CN109409133A - Call method, device and electronic equipment - Google Patents

Call method, device and electronic equipment Download PDF

Info

Publication number
CN109409133A
CN109409133A CN201811340278.8A CN201811340278A CN109409133A CN 109409133 A CN109409133 A CN 109409133A CN 201811340278 A CN201811340278 A CN 201811340278A CN 109409133 A CN109409133 A CN 109409133A
Authority
CN
China
Prior art keywords
terminal
encryption
information
declaration form
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811340278.8A
Other languages
Chinese (zh)
Inventor
刘伟
李�瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201811340278.8A priority Critical patent/CN109409133A/en
Publication of CN109409133A publication Critical patent/CN109409133A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the present invention provides a kind of call method, device and electronic equipment, it include: to obtain the corresponding encryption information of declaration form, encryption information is to be encrypted using the first Encryption Algorithm to the contact information of declaration form, and contact information includes: the encryption identification of number of policy, the mark of contact person, second terminal;Encryption information is decrypted using the first decipherment algorithm, obtains the contact information of declaration form;Call request is sent to server, call request includes the phone number of first terminal and the encryption identification of second terminal;Receive the Three-Way Calling connection request that server is sent;It since the contact information of declaration form is not presented on explicitly on declaration form envelope, but is presented, is can be avoided since declaration form is lost or other people check the leakage of caused customer information in the form of encryption information;During courier's policy delivery, the practical phone number of declaration form contact person be always to courier it is sightless, the leakage of customer information can be further avoided.

Description

Call method, device and electronic equipment
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of call methods, device and electronic equipment.
Background technique
In insurance field, client is after having purchased insurance, if client's selection is papery declaration form, insurance company is needed Papery declaration form is printed, by the express delivery hilllock of insurance company or the express company of cooperation, declaration form is sent to the hand of client In.
In the prior art, courier is given declaration form to be delivered to by insurance company, the contact information pair of these declaration forms Courier is visible, wherein the contact information of declaration form includes at least: number of policy, insurer's name, warrantee's name, The information such as name of contact person, contact phone number.Then visitor is related to according to the contact information of declaration form by courier The delivering of declaration form is completed at family.
However, above-mentioned the prior art has the following problems: the contact information of declaration form is open presentation, in declaration form In delivery process, it be easy to cause the leakage of customer information.
Summary of the invention
The embodiment of the present invention provides a kind of call method, device and electronic equipment, can be avoided in the prior art, is protecting The problem of customer information caused by single delivery process is revealed.
In a first aspect, the embodiment of the present invention provides a kind of call method, it is applied to first terminal, comprising:
The corresponding encryption information of declaration form is obtained, the encryption information is the connection using the first Encryption Algorithm to the declaration form It is that people's information is encrypted, the contact information includes: the encryption of number of policy, the mark of contact person, second terminal Mark, the second terminal are the terminal of the contact person, and the encryption identification of the second terminal is using the second Encryption Algorithm The phone number of the second terminal is encrypted;
The encryption information is decrypted using the first decipherment algorithm, obtains the contact information of the declaration form;
Call request is sent to server, the call request includes the phone number and described the of the first terminal The encryption identification of two terminals;
Receive the Three-Way Calling connection request that the server is sent.
Optionally, described that the encryption information is decrypted using the first decipherment algorithm, obtain the connection of the declaration form After people's information, further includes:
The contact information of the declaration form is shown;
Call instruction is obtained, the call instruction is used to indicate the first terminal and the second terminal is established and conversed Connection;
Correspondingly, described send call request to server, comprising:
It is instructed according to the call, Xiang Suoshu server sends call request.
Optionally, the contact information to the declaration form is shown, comprising:
The encryption identification of the second terminal in the contact information of the declaration form is hidden, remaining information into Row display.
Optionally, the corresponding encryption information of the acquisition declaration form includes:
According to the corresponding identification code of declaration form, the corresponding encryption information of the declaration form is obtained.
Optionally, the identification code is two dimensional code.
Second aspect, the embodiment of the present invention provide a kind of call method, are applied to server, comprising:
Receive first terminal send call request, the call request include the first terminal phone number and The encryption identification of second terminal, the encryption identification of the second terminal is using the second Encryption Algorithm to the second terminal What phone number was encrypted;
The encryption identification of the second terminal is decrypted using the second decipherment algorithm, obtains the second terminal Phone number;
According to the phone number of the phone number of the first terminal and the second terminal, Xiang Suoshu first terminal and The second terminal sends Three-Way Calling connection request.
Optionally, it is described send Three-Way Calling connection request to the first terminal and the second terminal after, also wrap It includes:
The dialog context of the first terminal and the second terminal is recorded and stored.
The third aspect, the embodiment of the present invention provide a kind of communicator, are applied to first terminal, comprising:
Module is obtained, for obtaining the corresponding encryption information of declaration form, the encryption information is using the first Encryption Algorithm pair What the contact information of the declaration form was encrypted, the contact information includes: number of policy, the mark of contact person, The encryption identification of two terminals, the second terminal are the terminal of the contact person, and the encryption identification of the second terminal is to use Second Encryption Algorithm encrypts the phone number of the second terminal;
Deciphering module obtains the connection of the declaration form for the encryption information to be decrypted using the first decipherment algorithm It is people's information;
Sending module, for sending call request to server, the call request includes the mobile phone of the first terminal The encryption identification of number and the second terminal;
Receiving module, the Three-Way Calling connection request sent for receiving the server.
Optionally, the terminal further include: display module;
The display module is shown for the contact information to the declaration form;
The acquisition module, is also used to obtain call instruction, and the call instruction is used to indicate the first terminal and institute It states second terminal and establishes call connection;
Correspondingly, the sending module, is specifically used for being instructed according to the call, Xiang Suoshu server sends call and asks It asks.
Optionally, the display module, specifically for the second terminal in the contact information to the declaration form Encryption identification is hidden, remaining information is shown.
Optionally, the acquisition module is specifically used for that it is corresponding to obtain the declaration form according to the corresponding identification code of declaration form Encryption information.
Optionally, the identification code is two dimensional code.
Fourth aspect, the embodiment of the present invention provide a kind of communicator, are applied to server, comprising:
Receiving module, for receiving the call request of first terminal transmission, the call request includes the first terminal Phone number and second terminal encryption identification, the encryption identification of the second terminal be using the second Encryption Algorithm to institute State what the phone number of second terminal was encrypted;
Deciphering module is decrypted using the second decipherment algorithm for the encryption identification to the second terminal, obtains institute State the phone number of second terminal;
Sending module, for according to the phone number of the first terminal and the phone number of the second terminal, to institute It states first terminal and the second terminal sends Three-Way Calling connection request.
Optionally, the server further include: recording module;
The recording module is recorded and is deposited for the dialog context to the first terminal and the second terminal Storage.
5th aspect, the embodiment of the present invention provide a kind of electronic equipment, comprising: at least one processor and memory;
The memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of the memory storage, so that described at least one A processor executes such as the described in any item call methods of first aspect.
6th aspect, the embodiment of the present invention provide a kind of electronic equipment, comprising: at least one processor and memory;
The memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of the memory storage, so that described at least one A processor executes such as the described in any item call methods of second aspect.
7th aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium It is stored with computer executed instructions in matter, when processor executes the computer executed instructions, realizes as first aspect is any Call method described in, alternatively, such as the described in any item call methods of second aspect.
Eighth aspect, the embodiment of the present invention provide a kind of phone system, comprising: described in any item electricity in terms of the such as the 5th Described in any item electronic equipments in terms of sub- equipment and the such as the 6th.
Call method, device and electronic equipment provided in an embodiment of the present invention, comprising: it is corresponding that first terminal obtains declaration form Encryption information, the encryption information is to be encrypted to obtain to the contact information of the declaration form using the first Encryption Algorithm , the contact information includes: the encryption identification of number of policy, the mark of contact person, second terminal, and the second terminal is The terminal of the contact person, the encryption identification of the second terminal are the hands using the second Encryption Algorithm to the second terminal Machine number is encrypted;The encryption information is decrypted using the first decipherment algorithm, obtains the declaration form Contact information;Call request is sent to server, and the call request includes the phone number of the first terminal and described The encryption identification of second terminal;Receive the Three-Way Calling connection request that the server is sent;Due to the contact information of declaration form Be not presented on explicitly on declaration form envelope, but presented in the form of encryption information, can be avoided due to declaration form lose or Person other people check caused by customer information leakage;During courier's policy delivery, the practical mobile phone of declaration form contact person Number be always to courier it is sightless, the leakage of customer information can be further avoided.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only Some embodiments of the present invention, for those of ordinary skill in the art, without any creative labor, It is also possible to obtain other drawings based on these drawings.
Fig. 1 is the architecture diagram of phone system provided in an embodiment of the present invention;
Fig. 2 is the interaction schematic diagram of call method provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of the generating process of the encryption information of declaration form provided in an embodiment of the present invention;
Fig. 4 is the flow chart of call method provided in an embodiment of the present invention;
Fig. 5 is the interface schematic diagram that first terminal shows declaration form contact information in the embodiment of the present invention;
Fig. 6 is the structural schematic diagram one of communicator provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram two of communicator provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram one of electronic equipment provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram two of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should Understand that the data used in this way are interchangeable under appropriate circumstances, so that the embodiment of the present invention described herein for example can Implemented with the sequence other than those of illustrating or describing herein.In addition, term " includes " and " having " and they Any deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, being System, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or For the intrinsic other step or units of these process, methods, product or equipment.
As previously mentioned, courier is given declaration form to be delivered to by insurance company, the contact information of these declaration forms is to fast The personnel of passing are visible, wherein the contact information of declaration form includes at least: number of policy, insurer's name, warrantee's name, connection It is the information such as people's name, contact phone number.Then client is related to according to the contact information of declaration form by courier, Complete the delivering of declaration form.
However, above-mentioned the prior art has the following problems: the contact information of declaration form is open presentation, in declaration form In delivery process, it be easy to cause the leakage of customer information.
To solve the above problems, the embodiment of the present invention provides a kind of call method, device and electronic equipment, Fig. 1 is this hair The architecture diagram for the phone system that bright embodiment provides, as shown in Figure 1, the phone system includes the terminal of courier side, customer side Terminal and server.For convenience, the terminal of courier side is known as first terminal, customer side by the embodiment of the present invention Terminal be known as second terminal.Wherein, first terminal and second terminal can be that can be realized any end of voice call function End equipment takes the mobile phone as an example in the embodiment of the present invention and is illustrated.Server can be the service that can be realized call function Device equipment.
It should be noted that call method provided in an embodiment of the present invention, device and electronic equipment, are suitable for express delivery and lead The scene of express mail is sent in domain, i.e. courier with charge free to client, wherein the express mail that courier sends with charge free can be any article, comprising: letter Part, package etc..In order to describe aspect, it is described in detail by taking the process for sending declaration form with charge free as an example in the embodiment of the present invention.
The application scenarios of phone system provided in an embodiment of the present invention are as follows, and declaration form to be delivered is given by insurance company Courier, it is desirable that declaration form is delivered to client by courier.Unlike the prior art, the contact information of the declaration form is not It is directly explicitly presented on declaration form, but is presented in the form of encryption information.Courier gets this using first terminal After encryption information, encryption information can be decrypted, obtain the contact information of declaration form, the contact information of declaration form can be with Including number of policy, the name of contact person, second terminal (contact person's terminal) encryption identification.That is, second terminal Phone number is sightless to courier.Then, first terminal initiates call request to server, by server to second The encryption identification of terminal is decrypted, and obtains the phone number of second terminal, and according to the number and second terminal of first terminal Number initiate Three-Way Calling request.
Since the contact information of declaration form is presented on declaration form in the form of encryption information, customer information can be avoided Leakage, in addition, since courier is during policy delivery, the phone number of declaration form contact person is always to courier It is sightless, further avoid the leakage of customer information.
Technical solution of the present invention is described in detail with specifically embodiment below.These are specific real below Applying example can be combined with each other, and the same or similar concept or process may be repeated no more in some embodiments.
Fig. 2 is the interaction schematic diagram of call method provided in an embodiment of the present invention, as shown in Fig. 2, the method for the present embodiment Include:
S201: first terminal obtains the corresponding encryption information of declaration form, and the encryption information is using the first Encryption Algorithm pair What the contact information of the declaration form was encrypted, the contact information includes: number of policy, the mark of contact person, The encryption identification of two terminals, the second terminal are the terminal of the contact person, and the encryption identification of the second terminal is to use Second Encryption Algorithm encrypts the phone number of the second terminal.
Wherein, the mark of contact person can be the information such as name, alias, the ID card No. of contact person, and the present invention is implemented Example is not especially limited, and the present embodiment and subsequent embodiment will be described by taking the name of contact person as an example.
In the prior art, the declaration form that insurance company sends to client is accommodated using envelope, and guarantor can explicitly be presented on envelope Single contact information.Customer information is checked in policy delivery in order to facilitate courier, in general, presenting on declaration form envelope Contact information generally include: number of policy, declaration form state, declaration form form, insurer, warrantee, contact person, contact person The information such as phone number.
In the present embodiment, the declaration form pair is generated in advance before giving declaration form to be delivered to courier in insurance company The encryption information answered obtains specifically, the contact information being explicitly presented on envelope will be needed to encrypt in the prior art To encryption information.Then the encryption information is presented on envelope.
It should be understood that since the contact information of declaration form is not presented on explicitly on declaration form envelope, but to encrypt letter The form of breath is presented, and can be avoided since declaration form is lost or other people check the leakage of caused customer information.
It should be noted that presentation mode of the encryption information on envelope, the embodiment of the present invention do not limit specifically It is fixed, it can be presented, can be presented in the form of figure ciphertext in the form of character string ciphertext.It is understood that according to Different presentation modes of the encryption information on envelope, first terminal can obtain in different ways declaration form it is corresponding plus Confidential information.For example, can be obtained by way of scanning encryption information, can also be obtained in such a way that courier is manually entered It takes, can also be obtained in such a way that courier's voice inputs, the present invention is not especially limit this.
Wherein, the corresponding encryption information of declaration form can be generated by encryption device.In order to improve the safety of customer information Property, in the embodiment of the present invention by the way of two re-encryptions.Fig. 3 is the encryption information of declaration form provided in an embodiment of the present invention The schematic diagram of generating process, as shown in Figure 3, it is assumed that the terminal of contact person is second terminal, first using the second Encryption Algorithm to the The phone number of two terminals is encrypted, and the encryption identification of second terminal is obtained;Then by the encryption identification of second terminal and connection It is that other information in people's information is encrypted using the first Encryption Algorithm, obtains the corresponding encryption information of declaration form.
It should be noted that the embodiment of the present invention does not limit the first Encryption Algorithm and the second Encryption Algorithm specifically It is fixed, it can be realized using any Encryption Algorithm in the prior art.
Optionally, the first Encryption Algorithm and the second Encryption Algorithm difference.It is understood that being calculated by the way that different encryptions is arranged Method enables to the safety of encryption information higher.
S202: the encryption information is decrypted using the first decipherment algorithm for first terminal, obtains the connection of the declaration form It is people's information.
Specifically, after first terminal gets encryption information, using the first decipherment algorithm corresponding with the first Encryption Algorithm It is decrypted, obtains the contact information of declaration form.It should be understood that including second terminal in the contact information of declaration form Encryption identification.
S203: first terminal sends call request to server, and the call request includes the mobile phone of the first terminal The encryption identification of number and the second terminal.
S204: the encryption identification of the second terminal is decrypted using the second decipherment algorithm for server, obtains described The phone number of second terminal.
Specifically, server uses the second decipherment algorithm corresponding with the second Encryption Algorithm, to the encryption mark of second terminal Knowledge is decrypted, and obtains the phone number of second terminal.
S205: server is according to the phone number of the first terminal and the phone number of the second terminal, Xiang Suoshu First terminal and the second terminal send Three-Way Calling connection request.
The Three-Way Calling refers to the call between first terminal, second terminal and server.
S206: first terminal and second terminal receive the Three-Way Calling connection request that the server is sent.
Through above-mentioned communication process as it can be seen that during courier's policy delivery, first terminal is simultaneously not responsible to second The encryption identification of terminal is decrypted.That is, first terminal, which is merely able to parsing, obtains the contact information of declaration form, i.e., only The information such as name of number of policy, contact person can be obtained, and the practical phone number of contact person can not be obtained, but eventually by second The encryption identification at end is sent to server and is parsed, and after being decrypted by encryption identification of the server to second terminal, initiates Three-Way Calling.
It should be understood that the practical phone number of declaration form contact person is to courier during courier's policy delivery Always be it is sightless, the leakage of customer information can be further avoided.In addition, by establishing server, first terminal and Three-Way Calling between two terminals enables the server to exercise supervision to the process of courier's policy delivery.
Optionally, in the present embodiment, server is established after Three-Way Calling connection, can also include:
S207: server is recorded and is stored to the dialog context of the first terminal and the second terminal.
When specific implementation, recording data can be stored into the database of server, or recording server is arrived in storage In, it is checked so as to subsequent.
It is recorded by server to the dialog context between courier and client, additionally it is possible to realize server to fast The dialog context of the person of passing and client exercise supervision, and are conducive to the image for safeguarding insurance company.
Call method provided in an embodiment of the present invention, since the contact information of declaration form is not presented on declaration form letter explicitly It seals up, but is presented in the form of encryption information, be can be avoided since declaration form is lost or other people check caused client The leakage of information;During courier's policy delivery, the practical phone number of declaration form contact person is not always to courier It is visible, the leakage of customer information can be further avoided;By establishing between server, first terminal and second terminal Three-Way Calling enables the server to exercise supervision to the process of courier's policy delivery;By server to courier and visitor Dialog context between family is recorded, additionally it is possible to realize that server exercises supervision to the dialog context of courier and client, have Conducive to the image of maintenance insurance company.
Fig. 4 is the flow chart of call method provided in an embodiment of the present invention, and the method for the present embodiment can be by Fig. 1 the One terminal executes.On the basis of the above embodiments, as shown in figure 4, the method for the present embodiment, comprising:
S401: according to the corresponding identification code of declaration form, the corresponding encryption information of the declaration form is obtained, the encryption information is It is encrypted using contact information of first Encryption Algorithm to the declaration form, the contact information includes: declaration form Number, the encryption identification of the mark of contact person, second terminal, the second terminal is the terminal of the contact person, and described second eventually The encryption identification at end is to be encrypted using the second Encryption Algorithm to the phone number of the second terminal.
On the basis of the above embodiments, by the first Encryption Algorithm and the second Encryption Algorithm generate declaration form it is corresponding plus After confidential information, which can be encoded to by identification code using preset coding mode, which is arranged in declaration form Envelope on.In turn, first terminal can identify the identification code on declaration form envelope, obtain the corresponding encryption letter of declaration form Breath.
Wherein, the present embodiment for the preset coding mode and is not especially limited, as long as can be by encryption information It is encoded to identification code.Specifically, identification code can be bar code, two dimensional code etc..
By taking two dimensional code as an example, the two dimensional code on first terminal scanning declaration form envelope is can be used in courier, obtains the declaration form Corresponding encryption information.
S402: the encryption information being decrypted using the first decipherment algorithm, obtains contact person's letter of the declaration form Breath.
S403: the contact information of the declaration form is shown.
In the present embodiment, first terminal is decrypted encryption information using the first decipherment algorithm, obtains the connection of declaration form After people's information, the contact information of the declaration form can be shown in the interface of first terminal, to facilitate courier to visitor The case where family carries out the verification of policy information, avoids the occurrence of declaration form delivery error.
Fig. 5 is the interface schematic diagram that first terminal shows declaration form contact information in the embodiment of the present invention.Assuming that The contact information for the declaration form that first terminal parses in the present embodiment includes: number of policy, insurer, warrantee, contact person Name, contact person's terminal encryption identification.
In a kind of optional embodiment, as shown in figure 5, eventually to described second in the contact information of the declaration form The encryption identification at end (contact person's terminal) is hidden, remaining information is shown.In the embodiment, contact person's terminal Encryption identification be it is hiding, courier can not see the encryption identification of contact person's terminal, and can only see remaining information, guarantee The safety of customer information prevents Client handset number from revealing.Even if can be obtained by certain technological means in hiding Hold, also can only obtain the encryption identification of contact person's terminal, still can not obtain the phone number of contact person's terminal, duplicate protection The safety of customer information.
S404: call instruction is obtained, the call instruction is used to indicate the first terminal and the second terminal is established Call connection.
After first terminal shows interface information shown in fig. 5, judges whether to receive call instruction, converse when receiving Subsequent step is executed when instruction, initiates call request to server.
Specifically, courier can input call instruction to first terminal in several ways, the embodiment of the present invention is not made It is specific to limit.Such as: courier can click " call contact " as shown in Figure 5, input call instruction to first terminal, Courier can also input preset phonetic order to first terminal,
S405: instructing according to the call, and Xiang Suoshu server sends call request, and the call request includes described The encryption identification of the phone number of first terminal and the second terminal.
S406: the Three-Way Calling connection request that the server is sent is received.
Call method provided in an embodiment of the present invention, since the contact information of declaration form is not presented on declaration form letter explicitly It seals up, but is presented in the form of encryption information, be can be avoided since declaration form is lost or other people check caused client The leakage of information;During courier's policy delivery, the practical phone number of declaration form contact person is not always to courier It is visible, the leakage of customer information can be further avoided;By establishing between server, first terminal and second terminal Three-Way Calling enables the server to exercise supervision to the process of courier's policy delivery;By server to courier and visitor Dialog context between family is recorded, additionally it is possible to realize that server exercises supervision to the dialog context of courier and client, have Conducive to the image of maintenance insurance company.
Fig. 6 is the structural schematic diagram one of communicator provided in an embodiment of the present invention, as shown in fig. 6, the present embodiment provides Communicator 600, comprising: obtain module 601, deciphering module 602, sending module 603 and receiving module 604.
Wherein, module 601 is obtained, for obtaining the corresponding encryption information of declaration form, the encryption information is added using first Close algorithm encrypts the contact information of the declaration form, and the contact information includes: number of policy, contact person Mark, second terminal encryption identification, the second terminal be the contact person terminal, the encryption of the second terminal Mark is to be encrypted using the second Encryption Algorithm to the phone number of the second terminal;
Deciphering module 602 obtains the declaration form for the encryption information to be decrypted using the first decipherment algorithm Contact information;
Sending module 603, for sending call request to server, the call request includes the first terminal The encryption identification of phone number and the second terminal;
Receiving module 604, the Three-Way Calling connection request sent for receiving the server.
Optionally, as shown in fig. 6, the communicator of the present embodiment can also include: display module 605;
The display module 605, shows for the contact information to the declaration form;
The acquisition module 601, is also used to obtain call instruction, and the call instruction is used to indicate the first terminal Call connection is established with the second terminal;
Correspondingly, the sending module 603, is specifically used for being instructed according to the call, Xiang Suoshu server sends call Request.
Optionally, the display module 605, eventually specifically for described second in the contact information to the declaration form The encryption identification at end is hidden, remaining information is shown.
Optionally, the acquisition module 601 is specifically used for that it is corresponding to obtain the declaration form according to the corresponding identification code of declaration form Encryption information.
Optionally, the identification code is two dimensional code.
The communicator of the present embodiment can be used for executing the correspondent of first terminal side in any of the above-described embodiment of the method Method, it is similar that the realization principle and technical effect are similar, and details are not described herein again.
Fig. 7 is the structural schematic diagram two of communicator provided in an embodiment of the present invention, as shown in fig. 7, the present embodiment provides Communicator 700, may include: receiving module 701, deciphering module 702 and sending module 703.
Wherein, receiving module 701, for receiving the call request of first terminal transmission, the call request includes described The phone number of first terminal and the encryption identification of second terminal, the encryption identification of the second terminal are using the second encryption Algorithm encrypts the phone number of the second terminal;
Deciphering module 702 is decrypted using the second decipherment algorithm for the encryption identification to the second terminal, is obtained To the phone number of the second terminal;
Sending module 703, for according to the phone number of the first terminal and the phone number of the second terminal, Three-Way Calling connection request is sent to the first terminal and the second terminal.
Optionally, as shown in fig. 7, the communicator of the present embodiment can also include: recording module 704;
The recording module 704, is recorded simultaneously for the dialog context to the first terminal and the second terminal Storage.
The communicator of the present embodiment can be used for executing the call method of server side in any of the above-described embodiment of the method, That the realization principle and technical effect are similar is similar for it, and details are not described herein again.
Fig. 8 is the structural schematic diagram one of electronic equipment provided in an embodiment of the present invention, as shown in figure 8, the electricity of the present embodiment Sub- equipment can be terminal 800, may include: at least one processor 801 and memory 802.Wherein, processor 801, deposit Reservoir 802 is connected by bus 803.
During specific implementation, at least one processor 801 executes the computer that the memory 802 stores and executes Instruction, so that at least one processor 801 executes the call method of first terminal side in any of the above-described embodiment of the method.
The specific implementation process of processor 801 can be found in above method embodiment, implementing principle and technical effect class Seemingly, details are not described herein again for the present embodiment.
Fig. 9 is the structural schematic diagram two of electronic equipment provided in an embodiment of the present invention, as shown in figure 9, the electricity of the present embodiment Sub- equipment can be server 900, may include: at least one processor 901 and memory 902.Wherein, processor 901, Memory 902 is connected by bus 903.
During specific implementation, at least one processor 901 executes the computer that the memory 902 stores and executes Instruction, so that at least one processor 901 executes the call method of server side in any of the above-described embodiment of the method.
The specific implementation process of processor 901 can be found in above method embodiment, implementing principle and technical effect class Seemingly, details are not described herein again for the present embodiment.
In above-mentioned Fig. 8 and embodiment shown in Fig. 9, it should be appreciated that processor can be central processing unit (English: Central Processing Unit, referred to as: CPU), it can also be other general processors, digital signal processor (English Text: Digital Signal Processor, referred to as: DSP), specific integrated circuit (English: Application Specific Integrated Circuit, referred to as: ASIC) etc..General processor can be microprocessor or the processor is also possible to Any conventional processor etc..Hardware processor can be embodied directly in conjunction with the step of invention disclosed method to have executed At, or in processor hardware and software module combination execute completion.
Memory may include high speed RAM memory, it is also possible to and it further include non-volatile memories NVM, for example, at least one Magnetic disk storage.
Bus can be industry standard architecture (Industry Standard Architecture, ISA) bus, External equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, EISA) bus etc..Bus can be divided into address bus, data/address bus, control Bus processed etc..For convenient for indicating, the bus in illustrations does not limit only a bus or a type of bus.
The embodiment of the present invention also provides a kind of computer readable storage medium, deposits in the computer readable storage medium Computer executed instructions are contained, when processor executes the computer executed instructions, realize the correspondent that terminal as above executes Method.
The embodiment of the present invention also provides a kind of computer readable storage medium, deposits in the computer readable storage medium Computer executed instructions are contained, when processor executes the computer executed instructions, realize the call that server as above executes Method.
Above-mentioned computer readable storage medium, above-mentioned readable storage medium storing program for executing can be by any kind of volatibility or Non-volatile memory device or their combination are realized, such as static random access memory (SRAM), electrically erasable Read-only memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM) are read-only Memory (ROM), magnetic memory, flash memory, disk or CD.Readable storage medium storing program for executing can be general or specialized calculating Any usable medium that machine can access.
A kind of illustrative readable storage medium storing program for executing is coupled to processor, to enable a processor to from the readable storage medium Matter reads information, and information can be written to the readable storage medium storing program for executing.Certainly, readable storage medium storing program for executing is also possible to the group of processor At part.Processor and readable storage medium storing program for executing can be located at specific integrated circuit (Application Specific Integrated Circuits, referred to as: ASIC) in.Certainly, processor and readable storage medium storing program for executing can also be used as discrete assembly It is present in equipment.
The embodiment of the present invention also provides a kind of phone system, as shown in Figure 1, comprising: first terminal, second terminal kimonos Business device, wherein first terminal can use structure as shown in Figure 9 using the structure of figure as depicted in figure 8, server.
The phone system of the present embodiment can be used for executing the technical solution of any of the above-described embodiment of the method, realization principle Similar with technical effect, details are not described herein again.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can be with It is done through the relevant hardware of the program instructions.Program above-mentioned can be stored in a computer readable storage medium.It should When being executed, execution includes the steps that above-mentioned each method embodiment to program;And storage medium above-mentioned includes: ROM, RAM, magnetic The various media that can store program code such as dish or CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations; Although present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its It is still possible to modify the technical solutions described in the foregoing embodiments, or special to some or all of technologies Sign is equivalently replaced;And these are modified or replaceed, various embodiments of the present invention that it does not separate the essence of the corresponding technical solution The range of technical solution.

Claims (10)

1. a kind of call method, which is characterized in that be applied to first terminal, comprising:
The corresponding encryption information of declaration form is obtained, the encryption information is believed using contact person of first Encryption Algorithm to the declaration form What breath was encrypted, the contact information includes: the encryption identification of number of policy, the mark of contact person, second terminal, institute The terminal that second terminal is the contact person is stated, the encryption identification of the second terminal is using the second Encryption Algorithm to described the What the phone number of two terminals was encrypted;
The encryption information is decrypted using the first decipherment algorithm, obtains the contact information of the declaration form;
To server send call request, the call request include the first terminal phone number and the second terminal Encryption identification;
Receive the Three-Way Calling connection request that the server is sent.
2. the method according to claim 1, wherein it is described to the encryption information using the first decipherment algorithm into Row decryption, after obtaining the contact information of the declaration form, further includes:
The contact information of the declaration form is shown;
Call instruction is obtained, the call instruction is used to indicate the first terminal and the second terminal establishes call connection;
Correspondingly, described send call request to server, comprising:
It is instructed according to the call, Xiang Suoshu server sends call request.
3. according to the method described in claim 2, it is characterized in that, the contact information to the declaration form is shown, Include:
The encryption identification of the second terminal in the contact information of the declaration form is hidden, remaining information is shown Show.
4. the method according to claim 1, wherein the corresponding encryption information of the acquisition declaration form includes:
According to the corresponding identification code of declaration form, the corresponding encryption information of the declaration form is obtained.
5. a kind of call method, which is characterized in that be applied to server, comprising:
The call request that first terminal is sent is received, the call request includes phone number and the second end of the first terminal The encryption identification at end, the encryption identification of the second terminal are the phone numbers using the second Encryption Algorithm to the second terminal It is encrypted;
The encryption identification of the second terminal is decrypted using the second decipherment algorithm, obtains the cell-phone number of the second terminal Code;
According to the phone number of the phone number of the first terminal and the second terminal, Xiang Suoshu first terminal and described Two terminals send Three-Way Calling connection request.
6. according to the method described in claim 5, it is characterized in that, described send to the first terminal and the second terminal After Three-Way Calling connection request, further includes:
The dialog context of the first terminal and the second terminal is recorded and stored.
7. a kind of communicator, which is characterized in that be applied to first terminal, comprising:
Module is obtained, for obtaining the corresponding encryption information of declaration form, the encryption information is using the first Encryption Algorithm to described What the contact information of declaration form was encrypted, the contact information includes: number of policy, the mark of contact person, the second end The encryption identification at end, the second terminal are the terminal of the contact person, and the encryption identification of the second terminal is using second Encryption Algorithm encrypts the phone number of the second terminal;
Deciphering module obtains the contact person of the declaration form for the encryption information to be decrypted using the first decipherment algorithm Information;
Sending module, for sending call request to server, the call request includes the phone number of the first terminal With the encryption identification of the second terminal;
Receiving module, the Three-Way Calling connection request sent for receiving the server.
8. a kind of communicator, which is characterized in that be applied to server, comprising:
Receiving module, for receiving the call request of first terminal transmission, the call request includes the hand of the first terminal The encryption identification of machine number and second terminal, the encryption identification of the second terminal are using the second Encryption Algorithm to described second What the phone number of terminal was encrypted;
Deciphering module is decrypted for the encryption identification to the second terminal using the second decipherment algorithm, obtains described the The phone number of two terminals;
Sending module, for according to the phone number of the first terminal and the phone number of the second terminal, Xiang Suoshu One terminal and the second terminal send Three-Way Calling connection request.
9. a kind of electronic equipment characterized by comprising at least one processor and memory;
The memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of the memory storage, so that at least one described processing Device executes such as call method as claimed in any one of claims 1 to 6.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium It executes instruction, when processor executes the computer executed instructions, realizes such as the described in any item calls of Claims 1-4 Method, alternatively, such as call method described in claim 5 or 6.
CN201811340278.8A 2018-11-12 2018-11-12 Call method, device and electronic equipment Pending CN109409133A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811340278.8A CN109409133A (en) 2018-11-12 2018-11-12 Call method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811340278.8A CN109409133A (en) 2018-11-12 2018-11-12 Call method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN109409133A true CN109409133A (en) 2019-03-01

Family

ID=65473009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811340278.8A Pending CN109409133A (en) 2018-11-12 2018-11-12 Call method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109409133A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995774A (en) * 2019-03-22 2019-07-09 泰康保险集团股份有限公司 Cipher key authentication method, system, equipment and storage medium based on part decryption
CN110191239A (en) * 2019-04-15 2019-08-30 平安科技(深圳)有限公司 Dialing Method, device, computer equipment and storage medium based on information reparation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027259A (en) * 2016-05-10 2016-10-12 河南理工大学 Two-dimensional code encryption method for logistics confidential information
CN107104969A (en) * 2017-04-27 2017-08-29 山西大学 The method that the individual privacy information in express delivery is protected with dynamic encryption mechanism
CN107133529A (en) * 2017-05-04 2017-09-05 广东工业大学 A kind of express delivery privacy information time slot scrambling
CN107770396A (en) * 2016-10-21 2018-03-06 优估(上海)信息科技有限公司 Method of calling, system and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027259A (en) * 2016-05-10 2016-10-12 河南理工大学 Two-dimensional code encryption method for logistics confidential information
CN107770396A (en) * 2016-10-21 2018-03-06 优估(上海)信息科技有限公司 Method of calling, system and server
CN107104969A (en) * 2017-04-27 2017-08-29 山西大学 The method that the individual privacy information in express delivery is protected with dynamic encryption mechanism
CN107133529A (en) * 2017-05-04 2017-09-05 广东工业大学 A kind of express delivery privacy information time slot scrambling

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995774A (en) * 2019-03-22 2019-07-09 泰康保险集团股份有限公司 Cipher key authentication method, system, equipment and storage medium based on part decryption
CN109995774B (en) * 2019-03-22 2021-10-08 泰康保险集团股份有限公司 Key authentication method, system, device and storage medium based on partial decryption
CN110191239A (en) * 2019-04-15 2019-08-30 平安科技(深圳)有限公司 Dialing Method, device, computer equipment and storage medium based on information reparation

Similar Documents

Publication Publication Date Title
US10218839B2 (en) Methods, apparatus and devices for authenticating a call session
CN108550041A (en) Protect the method, apparatus and terminal of original works
CN110096496A (en) A kind of form validation method, relevant apparatus and equipment
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN110933063B (en) Data encryption method, data decryption method and equipment
US11989319B2 (en) Utilizing a mnemonic for communicating sensitive data
CN110162551A (en) Data processing method, device and electronic equipment
CN108055238A (en) A kind of account verification method and system
DK3176779T3 (en) SYSTEMS AND METHODS FOR SENSITIVE AUDIO ZONE RANGE
CN104753675B (en) Information Authentication method, electric paying method, terminal, server and system
CN104281272A (en) Password input processing method and device
CN108763937A (en) Distribution document generation, distribution and popularization information processing method and device
CN104010068A (en) Text message processing method and device for mobile terminal
CN108229947A (en) Quick Response Code uses the support method of position and system, barcode scanning equipment, platform end
CN109409133A (en) Call method, device and electronic equipment
CN110519405A (en) A kind of short chain address operation access method, device, equipment and storage medium
CN106664535B (en) A kind of method for sending information, device, terminal device and system
CN114466348A (en) Communication method, device and equipment
CN109150513A (en) Private key storage method, computer equipment and storage medium based on block chain
CN109359960A (en) The implementation method and device of e-payment
US20190089544A1 (en) Validation code encryption manager
CN111291396A (en) Form data processing method and device, electronic equipment and storage medium
WO2017020598A1 (en) Contact information management method, apparatus and terminal
CN108763976B (en) Information display method based on double screens, mobile terminal and storage medium
US10911434B2 (en) Phone number protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301