returns a first response message (carrying the first response message to the network open function device) virtual number X); after receiving the first response message, the network opening function device sends a notification message to the first network function device to which the first user number A belongs, and the notification message carries the first virtual number X, the first user number A, the second user number B, optionally, the notification message also carries the privacy protection mode AXB; after receiving the notification message, the first network function device to which the first user number A belongs, establishes and saves the first virtual number X, The association between the first user number A and the second user number B.
  • the network opening function device sends a second response message to the application server, and the application server receives the second response message, where the second response message carries the first virtual number;
  • the network opening function device first sends the second response message to the cloud server, and then the cloud server forwards the second response message to the application server.
  • the second response message also carries the second virtual number.
  • the virtual number X and the virtual number Y are carried in the second response message.
  • the network opening function device may carry the mapping relationship between the virtual number and the user number in the first response message.
  • the second response message carries the mapping relationship between A and X, and the mapping relationship between B and Y.
  • the second response message carries the mapping relationship among A, B, and X.
  • the application server delivers the first virtual number to the first terminal device.
  • the application server delivers the first virtual number to the first terminal device.
  • the application server not only delivers the first virtual number to the first terminal device, but also delivers the first virtual number to the second terminal device.
  • the application server not only delivers the first virtual number to the first terminal device, but also delivers the first virtual number to terminals corresponding to other multiple user numbers (such as G1, G2, G3, etc.). equipment.
  • the application server will not only deliver the first virtual number to the first terminal device, but also deliver the second virtual number Y to the second terminal device, and deliver the first virtual number X to the second terminal device.
  • the terminal device delivers the second virtual number Y to the first terminal device.
  • S406 includes S406A and S406B.
  • the dotted line indicates that S406A or S406B is optional. Actually, there may be only S406A or S406B, or both S406A and S406B.
  • the above S401 to S406 describe the virtual number allocation process. After the terminal device obtains the virtual number, the terminal device can initiate a call based on the virtual number.
  • the first network function device receives the first call request message, where the first call request message carries the first virtual number or the first user number;
  • the first network function device receives the first call request message from the first terminal device, and the calling number carried in the first call request message is The first user number.
  • the called number carried in the first call request message may be a real user number or a virtual number corresponding to the user number, which may be determined according to the privacy protection mode.
  • the call request message of the second terminal device is first sent to the second terminal device.
  • the second network function device to which the terminal device belongs then the second network function device continues the call request and sends a first call request message to the first network function device, and the first network function device receives the first call from the second network function device.
  • the called number carried in the first call request message is the first virtual number.
  • the calling number in the first call request message may be a real user number or a virtual number corresponding to the user number, which may be determined according to the privacy mode.
  • S407 includes S407A and S407B, and the dotted line indicates that S407A or S407B is optional, but actually there may be only S407A or S407B.
  • the first network function device processes the first call request message according to the pre-stored association relationship.
  • the calling number carried in the first call request message is the first user number, and the first network function device calls the calling number according to the pre-stored association relationship. The number is replaced from the first user number to the first virtual number, and then the call is connected to the first network function device to which the called number belongs (eg, the second network function device to which the second user number belongs).
  • the called number carried in the first call request message is the first call.
  • the first network function device replaces the called number from the first virtual number with the first user number according to the pre-stored association relationship, and then connects the call to the called number, that is, the first network function to which the first user number belongs. equipment.
  • the first network function device may also perform number conversion on other user numbers or other virtual numbers.
  • Example 1 the privacy protection mode is AXB mode.
  • the first terminal device corresponding to the first user number A sends a call request message (the calling number is the first network function device to which the first user number A belongs).
  • a user number A and the called number are the first virtual number X); after the first network function device receives the call request message, the first user number A, the second user number B and the first virtual number X three send a call request message (the calling number is the first virtual number X and the called number is the second user number B) to the second network function device to which the second user number belongs; the second network function device receives the After the call request message, the call is connected to the second terminal device, and a call request message is sent to the second terminal device (the calling number is the first virtual number X, and the called number is the second user number B).
  • the situation where the second terminal device corresponding to the second user number actively initiates a call is opposite to the above process, that is, the second terminal device corresponding to the second user number B sends a call request message to the second network function device to which the second user number B belongs.
  • the calling number is the second user number B, and the called number is the first virtual number X
  • the second network function device receives the call request message
  • the The association between the first virtual number X sends a call request message to the first network function device to which the first user number belongs (the calling number is the first virtual number X, and the called number is the first user number A);
  • the first network function device connects the call to the first terminal device, and sends a call request message to the first terminal device (the calling number is the first virtual number X, and the called number is the first user number A) .
  • Example 2 the privacy protection mode is AXG mode.
  • the first terminal device corresponding to the first user number initiates a call to the terminal device corresponding to any number in a group of numbers (such as G1, G2, G3, etc.), you can refer to the first terminal device corresponding to the first user number in the above example 1.
  • G1, G2, and G3 may correspond to the second user number B, which will not be repeated here.
  • the terminal device corresponding to any number in a group of numbers (such as G1, G2, G3, etc.) initiates a call to the first terminal device corresponding to the first user number
  • G1, G2, and G3 may correspond to the second user number B, which will not be repeated here.
  • Example 3 the privacy protection mode is AX mode.
  • the first terminal device corresponding to the first user number A sends a call request message (the calling number is the first user number A and the called number is the second user number B) to the first network function device to which the first user number A belongs;
  • the first network function device After receiving the call request message, the first network function device sends a call request message (calling number) to the second network function device to which the second user number belongs according to the pre-stored association between the first user number A and the first virtual number X. is the first virtual number X, and the called number is the second user number B); after receiving the call request message, the second network function device connects the call to the second terminal device, and sends the call request message to the second terminal device (calling The number is the first virtual number X, and the called number is the second user number B).
  • the second network function device may also store the association relationship between the first user number A and the first virtual number X in advance.
  • the first terminal device corresponding to the first user number A sends a call request message (the calling number is the first user number A and the called number is the second user number) to the first network function device to which the first user number A belongs.
  • the first network function device after the first network function device receives the call request message, it sends a call request message to the second network function device to which the second user number belongs (the calling number is the first user number A, the called number is the second user number B); After the second network function device receives the call request message, it connects the call to the second terminal device according to the pre-stored relationship between the first user number A and the first virtual number X, and sends a call to the second terminal device Request message (the calling number is the first virtual number X, and the called number is the second user number B).
  • the second terminal device corresponding to the second user number B sends a call request message (the calling number is the second user number B and the called number is the first virtual number X) to the second network function device to which the second user number B belongs;
  • the second network function device After receiving the call request message, sends a call request message to the first network function device to which the first user number belongs (the calling number is the second user number B, and the called number is the first virtual number X);
  • the first network function device connects the call to the first terminal device according to the pre-stored association relationship between the first user number A and the first virtual number X, and sends a call request message (main
  • the calling number is the second user number B, and the called number is the first user number A).
  • the second network function device may also store the association relationship between the first user number A and the first virtual number X in advance.
  • the second terminal device corresponding to the second user number B sends a call request message (the calling number is the second user number B and the called number is the first virtual number to the second network function device to which the second user number B belongs).
  • the second network function device after receiving the call request message, the second network function device sends a call request message to the first network function device to which the first user number belongs according to the pre-stored association relationship between the first user number A and the first virtual number X (The calling number is the second user number B, and the called number is the first virtual number A); after receiving the call request message, the first network function device continues the call to the first terminal device and sends a call to the first terminal device Request message (the calling number is the second user number B, and the called number is the first user number A).
  • Example 4 the privacy protection mode is AXYB mode.
  • the first terminal device corresponding to the first user number A sends a call request message (the calling number is the first network function device to which the first user number A belongs).
  • a user number A and the called number are the second virtual number Y); after receiving the call request message, the first network function device, according to the pre-stored association relationship between the first user number A and the first virtual number, sends a call to the second virtual number
  • the second network function device to which the number belongs sends a call request message (the calling number is the first virtual number X, and the called number is the second user number Y); after receiving the call request message, the second network function device
  • the association relationship between the user number B and the second virtual number Y send a call request message to the second terminal device (the calling number is the first virtual number X, and the called number is the second user number B).
  • the situation where the second terminal device corresponding to the second user number actively initiates a call is opposite to the above process, that is, the second terminal device corresponding to the second user number B sends a call request message to the second network function device to which the second user number B belongs.
  • the calling number is the second user number B, and the called number is the first virtual number X
  • the association relationship is to send a call request message (the calling number is the second virtual number Y and the called number is the first virtual number X) to the first network function device to which the first user number belongs; the first network function device receives the call request message Then, according to the pre-stored relationship between the first user number A and the first virtual number, send a call request message to the first terminal device (the calling number is the second virtual number Y, and the called number is the first user number A) .
  • the call request message involved in this embodiment of the present application is an Invite message.
  • the audio and video media of the first terminal device and the second terminal device can also be transmitted according to the call path (ie: the first terminal device ⁇ the first terminal device Network function equipment ⁇ second network function equipment ⁇ second terminal equipment, or, second terminal equipment ⁇ second network function equipment ⁇ first network function equipment ⁇ first terminal equipment).
  • the application server also sends a first number release message (carrying the first user number and the first virtual number) to the network opening function device, which is used to request to release the first user number and the first virtual number.
  • the association relationship between numbers after receiving the first number release message from the application server, the network opening function device sends a second number release message (carrying the first user number and the first number release message to the first network function device to which the first user number belongs).
  • a virtual number used to request to release the association between the first user number and the first virtual number; after the first network function device receives the second number release message from the network opening function device, it releases the first user number and the first number.
  • An association relationship between virtual numbers, any subsequent calls to the first virtual number will prompt that the first virtual number does not exist. In this way, the privacy and security of the first terminal device can be further guaranteed.
  • the first number release message also carries the second user number and the second virtual number
  • the network opening function device receives the first number release message from the application server, it also sends to the second user number.
  • the home second network function device sends a third number release message, and the second network function device releases the association between the second user number and the second virtual number.
  • any subsequent calls to the second virtual number will be sent to the second network function device. Prompt that the second virtual number does not exist. In this way, the privacy and security of the second terminal device can be further guaranteed.
  • the virtual number is selected according to the real location of the user number (the user number and the virtual number belong to the same area), which optimizes the path for transmitting audio media, reduces the circuitous path, and can improve the call quality ;
  • the virtual number is allocated by the operator network, which can avoid manual control and probabilistic call restriction in the operator network, and improve the connection rate;
  • the virtual number is dynamically allocated and used by the operator, without the need for the cloud service provider to apply in advance, which greatly saves the cost;
  • This embodiment introduces a privacy-protected call method based on the AXB mode initiated by a taxi application (such as "DiDi").
  • the method includes:
  • the Didi server sends a virtual number request to the network open function device through the cloud server.
  • the Didi server matches an online car-hailing service to obtain the driver's real number A and the passenger's real number B.
  • the Didi server sends a privacy protection number request to the cloud server, and the carried content includes: privacy protection pattern (Pattern, P), in this case AXB, and P1 is used to represent AXB; the driver's real number: A; the passenger's real number: B.
  • P privacy protection pattern
  • the cloud server forwards the request to a specific operator according to the privacy protection mode and the attribution of numbers A and B. In this example, it is assumed that numbers A and B belong to CMCC;
  • the network opening function device of CMCC receives the virtual number request, and selects the contact number from A and B according to the privacy protection mode and service load (the number that actually triggers the service, that is, the number needs to be set in the network corresponding to this number)
  • the conversion process, for AXB mode, requires a contact number) in this case the contact number is assumed to be A.
  • the network opening function device sends a virtual code request to the home IMS of the contact number, carrying the following information: contact number A and related number B. Optionally, it also carries a recording logo, indicating whether or not the call needs to be recorded;
  • A's home IMS allocates a neighboring number X of A from the virtual number pool as the virtual number of this call.
  • the so-called adjacent number is exactly the same as the original number A in number analysis and routing. It is guaranteed that any calls to nearby numbers can be routed to this IMS.
  • A's home IMS sends a virtual number response to the network opening function device, carrying the virtual number X;
  • the network opening function device forwards the virtual number response to the cloud server, carrying the virtual number X;
  • the cloud server forwards the virtual number response to the Didi server, carrying the virtual number X;
  • the Didi server issues virtual numbers to the terminal devices corresponding to A and B;
  • the terminal device corresponding to A initiates a call to the PCSCF in A's home IMS, and the call request carries the following numbers: calling A, called X;
  • Contact number A is called process (S511 ⁇ S513):
  • the terminal device corresponding to B initiates a call to the PCSCF in B's home IMS, and the call request carries the following numbers: calling B, called X;
  • B's home IMS analyzes the X number's home network through a normal number analysis process, and sends the call request to A's home IMS domain, which is consistent with a normal call;
  • the Didi server determines that the call service has ended, and sends a virtual number release request to the cloud server, carrying the previously applied virtual number X;
  • the cloud server and the network opening function device transparently transmit the virtual number release request to the IMS to which the contact number belongs;
  • A's home IMS releases the association relationship between X and the (A, B) number group, and releases the X number back into the number pool. Any subsequent calls to the X number will prompt that the number does not exist;
  • A's home IMS sends a virtual number release response to the network opening function device
  • the network opening function device and the cloud server transparently transmit the virtual number release response to the Didi server.
  • the operator network assigns virtual numbers to drivers and passengers. After receiving the call request, the operator network directly completes the conversion between the user's real number and the virtual number within the operator network.
  • the operator network only needs to Reserving one call can effectively reduce network cost and load, increase connection rate, and improve call quality, thereby improving the service level of taxi-hailing applications.
  • This embodiment also introduces a method for a privacy-protected call initiated by a food delivery application (such as "Meituan”) based on the AXYB mode.
  • a food delivery application such as "Meituan”
  • the method includes:
  • the Meituan server sends a virtual number request to the network open function device through the cloud server. Specifically, the Meituan server matches the delivery service once, and obtains the delivery person's real number A and the customer's real number B.
  • the Meituan server sends a privacy protection number request to the cloud server, and the carried content includes: privacy protection pattern (Pattern, P), in this case AXYB, and P2 is used to represent AXYB; the deliveryman's real number: A; the customer's real number: B.
  • P privacy protection pattern
  • the cloud server forwards the request to a specific operator according to the privacy protection mode and the attribution of numbers A and B. In this example, it is assumed that numbers A and B belong to CMCC;
  • the network opening function device of CMCC receives the virtual number request, and selects the contact number from A and B according to the privacy protection mode and service load (the number that actually triggers the service, that is, the number that needs to be set in the network corresponding to this number)
  • the conversion process for AXYB mode, requires two contact numbers), in this case the contact numbers are A and B.
  • the network opening function device sends a virtual code request to the home IMS of each contact number (as shown in Figure 6, including S602A and S602B), and each request carries the following information: contact number A or contact number B.
  • it also carries a recording logo, indicating whether or not the call needs to be recorded;
  • A's home IMS allocates a neighboring number X of A from the virtual number pool
  • B's home IMS allocates a neighboring number Y of B from the virtual number pool as the virtual number of this call.
  • S603 A and A's home IMS sends a virtual number response to the network opening function device, carrying the virtual number X;
  • S603B and B's home IMS sends a virtual number response to the network opening function device, carrying the virtual number Y;
  • the network opening function device After receiving X and Y, the network opening function device sends a number notification to A's home IMS and B's home IMS, respectively.
  • the network opening function device sends a number notification to the IMS to which A belongs, carrying: the privacy protection mode P2, the local domain twin number group (A, X), and the foreign domain privacy number Y.
  • the IMS to which A belongs establishes and saves the association relationship ((A, X), Y));
  • the network opening function device sends a number notification to the IMS to which B belongs, carrying: the privacy protection mode P2, the twin number group (B, Y) in the local domain, and the privacy number X in the external domain.
  • B's home IMS establishes and saves an association relationship ((B, Y), X));
  • the network opening function device forwards the virtual number response to the Meituan server through the cloud server, carrying (A, X), (B, Y);
  • the Meituan server issues numbers to the terminal device corresponding to A, including the local domain twin number group (A, X) and the foreign domain privacy number Y;
  • the Meituan server issues numbers to the terminal device corresponding to B, including the twin number group (B, Y) of the local domain and the private number X of the external domain;
  • the terminal device corresponding to A initiates a call to the PCSCF in A's home IMS, and the call request carries the following numbers: calling A, called Y;
  • A's home IMS replaces the calling party with X according to the association relationship, performs routing analysis according to the Y number, and sends a call request to B's home IMS.
  • the subsequent call will be connected, and the recording should be processed during media processing;
  • the terminal device corresponding to B initiates a call to the PCSCF in B's home IMS, and the call request carries the following numbers: calling B, called X;
  • B's home IMS replaces the calling party with Y according to the association relationship, performs routing analysis according to X number, and sends a call request to A's home IMS.
  • the subsequent call will be connected, and the recording should be processed during media processing;
  • the Meituan server determines that the call service has ended, and sends a virtual number release request to the cloud server, carrying the previously applied virtual numbers X and Y;
  • the cloud server forwards the virtual number release request to transparently transmit the request to the network opening function device;
  • the network opening function device sends a virtual number release request to the IMS to which A and B belong;
  • A's home IMS releases the association between X and A, and releases X number back into the number pool. Any subsequent calls to X number will prompt that the number does not exist.
  • the IMS that B belongs to releases the association between Y and B, and releases Y number back to the number pool. Any subsequent calls to Y number will prompt that the number does not exist.
  • the operator network assigns virtual numbers to the takeaways and customers. After receiving the call request, the operator network directly completes the conversion of the user number and the virtual number within the operator network.
  • the operator network only needs to Reserving one call can effectively reduce network cost and load, improve connection rate, and improve call quality, thereby improving the service level of food delivery applications.
  • first user number A and the second user number B are based on the first user number A and the second user number B, and the first user number A and the second user number B belong to different network function devices (that is, the first network function device). and the second network function device) as an example, but in specific implementation, the first user number A and the second user number B may also belong to the same network function device, for example, both belong to the first network function device. In the following, it is only necessary to make appropriate modifications to the above-mentioned embodiments.
  • a number request is sent to a network function device, so the virtual number allocation method is basically similar; but in the AXYB mode, the above two network function devices (that is, the first The related processing performed by the network function device and the second network function device) needs to be merged into one network function device for processing (such as assigning virtual numbers X, Y, establishing the association relationship of A, X, Y, B, etc.), in addition to The process of sending a number notification message is omitted (because there is no need for notification of an external domain number).
  • the processing of the call message by the first network function device and the third user number needs to be combined into one network function device for processing.
  • an embodiment of the present application also provides a privacy protection communication device, the device includes a communication unit 701 and a processing unit 702 , and the processing unit 702 and the communication unit 701 cooperate to execute the embodiments of the present application that can be accessed by the network Part or all of the operations of any one of the methods performed by the open function device or the first network function device or the second network function device.
  • the communication unit 701 is configured to receive a first number request message from the network open function device, where the first number request message carries the first user number, and the first number request The message is used to request a virtual number; the processing unit 702 is used to obtain the first virtual number and establish an association relationship between the first user number and the first virtual number, and the first virtual number and the first user number belong to the same area; communication Unit 701 is further configured to send a first response message to the network opening function device, where the first response message carries the first virtual number; and receive a first call request message, where the first call request message carries the first virtual number or the first user Number; process the first call request message according to the association relationship.
  • the communication unit 701 is configured to receive a second number request message from the application server, where the second number request message carries the first user number, and the second number request message is used for requesting a virtual number; the processing unit 702 is used to determine the first network function device to which the first user number belongs; the control communication unit 701 sends a first number request message to the first network function device to which the first user number belongs; the communication unit 701, It is also used to send a first number request message to the first network function device to which the first user number belongs, where the first number request message carries the first user number, and the first number request message is used to request a virtual number; receiving the first network function The first response message returned by the device, the first response message carries the first virtual number allocated by the first network function device, and the first virtual number and the first user number belong to the same area; send a second response message to the application server, the first virtual number and the first user number belong to the same area; The second response message carries the
  • FIG. 8 is a schematic structural diagram of a communication device according to an embodiment of the present application
  • FIG. 9 is a schematic interface diagram of a communication board 830 in the communication device shown in FIG. 8 .
  • the communication device mainly includes a cabinet 800 and a communication single board 830 installed in the cabinet.
  • the communication single board 830 is mainly composed of a circuit board, chips and electronic components mounted on the circuit board, and can provide communication services.
  • the number of the communication boards 830 may be increased or decreased according to actual needs, and the specific number is not limited in this embodiment.
  • the cabinet 830 further includes a fan frame 820 for installing a cooling fan and a cabinet management board 810 for managing the cabinet.
  • the cabinet management board 810 is used to manage the working status of the entire cabinet, for example, managing the power-on status, working temperature, and alarm status of the cabinet.
  • the communication board 830 includes a plurality of input/output interfaces, such as a display interface 832 for an external display, network interfaces 831 and 833 for connecting to a communication network, and Universal Serial Bus (USB) interfaces 834.
  • the above-mentioned network interface 833 may be an Ethernet interface
  • the network interface 831 may be an optical fiber interface.
  • the communication board 830 also includes a power interface 836 for connecting a power supply and an expansion slot 835 for extending the function of the communication board 830 .
  • the above-mentioned communication apparatus may be a network open function device, a first network function device, a second network function device, or other devices.
  • the above communication apparatus implements different functions by installing different communication boards 830, for example, the functions of the network open function device or the first network function device or the second network function device in the embodiments of the present application can be implemented.
  • Control elements such as a general-purpose processor/control chip/logic circuit are installed on the communication single board 830 .
  • a memory such as a memory chip may also be installed in the communication board 830 .
  • the above-mentioned processor and memory may cooperate with a relevant communication interface to execute part or all of the operations of any method that can be executed by the network open function device or the first network function device or the second network function device in the embodiments of the present application.
  • a schematic structural diagram of another communication apparatus includes: at least one processor 1001 ; and a memory 1002 and a communication interface 1003 communicatively connected to the at least one processor 1001 ;
  • the memory 1002 stores instructions that can be executed by the at least one processor 1001, and the at least one processor 1001 executes the instructions stored in the memory 1002 to cause the device to execute the embodiments of the present application through the communication interface 1003 Part or all of the operations in any one of the methods that may be performed by the network open function device or the first network function device or the second network function device.
  • the specific connection medium between the processor 1001 , the memory 1002 , and the communication interface 1003 is not limited in the embodiments of the present application.
  • the processor 1001, the memory 1002, and the communication interface 1003 are connected through a bus 1004 in FIG. 10.
  • the bus is represented by a thick line in FIG. 10, and the connection between other components is only for schematic illustration. , is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 10, but it does not mean that there is only one bus or one type of bus.
  • the processor mentioned in the embodiments of the present application may be implemented by hardware or software.
  • the processor When implemented in hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When implemented in software, the processor may be a general-purpose processor implemented by reading software codes stored in memory.
  • the processor may be a central processing unit (Central Processing Unit, CPU), or other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC) , Off-the-shelf Programmable Gate Array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
  • RAM Static RAM
  • DRAM Dynamic RAM
  • SDRAM Synchronous DRAM
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Eate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • synchronous link dynamic random access memory Synchlink DRAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components
  • the memory storage module
  • memory described herein is intended to include, but not be limited to, these and any other suitable types of memory.
  • embodiments of the present application further provide a computer-readable storage medium, including a program or an instruction, when the program or instruction is run on a computer, the method as described in FIG. 4 to FIG. 6 is executed.
  • an embodiment of the present application further provides a chip, which is coupled to a memory and used to read and execute program instructions stored in the memory, so that the methods described in FIGS. 4 to 6 are executed. .
  • the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请实施例提供一种隐私保护通话方法及对应装置。方法包括:第一网络功能设备接收来自网络开放功能设备的第一号码请求消息,获取与第一用户号码属于同一个地区的第一虚拟号码,建立第一用户号码与第一虚拟号码之间的关联关系,向网络开放功能设备返回第一虚拟号码;在隐私保护通话过程中,第一网络功能设备接收携带第一虚拟号码或第一用户号码的第一呼叫请求消息后,直接根据关联关系对第一用户号码或第一虚拟号码进行号码转换。如此,网络中只需保留一路呼叫,可有效降低网络成本和负载、提升呼叫接通率、提高通话质量。

Description

一种隐私保护通话方法及对应装置
相关申请的交叉引用
本申请要求在2021年04月29日提交中国专利局、申请号为202110474208.7、申请名称为“一种隐私保护通话方法及对应装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种隐私保护通话方法及对应装置。
背景技术
为了防止用户号码隐私泄露,云服务厂商推出了隐私保护通话功能,适用于网购、出行、求职、外卖等各种场景。
当前隐私保护通话功能的实现,都是基于虚拟号码(或者称为隐私号码)的方案,用户一次呼叫,在运营商网络中实际分两步:第一步是真实主叫号码发起呼叫并接续虚拟号码,第二步由虚拟号码发起呼叫并接续真实被叫号码。使用虚拟号码可以使得用户的真实号码不公开,对外呈现为虚拟号码,实现隐私保护通话。
但是,由于原本一次呼叫分为两步,不仅增加了网络成本和负载,同时还导致呼叫的接续时间被延长,音视频媒体的传输时间被延长,用户体验差。
发明内容
本申请实施例提供一种隐私保护通话方法及对应装置,可以降低网络成本和负载、提升呼叫接通率、提高通话质量。
第一方面,提供一种隐私保护通话方法,可以应用于第一网络功能设备或者第一网络功能设备中的芯片。以方法应用于第一网络功能设备为例,该方法包括:第一网络功能设备接收来自网络开放功能设备的第一号码请求消息,其中第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;第一网络功能设备获取第一虚拟号码,建立第一用户号码与第一虚拟号码之间的关联关系,第一虚拟号码与第一用户号码属于同一个地区;第一网络功能设备向网络开放功能设备发送第一响应消息,第一响应消息中携带第一虚拟号码;第一网络功能设备接收第一呼叫请求消息,第一呼叫请求消息中携带第一虚拟号码或第一用户号码;第一网络功能设备根据关联关系处理第一呼叫请求消息。
本申请实施例中,由第一网络功能设备为第一用户号码分配与第一用户号码属于同一个地区的第一虚拟号码,这样第一网络功能设备在接收到第一呼叫请求消息后,就可以直接在呼叫请求消息中将第一用户号码与第一虚拟号码进行转换,使得网络中只需保留一路呼叫,相比现有技术中需要网络同时保留两路呼叫而言,可以有效降低网络成本和负载、提升呼叫接通率、提高通话质量。
应理解,第一用户号码对应的第一终端设备可以是主叫方,也可以是被叫方,本申请不做限制。
在一个可能的实现方式中,第一网络功能设备为第一用户号码归属地的IP多媒体子系统。
如此,可以实现由第一用户号码归属地的IP多媒体子系统为第一用户号码分配第一虚拟号码并处理呼叫消息,保证方案的可靠性。
在一个可能的实现方式中,第一用户号码归属地的IP多媒体子系统中包括呼叫会话控制功能设备。
如此,可以实现由第一用户号码归属地的IP多媒体子系统中的呼叫会话控制功能设备处理呼叫消息,保证方案的可靠性。
下面,结合具体的隐私保护模式,介绍第一网络功能设备处理第一呼叫请求消息的几种具体实现方式。
一种可能的实现方式中,隐私保护模式为共享隐私号码模式(AXB模式)或群组隐私号码模式(AXG模式)。第一号码请求消息中还携带第二用户号码;第一网络功能设备建立第一用户号码与第一虚拟号码之间的关联关系具体可以是:第一网络功能设备建立第一用户号码、第一虚拟号码以及第二用户号码之间的关联关系。
如果第一用户号码对应的第一终端设备是主叫方,则第一网络功能设备接收来自第一用户号码对应的第一终端设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第一用户号码、被叫号码为第一虚拟号码;第一网络功能设备根据关联关系、第一呼叫请求消息向第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第二用户号码。
如果第一用户号码对应的第一终端设备是被叫方,则第一网络功能设备接收来自第二用户号码归属的第二网络功能设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第二用户号码,被叫号码为第一虚拟号码;第一网络功能设备根据联关系、第一呼叫请求消息,向第一用户号码对应的第一终端设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第一用户号码。
如此,可以实现第一网络功能设备为第一用户号码和第二用户号码分配共享的虚拟号码(即第一虚拟号码),在第一终端设备和第二终端设备进行IMS通话时,第一终端设备和第二终端设备向对方呈现的号码均为第一虚拟号码,既能保持第一终端设备和第二终端设备正常通话,又隐藏了通话双方的真实号码。一种可能的实现方式中,隐私保护模式为单向隐私号码模式(AX模式)。
如果第一用户号码对应的第一终端设备是主叫方,则第一网络功能设备接收来自第一用户号码对应的第一终端设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第一用户号码、被叫号码为第二用户号码;根据关联关系、第一呼叫请求消息,向第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第二用户号码。
如果第一用户号码对应的第一终端设备是被叫方,则第一网络功能设备接收来自第二用户号码归属的第二网络功能设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第二用户号码,被叫号码为第一虚拟号码;根据关联关系、第一呼叫请求消息,向第一用户号码对应的第一终端设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第二用户号码,被叫号码为第一用户号码。
如此,可以实现第一网络功能设备为第一用户号码分配第一虚拟号码,在第一终端设备对外通话时,第一终端设备对外的号码都以第一虚拟号码替代第一用户号码,所有与第一终端设备的通话都通过第一虚拟号码建立,可以保护第一用户号码不泄露。
一种可能的实现方式中,隐私保护模式为独立隐私号码模式(AXYB)。第一网络功能设备在向网络开放功能设备发送第一响应消息之后、以及接收第一呼叫请求消息之前,还接收来自网络开放功能设备的第一通知消息,第一通知消息中携带第二虚拟号码;建立第一用户号码、第一虚拟号码与第二虚拟号码之间的关联关系。
如果第一用户号码对应的第一终端设备是主叫方,则第一网络功能设备接收来自第一用户号码对应的第一终端设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第一用户号码、被叫号码为第二虚拟号码;根据第一用户号码、第一虚拟号码与第二虚拟号码之间的关联关系、以及第一呼叫请求消息,向第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第二虚拟号码。
如果第一用户号码对应的第一终端设备是被叫方,则第一网络功能设备接收来自第二用户号码归属的第二网络功能设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第二虚拟号码、被叫号码为第一虚拟号码;根据第一用户号码、第一虚拟号码与第二虚拟号码之间的关联关系、以及第一呼叫请求消息,向第一用户号码对应的第一终端设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第二虚拟号码,被叫号码为第一虚拟号码。
如此,可以实现第一用户号码归属的第一网络功能设备为第一用户号码分配第一虚拟号码,第二用户号码归属的第二网络功能设备为第二用户号码分配第二虚拟号码,在第一终端设备与第二终端设备进行IMS通话时,第一终端设备对第二终端设备的呈现号码都以第一虚拟号码替代第一用户号码,第二终端设备对第一终端设备的呈现号码都以第二虚拟号码替代第二用户号码,保证通话双方的号码不泄露。
需要说明的是,以上三种实现方式仅为举例而非限制。
一种可能的实现方式中,第一网络功能设备预先配置有虚拟号码资源池,该虚拟号码资源池中包含至少一个虚拟号码,第一网络功能设备从该虚拟号码资源池中获取第一虚拟号码。
如此,可以提高虚拟号码分配效率。
一种可能的实现方式中,第一网络功能设备在根据关联关系处理第一呼叫请求消息之后,还可以接收来自网络开放功能设备的第一号码释放消息,第一号码释放消息用于请求解除第一用户号码和第一虚拟号码之间的关联关系,第一号码释放请求消息中携带第一用户号码和第一虚拟号码;第一网络功能设备解除第一用户号码和第一虚拟号码之间的关联关系。
如此,可以及时解除第一用户号码和第一虚拟号码之间的关联关系,避免虚拟号码长期使用,可以进一步保障第一终端设备的隐私安全。
一种可能的实现方式中,网络开放功能设备和第一网络功能设备位于运营商网络中。
如此,可以实现由运营商网络动态分配和使用虚拟号码,无需云服务厂商预先申请,大大节约了成本;同时,还可以避免在运营商网络中被人为管控和概率性限呼,提升接通率。
在一个可能的实现方式中,第二网络功能设备为第二用户号码归属地的IP多媒体子系统。
如此,可以实现由第二用户号码归属地的IP多媒体子系统为第二用户号码分配第二虚 拟号码,保证方案的可靠性。
第二方面,提供一种隐私保护通话方法,可以应用于网络开放功能设备或者网络开放功能设备中的芯片。以方法应用于网络开放功能设备为例,方法包括:接收来自应用服务器的第二号码请求消息,第二号码请求消息中携带第一用户号码,第二号码请求消息用于请求虚拟号码;向第一用户号码归属的第一网络功能设备发送第一号码请求消息,第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;接收第一网络功能设备返回的第一响应消息,第一响应消息中携带第一网络功能设备分配的第一虚拟号码,第一虚拟号码与第一用户号码属于同一个地区;向应用服务器发送第二响应消息,第二响应消息中携带第一虚拟号码。
一种可能的实现方式中,第二号码请求消息中还携带多个用户号码,多个用户号码包括第一用户号码;向第一用户号码归属的第一网络功能设备发送第一号码请求消息,包括:根据隐私保护模式和/或业务负载,向第一用户号码归属的第一网络功能设备发送第一号码请求消息;隐私保护模式用于指示多个用户号码中需要做号码转换的用户号码,业务负载用于指示多个用户号码中每个用户号码归属的网络中的号码隐私保护业务的负载。
一种可能的实现方式中,第一请求号码消息中还携带第二用户号码;在接收来自应用服务器的第二号码请求消息之后、以及向应用服务器发送第二响应消息之前,还包括:向第二用户号码归属的第二网络功能设备发送第三号码请求消息,第三号码请求消息中携带第二用户号码,第三号码请求消息用于请求虚拟号码;接收第二网络功能设备返回的第三响应消息,第三响应消息中携带第二虚拟号码,第二虚拟号码与第二用户号码属于同一个地区;网络开放功能设备向应用服务器发送的第二响应消息中还携带第二虚拟号码。
一种可能的实现方式中,在接收第一网络功能设备返回的第一响应消息之后,还包括:向第二网络功能设备发送第二通知消息,第二通知消息中携带第一虚拟号码;在接收第二网络功能设备返回的第三响应消息之后,还包括:向第一网络功能设备发送第一通知消息,第一通知消息中携带第二虚拟号码。
一种可能的实现方式中,在向应用服务器发送第二响应消息之后,还包括:接收来自应用服务器的第二号码释放消息,第二号码释放消息用于请求解除第一用户号码和第一虚拟号码之间的关联关系,第二号码释放请求消息中携带第一用户号码和第一虚拟号码;向第一用户号码归属的第一网络功能设备发送第一号码释放消息,第一号码释放消息用于请求解除第一用户号码和第一虚拟号码之间的关联关系。
一种可能的实现方式中,网络开放功能设备和第一网络功能设备位于运营商网络中。
第三方面,提供一种隐私保护通话装置,该装置可以是第一网络功能设备或者第一网络功能设备中的芯片,包括用于执行上述第一方面或第一方面任一种可能的实现方式中所述的方法的单元/模块。
示例性的,该装置可以包括:
通信单元,用于接收来自网络开放功能设备的第一号码请求消息,第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;
处理单元,用于获取第一虚拟号码,建立第一用户号码与第一虚拟号码之间的关联关系,第一虚拟号码与第一用户号码属于同一个地区;
通信单元,还用于向网络开放功能设备发送第一响应消息,第一响应消息中携带第一虚拟号码;接收第一呼叫请求消息,第一呼叫请求消息中携带第一虚拟号码或第一用户号 码;根据关联关系处理第一呼叫请求消息。
一种可能的实现方式中,第一号码请求消息中还携带第二用户号码;处理单元在建立第一用户号码与第一虚拟号码之间的关联关系时,具体用于:建立第一用户号码、第一虚拟号码以及第二用户号码之间的关联关系;
通信单元在接收第一呼叫请求消息时,具体用于:接收来自第一用户号码对应的第一终端设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第一用户号码、被叫号码为第一虚拟号码;处理单元在根据关联关系处理第一呼叫请求消息时,具体用于:根据所关联关系、第一呼叫请求消息控制通信单元向第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第二用户号码;或者,
通信单元在接收第一呼叫请求消息时,具体用于:接收来自第二用户号码归属的第二网络功能设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第二用户号码,被叫号码为第一虚拟号码;处理单元在根据关联关系处理第一呼叫请求消息时,具体用于:根据关联关系、第一呼叫请求消息,控制通信单元向第一用户号码对应的第一终端设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第一用户号码。
一种可能的实现方式中,通信单元在接收第一呼叫请求消息时,具体用于:接收来自第一用户号码对应的第一终端设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第一用户号码、被叫号码为第二用户号码;处理单元在根据关联关系处理第一呼叫请求消息时,具体用于:根据关联关系、第一呼叫请求消息,控制通信单元向第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第二用户号码;或者,
通信单元在接收第一呼叫请求消息时,具体用于:接收来自第二用户号码归属的第二网络功能设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第二用户号码,被叫号码为第一虚拟号码;处理单元在根据关联关系处理第一呼叫请求消息时,具体用于:根据关联关系、第一呼叫请求消息,控制通信单元向第一用户号码对应的第一终端设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第二用户号码,被叫号码为第一用户号码。
一种可能的实现方式中,通信单元还用于:在通信单元向网络开放功能设备发送第一响应消息之后、以及接收第一呼叫请求消息之前,接收来自网络开放功能设备的第一通知消息,第一通知消息中携带第二虚拟号码;
处理单元还用于:建立第一用户号码、第一虚拟号码与第二虚拟号码之间的关联关系。
一种可能的实现方式中,通信单元在接收第一呼叫请求消息时,具体用于:接收来自第一用户号码对应的第一终端设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第一用户号码、被叫号码为第二虚拟号码;处理单元在根据关联关系处理第一呼叫请求消息时,具体用于:根据第一用户号码、第一虚拟号码与第二虚拟号码之间的关联关系、以及第一呼叫请求消息,控制通信单元向第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第一虚拟号码,被叫号码为第二虚拟号码;或者,
通信单元在接收第一呼叫请求消息时,具体用于:接收来自第二用户号码归属的第二 网络功能设备的第一呼叫请求消息,第一呼叫请求消息中的主叫号码为第二虚拟号码、被叫号码为第一虚拟号码;处理单元在根据关联关系处理第一呼叫请求消息时,具体用于:根据第一用户号码、第一虚拟号码与第二虚拟号码之间的关联关系、以及第一呼叫请求消息,控制通信单元向第一用户号码对应的第一终端设备发送第二呼叫请求消息,第二呼叫请求消息中的主叫号码为第二虚拟号码,被叫号码为第一虚拟号码。
一种可能的实现方式中,通信单元还用于:在处理单元根据关联关系处理第一呼叫请求消息之后,接收来自网络开放功能设备的第一号码释放消息,第一号码释放消息用于请求解除第一用户号码和第一虚拟号码之间的关联关系,第一号码释放请求消息中携带第一用户号码和第一虚拟号码;处理单元还用于:解除第一用户号码和第一虚拟号码之间的关联关系。
一种可能的实现方式中,网络开放功能设备和第一网络功能设备位于运营商网络中。
第四方面,提供一种隐私保护通话装置,该装置可以是第而网络功能设备或者网络开放功能设备中的芯片,包括用于执行上述第二面或第二方面任一种可能的实现方式中所述的方法的单元/模块。
示例性的,该装置可以包括:
通信单元,用于接收来自应用服务器的第二号码请求消息,第二号码请求消息中携带第一用户号码,第二号码请求消息用于请求虚拟号码;
处理单元,用于确定第一用户号码归属的第一网络功能设备;控制通信单元向第一用户号码归属的第一网络功能设备发送第一号码请求消息;
通信单元,还用于向第一用户号码归属的第一网络功能设备发送第一号码请求消息,第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;接收第一网络功能设备返回的第一响应消息,第一响应消息中携带第一网络功能设备分配的第一虚拟号码,第一虚拟号码与第一用户号码属于同一个地区;向应用服务器发送第二响应消息,第二响应消息中携带第一虚拟号码。
一种可能的实现方式中,第二号码请求消息中还携带多个用户号码,多个用户号码包括第一用户号码;处理单元还用于:根据隐私保护模式和/或业务负载,控制通信单元向第一用户号码归属的第一网络功能设备发送第一号码请求消息;隐私保护模式用于指示多个用户号码中需要做号码转换的用户号码,业务负载用于指示多个用户号码中每个用户号码归属的网络中的号码隐私保护业务的负载。
一种可能的实现方式中,第一请求号码消息中还携带第二用户号码;通信单元还用于:在接收来自应用服务器的第二号码请求消息之后、以及向应用服务器发送第二响应消息之前,向第二用户号码归属的第二网络功能设备发送第三号码请求消息,第三号码请求消息中携带第二用户号码,第三号码请求消息用于请求虚拟号码;接收第二网络功能设备返回的第三响应消息,第三响应消息中携带第二虚拟号码,第二虚拟号码与第二用户号码属于同一个地区;通信单元向应用服务器发送的第二响应消息中还携带第二虚拟号码。
一种可能的实现方式中,通信单元还用于:在接收第一网络功能设备返回的第一响应消息之后,向第二网络功能设备发送第二通知消息,第二通知消息中携带第一虚拟号码;在接收第二网络功能设备返回的第三响应消息之后,向第一网络功能设备发送第一通知消息,第一通知消息中携带第二虚拟号码。
一种可能的实现方式中,通信单元还用于:在向应用服务器发送第二响应消息之后, 接收来自应用服务器的第二号码释放消息,第二号码释放消息用于请求解除第一用户号码和第一虚拟号码之间的关联关系,第二号码释放请求消息中携带第一用户号码和第一虚拟号码;向第一用户号码归属的第一网络功能设备发送第一号码释放消息,第一号码释放消息用于请求解除第一用户号码和第一虚拟号码之间的关联关系。
一种可能的实现方式中,网络开放功能设备和第一网络功能设备位于运营商网络中。
第五方面,提供一种通信装置,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器、通信接口;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述至少一个处理器通过执行所述存储器存储的指令,使得所述装置通过所述通信接口执行如第一方面或第一方面任一种可能的实现方式或第二方面或第二方面任一种可能的实现方式中所述的方法。
第六方面,提供一种计算机可读存储介质,包括程序或指令,当所述程序或指令在计算机上运行时,使得如第一方面或第一方面任一种可能的实现方式或第二方面或第二方面任一种可能的实现方式中所述的方法被执行。
第七方面,提供一种芯片,所述芯片与存储器耦合,用于读取并执行所述存储器中存储的程序指令,使得如第一方面或第一方面任一种可能的实现方式或第二方面或第二方面任一种可能的实现方式中所述的方法被执行。
第八方面,提供一种通信系统,包括:第一网络功能设备,用于执行如第一方面或第一方面任一种可能的实现方式中所述的方法;以及,网络开放功能设备,用于执行如第二方面或第二方面任一种可能的实现方式中所述的方法。
上述第二方面至第八方面中各实现方式的有益效果参见第一方面中对应实现方式的有益效果,这里不再赘述。
在以上任一方面提供的技术方案中,网络开放功能设备可以为运营商网络中的开放管理平台或业务能力开放功能设备。
在以上任一方面提供的技术方案中,呼叫请求消息为Invite消息。
附图说明
图1为本申请中一种通话场景的示意图;
图2为本申请实施例提供的一种通信系统的网络架构图;
图3为本申请实施例中IMS的示意图;
图4为本申请实施例提供的一种隐私保护通话方法的流程图;
图5为本申请实施例提供的另一种隐私保护通话方法的流程图;
图6为本申请实施例提供的另一种隐私保护通话方法的流程图;
图7为本申请实施例提供的一种隐私保护通话装置的结构示意图;
图8为本申请实施例提供的一种通信装置的结构示意图;
图9为本申请实施例提供的一种通信单板的接口示意图;
图10为本申请实施例提供的另一种通信装置的结构示意图。
具体实施方式
参见图1,为一种通话场景的示意图。用户号码A的用户(简称用户A)和/或用户号 码B的用户(简称用户B)在使用同一应用(例如打车应用或外卖应用等)提供的服务时,可以通过应用相互通话,且基于隐私安全的考虑,应用可以向用户A和/或用户B隐藏对方的真实号码,即用户A和用户B进行隐私保护通话。
隐私保护通话的一种实现方案是:终端设备的云服务厂商的服务器(简称云服务器)预先从运营商网络中申请一批虚拟号码(这些虚拟号码的归属地一般固定,例如在上海或杭州等),当应用服务器生成用户号码A和用户号码B的业务时,先从云服务器获取一个虚拟号码,例如虚拟号码X,然后下发给用户号码A对应的用户A以及用户号码A对应的用户B,这样,对于用户A而言,X是用户B的号码,对于用户B而言,X是用户A的号码。之后,主叫方(例如号码A)发起呼叫,运营商网络将呼叫接续到虚拟号码X,然后虚拟号码再发起呼叫,运营商网络再将呼叫接续到被叫方(例如用户B)。呼叫接通之后,主叫方(例如用户A)和被叫方(例如用户B)的音视频媒体通过虚拟号码X中转。
该方案存在如下痛点:1)呼叫接续时间长。由于原本的一次呼叫分为两步,呼叫接续时间长,可以达到8S甚至10S以上,与长期演进语音承载(Voice over Long-Term Evolution,VoLTE)普通呼叫的0.5S差异很大;2)网络成本高。一次通话,需要承载在两路普通通话(即A与X的通话、X与B的通话)中,增加了网络成本和负载;3)通话质量差。一方面,通话过程中的音视频媒体需要到虚拟号码做中转,而虚拟号码可能在异地(例如主叫号码A在成都,被叫号码B在北京,而虚拟号码N在上海),音视频媒体传输的网络路径长,导致通话时延长,以及更高概率的丢包、抖动;4)呼叫接通率低。一方面,虚拟号码重复使用,很容易被用户标注为恶意呼叫;第二,虚拟号码大量复用,会受到运营商网络中管控策略影响而被限呼;5)云服务厂商需要预先从运营商处申请虚拟号码,成本高;6)用户操作繁琐:在一个号码针对部分其它号码隐藏真实号码时,该一个号码的用户需要通过短信或者APP单独设置其它号码。
为了解决上述一个或多个技术问题,本申请实施例提供一种隐私保护通话方法及对应装置。本申请实施例通过运营商网络分配虚拟号码,运营商网络在接收到呼叫请求后,直接在运营商网络内部完成用户号码与虚拟号码的转换。如此,运营商网络中只需保留一路呼叫,可以有效降低网络成本和负载、提升接通率、提高通话质量。
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(long term evolution,LTE)系统,全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统,未来的第五代(5th Generation,5G)系统,如新一代无线接入技术(new radio access technology,NR),及未来的通信系统,如6G系统等。只要该网络中存在通话需求,则均可以采用本申请实施例的技术方案。
参见图2,为本申请实施例提供的一种通信系统的网络架构图。该通信系统包括:
1)终端设备,或称为用户设备(User Equipment,UE),用于发起或接听呼叫。终端设备包括向用户提供语音和/或数据连通性的设备,具体的,包括向用户提供语音的设备,或包括向用户提供数据连通性的设备,或包括向用户提供语音和数据连通性的设备。例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。具体例如包括手机、智能手表、智能耳机等。
而如上介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,车载终端设备例如也称为车载单元(on-board unit,OBU)。
2)应用服务器:安装在终端设备上的应用对应的后台服务器,用于为终端设备提供相 应的业务,例如是打车软件“滴滴”的后台服务器、或者外卖软件“美团”的后天服务器等。在本申请实施例中,应用服务器用于从云服务器申请虚拟号码,并下发到终端设备。
3)云服务器,云服务厂商的服务器,是由终端设备的厂商或运营商建立、维护、通过网络以按需、按易扩展的方式提供所需服务的平台,例如手机厂商“华为”的服务器。在本申请实施例中,云服务器用于从应用服务器接收为用户号码分配虚拟号码的号码请求,分析用户号码归属的运营商网络,从用户号码归属的运营商网络获取虚拟号码。
在该通信架构中,云服务器是可选的,例如应用服务器可以分析用户号码归属的运营商网络,然后直接向用户号码归属的运营商网络发起请求,获取虚拟号码。
4)网络开放功能设备,用于虚拟号码的管理的设备。例如,从云服务器接收为用户号码分配虚拟号码的号码请求,确定用户号码的归属的第一网络功能设备,从用户号码的归属的第一网络功能设备获取虚拟号码,将获取到的虚拟号码反馈给云服务器等。
一些可能的设计中,第二网功能设备位于运营商网络中(即如图2所示)。网络开放功能设备可以为运营商网络中的开放管理平台或业务能力开放功能设备。网络开放功能设备可以部署在运营商网络原有的功能实体之上,也可以单独部署功能实体,本申请不做限制。另一些可能的设计中,网络开放功能设备部署在运营商网络外面,例如网络开放功能设备被集成在云服务器上。本申请对网络开放功能设备的具体实现形式不做具体限制。在下文中,主要以第二网功能设备位于运营商网络中为例。
5)第一网络功能设备和第二网络功能设备,是运营商网络中提供呼叫控制功能的网络功能设备。第一网络功能设备和/或第二网络功能设备配置有虚拟号码资源池,能够为用户号码分配虚拟号码。
第一网络功能设备和第二网络功能设备的区别是,第一网络功能设备和第二网络功能设备位于不同的归属地,即为不同归属的地的用户号码提供呼叫控制功能。
例如,第一网络功能设备和第二网络功能设备可以是网际互连协议多媒体子系统(Internet Protocol Multimedia Subsystem,IMS)或其他实时音视频网络。其中,IMS是新一代通信网络的核心,它采用了会话发起协议(Session Initiation Protocol,SIP)体系控制呼叫,通信与接入无关,可以具备多种媒体业务控制功能与承载能力分离,呼叫与会话分离,应用与服务分离,业务与网络分离,以及移动网与因特网业务融合等多种能力。用户号码归属地的IMS可称为IMS归属域或归属域IMS,用户号码拜访地的IMS可称为IMS拜访域或拜访域IMS。根据用户号码对应的终端设备所在的位置和IMS网络部署实际情况,用户号码对应的终端设备可以附着在归属地的IMS,也可以附着在拜访地的IMS。
IMS可以由多个功能设备组成,这些功能设备使用其功能作为简称。例如图3所示,终端设备通过核心网连接到IMS。第一终端设备(第一用户号码)归属的IMS1(即第一网络功能设备)中的设备可以包括代理呼叫会话控制功能1(proxy-call session control function,P-CSCF1),业务呼叫会话控制功能1(service-call session control function,S-CSCF1)、查询呼叫会话控制功能1(interrogating-call session control function,I-CSCF1)、归属用户服务器1(home subscriber server,HSS1)以及应用服务器1(application server,AS1)。第二终端设备(第二用户号码)归属的IMS2(即第二网络功能设备)中的设备可以包括P-CSCF2,S-CSCF2,I-CSCF2,HSS2以及AS2。以上仅仅简单示出了IMS中的设备,IMS中还可以包括其他的设备。
应理解,IMS是由第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)标 准组织在R5版本基础上提出,是在基于IP的网络上提供多媒体业务的通用网络架构。随着通信技术标准的不断演变,IMS的具体网络结构也可以发生变化(例如拆分功能实体,或新增网络实体等),所以IMS的名称也可以发生变化。
应理解,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
参见图4,为本申请实施例提供的一种隐私保护通话方法的流程图,该方法以应用于图2所示的网络架构为例,具体流程包括:
S401、应用服务器向网络开放功能设备发送第二号码请求消息,网络开放功能设备接收来自应用服务器的第二号码请求消息,其中第二号码请求消息中携带第一用户号码,第二号码请求消息用于请求虚拟号码。
可选的,应用服务器向云服务器发送第二号码请求消息,云服务器收到第二号码请求消息之后,分析第一用户号码归属的运营商网络(例如是中国移动或中国联通等,本申请不做限制),然后将第二号码请求消息转发到第一用户号码归属的运营商网络中的第一网络功能设备。
可替换的,如果应用服务器集成有号码分析功能设备,则应用服务器可以分析第一用户号码归属的运营商网络,然后将第二号码请求消息直接发送到第一用户号码归属的运营商网络中的第一网络功能设备。
一种可能的设计中,隐私保护模式为默认模式的情况下,例如默认为共享隐私号码模式(AXB模式)、独立隐私号码模式(AXYB模式)、单向隐私号码模式(AX模式)或群组隐私号码模式(AXG模式)中的一种,第二号码请求消息中可以不携带隐私保护模式。另一种可能的设计中,隐私保护模式非默认情况下,第二号码请求消息中还可以携带隐私保护模式,例如AXB模式、或AXYB模式、或AC模式、或AXG模式等。
应理解,本申请实施例适用的隐私保护模式包括但不限于AXB模式、AXYB模式、AC模式、AXG模式。以下对这几种模式分别进行介绍。
1)AXB模式:
在用户号码A和用户号码B间,建立一对一的关联关系。双方不知道对方真实号码,通过隐私号码X联系对方,用户号码A对用户号码B只呈现X号码,用户号码B对用户号码A只呈现X号码。同一X号码可以复用在不同的关联关系中,但A、B号码不同。
AXB模式的适用场景示例:主要针对于1对1场景下的隐私保护,前置条件是A、B的联系方式已知,例如网约打车、短租、外卖派送、线上医生问诊、法律咨询等。AXB模式下的隐私保护号码主要在一对一场景下使双方隐私都得到保护,既能保持双方正常进行IMS通话,又隐藏了通话双方的真实号码。
在AXB模式下,第二号码请求消息中还可以携带第二用户号码,例如第一用户号码为A,第二用户号码为B。
2)AXYB模式:
在用户号码A和用户号码B间,建立一对一的关联关系。双方不知道对方真实号码,通过隐私号码X、Y联系对方,用户号码A对用户号码B只呈现X号码,用户号码B对用户号码A只呈现Y号码。同一组X、Y号码可以复用在不同的关联关系中,但A、B号 码不同。
AXYB模式的适用场景示例:主要针对企业严格把控企业会员隐私情况的场景,例如派送、汽车救援、租车等。AXYB模式下的隐私保护号码主要在一对多互动场景对号码进行保护。通话都通过隐私号码建立,保证通话双方的号码不泄露。
在AXYB模式下,第二号码请求消息中还可以携带第二用户号码,例如第一用户号码为A,第二用户号码为B。
3)AX模式:
用户号码A具有一个独立的隐私号码X。任何人可通过X号码拨打到用户号码A对应的终端设备,户号码A对应的终端设备可以回拨给其中的某一个人,用户号码A对外呈现号码为X,其它用户号码对用户号码A呈现真实的用户号码。通常,一个X号码只能与一个用户号码A绑定。特殊的,用户号码A的用户可以设置想要对其隐藏真实号码的多个号码,用户A号码只对该多个号码呈现号码为X,而对其它未设置的号码,则可以呈现真实的用户号码A。在后文中,AX模式以对外所有号码都呈现X为例。
AX模式的适用场景示例:咨询行业、快递服务等。AX模式下的隐私保护号码主要在一对N场景下对单方号码进行隐私保护,用户号码A对外的号码都以X替代,所有与用户号码A的通话都通过X建立,保护用户号码A号码不泄露。
4)AXG模式:
在用户号码A与一组用户号码G间,建立组对一的关联关系。一个组G中有多个成员,G分配对应的虚拟号码X,G组中的成员可通过X拨打用户号码A,用户号码A可回呼到G中的某一个成员。同一X号码可以复用在不同的关联关系中,但A、G不同。
AXG模式的适用场景示例:主要针对有团队协作场景的行业,如招聘、银行、保险等。
在AXG模式下,第二号码请求消息中还可以携带除第一用户号码之外的多个用户号码,例如第一用户号码为A,其它用户号码如G1、G2、G3等。
S402、网络开放功能设备向第一用户号码归属的第一网络功能设备发送第一号码请求消息,第一用户号码归属的第一网络功能设备接收来自网络开放功能设备的第一号码请求消息;其中第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;
如果隐私保护模式是AX,则第一号码请求中可以携带第一用户号码,例如A。如果隐私保护模式是AXB、AXYB、AXG等其它模式,则第一号码请求中还可能携带其它用户号码。例如,在AXB模式或AXYB模式下,第一号码请求中携带第一用户号码A和第二用户号码B。例如,在AXG模式下,第一号码请求中携带第一用户号码A、除A之外的多个用户号码(如号码G1、G2、G3等)。
可选的,第一号码请求消息中还携带隐私保护模式。
S403、第一用户号码归属的第一网络功能设备获取第一虚拟号码;
第一虚拟号码的归属地和第一用户号码的归属地满足预设关系,例如第一虚拟号码与第一用户号码属于同一个地区。如此,可以保证任意网络节点到第一虚拟号码所在的网络节点的路径与该网络节点到第一用户号码所在的网络节点的路径相同。
可选的,第一用户号码和第二用户号码具有相同的号码段。例如,按照中国的手机号码编码规则,每个手机号码为11位的数字,手机号码前三位为网络识别号,即表示是哪家运营商的,中间四位是地区编码,表示号码所在地区,后四位为用户编号,表示用户身份。按照上述号码编码规则,第一用户号码和第一虚拟号码中间四位编号相同。
可选的,第一网络功能设备预配置有虚拟号码资源池,虚拟号码资源池中包括至少一个虚拟号码,第一网络功能设备从虚拟号码资源池中获取第一虚拟号码。可选的,第一网络功能设备从虚拟号码资源池中确定出与第一用户号码临近的虚拟号码作为第一虚拟号码。
可选的,虚拟号码资源池中的虚拟号码均归属于该第一网络功能设备,换而言之,该虚拟号码资源池中的虚拟号码的归属地为该第一网络功能设备服务的区域,第一网络功能设备可以从虚拟号码资源池中随机选择一个虚拟号码作为第一虚拟号码。
可选的,第一用户号码归属的第一网络功能设备从虚拟号码资源池中确定出第一虚拟号码之后,还可以建立并保存第一用户号码与第一虚拟号码之间的关联关系。
进一步可选的,当第一号码请求消息中除了携带第一用户号码还携带其它号码(如外域号码)时,第一用户号码归属的第一网络功能设备可以建立并保存本域的第一用户号码、第一虚拟号码以及外域号码之间的关联关系。例如,AXB模式下,建立并保存第一用户号码A和第一虚拟号码X以及第二用户号码B(外域号码)三者之间的关联关系;AXG模式下,建立并保存第一用户号码A和第一虚拟号码X以及其它多个用户号码(如G1,G2,G3等)(外域号码)之间的关联关系;特殊的,AX模式下,建立并保存第一虚拟号码X与第一用户号码A之间的关联关系。
进一步可选的,在隐私保护模式非默认的情况下,第一用户号码归属的第一网络功能设备还保存隐私保护模式,且将隐私保护模式与上述建立关联关系进行关联保存。
S404、第一网络功能设备向网络开放功能设备发送第一响应消息,网络开放功能设备接收第一网络功能设备返回的第一响应消息;其中第一响应消息中携带第一虚拟号码;
在执行上述S402~S404的过程中,如果第二号码请求消息中除了第一用户号码,还携带其它用户号码,换而言之,第二号码请求消息中携带多个用户号码(该多个用户号码包括第一用户号码),则第一网络功能设备还可以根据隐私保护模式和/或业务负载,确定向多个用户号码中的至少一个用户号码归属的第一网络功能设备发送第一号码请求消息。
其中,隐私保护模式用于指示多个用户号码中需要做号码转换的用户号码。业务负载用于指示该多个用户号码中每个用户号码归属的网络中的号码隐私保护业务的负载。
以下,例举四种隐私保护模式,分别对第一网络功能设备根据隐私保护模式和/或业务负载向多个用户号码中的至少一个用户号码归属的第一网络功能设备发送第一号码请求消息进行举例说明:
示例1,隐私保护模式为AXB模式时,第二号码请求消息中同时携带第一用户号码A和第二用户号码B。
在这种情况下,A和B都需要做号码转换,网络开放功能设备向第一用户号码归属的第一网络功能设备或者第二用户号码归属的第二网络功能设备发送第一号码请求消息;第一用户号码归属的第一网络功能设备或者第二用户号码归属的第二网络功能设备接收第一号码请求消息后,根据隐私保护模式,从虚拟资源池中确定出第一虚拟号码X,建立并保存第一用户号码A、第二用户号码B以及第一虚拟号码X三者之间的关联关系;之后,第一用户号码归属的第一网络功能设备或者第二用户号码归属的第二网络功能设备将第一虚拟号码返回给网络开放功能设备。
可选的,网络开放功能设备可以通过比较第一网络功能设备的业务负载和第二网络功能设备的业务负载,从第一网络功能设备、第二网络功能设备中选择业务负载更低的一个 网络功能设备发送第一号码请求消息。
可选的,第一用户号码归属的第一网络功能设备或者第二用户号码归属的第二网络功能设备还保存隐私保护模式AXB。
示例2,隐私保护模式为AXYB模式时,第二号码请求消息中同时携带第一用户号码A和第二用户号码B。
在这种情况下,A和B都需要做号码转换,网络开放功能设备除了向第一用户号码归属的第一网络功能设备发送第一号码请求消息(携带第一用户号码A),还向第二用户号码归属的第二网络功能设备发送第三号码请求消息(携带第二用户号码B)。第一用户号码归属的第一网络功能设备接收第一号码请求消息后,根据隐私保护模式,为第一用户号码分配一个虚拟号码,如第一虚拟号码X,建立第一用户号码A、第一虚拟号码X之间的关联关系,第一网络功能设备将第一虚拟号码X携带在第一响应消息中发送给网络开放功能设备。第二用户号码归属的第二网络功能设备接收第三号码请求消息后,根据隐私保护模式,为第二用户号码分配一个虚拟号码,如第二虚拟号码Y,建立第二用户号码B、第二虚拟号码Y之间的关联关系,第二网络功能设备将第二虚拟号码B携带在第三响应消息发送给网络开放功能设备。
示例3,隐私保护模式为AX模式时,第二号码请求消息中携带第一用户号码A。
在这种情况下,A需要做号码转换,网络开放功能设备可以向第一用户号码归属的第一网络功能设备发送第一号码请求消息;第一用户号码归属的第一网络功能设备接收第一号码请求消息后,根据隐私保护模式,从虚拟资源池中确定出第一虚拟号码X,建立并保存第一用户号码A、第一虚拟号码X之间的关联关系;之后,第一网络功能设备将第一虚拟号码返回给网络开放功能设备。
可选的,第一网络功能设备还保存隐私保护模式AX。
示例4,隐私保护模式为AXG模式时,第二号码请求消息中携带第一用户号码A和A对应的一组用户号码(如G1、G2、G3等)。
在这种情况下,A与G1、G2、G3中任何一个号码通话时,都需要做号码转换,所以网络开放功能设备可以向第一用户号码归属的第一网络功能设备发送第一号码请求消息;第一用户号码归属的第一网络功能设备接收第一号码请求消息后,根据隐私保护模式,从虚拟资源池中确定出第一虚拟号码X,建立并保存第一用户号码A、第一虚拟号码X、号码组(如G1、G2、G3等)之间的关联关系;之后,第一网络功能设备将第一虚拟号码返回给网络开放功能设备。
可选的,第一网络功能设备还保存隐私保护模式AX。
应理解,具体实施时,不限于上述四种示例。
可选的,第一网络功能设备在向网络开放功能设备发送第一响应消息时,可以是在第一响应消息中携带第一虚拟号码和第一用户号码的映射关系的形式,如此可以将分配的第一虚拟号码、以及第一虚拟号码和第一用户号码的映射关系一并通知给网络开放功能设备。
在一个用户号码(例如第一用户号码A)归属的网络中执行号码转换的情况下(如AX,AXB,AXG等模式下),网络开放功能设备在向第一用户号码A归属的第一网络功能设备请求虚拟号码时,可以将与第一用户号码相关的其它号码(AXB模式时第一用户号码关联的第二用户号码,AXG模式时第一用户号码关联的多个其它用户号码(如G1,G2,G3等),AX模式时第一用户号码可以没有关联的其它号码)一并发送给第一用户号码归属的第一 网络功能设备,第一用户号码归属的第一网络功能设备在分配虚拟号码之后,可以直接建立并保存本域号码组和外域号码之间的关联关系。如上文S403中所举例的:AXB模式下,第一用户号码A归属的第一网络功能设备在分配第一虚拟号码X之后,建立并保存第一虚拟号码X、第一用户号码A、第二用户号码B三者之间的关联关系;AXG模式下,第一用户号码A归属的第一网络功能设备在分配第一虚拟号码X之后,建立并保存第一虚拟号码X、第一用户号码A、其它多个用户号码(如G1、G2、G3)之间的关联关系;特殊的,AX模式下,网络开放功能设备在分配第一虚拟号码X之后,建立并保存第一虚拟号码X与第一用户号码A之间的关联关系。
而在两个或两个以上用户号码归属的网络中执行号码转换的情况下(如AXYB模式),还可以向每个用户号码归属的网络通知外域号码,进而使得每个第一网络功能设备建立并保存本域号码组和外域号码之间的关联关系。例如,AXYB模式下,则网络开放功能设备在接收第一响应消息之后,还向第二网络功能设备发送第二通知消息,其中第二通知消息中携带第一虚拟号码X(或者携带X和号码组(B,Y)的关联关系),第二网络功能设备接收第二通知消息后,建立并保存X和号码组(B,Y)的关联关系;以及,向第一网络功能设备发送第一通知消息,其中第一通知消息中携带第二虚拟号码Y(或者携带Y和号码组(A,X)的关联关系),第一网络功能设备接收第一通知消息后,建立并保存Y和号码组(A,X)的关联关系。
当然,对于在一个用户号码(例如第一用户号码A)归属的网络中执行号码转换的情况下(如AX,AXB,AXG等模式下),网络开放功能设备也可以在收到第一响应消息之后,向第一用户号码A归属的第一网络功能设备发送通知消息,将外域号码(或者本域号码组和外域号码之间的关联关系)通知给第一用户号码A归属的第一网络功能设备,第一用户号码A归属的第一网络功能设备根据通知消息建立并保存相应的关联关系。例如,AXB模式下,第一用户号码A归属的第一网络功能设备在分配第一虚拟号码X之后,先不建立关联关系,而是直接向网络开放功能设备返回第一响应消息(携带第一虚拟号码X);网络开放功能设备收到第一响应消息之后,再向第一用户号码A归属的第一网络功能设备发送通知消息,该通知消息中携带第一虚拟号码X、第一用户号码A、第二用户号码B,可选的,该通知消息中还携带隐私保护模式AXB;第一用户号码A归属的第一网络功能设备收到通知消息之后,建立并保存第一虚拟号码X、第一用户号码A、第二用户号码B之间的关联关系。
S405、网络开放功能设备向应用服务器发送第二响应消息,应用服务器接收第二响应消息,第二响应消息中携带第一虚拟号码;
可选的,网络开放功能设备先将第二响应消息发送至云服务器,然后云服务器将第二响应消息转发给应用服务器。
可选的,第二响应消息中还携带第二虚拟号码。例如,在AXYB模式下,第二响应消息中携带虚拟号码X和虚拟号码Y。
可选的,网络开放功能设备可以在第一响应消息中携带虚拟号码和用户号码的映射关系。例如,在AXYB模式下,第二响应消息中携带A和X的映射关系、B和Y的映射关系。例如,在AXB模式下,第二响应消息中携带A、B和X三者之间的映射关系。
S406、应用服务器将第一虚拟号码下发到第一终端设备。
如果是AX模式,则应用服务器将第一虚拟号码下发到第一终端设备。
如果是AXB模式,则应用服务器除了将第一虚拟号码下发到第一终端设备之外,还将第一虚拟号码下发到第二终端设备。
如果是AXG模式,则应用服务器除了将第一虚拟号码下发到第一终端设备之外,还将第一虚拟号码下发到其它多个用户号码(如G1、G2、G3等)对应的终端设备。
如果是AXYB模式,则应用服务器除了将第一虚拟号码下发到第一终端设备之外,还将第二虚拟号码Y下发到第二终端设备、将第一虚拟号码X下发到第二终端设备、将第二虚拟号码Y下发到第一终端设备。
在图4中,S406包括S406A和S406B,使用虚线表示S406A或S406B是可选的,实际可以只有S406A或S406B,也可以同时有S406A和S406B。
如上S401~S406介绍了虚拟号码的分配过程,在终端设备获得虚拟号码之后,终端设备就可以基于虚拟号码发起呼叫。
S407、第一网络功能设备接收第一呼叫请求消息,第一呼叫请求消息中携带第一虚拟号码或第一用户号码;
如果是归属于第一网络功能设备的第一终端设备主动发起呼叫,则第一网络功能设备接收来自于第一终端设备的第一呼叫请求消息,第一呼叫请求消息中携带的主叫号码为第一用户号码。第一呼叫请求消息中携带的被叫号码可能是一个真实的用户号码也可能是该用户号码对应的虚拟号码,具体可以根据隐私保护模式而定。
如果不是归属于第一网络功能设备的第二终端设备主动发起呼叫,例如是归属于第二网络功能设备的第二终端设备主动发起呼叫,则第二终端设备的呼叫请求消息是先发送到第二终端设备归属的第二网络功能设备,然后第二网络功能设备接续呼叫请求,向第一网络功能设备发送第一呼叫请求消息,第一网络功能设备接收来自于第二网络功能设备的第一呼叫请求消息,第一呼叫请求消息中携带的被叫号码为第一虚拟号码。第一呼叫请求消息中的主叫号码可能是一个真实的用户号码也可能是该用户号码对应的虚拟号码,具体可以根据隐私模式而定。
在图4中,S407包括S407A和S407B,使用虚线表示S407A或S407B是可选的,实际可以只有S407A或S407B。
S408、第一网络功能设备根据预先保存的关联关系处理第一呼叫请求消息。
如果是归属于第一网络功能设备的第一终端设备主动发起呼叫,则第一呼叫请求消息中携带的主叫号码为第一用户号码,第一网络功能设备根据预先保存的关联关系将主叫号码从第一用户号码替换为第一虚拟号码,然后将呼叫接续到被叫号码归属的第一网络功能设备(如第二用户号码归属的第二网络功能设备)。
如果不是归属于第一网络功能设备的第二终端设备主动发起呼叫,例如是归属于第二网络功能设备的第二终端设备主动发起呼叫,则第一呼叫请求消息中携带的被叫号码为第一虚拟号码,第一网络功能设备根据预先保存的关联关系将被叫号码从第一虚拟号码替换为第一用户号码,然后将呼叫接续到被叫号码即第一用户号码归属的第一网络功能设备。
另外,根据隐私保护模式的不同,第一网络功能设备除了对第一用户号码或第一虚拟号码进行号码转换之外,还可能可以对其它用户号码或其它虚拟号码进行号码转换。
示例1,隐私保护模式为AXB模式。
第一用户号码对应的第一终端设备主动发起呼叫的情况:第一用户号码A对应的第一终端设备向第一用户号码A归属的第一网络功能设备发送呼叫请求消息(主叫号码为第一 用户号码A、被叫号码为第一虚拟号码X);第一网络功能设备收到呼叫请求消息后,根据预先保存的第一用户号码A、第二用户号码B、第一虚拟号码X三者之间的关联关系向第二用户号码归属的第二网络功能设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第二用户号码B);第二网络功能设备接收呼叫请求消息后,将呼叫接续到第二终端设备,向第二终端设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第二用户号码B)。
第二用户号码对应的第二终端设备主动发起呼叫的情况与上述过程相反,即:第二用户号码B对应的第二终端设备向第二用户号码B归属的第二网络功能设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一虚拟号码X);第二网络功能设备收到呼叫请求消息后,根据预先保存的第一用户号码A、第二用户号码B、第一虚拟号码X三者之间的关联关系向第一用户号码归属的第一网络功能设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第一用户号码A);第一网络功能设备接收呼叫请求消息后,将呼叫接续到第一终端设备,向第一终端设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第一用户号码A)。
示例2,隐私保护模式为AXG模式。
第一用户号码对应的第一终端设备向一组号码(如G1、G2、G3等)中的任一号码对应的终端设备发起呼叫时,可以参考与上述示例1中第一用户号码对应的第一终端设备主动发起呼叫的情况,其中G1、G2、G3可以对应第二用户号码B,此处不再赘述。
一组号码(如G1、G2、G3等)中的任一号码对应的终端设备向第一用户号码对应的第一终端设备发起呼叫时,可以参考与上述示例2中第二用户号码对应的第二终端设备主动发起呼叫的情况,其中G1、G2、G3可以对应第二用户号码B,此处不再赘述。
示例3,隐私保护模式为AX模式。
1)第一用户号码对应的第一终端设备主动发起呼叫的情况:
第一用户号码A对应的第一终端设备向第一用户号码A归属的第一网络功能设备发送呼叫请求消息(主叫号码为第一用户号码A、被叫号码为第二用户号码B);第一网络功能设备收到呼叫请求消息后,根据预先保存的第一用户号码A、第一虚拟号码X的关联关系向第二用户号码归属的第二网络功能设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第二用户号码B);第二网络功能设备接收呼叫请求消息后,将呼叫接续到第二终端设备,向第二终端设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第二用户号码B)。
当然,第二网络功能设备也可以预先保存第一用户号码A、第一虚拟号码X的关联关系。相应的,第一用户号码A对应的第一终端设备向第一用户号码A归属的第一网络功能设备发送呼叫请求消息(主叫号码为第一用户号码A、被叫号码为第二用户号码B);第一网络功能设备收到呼叫请求消息后,向第二用户号码归属的第二网络功能设备发送呼叫请求消息(主叫号码为第一用户号码A、被叫号码为第二用户号码B);第二网络功能设备收到呼叫请求消息后,根据预先保存的第一用户号码A、第一虚拟号码X的关联关系,将呼叫接续到第二终端设备,向第二终端设备发送呼叫请求消息(主叫号码为第一虚拟号码X、被叫号码为第二用户号码B)。
2)第二用户号码对应的第二终端设备主动发起呼叫的情况与上述过程相反,即:
第二用户号码B对应的第二终端设备向第二用户号码B归属的第二网络功能设备发送 呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一虚拟号码X);第二网络功能设备收到呼叫请求消息后,向第一用户号码归属的第一网络功能设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一虚拟号码X);第一网络功能设备接收呼叫请求消息后,根据预先保存的第一用户号码A、第一虚拟号码X的关联关系,将呼叫接续到第一终端设备,向第一终端设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一用户号码A)。
当然,第二网络功能设备也可以预先保存第一用户号码A、第一虚拟号码X的关联关系。相应的,第二用户号码B对应的第二终端设备向第二用户号码B归属的第二网络功能设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一虚拟号码X);第二网络功能设备收到呼叫请求消息后,根据预先保存的第一用户号码A、第一虚拟号码X的关联关系,向第一用户号码归属的第一网络功能设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一虚拟号码A);第一网络功能设备接收呼叫请求消息后,将呼叫续接到第一终端设备,向第一终端设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一用户号码A)。
示例4,隐私保护模式为AXYB模式。
第一用户号码对应的第一终端设备主动发起呼叫的情况:第一用户号码A对应的第一终端设备向第一用户号码A归属的第一网络功能设备发送呼叫请求消息(主叫号码为第一用户号码A、被叫号码为第二虚拟号码Y);第一网络功能设备收到呼叫请求消息后,根据预先保存的第一用户号码A和第一虚拟号码的关联关系,向第二虚拟号码归属的第二网络功能设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第二用户号码Y);第二网络功能设备接收呼叫请求消息后,根据预先保存的第二用户号码B和第二虚拟号码Y的关联关系,向第二终端设备发送呼叫请求消息(主叫号码为第一虚拟号码X,被叫号码为第二用户号码B)。
第二用户号码对应的第二终端设备主动发起呼叫的情况与上述过程相反,即:第二用户号码B对应的第二终端设备向第二用户号码B归属的第二网络功能设备发送呼叫请求消息(主叫号码为第二用户号码B、被叫号码为第一虚拟号码X);第二网络功能设备收到呼叫请求消息后,根据预先保存的第二用户号码B和第二虚拟号码Y的关联关系,向第一用户号码归属的第一网络功能设备发送呼叫请求消息(主叫号码为第二虚拟号码Y,被叫号码为第一虚拟号码X);第一网络功能设备接收呼叫请求消息后,根据预先保存的第一用户号码A和第一虚拟号码的关联关系,向第一终端设备发送呼叫请求消息(主叫号码为第二虚拟号码Y,被叫号码为第一用户号码A)。
应理解,实际实施时,不限于以上四种示例。
一种可能的实现中,本申请实施例涉及的呼叫请求消息为Invite消息。
应理解,在VoLTE或NR语音(voice over NR,VoNR)呼叫接通之后,第一终端设备和第二终端设备的音视频媒体,也可以按照呼叫路径传输(即:第一终端设备→第一网络功能设备→第二网络功能设备→第二终端设备,或,第二终端设备→第二网络功能设备→第一网络功能设备→第一终端设备)。
可选的,在本次通话结束之后,应用服务器还向网络开放功能设备发送第一号码释放消息(携带第一用户号码和第一虚拟号码),用于请求解除第一用户号码和第一虚拟号码之间的关联关系;网络开放功能设备接收来自于应用服务器的第一号码释放消息后,向第 一用户号码归属的第一网络功能设备发送第二号码释放消息(携带第一用户号码和第一虚拟号码),用于请求解除第一用户号码和第一虚拟号码之间的关联关系;第一网络功能设备接收来自网络开放功能设备的第二号码释放消息后,解除第一用户号码和第一虚拟号码之间的关联关系,后续任何号码对第一虚拟号码发起呼叫,都会提示第一虚拟号码不存在。如此,可以进一步保障第一终端设备的隐私安全。
应理解,如果是AXYB模式,则第一号码释放消息中还携带第二用户号码和第二虚拟号码,网络开放功能设备接收来自于应用服务器的第一号码释放消息后,还向第二用户号码归属的第二网络功能设备发送第三号码释放消息,第二网络功能设备解除第二用户号码和第二虚拟号码之间的关联关系,同理,后续任何号码对第二虚拟号码发起呼叫,都会提示第二虚拟号码不存在。如此,可以进一步保障第二终端设备的隐私安全。
基于以上描述,本申请实施例技术方案至少具有如下技术效果:
1)呼叫过程中,运营商网络中只需保留一路呼叫,相比现有技术需要两路呼叫而言,可以减小呼叫接续时间长,有效降低网络成本和负载;
2)通话过程中,音频媒体不需要去虚拟号码处做中转,可以提高通话质量;
3)运营商网络为用户号码分配虚拟号码时,根据用户号码的真实位置选择虚拟号码(用户号码和虚拟号码属于同一地区),优化了传输音频媒体的路径,减少了路径迂回,可以提高通话质量;
4)由运营商网络分配虚拟号码,可以避免在运营商网络中被人为管控和概率性限呼,提升接通率;
5)虚拟号码由运营商动态分配和使用,无需云服务厂商预先申请,大大节约了成本;
6)用户操作更加简便。在一个号码针对部分其它号码隐藏真实号码时(如AX模式),该一个号码的用户可以通过前缀或者限定号码的方式,实现快速直拨,可以不用通过短信或者APP单独设置其它号码。
为了更加清楚地理解本申请实施例技术方案,以下再结合具体的业务场景来介绍本申请提供的隐私保护通话方法。
本实施例介绍一种由打车应用(如“滴滴”)发起的基于AXB模式的隐私保护通话方法。参见图5,该方法包括:
S501,滴滴服务器通过云服务器向网络开放功能设备发送虚拟号码请求。具体的,滴滴服务器撮合一次网约车服务,得到司机真实号码A,和乘客真实号码B。滴滴服务器向云服务器发送隐私保护号码请求,携带内容包括:隐私保护模式(Pattern,P),在此例中为AXB,用P1表示AXB;司机真实号码:A;乘客真实号码:B。可选的,还携带录音标识,指示本次呼叫是/否需要录音。云服务器收到请求后,根据隐私保护模式和A,B号码的归属,将请求转发到特定的运营商,本例中假设A,B号码均归属于CMCC;
应理解,图5中的“?”表示需要请求的虚拟号码。
S502,CMCC的网络开放功能设备收到虚拟号码请求,根据隐私保护模式以及业务负载,从A,B中选出触点号码(实际触发业务的号码,即需要在此号码对应的网络中做号码转换处理,对于AXB模式来说,需要一个触点号码),本例中触点号码假设为A。网络开放功能设备向触点号码的归属IMS发送虚拟码请求,携带如下信息:触点号码A、相关号码B。可选的,还携带录音标识,指示本次呼叫是/否需要录音;
S503,A归属的IMS从虚拟号码池中分配一个A的临近号码X,作为本次呼叫的虚 拟号码。所谓临近号码,即在号码分析和路由中,和原始号码A的处理方式完全一致。保证任何对临近号码的呼叫,都可以路由到本IMS。同时,在本端HSS中,建立X与(A,B)号码组之间的关联关系,并保存录音标识;
S504,A归属的IMS向网络开放功能设备发送虚拟号码响应,携带虚拟号码X;
S505,网络开放功能设备转发虚拟号码响应给云服务器,携带虚拟号码X;云服务器转发虚拟号码响应给滴滴服务器,携带虚拟号码X;
S506~S507,滴滴服务器向A,B对应的终端设备下发虚拟号码;
触点号码A做主叫流程(S508~S510):
S508,A对应的终端设备向A归属的IMS中的PCSCF发起呼叫,呼叫请求中携带号码如下:主叫A、被叫X;
S509,A归属的IMS根据之前X与(A,B)的关联关系,将主被叫号码做替换,将被叫替换为B,主叫替换为X,并根据B号码做路由分析,发送呼叫请求到B归属的IMS;同时,若之前保存的录音标识为录音,则在后续呼叫接通,媒体处理时要完成录音处理;
S510,B归属的IMS经过正常的号码分析流程,完成B的接续,与普通呼叫一致;
触点号码A做被叫流程(S511~S513):
S511,B对应的终端设备向B归属的IMS中的PCSCF发起呼叫,呼叫请求中携带号码如下:主叫B、被叫X;
S512,B归属的IMS经过正常的号码分析流程,分析X号码的归属网络,将呼叫请求发送到A归属IMS域,与普通呼叫一致;
S513,A归属的IMS根据之前X与(A,B)的关联关系,将主被叫号码做替换,将被叫替换为A,主叫替换为X,并根据A号码做路由分析,完成A的接续。同时,若之前保存的录音标识为录音,则在后续呼叫接通,媒体处理时要完成录音处理;
S514,滴滴服务器判断本次呼叫业务已经结束,向云服务器发送虚拟号码释放请求,携带之前申请的虚拟号码X;
S515~S516,云服务器和网络开放功能设备将虚拟号码释放请求透传到触点号码的归属的IMS;
S517,A归属IMS解除X与(A,B)号码组之间的关联关系,将X号码重新释放回号码池中,后续任何号码对X号码的呼叫,都会提示该号码不存在;
S518,A归属IMS向网络开放功能设备发送虚拟号码释放响应;
S519~S520,网络开放功能设备和云服务器将虚拟号码释放响应透传到滴滴服务器。
在本实施例中,由运营商网络为司机和乘客分配虚拟号码,运营商网络在接收到呼叫请求后,直接在运营商网络内部完成用户真实号码与虚拟号码的转换,运营商网络中只需保留一路呼叫,可以有效降低网络成本和负载、提升接通率、提高通话质量,进而提高打车应用的服务水平。
本实施例还介绍一种由外卖应用(如“美团”)发起的基于AXYB模式的隐私保护通话方法。参见图6,该方法包括:
S601,美团服务器通过云服务器向网络开放功能设备发送虚拟号码请求。具体的,美团服务器撮合一次外卖服务,得到外卖员真实号码A,和顾客真实号码B。美团服务器向云服务器发送隐私保护号码请求,携带内容包括:隐私保护模式(Pattern,P),在此例中为AXYB,用P2表示AXYB;外卖员真实号码:A;顾客真实号码:B。可选的,还携带录 音标识,指示本次呼叫是/否需要录音。云服务器收到请求后,根据隐私保护模式和A,B号码的归属,将请求转发到特定的运营商,本例中假设A,B号码均归属于CMCC;
应理解,图5中的“?”表示需要请求的虚拟号码。
S602,CMCC的网络开放功能设备收到虚拟号码请求,根据隐私保护模式以及业务负载,从A,B中选出触点号码(实际触发业务的号码,即需要在此号码对应的网络中做号码转换处理,对于AXYB模式来说,需要两个触点号码),本例中触点号码为A和B。网络开放功能设备向每个触点号码的归属IMS发送虚拟码请求(如图6,包括S602A和S602B),每个请求携带如下信息:触点号码A或触点号码B。可选的,还携带录音标识,指示本次呼叫是/否需要录音;
之后,A归属的IMS从虚拟号码池中分配一个A的临近号码X,B归属的IMS从虚拟号码池中分配一个B的临近号码Y,作为本次呼叫的虚拟号码。
S603A、A归属的IMS向网络开放功能设备发送虚拟号码响应,携带虚拟号码X;
S603B、B归属的IMS向网络开放功能设备发送虚拟号码响应,携带虚拟号码Y;
网络开放功能设备收到X,Y后,分别向A归属的IMS、B归属的IMS发送号码通知。
S604A、网络开放功能设备向A归属的IMS发送号码通知,携带:隐私保护模式P2、本域孪生号码组(A,X)、外域隐私号码Y。A归属的IMS建立并保存关联关系((A,X),Y));
S604B、网络开放功能设备向B归属的IMS发送号码通知,携带:隐私保护模式P2、本域孪生号码组(B,Y)、外域隐私号码X。B归属的IMS建立并保存关联关系((B,Y),X));
S605,网络开放功能设备通过云服务器转发虚拟号码响应给美团服务器,携带(A,X)、(B,Y);
S606A、美团服务器通过向A对应的终端设备下发号码,包括本域孪生号码组(A,X)、外域隐私号码Y;
S606B、美团服务器通过向B对应的终端设备下发号码,包括本域孪生号码组(B,Y)、外域隐私号码X;
触点号码A做主叫流程(S607~S609):
S607,A对应的终端设备向A归属的IMS中的PCSCF发起呼叫,呼叫请求中携带号码如下:主叫A、被叫Y;
S608,A归属的IMS根据关联关系,将主叫替换为X,并根据Y号码做路由分析,发送呼叫请求到B归属的IMS。同时,若之前保存的录音标识为录音,则在后续呼叫接通,媒体处理时要完成录音处理;
S609,B归属的IMS根据关联关系,将被叫替换为B,经过正常的号码分析流程,完成B的接续,与普通呼叫一致;
触点号码A做主叫流程(S610~S612):
S610,B对应的终端设备向B归属的IMS中的PCSCF发起呼叫,呼叫请求中携带号码如下:主叫B、被叫X;
S611,B归属的IMS根据关联关系,将主叫替换为Y,并根据X号码做路由分析,发送呼叫请求到A归属的IMS。同时,若之前保存的录音标识为录音,则在后续呼叫接通,媒体处理时要完成录音处理;
S612,A归属的IMS根据关联关系,将被叫替换为A,经过正常的号码分析流程,完成A的接续,与普通呼叫一致;
S613,美团服务器判断本次呼叫业务已经结束,向云服务器发送虚拟号码释放请求,携带之前申请的虚拟号码X、Y;
S614,云服务器转发虚拟号码释放请求透传到网络开放功能设备;
S615~S616、网络开放功能设备向A、B归属的IMS发送虚拟号码释放请求;
A归属的IMS解除X与A之间的关联关系,将X号码重新释放回号码池中,后续任何号码对X号码的呼叫,都会提示该号码不存在。
B归属的IMS解除Y与B之间的关联关系,将Y号码重新释放回号码池中,后续任何号码对Y号码的呼叫,都会提示该号码不存在。
S617~S618,A归属的IMS、B归属的IMS分别向网络开放功能设备发送虚拟号码释放响应;
S619~S620,网络开放功能设备和云服务器将虚拟号码释放响应透传到美团服务器。
在本实施例中,由运营商网络为外卖员和顾客分配虚拟号码,运营商网络在接收到呼叫请求后,直接在运营商网络内部完成用户号码与虚拟号码的转换,运营商网络中只需保留一路呼叫,可以有效降低网络成本和负载、提升接通率、提高通话质量,进而提升外卖应用的服务水平。
需要说明的是,以上实施例大部分是以第一用户号码A和第二用户号码B,并且第一用户号码A和第二用户号码B分别归属不同的网络功能设备(即第一网络功能设备和第二网络功能设备)为例,但在具体实施时,第一用户号码A和第二用户号码B也可以归属同一网络功能设备,例如均归属于第一网络功能设备,在这种情况之下,只需要对上述实施例进行适当的变形。比如,对于虚拟号码分配过程,AX、AXB、AXG等模式下,向一个网络功能设备发送号码请求,所以虚拟号码分配方法基本类似;但在AXYB模式下,上述两个网络功能设备(即第一网络功能设备和第二网络功能设备)执行的相关处理,需要合并到一个网络功能设备进行处理(如分配虚拟号码X、Y,建立A、X、Y、B的关联关系等),另外还可以省去发送号码通知消息过程(因为不涉及外域号码需要告知)。又如,对于呼叫过程,上述第一网络功能设备和第三用户号码对呼叫消息的处理需要合并到一个网络功能设备处理。
基于同一技术构思,参见图7,本申请实施例还提供一种隐私保护通话装置,该装置包括通信单元701和处理单元702,处理单元702和通信单元701配合以执行本申请实施例中可由网络开放功能设备或第一网络功能设备或第二网络功能设备执行的任意一种方法的部分或全部操作。
示例性的,当该装置位于第一网络功能设备时,通信单元701,用于接收来自网络开放功能设备的第一号码请求消息,第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;处理单元702,用于获取第一虚拟号码,建立第一用户号码与第一虚拟号码之间的关联关系,第一虚拟号码与第一用户号码属于同一个地区;通信单元701,还用于向网络开放功能设备发送第一响应消息,第一响应消息中携带第一虚拟号码;接收第一呼叫请求消息,第一呼叫请求消息中携带第一虚拟号码或第一用户号码;根据关联关系处理第一呼叫请求消息。
示例性的,当该装置位于网络开放功能设备时,通信单元701,用于接收来自应用服 务器的第二号码请求消息,第二号码请求消息中携带第一用户号码,第二号码请求消息用于请求虚拟号码;处理单元702,用于确定第一用户号码归属的第一网络功能设备;控制通信单元701向第一用户号码归属的第一网络功能设备发送第一号码请求消息;通信单元701,还用于向第一用户号码归属的第一网络功能设备发送第一号码请求消息,第一号码请求消息中携带第一用户号码,第一号码请求消息用于请求虚拟号码;接收第一网络功能设备返回的第一响应消息,第一响应消息中携带第一网络功能设备分配的第一虚拟号码,第一虚拟号码与第一用户号码属于同一个地区;向应用服务器发送第二响应消息,第二响应消息中携带第一虚拟号码。
参见图8-图9,图8为本申请实施例提供的一种通信装置的结构示意图,图9为图8所示通信装置中的通信单板830的接口示意图。
如图8所示,该通信装置主要包括机柜800以及安装在机柜内的通信单板830。其中,通信单板830主要由电路板以及安装在电路板上的芯片及电子元器件组成,可以提供通信业务。通信单板830的数量可以根据实际需要增加或减少,本实施例不限定具体的数量。
此外,机柜830还包括用于安装散热风扇的风扇框820以及用于管理机柜的机柜管理板810。机柜管理板810用于管理整个机柜的工作状态,例如管理机柜的上电状态、工作温度、告警状态等。
如图9所示,通信单板830包括多个输入/输出接口,例如用于外接显示器的显示接口832,连接通信网络的网络接口831、833,通用串行总线(Universal Serial Bus,USB)接口834。上述网络接口833可以为以太网接口,网络接口831可以为光纤接口。
此外,通信单板830中还包括连接电源的电源接口836以及用于扩展通信单板830功能的扩展插槽835。
其中,上述通信装置可以为网络开放功能设备或第一网络功能设备或第二网络功能设备等设备。
上述通信装置通过安装不同的通信单板830实现不同的功能,例如可以实现本申请实施例中网络开放功能设备或第一网络功能设备或第二网络功能设备的功能。通信单板830上安装有通用处理器/控制芯片/逻辑电路之类的控制元件。通信单板830中也可以安装有存储芯片之类的存储器。上述处理器、存储器可以和相关的通信接口配合以执行本申请实施例中可由网络开放功能设备或第一网络功能设备或第二网络功能设备执行的任意一种方法的部分或全部操作。
参见图10,为本申请实施例提供的另一种通信装置的结构示意图,包括:至少一个处理器1001;以及与所述至少一个处理器1001通信连接的存储器1002、通信接口1003;其中,所述存储器1002存储有可被所述至少一个处理器1001执行的指令,所述至少一个处理器1001通过执行所述存储器1002存储的指令,使得所述装置通过所述通信接口1003执行本申请实施例中可由网络开放功能设备或第一网络功能设备或第二网络功能设备执行的任意一种方法的部分或全部操作。
本申请实施例中不限定上述处理器1001、存储器1002以及通信接口1003之间的具体连接介质。本申请实施例在图10中以处理器1001、存储器1002以及通信接口1003之间通过总线1004连接,总线在图10中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
应理解,本申请实施例中提及的处理器可以通过硬件实现也可以通过软件实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等。当通过软件实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现。
示例性的,处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Eate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
基于同一技术构思,本申请实施例还提供一种计算机可读存储介质,包括程序或指令,当所述程序或指令在计算机上运行时,使得如图4~图6所述的方法被执行。
基于同一技术构思,本申请实施例还提供一种芯片,所述芯片与存储器耦合,用于读取并执行所述存储器中存储的程序指令,使得如图4~图6所述的方法被执行。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装 置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (15)

  1. 一种隐私保护通话方法,其特征在于,应用于第一网络功能设备,包括:
    接收来自网络开放功能的第一号码请求消息,其中所述第一号码请求消息中携带第一用户号码,所述第一号码请求消息用于请求虚拟号码;
    获取第一虚拟号码,建立所述第一用户号码与所述第一虚拟号码之间的关联关系,所述第一虚拟号码与所述第一用户号码属于同一个地区;
    向所述网络开放功能设备发送第一响应消息,所述第一响应消息中携带所述第一虚拟号码;
    接收第一呼叫请求消息,所述第一呼叫请求消息中携带所述第一虚拟号码或所述第一用户号码;
    根据所述关联关系处理所述第一呼叫请求消息。
  2. 如权利要求1所述的方法,其特征在于,所述第一号码请求消息中还携带第二用户号码;
    所述建立所述第一用户号码与所述第一虚拟号码之间的关联关系,包括:建立所述第一用户号码、所述第一虚拟号码以及所述第二用户号码之间的关联关系;
    所述接收第一呼叫请求消息,包括:接收来自所述第一用户号码对应的第一终端设备的第一呼叫请求消息,所述第一呼叫请求消息中的主叫号码为所述第一用户号码、被叫号码为所述第一虚拟号码;所述根据所述关联关系处理所述第一呼叫请求消息,包括:根据所述关联关系、所述第一呼叫请求消息向所述第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,所述第二呼叫请求消息中的主叫号码为所述第一虚拟号码,被叫号码为所述第二用户号码;或者,
    所述接收第一呼叫请求消息,包括:接收来自所述第二用户号码归属的第二网络功能设备的第一呼叫请求消息,所述第一呼叫请求消息中的主叫号码为所述第二用户号码,被叫号码为所述第一虚拟号码;所述根据所述关联关系处理所述第一呼叫请求消息,包括:根据所述关联关系、所述第一呼叫请求消息,向所述第一用户号码对应的第一终端设备发送第二呼叫请求消息,所述第二呼叫请求消息中的主叫号码为所述第一虚拟号码,被叫号码为所述第一用户号码。
  3. 如权利要求1所述的方法,其特征在于,
    所述接收第一呼叫请求消息,包括:接收来自所述第一用户号码对应的第一终端设备的第一呼叫请求消息,所述第一呼叫请求消息中的主叫号码为所述第一用户号码、被叫号码为第二用户号码;所述根据所述关联关系处理所述第一呼叫请求消息,包括:根据所述关联关系、所述第一呼叫请求消息,向所述第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,所述第二呼叫请求消息中的主叫号码为所述第一虚拟号码,被叫号码为所述第二用户号码;或者,
    所述接收第一呼叫请求消息,包括:接收来自第二用户号码归属的第二网络功能设备的第一呼叫请求消息,所述第一呼叫请求消息中的主叫号码为所述第二用户号码,被叫号码为所述第一虚拟号码;所述根据所述关联关系处理所述第一呼叫请求消息,包括:根据所述关联关系、所述第一呼叫请求消息,向所述第一用户号码对应的第一终端设备发送第二呼叫请求消息,所述第二呼叫请求消息中的主叫号码为所述第二用户号码,被叫号码为所述第一用户号码。
  4. 如权利要求1所述的方法,其特征在于,在向所述网络开放功能设备发送第一响应消息之后、以及接收第一呼叫请求消息之前,还包括:
    接收来自所述网络开放功能设备的第一通知消息,所述第一通知消息中携带第二虚拟号码;
    建立所述第一用户号码、所述第一虚拟号码与所述第二虚拟号码之间的关联关系。
  5. 如权利要求4所述的方法,其特征在于,
    所述接收第一呼叫请求消息,包括:接收来自所述第一用户号码对应的第一终端设备的第一呼叫请求消息,所述第一呼叫请求消息中的主叫号码为所述第一用户号码、被叫号码为所述第二虚拟号码;所述根据所述关联关系处理所述第一呼叫请求消息,包括:根据所述第一用户号码、所述第一虚拟号码与所述第二虚拟号码之间的关联关系、以及所述第一呼叫请求消息,向所述第二用户号码归属的第二网络功能设备发送第二呼叫请求消息,所述第二呼叫请求消息中的主叫号码为所述第一虚拟号码,被叫号码为所述第二虚拟号码;或者,
    所述接收第一呼叫请求消息,包括:接收来自所述第二用户号码归属的第二网络功能设备的第一呼叫请求消息,所述第一呼叫请求消息中的主叫号码为所述第二虚拟号码、被叫号码为所述第一虚拟号码;所述根据所述第一虚拟号码和所述第一用户号码之间的关联关系处理所述第一呼叫请求消息,包括:根据所述第一用户号码、所述第一虚拟号码与所述第二虚拟号码之间的关联关系、以及所述第一呼叫请求消息,向所述第一用户号码对应的第一终端设备发送第二呼叫请求消息,所述第二呼叫请求消息中的主叫号码为所述第二虚拟号码,被叫号码为所述第一虚拟号码。
  6. 如权利要求1-5任一项所述的方法,其特征在于,在根据所述关联关系处理所述第一呼叫请求消息之后,还包括:
    接收来自所述网络开放功能设备的第一号码释放消息,所述第一号码释放消息用于请求解除所述第一用户号码和所述第一虚拟号码之间的关联关系,所述第一号码释放请求消息中携带所述第一用户号码和所述第一虚拟号码;
    解除所述第一用户号码和所述第一虚拟号码之间的关联关系。
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述网络开放功能设备和所述第一网络功能设备位于运营商网络中。
  8. 一种隐私保护通话方法,其特征在于,应用于网络开放功能设备,包括:
    接收来自应用服务器的第二号码请求消息,所述第二号码请求消息中携带第一用户号码,所述第二号码请求消息用于请求虚拟号码;
    向所述第一用户号码归属的第一网络功能设备发送第一号码请求消息,所述第一号码请求消息中携带所述第一用户号码,所述第一号码请求消息用于请求虚拟号码;
    接收所述第一网络功能设备返回的第一响应消息,所述第一响应消息中携带所述第一网络功能设备分配的第一虚拟号码,所述第一虚拟号码与所述第一用户号码属于同一个地区;
    向所述应用服务器发送第二响应消息,所述第二响应消息中携带所述第一虚拟号码。
  9. 如权利要求8所述的方法,其特征在于,所述第二号码请求消息中还携带多个用户号码,所述多个用户号码包括所述第一用户号码;
    向所述第一用户号码归属的第一网络功能设备发送第一号码请求消息,包括:
    根据隐私保护模式和/或业务负载,向所述第一用户号码归属的第一网络功能设备发送所述第一号码请求消息;所述隐私保护模式用于指示所述多个用户号码中需要做号码转换的用户号码,所述业务负载用于指示所述多个用户号码中每个用户号码归属的网络中的号码隐私保护业务的负载。
  10. 如权利要求8或9所述的方法,其特征在于,所述第一请求号码消息中还携带第二用户号码;在接收来自应用服务器的第二号码请求消息之后、以及向所述应用服务器发送第二响应消息之前,还包括:
    向所述第二用户号码归属的第二网络功能设备发送第三号码请求消息,所述第三号码请求消息中携带所述第二用户号码,所述第三号码请求消息用于请求虚拟号码;
    接收所述第二网络功能设备返回的第三响应消息,所述第三响应消息中携带第二虚拟号码,所述第二虚拟号码与所述第二用户号码属于同一个地区;
    所述网络开放功能设备向所述应用服务器发送的第二响应消息中还携带所述第二虚拟号码。
  11. 如权利要求10所述的方法,其特征在于,
    在接收所述第一网络功能设备返回的第一响应消息之后,还包括:向所述第二网络功能设备发送第二通知消息,所述第二通知消息中携带所述第一虚拟号码;
    在接收所述第二网络功能设备返回的第三响应消息之后,还包括:向所述第一网络功能设备发送第一通知消息,所述第一通知消息中携带所述第二虚拟号码。
  12. 如权利要求8-11任一项所述的方法,其特征在于,在向所述应用服务器发送第二响应消息之后,还包括:
    接收来自所述应用服务器的第二号码释放消息,所述第二号码释放消息用于请求解除所述第一用户号码和所述第一虚拟号码之间的关联关系,所述第二号码释放请求消息中携带所述第一用户号码和所述第一虚拟号码;向所述第一用户号码归属的第一网络功能设备发送第一号码释放消息,所述第一号码释放消息用于请求解除所述第一用户号码和所述第一虚拟号码之间的关联关系。
  13. 如权利要求8-12任一项所述的方法,其特征在于,所述网络开放功能设备和所述第一网络功能设备位于运营商网络中。
  14. 一种通信装置,其特征在于,包括:
    至少一个处理器;以及与所述至少一个处理器通信连接的存储器、通信接口;
    其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述至少一个处理器通过执行所述存储器存储的指令,使得所述装置通过所述通信接口执行如权利要求1-7或8-13中任一项所述的方法。
  15. 一种计算机可读存储介质,其特征在于,包括程序或指令,当所述程序或指令在计算机上运行时,使得如权利要求1-7或8-13中任一项所述的方法被执行。
PCT/CN2022/071624 2021-04-29 2022-01-12 一种隐私保护通话方法及对应装置 WO2022227710A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110474208.7 2021-04-29
CN202110474208.7A CN115277944A (zh) 2021-04-29 2021-04-29 一种隐私保护通话方法及对应装置

Publications (1)

Publication Number Publication Date
WO2022227710A1 true WO2022227710A1 (zh) 2022-11-03

Family

ID=83745785

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/071624 WO2022227710A1 (zh) 2021-04-29 2022-01-12 一种隐私保护通话方法及对应装置

Country Status (2)

Country Link
CN (1) CN115277944A (zh)
WO (1) WO2022227710A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117014553A (zh) * 2023-08-08 2023-11-07 中移互联网有限公司 呼叫方法、装置、电子设备及介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116013089A (zh) * 2023-01-19 2023-04-25 支付宝(杭州)信息技术有限公司 车辆提醒方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104980903A (zh) * 2015-06-30 2015-10-14 华为技术有限公司 一种保护用户隐私的方法及装置
CN106921951A (zh) * 2015-12-28 2017-07-04 中国电信股份有限公司 基于关系号码的号码隐私保护方法和系统以及相关设备
US20180014183A1 (en) * 2015-01-30 2018-01-11 Hewlett Packard Enterprise Development Lp Communication using virtual numbers
CN108566498A (zh) * 2018-03-09 2018-09-21 中国—东盟信息港股份有限公司 一种基于移动互联网的手机号码安全隐私保护方法及平台
CN109257509A (zh) * 2017-07-14 2019-01-22 中国移动通信集团浙江有限公司 基于虚拟号码的通信方法、系统、服务器和存储介质
CN112188470A (zh) * 2020-09-10 2021-01-05 中国联合网络通信集团有限公司 一种隐私号平台的确定方法和装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180014183A1 (en) * 2015-01-30 2018-01-11 Hewlett Packard Enterprise Development Lp Communication using virtual numbers
CN104980903A (zh) * 2015-06-30 2015-10-14 华为技术有限公司 一种保护用户隐私的方法及装置
CN110072230A (zh) * 2015-06-30 2019-07-30 华为技术有限公司 一种保护用户隐私的方法及装置
CN106921951A (zh) * 2015-12-28 2017-07-04 中国电信股份有限公司 基于关系号码的号码隐私保护方法和系统以及相关设备
CN109257509A (zh) * 2017-07-14 2019-01-22 中国移动通信集团浙江有限公司 基于虚拟号码的通信方法、系统、服务器和存储介质
CN108566498A (zh) * 2018-03-09 2018-09-21 中国—东盟信息港股份有限公司 一种基于移动互联网的手机号码安全隐私保护方法及平台
CN112188470A (zh) * 2020-09-10 2021-01-05 中国联合网络通信集团有限公司 一种隐私号平台的确定方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117014553A (zh) * 2023-08-08 2023-11-07 中移互联网有限公司 呼叫方法、装置、电子设备及介质

Also Published As

Publication number Publication date
CN115277944A (zh) 2022-11-01

Similar Documents

Publication Publication Date Title
US11039381B2 (en) SMF selection based on supported DNN
US11917498B2 (en) Communication method and communications apparatus
US10285042B2 (en) System and method for terminating communication sessions with roaming mobile devices
US20200153838A1 (en) Alias management method and device
WO2022227710A1 (zh) 一种隐私保护通话方法及对应装置
US20190208572A1 (en) Method for dynamically creating local packet data network, apparatus, and system
US20090137227A1 (en) Federated Virtual Network of Communications Services
US20130159520A1 (en) System and method for non-ims application service access over ip multimedia subsystem
TW201737753A (zh) 一種網路接入方法、相關設備和系統
US20110280187A1 (en) Provision of an end-to-end connection from a terminal unit to a network
US20200076494A1 (en) Communication system, relay server, communication method and program
CN115396866A (zh) 用于发送终端策略的方法、装置和系统
JP2015037275A (ja) 移動通信端末
EP4207828A1 (en) Data communication method and communication apparatus
JP2013519282A (ja) Imsネットワーク上で非公開識別子に関連付けられた固定公開sipアドレスを生成する方法
US20230337041A1 (en) P-cscf registration and discovery mechanism
JP5933838B2 (ja) Imsネットワークに少なくとも1つの公開アドレスを登録する方法およびアプリケーション
WO2021248971A1 (zh) 网络接入方法、电子设备及存储介质
CN107534847B (zh) 一种发现方法及设备
CN109788579B (zh) 一种pdu会话的建立方法及设备
CN114557045A (zh) 通信方法及相关装置
KR20040098308A (ko) 이동통신망에서의 멀티미디어 서비스 제공 시스템 및 그방법
US20220167318A1 (en) Systems and methods for reducing transcoding resource allocation during call setup to multiple terminations
KR100827980B1 (ko) 이넘/도메인 네임 서버를 위한 가입자 등록 방법 및 접속게이트웨이
US20170272939A1 (en) Method, apparatus and computer program product for provisioning multiple user identities in an ip multimedia subsystem

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22794193

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22794193

Country of ref document: EP

Kind code of ref document: A1