CN113965648A - Information hiding method and device and electronic equipment - Google Patents
Information hiding method and device and electronic equipment Download PDFInfo
- Publication number
- CN113965648A CN113965648A CN202010704905.2A CN202010704905A CN113965648A CN 113965648 A CN113965648 A CN 113965648A CN 202010704905 A CN202010704905 A CN 202010704905A CN 113965648 A CN113965648 A CN 113965648A
- Authority
- CN
- China
- Prior art keywords
- called party
- calling
- party
- encrypted
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 238000012216 screening Methods 0.000 claims description 5
- 230000011664 signaling Effects 0.000 description 31
- 230000006870 function Effects 0.000 description 17
- 230000008569 process Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42348—Location-based services which utilize the location information of a target
- H04M3/42357—Location-based services which utilize the location information of a target where the information is provided to a monitoring entity such as a potential calling party or a call processing server
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The application provides an information hiding method and device and electronic equipment, and relates to the technical field of information security. In the method of the embodiment of the application, the calling party initiates a calling request according to the encrypted number of the called party, and the calling request comprises the area information of the calling party and the encrypted number of the called party. And after receiving a calling request initiated by a calling party, the target platform judges whether the area information is contained in the service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, the target platform determines the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. According to the method, the calling party initiates the calling request according to the encrypted number of the called party, the real number of the called party is invisible to the calling party, the real number of the called party is effectively hidden, leakage of personal information of the called party is prevented, and personal information safety of the called party is protected.
Description
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of information security technologies, and in particular, to an information hiding method and apparatus, and an electronic device.
[ background of the invention ]
In a package delivery scenario, the recipient's personal information, such as contact phone number, address, etc., is typically displayed in clear text on a single face. In the process of delivering the package, the courier and all persons who contact the package can directly obtain the personal information of the user, so that the personal information of the user is leaked. Even after the package is signed, the personal information of the user still remains on the discarded package, which is not beneficial to protecting the personal information of the user.
In the prior art, a user can only smear or destroy personal information on a package to be discarded after signing in the package, so that the leakage of the personal information is prevented. However, the personal information of the user is always at risk of leakage during the package delivery process.
[ summary of the invention ]
The embodiment of the application provides an information hiding method and device and electronic equipment, so that the hiding and protection of the personal information of a receiver are realized in the parcel delivery process, and the leakage of the personal information of the receiver is prevented.
In a first aspect, an embodiment of the present application provides an information hiding method, including: receiving a call request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party; judging whether the area information is contained in a service area range associated with the calling party; if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party; and calling the called party according to the real number of the called party.
In one possible implementation mode, an encryption mode for the real number of the called party is determined according to the attribution of the real number of the called party in the order to be dispatched; encrypting the real number of the called party according to the determined encryption mode; determining a calling party for dispatching the order to be dispatched according to the address of the receiving of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
In one possible implementation manner, the method further includes: when the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, the true number of the called party is encrypted by using a second encryption mode.
In one possible implementation manner, the encrypted number of the called party includes a ciphertext symbol and a plaintext symbol; determining the real number of the called party according to the encrypted number of the called party, comprising: determining order information to be dispatched in a service area associated with a calling party; determining a calling number consistent with a plaintext character in an encrypted number of a called party from the order information to be dispatched; if the determined calling number is one, determining the calling number as the real number of the called party; if a plurality of calling numbers are determined, sending prompt information to the calling party to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from the calling numbers according to the auxiliary identification code input by the calling party.
In one possible implementation manner, the encrypted number of the called party includes an encryption manner prompt;
determining a calling number consistent with a plain text symbol in the encrypted number of the called party from the order information to be dispatched, wherein the step of determining the calling number comprises the following steps:
if the encrypted number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt sign, screening first order dispatching information of which the called party number attribution and the receiving address belong to the same area from the order information to be dispatched; determining a calling number consistent with a plain text symbol in an encrypted number of a called party from the first order dispatching information; if the encrypted number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt sign, screening second order dispatching information of which the called party number attribution and the receiving address belong to different areas from the order information to be dispatched; and determining a calling number consistent with a plain text character in the encrypted number of the called party from the second order dispatching information.
In one possible implementation manner, after the called party is called according to the real number of the called party, the method further includes: and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the signing-in state, setting the encrypted number of the called party to be invalid.
In a second aspect, an embodiment of the present application provides an information hiding apparatus, including: the receiving module is used for receiving a calling request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party; the judging module is used for judging whether the area information is contained in a service area range associated with the calling party; the determining module is used for determining the real number of the called party according to the encrypted number of the called party when the area information is contained in the service area range associated with the calling party; and the calling module is used for calling the called party according to the real number of the called party.
In one possible implementation manner, the apparatus further includes: the encryption module is used for determining an encryption mode of the real number of the called party according to the attribution place of the real number of the called party in the order to be dispatched before the receiving module receives the call request initiated by the calling party; encrypting the real number of the called party according to the determined encryption mode; the sending module is used for determining a calling party for dispatching the order to be dispatched according to the address of the receiving party of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
In a third aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, which when called by the processor are capable of performing the method as described above.
In a fourth aspect, embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the method as described above.
In the above technical solution, the calling party initiates a call request according to the encrypted number of the called party, and the call request includes the area information where the calling party is located and the encrypted number of the called party. After receiving a calling request initiated by a calling party, the target platform judges whether the area information is contained in a service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, the target platform determines the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. The calling party initiates a calling request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party in the whole calling process, so that the real number of the called party is effectively hidden. In the calling process, the target platform determines the real number of the called party according to the encrypted number of the called party in the calling request, so that the calling is completed, the safety is higher, the personal information of the called party is prevented from being leaked, and the personal information safety of the called party is protected.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of an information hiding method of the present application;
FIG. 2 is a flow chart of another embodiment of the information hiding method of the present application;
FIG. 3 is a flowchart of another embodiment of the information hiding method of the present application;
FIG. 4 is a diagram illustrating an embodiment of an information hiding method according to the present application;
FIG. 5 is another schematic diagram of an embodiment of an information hiding method of the present application;
FIG. 6 is a further schematic diagram of an embodiment of an information hiding method of the present application;
FIG. 7 is a flowchart of another embodiment of an information hiding method of the present application;
FIG. 8 is a schematic structural diagram of an embodiment of an information hiding apparatus according to the present application;
FIG. 9 is a schematic structural diagram of another embodiment of an information hiding apparatus according to the present application;
fig. 10 is a schematic structural diagram of an embodiment of an electronic device according to the present application.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In the package delivery scenario referred to in the embodiments of the present application, a call is initiated by a sender to a recipient based on the recipient's contact phone. In the process, the sender is the calling party of the embodiment of the application, and the receiver is the called party of the embodiment of the application.
In the embodiment of the application, the contact telephone of the receiver is the encrypted contact telephone of the receiver, when the calling party initiates a call request according to the encrypted contact telephone, the target platform responds to the call request, and the information hiding method in the embodiment of the application is executed according to the call request.
Fig. 1 is a flowchart of an embodiment of an information hiding method of the present application. The execution subject of the method shown in fig. 1 is the target platform. The target platform may be, for example, a logistics service platform, or may be an enterprise information platform, etc. As shown in fig. 1, the information hiding method performed by the target platform may include:
And after receiving the call request of the calling party, the target platform analyzes the call signaling contained in the call request. The target platform can obtain the number information of the calling party, the area information of the calling party and the encrypted number of the called party, which are carried by the calling signaling, according to the analysis result. The area information of the calling party refers to the current position of the calling party, and can be determined according to a base station or a cell where the calling party initiates a call request; or when the calling party initiates a call request, the terminal equipment used by the calling party can be positioned through the global positioning system. The regional information can be accurate to the county according to actual needs.
In the embodiment of the application, a service area associated with a calling party exists in a target platform. The service area may be used to indicate the area where the calling party is responsible for delivering the package. If the area where the calling party is responsible for dispatching the package is the east city area of Beijing city, then the service area associated with the calling party in the target platform is the east city area of Beijing city. It should be noted that when the area where the calling party is responsible for delivering the package changes, the service area associated with the calling party needs to be updated in the target platform.
After the area information of the calling party is obtained through the above step 101, it is determined whether the area information of the calling party is included in the service area range associated with the calling party. I.e. whether the current location of the calling party is within the area where it is responsible for delivering the package. And when the area information of the calling party is judged to be contained in the service area range associated with the calling party, executing the step 103, otherwise, executing the step 104.
And 103, determining the real number of the called party according to the encrypted number of the called party.
In this embodiment, the encrypted number of the called party includes a plaintext character and an encrypted character. The clear text symbol is a displayable partial real number, and the encryption symbol is a hidden partial real number. The specific steps of determining the real number of the called party according to the encrypted number of the called party are as follows.
First, to-be-dispatched order information in a service area associated with a calling party is determined.
Then, from the order information to be dispatched, a calling number which is consistent with a plain text character in the encrypted number of the called party is determined.
Specifically, the encrypted number of the called party contains an encryption mode prompt, when the encrypted number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt, order information of which the called party number belongs to the same area as the receiving address is screened from the order information to be dispatched and used as first order dispatching information, and a calling number which is consistent with a plaintext character in the encrypted number of the called party is determined from the first order dispatching information.
And when the encrypted number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt symbol, screening order information of which the called party number belongs to different areas from the receiving address from the order information to be dispatched as second order dispatching information, and determining a calling number which is consistent with a plaintext symbol in the encrypted number of the called party from the second order dispatching information.
And finally, if the determined calling number is one, determining the calling number as the real number of the called party. And if a plurality of calling numbers are determined, sending prompt information to the calling party to prompt the calling party to input an auxiliary identification code, and determining the real number of the called party from the calling numbers according to the auxiliary identification code input by the calling party.
Wherein, the auxiliary identification code is associated with the real number of the called party, and the real number of the called party can be uniquely determined. The auxiliary identification code may be transmitted to the calling party simultaneously when the real number of the called party is transmitted to the calling party. A specific transmission method will be described in the second embodiment of the present application.
In this embodiment, optionally, the auxiliary identification code is an order number of a package corresponding to the called party; or the auxiliary identification code is a code value generated by operation according to the real number of the called party, and comprises a combination of numbers and/or letters, an ASCII code and the like; alternatively, the auxiliary identification code is a randomly generated multi-bit number value, and the like, and the application is not limited thereto.
And 104, calling the called party according to the real number of the called party.
When the area information is judged not to be included in the service area range associated with the calling party, the current position of the calling party is not in the range where the calling party is responsible for delivering the package. The reasons for this may be: firstly, the calling party is not a delivery responsible person of a package corresponding to the current called party; secondly, the calling party is the delivery responsible person of the package corresponding to the current called party, but the distance from the delivery place is far, and the delivery task cannot be effectively executed. Then in this case the calling party's call request is rejected in order to guarantee dispatch efficiency and reduce the disturbance rate to the called party.
In this embodiment, a call request initiated by a calling party is received, where the call request includes area information where the calling party is located and an encrypted number of a called party. And judging whether the area information is contained in the service area range associated with the calling party, and if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party. And calling the called party according to the real number of the called party. And rejecting the calling request of the calling party when the area information is not included in the service area range associated with the calling party. The real number of the called party is effectively hidden, the personal information of the called party is prevented from being leaked, and the personal information safety of the called party is protected.
Fig. 2 is a flowchart of another embodiment of the information hiding method of the present application.
As shown in fig. 2, in this embodiment, before step 101 is executed, the information hiding method of the present application further includes the following steps:
step 1001, according to the attribution of the real number of the called party in the order to be dispatched, determining the encryption mode of the real number of the called party.
When the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, the true number of the called party is encrypted by using a second encryption mode.
Specifically, the attribution of the real number of the called party may be specified to a local city, and when the attribution is the same as the local city corresponding to the recipient address of the package to be dispatched, the real number of the called party may be encrypted by using a first encryption method, otherwise, the real number of the called party may be encrypted by using a second encryption method. Optionally, the attribution of the real number of the called party may also be specified to a county according to actual requirements, and correspondingly, different encryption manners are determined according to the county corresponding to the recipient address of the package to be delivered, where the specific determination manner is the same as above and is not described again.
Step 1002, encrypting the real number of the called party according to the determined encryption mode.
The first encryption method and the second encryption method may be the same encryption method or different encryption methods. The specific encryption mode may include: deleting the middle adjacent digits in the real number of the called party, replacing the middle adjacent digits in the real number of the called party, shielding the middle adjacent digits in the real number of the called party and the like.
The encrypted number of the called party obtained by encrypting in the first encryption mode and the second encryption mode contains different encryption mode prompters for prompting the encryption mode of the encrypted number of the called party. The encryption mode prompt can be in the encrypted number of the called party as a part of the encrypted number of the called party, and can also be independently in addition to the encrypted number of the called party as an additional character.
For example, for the real number 12345678910, when it is encrypted by the first encryption method, the resulting encrypted number is 123# # #8910, and when it is encrypted by the second encryption method, the resulting encrypted number is 123 × 8910. At this time, the cryptosystem prompts "#" and "-" exist in the generated encrypted number as part of the encrypted number. For another example, the first encryption method is used to obtain the encrypted number 123sgRy8910(#), and the second encryption method is used to obtain the encrypted number 123yshF8910 (#). At this time, the cryptosystem prompts "#" and "-" exist independently as additional symbols other than the generated encrypted number.
Step 1003, determining a calling party for dispatching the order to be dispatched according to the address of the receiving party of the order to be dispatched. And sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
And determining a service area corresponding to the receiving address according to the receiving address of the order to be dispatched, further inquiring a calling party associated with the service area in the target platform, and determining the calling party as the calling party of the order to be dispatched, namely a dispatcher responsible for dispatching the package to be dispatched.
The auxiliary identification code associated with the real number of the called party and the encrypted number of the called party generated in the above steps are sent to the calling party, which may be: and sending the auxiliary identification code and the generated encrypted number of the called party to terminal equipment associated with the calling party, wherein the calling party initiates a calling request to the called party through the encrypted number of the called party in the terminal equipment. The method can also be as follows: and generating a wrapping list according to the auxiliary identification code and the generated encrypted number of the called party, and initiating a call request to the called party by the calling party according to the encrypted number of the called party on the wrapping list.
In the embodiment, the real number of the called party is encrypted through different encryption modes, the encrypted number of the called party is sent to the calling party, the calling party initiates a calling request according to the encrypted number of the called party, and the real number of the called party is invisible to the calling party, so that the personal information security of the called party is protected.
Fig. 3 is a flowchart of another embodiment of the information hiding method of the present application.
As shown in fig. 3, in this embodiment, after step 104 is executed, the information hiding method in this embodiment further includes the following steps:
In this embodiment, when the encrypted number of the called party is generated according to the real number of the called party, an effective time limit is set for the encrypted number of the called party and the auxiliary identification code associated with the real number of the called party, and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the receipt state, the encrypted number and the auxiliary identification code of the called party are invalid.
The valid time limit can be that when the order corresponding to the called party enters the to-be-dispatched state, the validity of the encrypted number of the called party is triggered, and at the moment, a call request can be initiated to the called party through the encrypted number of the called party; when the order corresponding to the called party is changed from the to-be-dispatched state to the signing state, the validity of the encrypted number of the called party is lost, and at the moment, a call request cannot be initiated to the called party through the encrypted number of the called party. In this case, the encrypted number of the called party is valid only when the order is in the to-be-dispatched state, so that the personal information security of the called party can be protected to the greatest extent.
The valid time limit may also be that, when the encrypted number of the called party is generated, the encrypted number of the called party is valid, and a call request can be initiated to the called party through the encrypted number of the called party in the whole logistics process of the order. Until the order is changed from the to-be-dispatched state to the signing-in state, the encryption number of the called party is invalid, and the calling request can not be initiated to the called party through the encryption number of the called party. Under the condition, the contact with the called party can be ensured through the encrypted number of the called party in the whole logistics process, and the accidental situations in the logistics process can be conveniently processed; meanwhile, the encrypted number of the called party is invalid after the order is signed, and the privacy and the safety of the called party are protected.
Fig. 4 is a schematic diagram of an embodiment of an information hiding method according to the present application.
Fig. 4 is a flow chart illustrating a call signaling generated by a call request is transferred between a calling party and a called party in a general call flow. As shown in fig. 4, the process includes:
In the prior art, a calling party User Equipment (UE) initiates a call request according to a real number abcxxdefg of a called party, and a generated call signaling INVITE includes a calling party UE _ a, called party real number information ABCXXXXDEFG, and information about a wireless cell where the calling party is located.
After receiving the call signaling INVITE, the PSBC _ a analyzes the wireless cell information therein to obtain the area information area of the calling party. And replaces the radio cell information in the call signaling INVITE with the areeid.
In step 48, UE _ B transmits the generated RING signal 180RING back to the calling party UE _ A.
In the calling process shown in fig. 4, a call request is initiated through the real number of the called party, the real number of the called party cannot be protected, and the generated call signaling INVITE does not pass through the target platform, i.e., the enterprise information platform AS in fig. 4.
In the call flow of the embodiment of the present application, unlike the prior art, the calling party initiates the call request through the encrypted number of the called party. As shown in fig. 5, the called party number information included in the call signaling INVITE generated at the calling party UE _ a is encrypted number information. In the embodiment of the present application, the process includes:
A further difference is that the call signaling INVITE goes through the target platform, i.e. the enterprise information platform AS in fig. 5.
Step 50-52, the call signaling INVITE is transmitted to the enterprise information platform AS via the query session control function/service session control function network element I/SCSCF _ a. At this time, the enterprise information platform AS compares the area information area of the calling party, carried in the call signaling INVITE, with the service area associated with the calling party in the target platform to determine the call authority of the calling party.
And when the enterprise information platform AS determines that the calling party has the calling right, determining the real number ABCCXXXDEFG of the called party according to the encrypted number ABC x DEFG of the called party carried in the call signaling INVITE. And replaces the encrypted number ABC x DEFG of the called party in the call signaling INVITE with the real number abcxxdefg of the called party.
Step 54-58, the call signaling INVITE is forwarded by the query session control function/service session control function network element I/SCSCF _ a, other platform AS, query session control function/service session control function network element I/SCSCF _ B, proxy session border control network element PSBC _ B, and is transmitted to the called user equipment UE _ B. At this point, the called party rings.
In step 59, the called party UE _ B returns the ringing information 180RING to the calling party UE _ a.
The enterprise information platform AS comprises order information, and when determining the real number of the called party according to the encrypted number of the called party carried in the call signaling INVITE, the enterprise information platform AS comprises the following process.
Firstly, the encryption mode of the encryption number of the called party is determined according to the encryption mode prompt contained in the encryption number of the called party.
Secondly, determining the query range when the real number of the called party is queried according to the encryption mode.
AS shown in fig. 5, after the enterprise information platform AS determines the encryption mode according to the encryption mode indicator "+", if the encryption mode is the first encryption mode, it is determined that the query range is the order in which the home location of the real number of the called party and the recipient address belong to the same area in the order to be dispatched in the service area of the calling party.
AS shown in fig. 6, after the enterprise information platform AS determines the encryption mode according to the prompt "#" of the encryption mode, assuming that the encryption mode is the second encryption mode, it determines that the query range is an order in which the home location and the recipient address of the real number of the called party do not belong to the same area in the order to be dispatched in the service area of the calling party.
Then, from the determined query range, a calling number that coincides with the plain text character of the encrypted number of the called party is queried.
Specifically, the encrypted number of the called party includes a plaintext character and an encrypted character, and the fact that the plaintext character of the encrypted number of the called party is consistent means that the number at the corresponding position of the inquired calling number is consistent with the plaintext character of the encrypted number of the called party. For example, for the encrypted number ABC × DEFG of the called party in fig. 5, its plaintext is ABCDEFG and its encrypted character is ABCDEFG; if the calling number obtained by the inquiry is ABCCJUHKDEFG, the calling number also starts with ABC and ends with DEFG, the clear text character of the encrypted number of the called party is considered to be consistent.
And finally, determining the real number of the called party from the calling number according to the auxiliary identification code.
In this embodiment, the calling party initiates a call request according to the encrypted number of the called party, and when the call signaling INVITE is transmitted to the target platform, that is, the enterprise information platform AS converts the encrypted number of the called party carried in the call signaling INVITE into the real number of the called party, and executes the following signaling transmission process to complete the call. In the whole calling process, the real number of the called party is invisible to the calling party, so that the personal information security of the called party is protected.
In order to facilitate understanding of the present application, in another embodiment of the present application, a specific example is used to describe the information hiding method of the present application.
In this embodiment, an implementation flow is described by taking an example of implementing the information hiding method of the present application in a Voice over LTE (VoLTE) network.
There are two preconditions for implementing this method under VoLTE. First, as a calling party, a courier needs to pre-store personal information in a target platform, including basic information such as name, age, gender, and contact telephone, and work information such as a service area. Second, the courier needs to open the VoLTE service and sign up for a specific Initial Filter Criteria (IFC). The IFC is used to indicate an execution platform of the call service, and the IFC has the highest priority among all the IFCs that have been signed, so that when a calling party initiates a call request, the IFC is triggered first, and the call service jumps to a target platform for execution.
Fig. 7 is a flowchart of another embodiment of the information hiding method of the present application. As shown in fig. 7, based on the above-mentioned premise, the execution flow of the information hiding method of the present application is as follows.
After a calling party initiates a call request, a call signaling INVITE is generated, and at the moment, the core network triggers the call signaling INVITE to an enterprise information platform (AS) according to the IFC signed by the calling party. After receiving the call signaling INVITE, the enterprise information platform AS determines the identity information of the calling party according to the calling party information contained therein, such AS the contact telephone of the calling party; and inquiring the service area of the calling party in an enterprise information platform (AS) according to the regional information of the calling party, such AS the Beijing Toyork area, and if the service area of the calling party is the Beijing city, judging that the calling party has the calling authority when the regional information is contained in the service area of the calling party. If the service area of the calling party is the western city area of Beijing city, the regional information is judged not to be contained in the service area of the calling party, and the calling party is considered not to have the calling authority. If the information of the calling party does not exist in the enterprise information platform AS, the calling party is considered to have no calling authority at the moment.
In the call signaling INVITE, the regional information of the calling party can be accurate to the county, and the format is '0 + area code, county code', and the areeid is used as the identifier. For example, 010.001 is in the Tokyo area of Beijing and 010.002 is in the Western area.
When the calling party is judged to have the calling right, step 202 is executed. Otherwise, step 204 is performed.
And when the calling party is judged to have the calling right, the enterprise information platform AS determines the real number of the called party according to the received call signaling INVITE.
First, the encrypted number ABC × DEFG of the called party carried in the call signaling INVITE is obtained, and the encryption method used by the called party is determined according to the encryption method prompt in the encrypted number. In this embodiment, the encryption mode indicator is "", and it may be determined that the first encryption mode is used. Of course, the encryption scheme prompt may also correspond to the second encryption scheme, as the case requires.
Secondly, the real number of the called party is determined according to the encryption mode of the encrypted number of the called party. In this embodiment, it is determined that the encryption mode is the first encryption mode, and it is assumed that the location of the called party's real number is the beijing-city-east-city area and the recipient address is the beijing-city-east-city area, then, in the enterprise information platform AS, from the order to be dispatched, the order whose recipient address is the beijing-city-east-city area and whose location of the recipient's contact phone is also the order of the beijing-city-east-city area is queried. An order in which the contact address of the recipient starts with ABC and ends with DEFG is determined, and the contact phone of the recipient in the order is extracted.
When only one contact phone meeting the conditions exists, the contact phone is used as the real number of the called party; when a plurality of contact numbers exist, the enterprise information platform AS sends a voice prompt to the calling party to 'please input the auxiliary identification code', and a plurality of contact numbers are screened through the auxiliary identification code to obtain the real number of the called party.
And after the real number of the called party is obtained, the enterprise information platform AS replaces the encrypted number of the called party carried in the call signaling INVITE by the real number of the called party, transmits the call signaling INVITE to a corresponding network element and executes a call request.
Fig. 8 is a schematic structural diagram of an embodiment of an information hiding apparatus according to the present application, where the information hiding apparatus in the present embodiment may be used as an information hiding device to implement the information hiding method according to the present application. As shown in fig. 8, the information hiding apparatus may include: a receiving module 81, a judging module 82, a determining module 83 and a calling module 84.
The receiving module 81 is configured to receive a call request initiated by a calling party, where the call request includes area information where the calling party is located and an encrypted number of a called party. A determining module 82, configured to determine whether the area information is included in the service area range associated with the calling party. And the determining module 83 is used for determining the real number of the called party according to the encrypted number of the called party when the area information is contained in the service area range associated with the calling party. And the calling module 84 is used for calling the called party according to the real number of the called party.
In concrete implementation, the determining module 83 is configured to determine order information to be dispatched in a service area associated with the calling party, and determine, from the order information to be dispatched, a calling number consistent with a plain text symbol in the encrypted number of the called party. If the determined calling number is one, determining the calling number as the real number of the called party; if a plurality of calling numbers are determined, prompt information is sent to the calling party to prompt the calling party to input the auxiliary identification code, and the real number of the called party is determined from the calling numbers according to the auxiliary identification code input by the calling party.
In this embodiment, when a call request is initiated to a called party, the receiving module 81 receives the call request initiated by a calling party, the determining module 82 determines the call authority of the calling party, and when the calling party has the call authority, the determining module 83 determines the real number of the called party according to the encrypted number of the called party, and calls the called party through the calling module 84. In the whole calling process, the real number of the called party is invisible to the calling party, so that the personal information of the called party is effectively hidden, and the personal information safety of the called party is protected.
Fig. 9 is a schematic structural diagram of another embodiment of the information hiding device of the present application, and compared with the information hiding device shown in fig. 8, the difference is that the information hiding device shown in fig. 9 may further include: an encryption module 85 and a sending module 86.
In a specific implementation, the encryption module 85 is configured to, before the receiving module 81 receives the call request initiated by the calling party, determine an encryption manner for the real number of the called party according to a home location of the real number of the called party in the order to be dispatched, and encrypt the real number of the called party according to the determined encryption manner.
The sending module 86 is configured to determine a calling party who sends the order to be dispatched according to the address of the recipient of the order to be dispatched, and send the encrypted number of the called party to the calling party, so that the calling party initiates a call request through the encrypted number of the called party.
FIG. 10 is a schematic block diagram of an embodiment of an electronic device according to the present application, which may include at least one processor, as shown in FIG. 10; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, and the processor calls the program instructions to execute the information hiding method provided by the embodiment of the application.
The electronic device may be an information hiding device, and the embodiment does not limit the specific form of the electronic device.
FIG. 10 illustrates a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the present application. The electronic device shown in fig. 10 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 10, the electronic device is in the form of a general purpose computing device. Components of the electronic device may include, but are not limited to: one or more processors 410, a memory 430, and a communication bus 440 that connects the various system components (including the memory 430 and the processing unit 410).
Electronic devices typically include a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
A program/utility having a set (at least one) of program modules, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored in memory 430, each of which examples or some combination may include an implementation of a network environment. The program modules generally perform the functions and/or methodologies of the embodiments described herein.
The electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, display, etc.), one or more devices that enable a user to interact with the electronic device, and/or any devices (e.g., network card, modem, etc.) that enable the electronic device to communicate with one or more other computing devices. Such communication may occur via communication interface 420. Furthermore, the electronic device may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public Network such as the Internet) via a Network adapter (not shown in FIG. 10) that may communicate with other modules of the electronic device via the communication bus 440. It should be appreciated that although not shown in FIG. 10, other hardware and/or software modules may be used in conjunction with the electronic device, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape Drives, and data backup storage systems, among others.
The processor 410 executes various functional applications and data processing, for example, implementing an information hiding method provided by an embodiment of the present application, by executing programs stored in the memory 430.
The embodiment of the present application further provides a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores a computer instruction, and the computer instruction enables the computer to execute the information hiding method provided in the embodiment of the present application.
The non-transitory computer readable storage medium described above may take any combination of one or more computer readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), a flash Memory, an optical fiber, a portable compact disc Read Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be noted that the terminal according to the embodiments of the present application may include, but is not limited to, a Personal Computer (Personal Computer; hereinafter, referred to as PC), a Personal Digital Assistant (Personal Digital Assistant; hereinafter, referred to as PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. An information hiding method is characterized in that an execution subject of the method is a target platform, and the method comprises the following steps:
receiving a call request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party;
judging whether the area information is contained in a service area range associated with the calling party;
if the area information is contained in the service area range associated with the calling party, determining the real number of the called party according to the encrypted number of the called party;
and calling the called party according to the real number of the called party.
2. The method of claim 1, wherein prior to receiving the call request initiated by the calling party, the method further comprises:
determining an encryption mode for the real number of the called party according to the attribution place of the real number of the called party in the order to be dispatched; encrypting the real number of the called party according to the determined encryption mode;
determining a calling party for dispatching the order to be dispatched according to the address of the receiving of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
3. The method of claim 2, wherein determining the encryption of the real number of the called party based on the location of the real number of the called party in the order to be dispatched comprises:
when the attribution of the real number of the called party in the order to be dispatched and the receiving address belong to the same area, encrypting the real number of the called party by using a first encryption mode; otherwise, the true number of the called party is encrypted by using a second encryption mode.
4. The method of claim 1, wherein the encrypted number of the called party comprises encrypted characters and plain characters;
determining the real number of the called party according to the encrypted number of the called party, comprising:
determining order information to be dispatched in a service area associated with a calling party;
determining a calling number consistent with a clear text symbol in an encrypted number of a called party from the order information to be dispatched;
if the determined calling number is one, determining the calling number as the real number of the called party;
if a plurality of calling numbers are determined, sending prompt information to the calling party to prompt the calling party to input an auxiliary identification code; and determining the real number of the called party from the calling numbers according to the auxiliary identification code input by the calling party.
5. The method of claim 4, wherein the encrypted number of the called party includes an encrypted mode prompt;
determining a calling number consistent with a plain text symbol in an encrypted number of a called party from the order information to be dispatched, comprising:
if the encrypted number of the called party is determined to be encrypted by adopting a first encryption mode according to the encryption mode prompt sign, screening first order dispatching information of which the called party number attribution and the receiving address belong to the same area from the order information to be dispatched; determining a calling number consistent with a plain text symbol in an encrypted number of a called party from the first order dispatching information;
if the encrypted number of the called party is determined to be encrypted by adopting a second encryption mode according to the encryption mode prompt sign, screening second order dispatching information of which the called party number attribution and the receiving address belong to different areas from the order information to be dispatched; and determining a calling number consistent with a plain text character in the encrypted number of the called party from the second order dispatch information.
6. The method of claim 1, wherein after the call is placed to the called party based on the real number of the called party, the method further comprises:
and when the order corresponding to the real number of the called party is changed from the to-be-dispatched state to the signing-in state, setting the encrypted number of the called party to be invalid.
7. An information hiding apparatus, comprising:
the receiving module is used for receiving a calling request initiated by a calling party; the calling request comprises the area information of the calling party and the encrypted number of the called party;
the judging module is used for judging whether the area information is contained in a service area range associated with the calling party;
the determining module is used for determining the real number of the called party according to the encrypted number of the called party when the area information is contained in the service area range associated with the calling party;
and the calling module is used for calling the called party according to the real number of the called party.
8. The apparatus of claim 7, further comprising:
the encryption module is used for determining an encryption mode of the real number of the called party according to the attribution place of the real number of the called party in the order to be dispatched before the receiving module receives the call request initiated by the calling party; encrypting the real number of the called party according to the determined encryption mode;
the sending module is used for determining a calling party for dispatching the order to be dispatched according to the address of the receiving party of the order to be dispatched; and sending the encrypted number of the called party to the calling party so that the calling party initiates a call request through the encrypted number of the called party.
9. An electronic device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 6.
10. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010704905.2A CN113965648B (en) | 2020-07-21 | 2020-07-21 | Information hiding method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010704905.2A CN113965648B (en) | 2020-07-21 | 2020-07-21 | Information hiding method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113965648A true CN113965648A (en) | 2022-01-21 |
CN113965648B CN113965648B (en) | 2024-05-07 |
Family
ID=79459755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010704905.2A Active CN113965648B (en) | 2020-07-21 | 2020-07-21 | Information hiding method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113965648B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090022149A1 (en) * | 2007-07-20 | 2009-01-22 | Cisco Technology, Inc. | Using PSTN Reachability to Verify VoIP Call Routing Information |
US20110294481A1 (en) * | 2010-05-25 | 2011-12-01 | Nzumafo Heine F | E-Mail to Phone Number Resolution for Mobile to Mobile, Mobile to Landline, And PC to Mobile Communications |
WO2011154221A1 (en) * | 2010-06-11 | 2011-12-15 | International Business Machines Corporation | System, method and computer program product for filtering telephone communications |
CN102567883A (en) * | 2010-12-07 | 2012-07-11 | 亚马逊技术股份有限公司 | Privacy protection related to product shipment |
US20120207297A1 (en) * | 2010-03-21 | 2012-08-16 | Zte Corporation | Method, System and Apparatus for Implementing Secure Call Forwarding |
CN105721720A (en) * | 2014-12-03 | 2016-06-29 | 中国电信股份有限公司 | Method for displaying virtual number, and virtual number distribution platform and system |
CN105992200A (en) * | 2015-02-13 | 2016-10-05 | 中国电信股份有限公司 | Addressee calling method, device, server and system |
CN106303103A (en) * | 2015-06-25 | 2017-01-04 | 阿里巴巴集团控股有限公司 | A kind of communication means protecting personal information and device |
US20170104870A1 (en) * | 2014-06-25 | 2017-04-13 | Orange | A method to authenticate calls in a telecommunication system |
WO2018147467A1 (en) * | 2017-02-13 | 2018-08-16 | クックパッド株式会社 | Reservation management phone-call system, reservation management phone-call program, and reservation management phone-call method |
CN108664798A (en) * | 2017-03-31 | 2018-10-16 | 北京京东尚科信息技术有限公司 | Information ciphering method and device |
US20200028690A1 (en) * | 2018-07-17 | 2020-01-23 | Verizon Patent And Licensing Inc. | Validating and securing caller identification to prevent identity spoofing |
US10681206B1 (en) * | 2018-12-05 | 2020-06-09 | At&T Intellectual Property I, L.P. | Detecting a spoofed call |
-
2020
- 2020-07-21 CN CN202010704905.2A patent/CN113965648B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090022149A1 (en) * | 2007-07-20 | 2009-01-22 | Cisco Technology, Inc. | Using PSTN Reachability to Verify VoIP Call Routing Information |
US20120207297A1 (en) * | 2010-03-21 | 2012-08-16 | Zte Corporation | Method, System and Apparatus for Implementing Secure Call Forwarding |
US20110294481A1 (en) * | 2010-05-25 | 2011-12-01 | Nzumafo Heine F | E-Mail to Phone Number Resolution for Mobile to Mobile, Mobile to Landline, And PC to Mobile Communications |
WO2011154221A1 (en) * | 2010-06-11 | 2011-12-15 | International Business Machines Corporation | System, method and computer program product for filtering telephone communications |
CN102567883A (en) * | 2010-12-07 | 2012-07-11 | 亚马逊技术股份有限公司 | Privacy protection related to product shipment |
US20170104870A1 (en) * | 2014-06-25 | 2017-04-13 | Orange | A method to authenticate calls in a telecommunication system |
CN105721720A (en) * | 2014-12-03 | 2016-06-29 | 中国电信股份有限公司 | Method for displaying virtual number, and virtual number distribution platform and system |
CN105992200A (en) * | 2015-02-13 | 2016-10-05 | 中国电信股份有限公司 | Addressee calling method, device, server and system |
CN106303103A (en) * | 2015-06-25 | 2017-01-04 | 阿里巴巴集团控股有限公司 | A kind of communication means protecting personal information and device |
WO2018147467A1 (en) * | 2017-02-13 | 2018-08-16 | クックパッド株式会社 | Reservation management phone-call system, reservation management phone-call program, and reservation management phone-call method |
CN108664798A (en) * | 2017-03-31 | 2018-10-16 | 北京京东尚科信息技术有限公司 | Information ciphering method and device |
US20200028690A1 (en) * | 2018-07-17 | 2020-01-23 | Verizon Patent And Licensing Inc. | Validating and securing caller identification to prevent identity spoofing |
US10681206B1 (en) * | 2018-12-05 | 2020-06-09 | At&T Intellectual Property I, L.P. | Detecting a spoofed call |
Non-Patent Citations (2)
Title |
---|
陆广海;: "VoLTE网络短号码呼叫方案研究", 山东通信技术, no. 03, pages 13 - 16 * |
陈士梁;: "互联网语音业务中的个人信息保护方法与实现技术", 中国新通信, no. 16, pages 129 - 130 * |
Also Published As
Publication number | Publication date |
---|---|
CN113965648B (en) | 2024-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11023572B2 (en) | Augmented reality object providing method and server using image authentication | |
US7937097B2 (en) | Method, system, and computer program product for anonymously/privately exchanging text messages | |
EP2525622B1 (en) | Method and apparatus for communication based on pseudo-contact information | |
US20120135744A1 (en) | Systems and methods for generating and managing communication rules associated with geographic locations | |
US11449820B2 (en) | Electronic signing method and apparatus | |
US20100162388A1 (en) | Wireless mobile device with automatic segregation of received messages for private and public access | |
CN110620846B (en) | Message merging method, device, equipment and storage medium | |
EP1919174A1 (en) | Presence information delivery apparatus and method for mobile communication network | |
CN109743246B (en) | Message emergency reminding method and device and electronic equipment | |
US20070140439A1 (en) | Method for presenting location information on a mobile terminal | |
CN105681564A (en) | Message reminding method and device | |
CN113067859A (en) | Communication method and device based on cloud mobile phone | |
US20120095771A1 (en) | System and method for sending, receiving and updatiing business card between electronic devices | |
CN106921557B (en) | Mail sending method and equipment | |
KR101611241B1 (en) | Message authentication method, system, server and computer-readable medium | |
CN113965648B (en) | Information hiding method and device and electronic equipment | |
US20050182738A1 (en) | Message handling device and method for telecommunication terminal and telecommunication terminal provided with such a device | |
US10728191B2 (en) | Method for establishing communication within a closed network | |
CN106211101A (en) | A kind of processing method and processing device of voice SMS | |
EP2571300B1 (en) | Wireless public telephone network management short message verifying method and device | |
KR100610901B1 (en) | Mobile Communication System Having Information Message Filtering Function and Method thereof | |
KR20170088240A (en) | Method for Safe Number Processing, Recording Medium and Program thereof | |
CN106332017A (en) | Method for implementing voice short message on basis of internet telephony | |
KR20130054575A (en) | Apparatus and method for identifying loss of portable terminal in wireless communication system | |
US20210112151A1 (en) | Method and System that Mitigates Digital Address Book Data Decay [TetherTap] |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |