CN114125158A - Anti-harassment method, device, equipment and storage medium based on trusted telephone - Google Patents

Anti-harassment method, device, equipment and storage medium based on trusted telephone Download PDF

Info

Publication number
CN114125158A
CN114125158A CN202111408121.6A CN202111408121A CN114125158A CN 114125158 A CN114125158 A CN 114125158A CN 202111408121 A CN202111408121 A CN 202111408121A CN 114125158 A CN114125158 A CN 114125158A
Authority
CN
China
Prior art keywords
identity
phone number
bill
mobile phone
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111408121.6A
Other languages
Chinese (zh)
Other versions
CN114125158B (en
Inventor
张伟春
宗瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weway Shenzhen Network Technology Co ltd
Original Assignee
Weway Shenzhen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weway Shenzhen Network Technology Co ltd filed Critical Weway Shenzhen Network Technology Co ltd
Priority to CN202111408121.6A priority Critical patent/CN114125158B/en
Publication of CN114125158A publication Critical patent/CN114125158A/en
Application granted granted Critical
Publication of CN114125158B publication Critical patent/CN114125158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an artificial intelligence technology, and discloses a harassment prevention method based on a trusted telephone, which comprises the following steps: receiving user information uploaded by a first user side, encrypting the user information to generate an identity bill, and generating a corresponding identity bill ID; when a second user terminal initiates a call request through an application, encrypting a calling party mobile phone number, a called party mobile phone number and an ID (identity) bill to obtain a communication token; and acquiring a communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring the identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of a third user end. In addition, the invention also relates to a block chain technology, and the user information can be stored in the nodes of the block chain. The invention also provides a harassment prevention device based on the trusted telephone, electronic equipment and a storage medium. The method and the device can solve the problem of low identification rate of the crank calls.

Description

Anti-harassment method, device, equipment and storage medium based on trusted telephone
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a method and a device for preventing harassment based on a trusted telephone, electronic equipment and a computer readable storage medium.
Background
The rapid development of mobile communication technology brings convenience to people's life, work and study, but various marketing, fraud, malicious calls and the like appear along with the rapid development of mobile communication technology, thereby causing great troubles to people's life and disturbing the operation order of a communication network.
At present, only the caller ID and remarks in called party equipment are displayed when the caller ID is displayed, although operators and mobile phone manufacturers add part of harassing call identifiers, such as fraud, harassment, advertising promotion, express meal delivery and the like, and intercept calls, the interception and identification cannot guarantee complete prevention of harassing calls, and the number libraries of the operators and the mobile phone manufacturers cannot be updated in real time, and the problem that normal calls are wrongly identified or wrongly intercepted can also occur.
In conclusion, the identification rate of the harassing calls in the current method needs to be improved.
Disclosure of Invention
The invention provides a method and a device for preventing harassment based on a trusted telephone and a computer readable storage medium, and mainly aims to solve the problem of low precision in product recommendation.
In order to achieve the above object, the present invention provides a harassment prevention method based on trusted phone, which comprises:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
Optionally, the verifying the user information includes:
extracting information which can represent the identity of the user, such as a mobile phone number, an identity card number, a name and the like from the user information;
and verifying the user information according to the information representing the user identity.
Optionally, the encrypting the user information to generate the identity ticket includes:
and encrypting the user information by using an SM2 algorithm to generate an identity ticket and a digital certificate corresponding to the identity ticket.
Optionally, the encrypting the mobile phone number of the calling party, the mobile phone number of the called party, and the ID of the identity ticket corresponding to the selected identity ticket to obtain the communication token includes:
generating a first key pair by using an SM2 algorithm, and calculating digest values of a calling party mobile phone number and a called party mobile phone number by using a message digest algorithm;
signing the digest value by using a private key in the first key pair to obtain a signature value;
generating a second key pair by using an SM3 algorithm, and encrypting the ID of the identity bill by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the check parameter into a communication token.
Optionally, the generating a first key pair using the SM2 algorithm includes:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) ═ d × G (x, y) based on the private key;
where G denotes a base point of the elliptic curve, n denotes an integer greater than 2, P denotes a public key, and (x, y) denotes an elliptic curve point.
Optionally, the decrypting the communication token to obtain the ID ticket ID includes:
calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
when the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
and decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the ID of the identity bill.
Optionally, the obtaining the corresponding identity ticket according to the identity ticket ID, and decrypting the user information from the identity ticket includes:
acquiring the identity bill and a digital certificate corresponding to the identity bill by using the ID of the identity bill;
and decrypting the identity bill by using the digital certificate to obtain the user information.
In order to solve the above problem, the present invention further provides an anti-harassment device based on trusted phone, the device includes:
the identity bill generation module is used for receiving user information uploaded by a first user end, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
the communication token generation module is used for acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application when the second user terminal successfully logs in the preset application; when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and the decryption module is used for receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill and displaying the identity information on a display screen of the third user terminal.
In order to solve the above problem, the present invention also provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the trusted phone-based anti-harassment method described above.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, in which at least one computer program is stored, and the at least one computer program is executed by a processor in an electronic device to implement the above-mentioned trusted telephone based anti-harassment method.
The embodiment of the invention encrypts the user information of the calling party into the identity bill, further encrypts the identity bill ID, the mobile phone number of the calling party and the mobile phone number of the called party corresponding to the identity bill into the communication token, displays the user information of the calling party in the incoming call by decrypting the called party, and can ensure that the called party confirms the identity of the incoming call through the user information, thereby reducing the possibility of answering a harassing call and avoiding the problem that a normal incoming call is wrongly identified or intercepted. Therefore, the harassment prevention method and device based on the credible telephone, the electronic equipment and the computer readable storage medium can solve the problem of low harassment telephone identification rate.
Drawings
Fig. 1 is an architecture diagram of an application environment of a trusted telephone-based harassment prevention method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of a harassment prevention method based on a trusted telephone according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a detailed implementation flow of one step in the trusted telephone based harassment prevention method shown in FIG. 2;
FIG. 4 is a schematic diagram illustrating a detailed implementation flow of one step in the trusted telephone based harassment prevention method shown in FIG. 2;
FIG. 5 is a functional block diagram of an anti-harassment device based on trusted phone according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device that implements the trusted telephone-based harassment prevention method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the application provides a harassment prevention method based on a trusted telephone. The execution subject of the anti-harassment method based on the trusted telephone includes but is not limited to at least one of electronic devices such as a server and a terminal which can be configured to execute the method provided by the embodiment of the application. In other words, the anti-harassment method based on the trusted telephone can be executed by software or hardware installed in the terminal equipment or the server equipment, and the software can be a block chain platform.
Preferably, referring to fig. 1, in the embodiment of the present invention, the method for preventing harassment based on trusted phone is applied to a server 1, where the server 1 includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and artificial intelligence platform, and the like.
When the anti-harassment method based on the trusted telephone is executed, the server 1 is in communication connection with the first user end 2. The first user end 2 may be any portable electronic device with a communication function, such as a mobile phone, a smart watch, a tablet computer, and the like of a user, or may be a non-portable electronic device with a communication function, such as a fixed phone, a desktop computer, and the like. In the embodiment of the present invention, the first user end 2 is installed with a client program corresponding to the harassment prevention method based on the trusted telephone, such as a trusted telephone APP.
Further, in the embodiment of the present invention, the first user end 2 can be divided into the second user end 20 and the third user end 30 according to different roles played in the communication process. The second user end 20 is a calling party identity during the communication process, and the third user end 30 is a called party identity during the communication process.
Fig. 2 is a schematic flow chart of a harassment prevention method based on a trusted telephone according to an embodiment of the present invention. In this embodiment, the harassment prevention method based on the trusted telephone includes:
s1, receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
in the embodiment of the present invention, the first user side may be all users who install the preset application. As described above, the preset application is a client program corresponding to the harassment prevention method based on the trusted telephone, such as a trusted telephone APP.
The user information may correspond to one or more identities of the user. Wherein, the user identity can be a company employee, a member of a certain social group, and the like. For example, in one application scenario of the present invention, a user has multiple identities of a redcross contractor, a student's home, a technician of a company, and the like. Therefore, in the embodiment of the present invention, the user information may be one or more groups of user information, where each group of user information may correspond to an identity of the user. In detail, each set of the user information may include a mobile phone number, an identification number, a name, a position, a job, an organization name of the company or group, a work certificate of the user, and the like.
In detail, the verifying the user information includes:
the first user end extracts information which can represent the user identity from the user information, such as a mobile phone number, an identity card number, a name and the like;
and verifying the user information according to the information representing the user identity.
In one embodiment of the invention, the information representing the user identity, such as the mobile phone number, the identity card number, the name and the like in the user information can be verified by using a national authentication mechanism system, so that the correctness and the legality of the user information are ensured. The national certified institution system is derived from an identity database of a government department, and when the national certified institution system is utilized, the user information can be ensured not to be leaked through de-identification.
In one embodiment of the present invention, when the user information fails to be verified, a verification failure prompt message is sent. The user information check fails, such as: the filling and writing of the mobile phone number is wrong, the name of the mobile phone number owner is not consistent with the name in the user information, the mobile phone number fails to pass real-name authentication, the identity card number is not matched with the name in the user information, and the like.
Further, in another embodiment of the present invention, when the authenticity and consistency of the mobile phone number, the identification number, and the name in the user information are successfully verified, an encryption algorithm, such as an SM2 algorithm, is used to encrypt each of the user information, so as to obtain an identity ticket corresponding to each of the user information and a digital certificate corresponding to the identity ticket.
In the embodiment of the invention, each identity bill correspondingly generates a unique corresponding identity bill ID, and the identity bills can be called through the identity bill IDs, so that the calling speed of the data related to the user information is improved.
In the implementation of the invention, the SM2 algorithm is an elliptic curve public key cryptographic algorithm issued by the State cryptology administration, the SM2 algorithm has high cryptographic complexity and high processing speed, and is beneficial to protecting user information from being leaked.
S2, when the second user successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
in this embodiment of the present invention, the second user end is any one of the users in the first user end. When the second user needs to make a call, the second user can log in the preset application by using the account password, and when the login is successful, all the identity tickets and the corresponding identity ticket IDs of the second user are called according to the account. The second user terminal can select the identity ticket corresponding to different user identities in the application.
S3, when the second user terminal initiates a call request through the application, receiving the identity ticket selected by the second user terminal in the application, and encrypting the mobile phone number of the calling party, the mobile phone number of the called party and the ID of the identity ticket corresponding to the selected identity ticket to obtain a communication token;
in the embodiment of the invention, the identity information is further encrypted by utilizing the SM2 algorithm, the SM3 algorithm and the SM4 algorithm in the national cryptographic algorithm to obtain the communication token. The SM2 algorithm is an asymmetric encryption algorithm, the SM3 algorithm is a digest algorithm, and the SM4 algorithm is a symmetric encryption algorithm.
In detail, referring to fig. 3, after encrypting the mobile phone number of the calling party, the mobile phone number of the called party, and the ID of the identity ticket corresponding to the selected identity ticket in S3, obtaining the communication token includes:
s31, generating a first key pair by using SM2 algorithm, and calculating the digest values of the mobile phone number of the calling party and the mobile phone number of the called party by using message digest algorithm;
s32, signing the digest value by using a private key in the first key pair to obtain a signature value;
s33, generating a second key pair by using an SM3 algorithm, and encrypting the ID of the identity bill by using a private key in the second key pair to obtain a ciphertext;
s34, generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and S35, combining the signature value, the ciphertext and the check parameter into a communication token.
Specifically, in this embodiment of the present invention, the generating a first key pair by using the SM2 algorithm includes:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) ═ d × G (x, y) based on the private key;
where G denotes a base point of the elliptic curve, n denotes an integer greater than 2, P denotes a public key, and (x, y) denotes an elliptic curve point.
In the embodiment of the invention, the communication token can be an ASN.1 data structure, the ASN.1(Abstract Syntax notification 1) is a formal language, and describes a data format for representing, coding, transmitting and decoding data, namely, the communication token can be rapidly and reliably transmitted in a wireless broadband and can also be used by application program codes. Furthermore, the embodiment of the invention also comprises the steps of verifying the data format of the communication token, preventing other data interference and storing the communication token passing the verification into the server.
In the embodiment of the invention, the ID of the identity bill, the number of the calling party mobile phone and the number of the called party mobile phone are further encrypted into the communication token, the user information is secondarily encrypted and then transmitted and stored, the identity information is not easy to be falsified, and the safety of the identity information is ensured.
S4, receiving a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity ticket ID, acquiring a corresponding identity ticket according to the identity ticket ID, decrypting identity information from the identity ticket, and displaying the identity information on a display screen of the third user terminal.
In this embodiment of the present invention, the third user may be any one of the first user, and at this time, the preset application, that is, a client program corresponding to the harassment prevention method based on the trusted phone, such as the trusted phone APP, is also installed in the third user.
In detail, referring to fig. 4, decrypting the communication token in S4 to obtain the ID ticket ID includes:
s41, computing the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
s42, when the signature passes the verification, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
and S43, decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the ID of the identity bill.
Further, the acquiring the corresponding identity ticket according to the identity ticket ID and decrypting the user information from the identity ticket includes:
acquiring the identity bill and a digital certificate corresponding to the identity bill by using the ID of the identity bill;
and decrypting the identity bill by using the digital certificate to obtain the user information.
In another embodiment of the present invention, when the third user side is any one of the users in the first user side, that is, the third user side does not have the preset application installed therein, the identity information cannot be displayed on the display screen of the third user side, but can be sent to the third user side in a multimedia message manner.
The embodiment of the invention encrypts the user information of the calling party into the identity bill, further encrypts the identity bill ID, the mobile phone number of the calling party and the mobile phone number of the called party corresponding to the identity bill into the communication token, displays the user information of the calling party in the incoming call by decrypting the called party, and can ensure that the called party confirms the identity of the incoming call through the user information, thereby reducing the possibility of answering a harassing call and avoiding the problem that a normal incoming call is wrongly identified or intercepted. Therefore, the harassment prevention method and device based on the credible telephone, the electronic equipment and the computer readable storage medium can solve the problem of low harassment telephone identification rate.
Fig. 5 is a functional block diagram of an anti-harassment device based on trusted phone according to an embodiment of the present invention.
The anti-harassment device 100 based on the trusted telephone of the present invention may be installed in an electronic device. According to the realized functions, the anti-harassment device 100 based on the trusted telephone can comprise an identity bill generating module 101, a communication token generating module 102 and a decryption module 103. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the identity bill generating module 101 is configured to receive user information uploaded by a first user, verify the user information, encrypt the user information to generate an identity bill and generate a corresponding identity bill ID when the user information is successfully verified;
the communication token generation module 102 is configured to, when a second user successfully logs in a preset application, obtain a corresponding identity ticket and a corresponding identity ticket ID according to login information of the preset application; when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
the decryption module 103 is configured to receive a calling party mobile phone number and a called party mobile phone number of an incoming call sent by a third user based on the call request, obtain a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypt the communication token to obtain an identity ticket ID, obtain a corresponding identity ticket according to the identity ticket ID, decrypt identity information from the identity ticket, and display the identity information on a display screen of the third user.
In detail, when the modules in the anti-harassment device 100 based on the trusted phone according to the embodiment of the present invention are used, the same technical means as the anti-harassment method based on the trusted phone described in fig. 1 to 4 are adopted, and the same technical effects can be produced, which is not described herein again.
Fig. 6 is a schematic structural diagram of an electronic device implementing a harassment prevention method based on a trusted telephone according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11, a communication bus 12 and a communication interface 13, and may further comprise a computer program, such as a trusted telephone based anti-harassment program, stored in the memory 11 and executable on the processor 10.
In some embodiments, the processor 10 may be composed of an integrated circuit, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same function or different functions, and includes one or more Central Processing Units (CPUs), a microprocessor, a digital Processing chip, a graphics processor, a combination of various control chips, and the like. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device by running or executing programs or modules (for example, executing a harassment prevention program based on a trusted telephone, and the like) stored in the memory 11 and calling data stored in the memory 11.
The memory 11 includes at least one type of readable storage medium including flash memory, removable hard disks, multimedia cards, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a removable hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only to store application software installed in the electronic device and various types of data, such as a code of a trusted telephone-based anti-harassment program, but also to temporarily store data that has been output or is to be output.
The communication bus 12 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
The communication interface 13 is used for communication between the electronic device and other devices, and includes a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which are typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
Fig. 6 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management and the like are realized through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The trusted telephone based anti-harassment program stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 10, enable:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
Specifically, the specific implementation method of the instruction by the processor 10 may refer to the description of the relevant steps in the embodiment corresponding to the drawings, which is not described herein again.
Further, the integrated modules/units of the electronic device 1, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. The computer readable storage medium may be volatile or non-volatile. For example, the computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM).
The present invention also provides a computer-readable storage medium, storing a computer program which, when executed by a processor of an electronic device, may implement:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method for preventing harassment based on trusted telephony, the method comprising:
receiving user information uploaded by a first user, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
when the second user terminal successfully logs in the preset application, acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application;
when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user end based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting the identity information from the identity bill, and displaying the identity information on a display screen of the third user end.
2. The trusted phone-based anti-harassment method of claim 1, wherein said verifying said user information comprises:
extracting information which can represent the identity of the user from the user information;
and verifying the user information according to the information representing the user identity.
3. The method for preventing harassment based on trusted telephone as claimed in claim 2, wherein said encrypting said user information to generate an identity ticket comprises:
and encrypting the user information by using an SM2 algorithm to generate an identity ticket and a digital certificate corresponding to the identity ticket.
4. The method as claimed in claim 3, wherein said encrypting the caller's phone number, the callee's phone number, the ID of the selected ID ticket to obtain the communication token comprises:
generating a first key pair by using an SM2 algorithm, and calculating digest values of a calling party mobile phone number and a called party mobile phone number by using a message digest algorithm;
signing the digest value by using a private key in the first key pair to obtain a signature value;
generating a second key pair by using an SM3 algorithm, and encrypting the ID of the identity bill by using a private key in the second key pair to obtain a ciphertext;
generating a third key pair by using an SM4 algorithm, and encrypting a public key in the second key pair by using a private key in the third key pair to obtain a verification parameter;
and combining the signature value, the ciphertext and the check parameter into a communication token.
5. A trusted telephony based anti-harassment method according to claim 4, wherein said generating a first key pair using the SM2 algorithm comprises:
selecting a random number as a private key d, wherein the value of d is 1< d < n-1;
generating a public key P (x, y) ═ d × G (x, y) based on the private key;
where G denotes a base point of the elliptic curve, n denotes an integer greater than 2, P denotes a public key, and (x, y) denotes an elliptic curve point.
6. A method as claimed in claim 4, wherein said decrypting said communication token to obtain an identity ticket ID comprises:
calculating the mobile phone number of the calling party and the mobile phone number of the called party by using the public key in the first key pair to obtain a verification digest value, and performing signature verification on the signature value in the communication token by using the verification digest value;
when the signature verification passes, decrypting the verification parameters in the communication token by using the public key in the third key pair to obtain the public key in the second key pair;
and decrypting the ciphertext in the communication token by using the public key in the second key pair to obtain the ID of the identity bill.
7. The method as claimed in claim 6, wherein said obtaining a corresponding identity ticket according to said identity ticket ID, and decrypting user information from said identity ticket comprises:
acquiring the identity bill and a digital certificate corresponding to the identity bill by using the ID of the identity bill;
and decrypting the identity bill by using the digital certificate to obtain the user information.
8. An anti-harassment device based on trusted telephony, characterized in that it comprises:
the identity bill generation module is used for receiving user information uploaded by a first user end, verifying the user information, encrypting the user information to generate an identity bill and generating a corresponding identity bill ID when the user information is verified successfully;
the communication token generation module is used for acquiring a corresponding identity bill and a corresponding identity bill ID according to the login information of the preset application when the second user terminal successfully logs in the preset application; when the second user terminal initiates a call request through the application, receiving an identity ticket selected by the second user terminal in the application, and encrypting a calling party mobile phone number, a called party mobile phone number and an identity ticket ID corresponding to the selected identity ticket to obtain a communication token;
and the decryption module is used for receiving the calling party mobile phone number and the called party mobile phone number of the incoming call sent by the third user terminal based on the call request, acquiring a corresponding communication token according to the calling party mobile phone number and the called party mobile phone number, decrypting the communication token to obtain an identity bill ID, acquiring a corresponding identity bill according to the identity bill ID, decrypting identity information from the identity bill and displaying the identity information on a display screen of the third user terminal.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform a trusted phone-based anti-harassment method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out a trusted telephone-based anti-harassment method as claimed in any one of claims 1 to 7.
CN202111408121.6A 2021-11-19 2021-11-19 Anti-harassment method, device, equipment and storage medium based on trusted telephone Active CN114125158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111408121.6A CN114125158B (en) 2021-11-19 2021-11-19 Anti-harassment method, device, equipment and storage medium based on trusted telephone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111408121.6A CN114125158B (en) 2021-11-19 2021-11-19 Anti-harassment method, device, equipment and storage medium based on trusted telephone

Publications (2)

Publication Number Publication Date
CN114125158A true CN114125158A (en) 2022-03-01
CN114125158B CN114125158B (en) 2024-04-23

Family

ID=80372456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111408121.6A Active CN114125158B (en) 2021-11-19 2021-11-19 Anti-harassment method, device, equipment and storage medium based on trusted telephone

Country Status (1)

Country Link
CN (1) CN114125158B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760114A (en) * 2022-03-29 2022-07-15 微位(深圳)网络科技有限公司 Identity authentication method, device, equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371797A (en) * 2020-03-12 2020-07-03 北京链安区块链科技有限公司 Credible identity authentication method and system in communication session
CN112422751A (en) * 2020-10-27 2021-02-26 中国科学院大学 Calling method and system for displaying calling party multimedia identity based on called party

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371797A (en) * 2020-03-12 2020-07-03 北京链安区块链科技有限公司 Credible identity authentication method and system in communication session
CN112422751A (en) * 2020-10-27 2021-02-26 中国科学院大学 Calling method and system for displaying calling party multimedia identity based on called party

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760114A (en) * 2022-03-29 2022-07-15 微位(深圳)网络科技有限公司 Identity authentication method, device, equipment and medium
CN114760114B (en) * 2022-03-29 2024-03-12 微位(深圳)网络科技有限公司 Identity authentication method, device, equipment and medium

Also Published As

Publication number Publication date
CN114125158B (en) 2024-04-23

Similar Documents

Publication Publication Date Title
CN110290102A (en) Service security system and method based on application
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
CN113055380B (en) Message processing method and device, electronic equipment and medium
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN114726630B (en) License-based information security authorization method and device, electronic equipment and medium
CN110677261B (en) Trusted two-dimensional code generation method and device, electronic equipment and storage medium
CN103139179A (en) Multi-channel active type network identity verification system and network identity verification device
CN114760114A (en) Identity authentication method, device, equipment and medium
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
CN114125158B (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
CN111199007A (en) Configuration method based on Web page, data encryption method and device
CN114826725B (en) Data interaction method, device, equipment and storage medium
CN115001784A (en) Data storage method and device, electronic equipment and computer readable storage medium
CN114095220A (en) Telephone communication verification method, device, equipment and storage medium
CN114697132A (en) Method, device, equipment and storage medium for intercepting repeated access request attack
CN111683070B (en) Data transmission method and device based on identity encryption and storage medium
CN115021995A (en) Multi-channel login method, device, equipment and storage medium
CN114826613B (en) Identity information query method, device, equipment and storage medium based on blockchain
CN107360183A (en) A kind of method and device of hiding checking information
CN114493940A (en) Block chain-based electronic contract management method, device, equipment and storage medium
CN114827354A (en) Identity authentication information display method and device, electronic equipment and readable storage medium
CN115473739A (en) Data processing method, device and equipment based on block chain and storage medium
CN114826570A (en) Certificate acquisition method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant