CN113965648A - Information hiding method and device and electronic equipment - Google Patents

Information hiding method and device and electronic equipment Download PDF

Info

Publication number
CN113965648A
CN113965648A CN202010704905.2A CN202010704905A CN113965648A CN 113965648 A CN113965648 A CN 113965648A CN 202010704905 A CN202010704905 A CN 202010704905A CN 113965648 A CN113965648 A CN 113965648A
Authority
CN
China
Prior art keywords
called party
calling
party
encrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010704905.2A
Other languages
Chinese (zh)
Other versions
CN113965648B (en
Inventor
任中岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Shandong Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Shandong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Shandong Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010704905.2A priority Critical patent/CN113965648B/en
Publication of CN113965648A publication Critical patent/CN113965648A/en
Application granted granted Critical
Publication of CN113965648B publication Critical patent/CN113965648B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42348Location-based services which utilize the location information of a target
    • H04M3/42357Location-based services which utilize the location information of a target where the information is provided to a monitoring entity such as a potential calling party or a call processing server

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The application provides an information hiding method and device and electronic equipment, and relates to the technical field of information security. In the method of the embodiment of the application, the calling party initiates a calling request according to the encrypted number of the called party, and the calling request comprises the area information of the calling party and the encrypted number of the called party. And after receiving a calling request initiated by a calling party, the target platform judges whether the area information is contained in the service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, the target platform determines the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. According to the method, the calling party initiates the calling request according to the encrypted number of the called party, the real number of the called party is invisible to the calling party, the real number of the called party is effectively hidden, leakage of personal information of the called party is prevented, and personal information safety of the called party is protected.

Description

Information hiding method and device and electronic equipment
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of information security technologies, and in particular, to an information hiding method and apparatus, and an electronic device.
[ background of the invention ]
In a package delivery scenario, the recipient's personal information, such as contact phone number, address, etc., is typically displayed in clear text on a single face. In the process of delivering the package, the courier and all persons who contact the package can directly obtain the personal information of the user, so that the personal information of the user is leaked. Even after the package is signed, the personal information of the user still remains on the discarded package, which is not beneficial to protecting the personal information of the user.
In the prior art, a user can only smear or destroy personal information on a package to be discarded after signing in the package, so that the leakage of the personal information is prevented. However, the personal information of the user is always at risk of leakage during the package delivery process.
[ summary of the invention ]
The embodiment of the application provides an information hiding method and device and electronic equipment, so that the hiding and protection of the personal information of a receiver are realized in the parcel delivery process, and the leakage of the personal information of the receiver is prevented.
In a first aspect, an embodiment of the present application provides an information hiding method, including: receiving a call request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party; judging whether the area information is contained in a service area range associated with the calling party; if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party; and calling the called party according to the real number of the called party.
In one possible implementation mode, an encryption mode for the real number of the called party is determined according to the attribution of the real number of the called party in the order to be dispatched; encrypting the real number of the called party according to the determined encryption mode; determining a calling party for dispatching the order to be dispatched according to the address of the receiving of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
In one possible implementation manner, the method further includes: when the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, the true number of the called party is encrypted by using a second encryption mode.
In one possible implementation manner, the encrypted number of the called party includes a ciphertext symbol and a plaintext symbol; determining the real number of the called party according to the encrypted number of the called party, comprising: determining order information to be dispatched in a service area associated with a calling party; determining a calling number consistent with a plaintext character in an encrypted number of a called party from the order information to be dispatched; if the determined calling number is one, determining the calling number as the real number of the called party; if a plurality of calling numbers are determined, sending prompt information to the calling party to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from the calling numbers according to the auxiliary identification code input by the calling party.
In one possible implementation manner, the encrypted number of the called party includes an encryption manner prompt;
determining a calling number consistent with a plain text symbol in the encrypted number of the called party from the order information to be dispatched, wherein the step of determining the calling number comprises the following steps:
if the encrypted number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt sign, screening first order dispatching information of which the called party number attribution and the receiving address belong to the same area from the order information to be dispatched; determining a calling number consistent with a plain text symbol in an encrypted number of a called party from the first order dispatching information; if the encrypted number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt sign, screening second order dispatching information of which the called party number attribution and the receiving address belong to different areas from the order information to be dispatched; and determining a calling number consistent with a plain text character in the encrypted number of the called party from the second order dispatching information.
In one possible implementation manner, after the called party is called according to the real number of the called party, the method further includes: and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the signing-in state, setting the encrypted number of the called party to be invalid.
In a second aspect, an embodiment of the present application provides an information hiding apparatus, including: the receiving module is used for receiving a calling request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party; the judging module is used for judging whether the area information is contained in a service area range associated with the calling party; the determining module is used for determining the real number of the called party according to the encrypted number of the called party when the area information is contained in the service area range associated with the calling party; and the calling module is used for calling the called party according to the real number of the called party.
In one possible implementation manner, the apparatus further includes: the encryption module is used for determining an encryption mode of the real number of the called party according to the attribution place of the real number of the called party in the order to be dispatched before the receiving module receives the call request initiated by the calling party; encrypting the real number of the called party according to the determined encryption mode; the sending module is used for determining a calling party for dispatching the order to be dispatched according to the address of the receiving party of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
In a third aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, which when called by the processor are capable of performing the method as described above.
In a fourth aspect, embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the method as described above.
In the above technical solution, the calling party initiates a call request according to the encrypted number of the called party, and the call request includes the area information where the calling party is located and the encrypted number of the called party. After receiving a calling request initiated by a calling party, the target platform judges whether the area information is contained in a service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, the target platform determines the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. The calling party initiates a calling request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party in the whole calling process, so that the real number of the called party is effectively hidden. In the calling process, the target platform determines the real number of the called party according to the encrypted number of the called party in the calling request, so that the calling is completed, the safety is higher, the personal information of the called party is prevented from being leaked, and the personal information safety of the called party is protected.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of an information hiding method of the present application;
FIG. 2 is a flow chart of another embodiment of the information hiding method of the present application;
FIG. 3 is a flowchart of another embodiment of the information hiding method of the present application;
FIG. 4 is a diagram illustrating an embodiment of an information hiding method according to the present application;
FIG. 5 is another schematic diagram of an embodiment of an information hiding method of the present application;
FIG. 6 is a further schematic diagram of an embodiment of an information hiding method of the present application;
FIG. 7 is a flowchart of another embodiment of an information hiding method of the present application;
FIG. 8 is a schematic structural diagram of an embodiment of an information hiding apparatus according to the present application;
FIG. 9 is a schematic structural diagram of another embodiment of an information hiding apparatus according to the present application;
fig. 10 is a schematic structural diagram of an embodiment of an electronic device according to the present application.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In the package delivery scenario referred to in the embodiments of the present application, a call is initiated by a sender to a recipient based on the recipient's contact phone. In the process, the sender is the calling party of the embodiment of the application, and the receiver is the called party of the embodiment of the application.
In the embodiment of the application, the contact telephone of the receiver is the encrypted contact telephone of the receiver, when the calling party initiates a call request according to the encrypted contact telephone, the target platform responds to the call request, and the information hiding method in the embodiment of the application is executed according to the call request.
Fig. 1 is a flowchart of an embodiment of an information hiding method of the present application. The execution subject of the method shown in fig. 1 is the target platform. The target platform may be, for example, a logistics service platform, or may be an enterprise information platform, etc. As shown in fig. 1, the information hiding method performed by the target platform may include:
step 101, receiving a call request initiated by a calling party, where the call request includes area information where the calling party is located and an encrypted number of a called party.
And after receiving the call request of the calling party, the target platform analyzes the call signaling contained in the call request. The target platform can obtain the number information of the calling party, the area information of the calling party and the encrypted number of the called party, which are carried by the calling signaling, according to the analysis result. The area information of the calling party refers to the current position of the calling party, and can be determined according to a base station or a cell where the calling party initiates a call request; or when the calling party initiates a call request, the terminal equipment used by the calling party can be positioned through the global positioning system. The regional information can be accurate to the county according to actual needs.
Step 102, judging whether the area information is contained in a service area range associated with a calling party; if yes, go to step 103; if not, step 104 is performed.
In the embodiment of the application, a service area associated with a calling party exists in a target platform. The service area may be used to indicate the area where the calling party is responsible for delivering the package. If the area where the calling party is responsible for dispatching the package is the east city area of Beijing city, then the service area associated with the calling party in the target platform is the east city area of Beijing city. It should be noted that when the area where the calling party is responsible for delivering the package changes, the service area associated with the calling party needs to be updated in the target platform.
After the area information of the calling party is obtained through the above step 101, it is determined whether the area information of the calling party is included in the service area range associated with the calling party. I.e. whether the current location of the calling party is within the area where it is responsible for delivering the package. And when the area information of the calling party is judged to be contained in the service area range associated with the calling party, executing the step 103, otherwise, executing the step 104.
And 103, determining the real number of the called party according to the encrypted number of the called party.
In this embodiment, the encrypted number of the called party includes a plaintext character and an encrypted character. The clear text symbol is a displayable partial real number, and the encryption symbol is a hidden partial real number. The specific steps of determining the real number of the called party according to the encrypted number of the called party are as follows.
First, to-be-dispatched order information in a service area associated with a calling party is determined.
Then, from the order information to be dispatched, a calling number which is consistent with a plain text character in the encrypted number of the called party is determined.
Specifically, the encrypted number of the called party contains an encryption mode prompt, when the encrypted number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt, order information of which the called party number belongs to the same area as the receiving address is screened from the order information to be dispatched and used as first order dispatching information, and a calling number which is consistent with a plaintext character in the encrypted number of the called party is determined from the first order dispatching information.
And when the encrypted number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt symbol, screening order information of which the called party number belongs to different areas from the receiving address from the order information to be dispatched as second order dispatching information, and determining a calling number which is consistent with a plaintext symbol in the encrypted number of the called party from the second order dispatching information.
And finally, if the determined calling number is one, determining the calling number as the real number of the called party. And if a plurality of calling numbers are determined, sending prompt information to the calling party to prompt the calling party to input an auxiliary identification code, and determining the real number of the called party from the calling numbers according to the auxiliary identification code input by the calling party.
Wherein, the auxiliary identification code is associated with the real number of the called party, and the real number of the called party can be uniquely determined. The auxiliary identification code may be transmitted to the calling party simultaneously when the real number of the called party is transmitted to the calling party. A specific transmission method will be described in the second embodiment of the present application.
In this embodiment, optionally, the auxiliary identification code is an order number of a package corresponding to the called party; or the auxiliary identification code is a code value generated by operation according to the real number of the called party, and comprises a combination of numbers and/or letters, an ASCII code and the like; alternatively, the auxiliary identification code is a randomly generated multi-bit number value, and the like, and the application is not limited thereto.
And 104, calling the called party according to the real number of the called party.
Step 105, the calling request of the calling party is rejected.
When the area information is judged not to be included in the service area range associated with the calling party, the current position of the calling party is not in the range where the calling party is responsible for delivering the package. The reasons for this may be: firstly, the calling party is not a delivery responsible person of a package corresponding to the current called party; secondly, the calling party is the delivery responsible person of the package corresponding to the current called party, but the distance from the delivery place is far, and the delivery task cannot be effectively executed. Then in this case the calling party's call request is rejected in order to guarantee dispatch efficiency and reduce the disturbance rate to the called party.
In this embodiment, a call request initiated by a calling party is received, where the call request includes area information where the calling party is located and an encrypted number of a called party. And judging whether the area information is contained in the service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. And rejecting the calling request of the calling party when the area information is not included in the service area range associated with the calling party. The real number of the called party is effectively hidden, the personal information of the called party is prevented from being leaked, and the personal information safety of the called party is protected.
Fig. 2 is a flowchart of another embodiment of the information hiding method of the present application.
As shown in fig. 2, in this embodiment, before step 101 is executed, the information hiding method of the present application further includes the following steps:
step 1001, according to the attribution of the real number of the called party in the order to be dispatched, determining the encryption mode of the real number of the called party.
When the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, the true number of the called party is encrypted by using a second encryption mode.
Specifically, the attribution of the real number of the called party may be specified to a local city, and when the attribution is the same as the local city corresponding to the recipient address of the package to be dispatched, the real number of the called party may be encrypted by using a first encryption method, otherwise, the real number of the called party may be encrypted by using a second encryption method. Optionally, the attribution of the real number of the called party may also be specified to a county according to actual requirements, and correspondingly, different encryption manners are determined according to the county corresponding to the recipient address of the package to be delivered, where the specific determination manner is the same as above and is not described again.
Step 1002, encrypting the real number of the called party according to the determined encryption mode.
The first encryption method and the second encryption method may be the same encryption method or different encryption methods. The specific encryption mode may include: deleting the middle adjacent digits in the real number of the called party, replacing the middle adjacent digits in the real number of the called party, shielding the middle adjacent digits in the real number of the called party and the like.
The encrypted number of the called party obtained by encrypting in the first encryption mode and the second encryption mode contains different encryption mode prompters for prompting the encryption mode of the encrypted number of the called party. The encryption mode prompt can be in the encrypted number of the called party as a part of the encrypted number of the called party, and can also be independently in addition to the encrypted number of the called party as an additional character.
For example, for the real number 12345678910, when it is encrypted by the first encryption method, the resulting encrypted number is 123# # #8910, and when it is encrypted by the second encryption method, the resulting encrypted number is 123 × 8910. At this time, the cryptosystem prompts "#" and "-" exist in the generated encrypted number as part of the encrypted number. For another example, the first encryption method is used to obtain the encrypted number 123sgRy8910(#), and the second encryption method is used to obtain the encrypted number 123yshF8910 (#). At this time, the cryptosystem prompts "#" and "-" exist independently as additional symbols other than the generated encrypted number.
Step 1003, determining a calling party for dispatching the order to be dispatched according to the address of the receiving party of the order to be dispatched. And sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
And determining a service area corresponding to the receiving address according to the receiving address of the order to be dispatched, further inquiring a calling party associated with the service area in the target platform, and determining the calling party as the calling party of the order to be dispatched, namely a dispatcher responsible for dispatching the package to be dispatched.
The auxiliary identification code associated with the real number of the called party and the encrypted number of the called party generated in the above steps are sent to the calling party, which may be: and sending the auxiliary identification code and the generated encrypted number of the called party to terminal equipment associated with the calling party, wherein the calling party initiates a calling request to the called party through the encrypted number of the called party in the terminal equipment. The method can also be as follows: and generating a wrapping list according to the auxiliary identification code and the generated encrypted number of the called party, and initiating a call request to the called party by the calling party according to the encrypted number of the called party on the wrapping list.
In the embodiment, the real number of the called party is encrypted through different encryption modes, the encrypted number of the called party is sent to the calling party, the calling party initiates a calling request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party, so that the personal information security of the called party is protected.
Fig. 3 is a flowchart of another embodiment of the information hiding method of the present application.
As shown in fig. 3, in this embodiment, after step 104 is executed, the information hiding method in this embodiment further includes the following steps:
step 1041, when the order corresponding to the real number of the called party changes from the to-be-dispatched state to the sign-off state, setting the encrypted number of the called party to be invalid.
In this embodiment, when the encrypted number of the called party is generated according to the real number of the called party, an effective time limit is set for the encrypted number of the called party and the auxiliary identification code associated with the real number of the called party, and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the receipt state, the encrypted number and the auxiliary identification code of the called party are invalid.
The valid time limit can be that when the order corresponding to the called party enters the to-be-dispatched state, the validity of the encrypted number of the called party is triggered, and at the moment, a call request can be initiated to the called party through the encrypted number of the called party; when the order corresponding to the called party is changed from the to-be-dispatched state to the signing state, the validity of the encrypted number of the called party is lost, and at the moment, a call request cannot be initiated to the called party through the encrypted number of the called party. In this case, the encrypted number of the called party is valid only when the order is in the to-be-dispatched state, so that the personal information security of the called party can be protected to the greatest extent.
The valid time limit may also be that, when the encrypted number of the called party is generated, the encrypted number of the called party is valid, and a call request can be initiated to the called party through the encrypted number of the called party in the whole logistics process of the order. Until the order is changed from the to-be-dispatched state to the signing-in state, the encryption number of the called party is invalid, and the calling request can not be initiated to the called party through the encryption number of the called party. Under the condition, the contact with the called party can be ensured through the encrypted number of the called party in the whole logistics process, and the accidental situations in the logistics process can be conveniently processed; meanwhile, the encrypted number of the called party is invalid after the order is signed, and the privacy and the safety of the called party are protected.
Fig. 4 is a schematic diagram of an embodiment of an information hiding method according to the present application.
Fig. 4 is a flow chart illustrating a call signaling generated by a call request is transferred between a calling party and a called party in a general call flow. As shown in fig. 4, the process includes:
step 41, a User Equipment (UE) of a calling party sends a call signaling INVITE to a Proxy-Session Border Control network element (PSBC).
In the prior art, a calling party User Equipment (UE) initiates a call request according to a real number abcxxdefg of a called party, and a generated call signaling INVITE includes a calling party UE _ a, called party real number information ABCXXXXDEFG, and information about a wireless cell where the calling party is located.
After receiving the call signaling INVITE, the PSBC _ a analyzes the wireless cell information therein to obtain the area information area of the calling party. And replaces the radio cell information in the call signaling INVITE with the areeid.
Steps 42 to 47, the Call signaling INVITE carrying the calling party UE _ a, the called party real number information abcxxxffg, and the calling party regional information areeid is forwarded to the called party User equipment (User equipment, UE _ B) by the query Session Control Function/service Session Control Function network element (I/SCSCF), the other platform AS, the query Session Control Function/service Session Control Function network element I/SCSCF _ B, and the proxy Session boundary Control network element PSBC _ B. At this point, the called party rings.
In step 48, UE _ B transmits the generated RING signal 180RING back to the calling party UE _ A.
In the calling process shown in fig. 4, a call request is initiated through the real number of the called party, the real number of the called party cannot be protected, and the generated call signaling INVITE does not pass through the target platform, i.e., the enterprise information platform AS in fig. 4.
In the call flow of the embodiment of the present application, unlike the prior art, the calling party initiates the call request through the encrypted number of the called party. As shown in fig. 5, the called party number information included in the call signaling INVITE generated at the calling party UE _ a is encrypted number information. In the embodiment of the present application, the process includes:
step 50, the calling party user equipment UE _ a transfers the call signaling INVITE containing the encrypted number of the called party to the proxy session border control network element PSBC _ a.
A further difference is that the call signaling INVITE goes through the target platform, i.e. the enterprise information platform AS in fig. 5.
Step 50-52, the call signaling INVITE is transmitted to the enterprise information platform AS via the query session control function/service session control function network element I/SCSCF _ a. At this time, the enterprise information platform AS compares the area information area of the calling party, carried in the call signaling INVITE, with the service area associated with the calling party in the target platform to determine the call authority of the calling party.
And when the enterprise information platform AS determines that the calling party has the calling right, determining the real number ABCCXXXDEFG of the called party according to the encrypted number ABC x DEFG of the called party carried in the call signaling INVITE. And replaces the encrypted number ABC x DEFG of the called party in the call signaling INVITE with the real number abcxxdefg of the called party.
Step 53, the enterprise information platform AS sends back the call signaling INVITE containing the real number abcxxxffg of the called party to the interrogating session control function/serving session control function network element I/SCSCF _ a.
Step 54-58, the call signaling INVITE is forwarded by the query session control function/service session control function network element I/SCSCF _ a, other platform AS, query session control function/service session control function network element I/SCSCF _ B, proxy session border control network element PSBC _ B, and is transmitted to the called user equipment UE _ B. At this point, the called party rings.
In step 59, the called party UE _ B returns the ringing information 180RING to the calling party UE _ a.
The enterprise information platform AS comprises order information, and when determining the real number of the called party according to the encrypted number of the called party carried in the call signaling INVITE, the enterprise information platform AS comprises the following process.
Firstly, the encryption mode of the encryption number of the called party is determined according to the encryption mode prompt contained in the encryption number of the called party.
Secondly, determining the query range when the real number of the called party is queried according to the encryption mode.
AS shown in fig. 5, after the enterprise information platform AS determines the encryption mode according to the encryption mode indicator "+", if the encryption mode is the first encryption mode, it is determined that the query range is the order in which the home location of the real number of the called party and the recipient address belong to the same area in the order to be dispatched in the service area of the calling party.
AS shown in fig. 6, after the enterprise information platform AS determines the encryption mode according to the prompt "#" of the encryption mode, assuming that the encryption mode is the second encryption mode, it determines that the query range is an order in which the home location and the recipient address of the real number of the called party do not belong to the same area in the order to be dispatched in the service area of the calling party.
Then, from the determined query range, a calling number that coincides with the plain text character of the encrypted number of the called party is queried.
Specifically, the encrypted number of the called party includes a plaintext character and an encrypted character, and the fact that the plaintext character of the encrypted number of the called party is consistent means that the number at the corresponding position of the inquired calling number is consistent with the plaintext character of the encrypted number of the called party. For example, for the encrypted number ABC × DEFG of the called party in fig. 5, its plaintext is ABCDEFG and its encrypted character is ABCDEFG; if the calling number obtained by the inquiry is ABCCJUHKDEFG, the calling number also starts with ABC and ends with DEFG, the clear text character of the encrypted number of the called party is considered to be consistent.
And finally, determining the real number of the called party from the calling number according to the auxiliary identification code.
In this embodiment, the calling party initiates a call request according to the encrypted number of the called party, and when the call signaling INVITE is transmitted to the target platform, that is, the enterprise information platform AS converts the encrypted number of the called party carried in the call signaling INVITE into the real number of the called party, and executes the following signaling transmission process to complete the call. In the whole calling process, the real number of the called party is invisible to the calling party, so that the personal information security of the called party is protected.
In order to facilitate understanding of the present application, in another embodiment of the present application, a specific example is used to describe the information hiding method of the present application.
In this embodiment, an implementation flow is described by taking an example of implementing the information hiding method of the present application in a Voice over LTE (VoLTE) network.
There are two preconditions for implementing this method under VoLTE. First, as a calling party, a courier needs to pre-store personal information in a target platform, including basic information such as name, age, gender, and contact telephone, and work information such as a service area. Second, the courier needs to open the VoLTE service and sign up for a specific Initial Filter Criteria (IFC). The IFC is used to indicate an execution platform of the call service, and the IFC has the highest priority among all the IFCs that have been signed, so that when a calling party initiates a call request, the IFC is triggered first, and the call service jumps to a target platform for execution.
Fig. 7 is a flowchart of another embodiment of the information hiding method of the present application. As shown in fig. 7, based on the above-mentioned premise, the execution flow of the information hiding method of the present application is as follows.
Step 201, receiving a call request of a calling party, and judging a call authority of the calling party.
After a calling party initiates a call request, a call signaling INVITE is generated, and at the moment, the core network triggers the call signaling INVITE to an enterprise information platform (AS) according to the IFC signed by the calling party. After receiving the call signaling INVITE, the enterprise information platform AS determines the identity information of the calling party according to the calling party information contained therein, such AS the contact telephone of the calling party; and inquiring the service area of the calling party in an enterprise information platform (AS) according to the regional information of the calling party, such AS the Beijing Toyork area, and if the service area of the calling party is the Beijing city, judging that the calling party has the calling authority when the regional information is contained in the service area of the calling party. If the service area of the calling party is the western city area of Beijing city, the regional information is judged not to be contained in the service area of the calling party, and the calling party is considered not to have the calling authority. If the information of the calling party does not exist in the enterprise information platform AS, the calling party is considered to have no calling authority at the moment.
In the call signaling INVITE, the regional information of the calling party can be accurate to the county, and the format is '0 + area code, county code', and the areeid is used as the identifier. For example, 010.001 is in the Tokyo area of Beijing and 010.002 is in the Western area.
When the calling party is judged to have the calling right, step 202 is executed. Otherwise, step 204 is performed.
Step 202, according to the call signaling INVITE, the real number of the called party is determined.
And when the calling party is judged to have the calling right, the enterprise information platform AS determines the real number of the called party according to the received call signaling INVITE.
First, the encrypted number ABC × DEFG of the called party carried in the call signaling INVITE is obtained, and the encryption method used by the called party is determined according to the encryption method prompt in the encrypted number. In this embodiment, the encryption mode indicator is "", and it may be determined that the first encryption mode is used. Of course, the encryption scheme prompt may also correspond to the second encryption scheme, as the case requires.
Secondly, the real number of the called party is determined according to the encryption mode of the encrypted number of the called party. In this embodiment, it is determined that the encryption mode is the first encryption mode, and it is assumed that the location of the called party's real number is the beijing-city-east-city area and the recipient address is the beijing-city-east-city area, then, in the enterprise information platform AS, from the order to be dispatched, the order whose recipient address is the beijing-city-east-city area and whose location of the recipient's contact phone is also the order of the beijing-city-east-city area is queried. An order in which the contact address of the recipient starts with ABC and ends with DEFG is determined, and the contact phone of the recipient in the order is extracted.
When only one contact phone meeting the conditions exists, the contact phone is used as the real number of the called party; when a plurality of contact numbers exist, the enterprise information platform AS sends a voice prompt to the calling party to 'please input the auxiliary identification code', and a plurality of contact numbers are screened through the auxiliary identification code to obtain the real number of the called party.
Step 203, according to the real number of the called party, executing the call request.
And after the real number of the called party is obtained, the enterprise information platform AS replaces the encrypted number of the called party carried in the call signaling INVITE by the real number of the called party, transmits the call signaling INVITE to a corresponding network element and executes a call request.
Step 204, the calling request of the calling party is rejected.
Fig. 8 is a schematic structural diagram of an embodiment of an information hiding apparatus according to the present application, where the information hiding apparatus in the present embodiment may be used as an information hiding device to implement the information hiding method according to the present application. As shown in fig. 8, the information hiding apparatus may include: a receiving module 81, a judging module 82, a determining module 83 and a calling module 84.
The receiving module 81 is configured to receive a call request initiated by a calling party, where the call request includes area information where the calling party is located and an encrypted number of a called party. A determining module 82, configured to determine whether the area information is included in the service area range associated with the calling party. And the determining module 83 is used for determining the real number of the called party according to the encrypted number of the called party when the area information is contained in the service area range associated with the calling party. And the calling module 84 is used for calling the called party according to the real number of the called party.
In concrete implementation, the determining module 83 is configured to determine order information to be dispatched in a service area associated with the calling party, and determine, from the order information to be dispatched, a calling number consistent with a plain text symbol in the encrypted number of the called party. If the determined calling number is one, determining the calling number as the real number of the called party; if a plurality of calling numbers are determined, prompt information is sent to the calling party to prompt the calling party to input the auxiliary identification code, and the real number of the called party is determined from the calling numbers according to the auxiliary identification code input by the calling party.
In this embodiment, when a call request is initiated to a called party, the receiving module 81 receives the call request initiated by a calling party, the determining module 82 determines the call authority of the calling party, and when the calling party has the call authority, the determining module 83 determines the real number of the called party according to the encrypted number of the called party, and calls the called party through the calling module 84. In the whole calling process, the real number of the called party is invisible to the calling party, so that the personal information of the called party is effectively hidden, and the personal information safety of the called party is protected.
Fig. 9 is a schematic structural diagram of another embodiment of the information hiding device of the present application, and compared with the information hiding device shown in fig. 8, the difference is that the information hiding device shown in fig. 9 may further include: an encryption module 85 and a sending module 86.
In a specific implementation, the encryption module 85 is configured to, before the receiving module 81 receives the call request initiated by the calling party, determine an encryption manner for the real number of the called party according to a home location of the real number of the called party in the order to be dispatched, and encrypt the real number of the called party according to the determined encryption manner.
The sending module 86 is configured to determine a calling party who sends the order to be dispatched according to the address of the recipient of the order to be dispatched, and send the encrypted number of the called party to the calling party, so that the calling party initiates a call request through the encrypted number of the called party.
FIG. 10 is a schematic block diagram of an embodiment of an electronic device according to the present application, which may include at least one processor, as shown in FIG. 10; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, and the processor calls the program instructions to execute the information hiding method provided by the embodiment of the application.
The electronic device may be an information hiding device, and the embodiment does not limit the specific form of the electronic device.
FIG. 10 illustrates a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the present application. The electronic device shown in fig. 10 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 10, the electronic device is in the form of a general purpose computing device. Components of the electronic device may include, but are not limited to: one or more processors 410, a memory 430, and a communication bus 440 that connects the various system components (including the memory 430 and the processing unit 410).
Communication bus 440 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. These architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, to name a few.
Electronic devices typically include a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 430 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) and/or cache Memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. Although not shown in FIG. 10, a disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to the communication bus 440 by one or more data media interfaces. Memory 430 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
A program/utility having a set (at least one) of program modules, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored in memory 430, each of which examples or some combination may include an implementation of a network environment. The program modules generally perform the functions and/or methodologies of the embodiments described herein.
The electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, display, etc.), one or more devices that enable a user to interact with the electronic device, and/or any devices (e.g., network card, modem, etc.) that enable the electronic device to communicate with one or more other computing devices. Such communication may occur via communication interface 420. Furthermore, the electronic device may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public Network such as the Internet) via a Network adapter (not shown in FIG. 10) that may communicate with other modules of the electronic device via the communication bus 440. It should be appreciated that although not shown in FIG. 10, other hardware and/or software modules may be used in conjunction with the electronic device, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape Drives, and data backup storage systems, among others.
The processor 410 executes various functional applications and data processing, for example, implementing an information hiding method provided by an embodiment of the present application, by executing programs stored in the memory 430.
The embodiment of the present application further provides a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores a computer instruction, and the computer instruction enables the computer to execute the information hiding method provided in the embodiment of the present application.
The non-transitory computer readable storage medium described above may take any combination of one or more computer readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), a flash Memory, an optical fiber, a portable compact disc Read Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be noted that the terminal according to the embodiments of the present application may include, but is not limited to, a Personal Computer (Personal Computer; hereinafter, referred to as PC), a Personal Digital Assistant (Personal Digital Assistant; hereinafter, referred to as PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. An information hiding method is characterized in that an execution subject of the method is a target platform, and the method comprises the following steps:
receiving a call request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party;
judging whether the area information is contained in a service area range associated with the calling party;
if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party;
and calling the called party according to the real number of the called party.
2. The method of claim 1, wherein prior to receiving the call request initiated by the calling party, the method further comprises:
determining an encryption mode for the real number of the called party according to the attribution place of the real number of the called party in the order to be dispatched; encrypting the real number of the called party according to the determined encryption mode;
determining a calling party for dispatching the order to be dispatched according to the address of the receiving of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
3. The method of claim 2, wherein determining the encryption of the real number of the called party based on the location of the real number of the called party in the order to be dispatched comprises:
when the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, the true number of the called party is encrypted by using a second encryption mode.
4. The method of claim 1, wherein the encrypted number of the called party comprises encrypted characters and plain characters;
determining the real number of the called party according to the encrypted number of the called party, comprising:
determining order information to be dispatched in a service area associated with a calling party;
determining a calling number consistent with a clear text symbol in an encrypted number of a called party from the order information to be dispatched;
if the determined calling number is one, determining the calling number as the real number of the called party;
if a plurality of calling numbers are determined, sending prompt information to the calling party to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from the calling numbers according to the auxiliary identification code input by the calling party.
5. The method of claim 4, wherein the encrypted number of the called party includes an encrypted mode prompt;
determining a calling number consistent with a plain text symbol in an encrypted number of a called party from the order information to be dispatched, comprising:
if the encrypted number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt sign, screening first order dispatching information of which the called party number attribution and the receiving address belong to the same area from the order information to be dispatched; determining a calling number consistent with a plain text symbol in an encrypted number of a called party from the first order dispatching information;
if the encrypted number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt sign, screening second order dispatching information of which the called party number attribution and the receiving address belong to different areas from the order information to be dispatched; and determining a calling number consistent with a plain text character in the encrypted number of the called party from the second order dispatch information.
6. The method of claim 1, wherein after the call is placed to the called party based on the real number of the called party, the method further comprises:
and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the signing-in state, setting the encrypted number of the called party to be invalid.
7. An information hiding apparatus, comprising:
the receiving module is used for receiving a calling request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party;
the judging module is used for judging whether the area information is contained in a service area range associated with the calling party;
the determining module is used for determining the real number of the called party according to the encrypted number of the called party when the area information is contained in the service area range associated with the calling party;
and the calling module is used for calling the called party according to the real number of the called party.
8. The apparatus of claim 7, further comprising:
the encryption module is used for determining an encryption mode of the real number of the called party according to the attribution place of the real number of the called party in the order to be dispatched before the receiving module receives the call request initiated by the calling party; encrypting the real number of the called party according to the determined encryption mode;
the sending module is used for determining a calling party for dispatching the order to be dispatched according to the address of the receiving party of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
9. An electronic device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 6.
10. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1 to 6.
CN202010704905.2A 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment Active CN113965648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010704905.2A CN113965648B (en) 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010704905.2A CN113965648B (en) 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113965648A true CN113965648A (en) 2022-01-21
CN113965648B CN113965648B (en) 2024-05-07

Family

ID=79459755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010704905.2A Active CN113965648B (en) 2020-07-21 2020-07-21 Information hiding method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113965648B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090022149A1 (en) * 2007-07-20 2009-01-22 Cisco Technology, Inc. Using PSTN Reachability to Verify VoIP Call Routing Information
US20110294481A1 (en) * 2010-05-25 2011-12-01 Nzumafo Heine F E-Mail to Phone Number Resolution for Mobile to Mobile, Mobile to Landline, And PC to Mobile Communications
WO2011154221A1 (en) * 2010-06-11 2011-12-15 International Business Machines Corporation System, method and computer program product for filtering telephone communications
CN102567883A (en) * 2010-12-07 2012-07-11 亚马逊技术股份有限公司 Privacy protection related to product shipment
US20120207297A1 (en) * 2010-03-21 2012-08-16 Zte Corporation Method, System and Apparatus for Implementing Secure Call Forwarding
CN105721720A (en) * 2014-12-03 2016-06-29 中国电信股份有限公司 Method for displaying virtual number, and virtual number distribution platform and system
CN105992200A (en) * 2015-02-13 2016-10-05 中国电信股份有限公司 Addressee calling method, device, server and system
CN106303103A (en) * 2015-06-25 2017-01-04 阿里巴巴集团控股有限公司 A kind of communication means protecting personal information and device
US20170104870A1 (en) * 2014-06-25 2017-04-13 Orange A method to authenticate calls in a telecommunication system
WO2018147467A1 (en) * 2017-02-13 2018-08-16 クックパッド株式会社 Reservation management phone-call system, reservation management phone-call program, and reservation management phone-call method
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
US20200028690A1 (en) * 2018-07-17 2020-01-23 Verizon Patent And Licensing Inc. Validating and securing caller identification to prevent identity spoofing
US10681206B1 (en) * 2018-12-05 2020-06-09 At&T Intellectual Property I, L.P. Detecting a spoofed call

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090022149A1 (en) * 2007-07-20 2009-01-22 Cisco Technology, Inc. Using PSTN Reachability to Verify VoIP Call Routing Information
US20120207297A1 (en) * 2010-03-21 2012-08-16 Zte Corporation Method, System and Apparatus for Implementing Secure Call Forwarding
US20110294481A1 (en) * 2010-05-25 2011-12-01 Nzumafo Heine F E-Mail to Phone Number Resolution for Mobile to Mobile, Mobile to Landline, And PC to Mobile Communications
WO2011154221A1 (en) * 2010-06-11 2011-12-15 International Business Machines Corporation System, method and computer program product for filtering telephone communications
CN102567883A (en) * 2010-12-07 2012-07-11 亚马逊技术股份有限公司 Privacy protection related to product shipment
US20170104870A1 (en) * 2014-06-25 2017-04-13 Orange A method to authenticate calls in a telecommunication system
CN105721720A (en) * 2014-12-03 2016-06-29 中国电信股份有限公司 Method for displaying virtual number, and virtual number distribution platform and system
CN105992200A (en) * 2015-02-13 2016-10-05 中国电信股份有限公司 Addressee calling method, device, server and system
CN106303103A (en) * 2015-06-25 2017-01-04 阿里巴巴集团控股有限公司 A kind of communication means protecting personal information and device
WO2018147467A1 (en) * 2017-02-13 2018-08-16 クックパッド株式会社 Reservation management phone-call system, reservation management phone-call program, and reservation management phone-call method
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
US20200028690A1 (en) * 2018-07-17 2020-01-23 Verizon Patent And Licensing Inc. Validating and securing caller identification to prevent identity spoofing
US10681206B1 (en) * 2018-12-05 2020-06-09 At&T Intellectual Property I, L.P. Detecting a spoofed call

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
陆广海;: "VoLTE网络短号码呼叫方案研究", 山东通信技术, no. 03, pages 13 - 16 *
陈士梁;: "互联网语音业务中的个人信息保护方法与实现技术", 中国新通信, no. 16, pages 129 - 130 *

Also Published As

Publication number Publication date
CN113965648B (en) 2024-05-07

Similar Documents

Publication Publication Date Title
US11023572B2 (en) Augmented reality object providing method and server using image authentication
US7937097B2 (en) Method, system, and computer program product for anonymously/privately exchanging text messages
EP2525622B1 (en) Method and apparatus for communication based on pseudo-contact information
US20120135744A1 (en) Systems and methods for generating and managing communication rules associated with geographic locations
US11449820B2 (en) Electronic signing method and apparatus
US20100162388A1 (en) Wireless mobile device with automatic segregation of received messages for private and public access
CN110620846B (en) Message merging method, device, equipment and storage medium
EP1919174A1 (en) Presence information delivery apparatus and method for mobile communication network
CN109743246B (en) Message emergency reminding method and device and electronic equipment
US20070140439A1 (en) Method for presenting location information on a mobile terminal
CN105681564A (en) Message reminding method and device
CN113067859A (en) Communication method and device based on cloud mobile phone
US20120095771A1 (en) System and method for sending, receiving and updatiing business card between electronic devices
CN106921557B (en) Mail sending method and equipment
KR101611241B1 (en) Message authentication method, system, server and computer-readable medium
CN113965648B (en) Information hiding method and device and electronic equipment
US20050182738A1 (en) Message handling device and method for telecommunication terminal and telecommunication terminal provided with such a device
US10728191B2 (en) Method for establishing communication within a closed network
CN106211101A (en) A kind of processing method and processing device of voice SMS
EP2571300B1 (en) Wireless public telephone network management short message verifying method and device
KR100610901B1 (en) Mobile Communication System Having Information Message Filtering Function and Method thereof
KR20170088240A (en) Method for Safe Number Processing, Recording Medium and Program thereof
CN106332017A (en) Method for implementing voice short message on basis of internet telephony
KR20130054575A (en) Apparatus and method for identifying loss of portable terminal in wireless communication system
US20210112151A1 (en) Method and System that Mitigates Digital Address Book Data Decay [TetherTap]

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant