CN114726843A - Telephone verification method, related device and communication equipment - Google Patents

Telephone verification method, related device and communication equipment Download PDF

Info

Publication number
CN114726843A
CN114726843A CN202110005369.1A CN202110005369A CN114726843A CN 114726843 A CN114726843 A CN 114726843A CN 202110005369 A CN202110005369 A CN 202110005369A CN 114726843 A CN114726843 A CN 114726843A
Authority
CN
China
Prior art keywords
data
certificate
verification
storing
media data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110005369.1A
Other languages
Chinese (zh)
Inventor
董文宇
张昕
刘悦
阎军智
杨波
杨成军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110005369.1A priority Critical patent/CN114726843A/en
Publication of CN114726843A publication Critical patent/CN114726843A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/113Details of archiving
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a telephone verification method, a related device and communication equipment, comprising the following steps: receiving a certificate storing starting request sent by terminal side equipment in a communication process; responding to a certificate storage starting request, and acquiring multimedia data generated in a conversation process to obtain a multimedia file; under the condition that a certificate storing ending request is received, generating a data tuple to be subjected to certificate storing, wherein the data tuple comprises media data generated based on a multimedia file, certificate storing description data of the media data, a certificate storing content abstract and a certificate storing identification, and the certificate storing description data comprises target metadata used for storing the certificate storing media data; and sending the media data to the network disk equipment for storage, and sending the data except the media data in the data tuple to the first block chain node so as to store the data except the media data in the data tuple into the block chain. The embodiment of the invention can improve the reliability and the safety of telephone certificate storage.

Description

Telephone verification method, related device and communication equipment
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a telephone verification method, a related device and communication equipment.
Background
From the third generation 3G communication, voice Telephony is gradually developing into video Telephony, and it is a trend that MultiMedia Telephony (MMTel) services will support a variety of media contents such as audio, video, text, and Augmented Reality (AR). It is expected that with the increasing capability of carrying and displaying media of MMTel, the application scenarios of MMTel will be wider.
The telephone is used as a widely used communication tool, and if the telephone can bear the function of storing the certificate, the production and living efficiency can be further improved. For example, business cooperation agreed by both the product and the seller through telephone discussion can be directly retained as evidence.
At present, in a telephone certificate storing scheme, telephone information is mainly collected at a terminal side, so that a media file for storing the certificate can be easily tampered, and the reliability of the telephone certificate storing is low.
Disclosure of Invention
The embodiment of the invention provides a telephone verification method, a related device and communication equipment, aiming at solving the problem of low reliability of telephone verification.
In order to solve the problems, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a telephone certificate storing method, which is executed by a certificate storing server, and includes:
receiving a certificate storing starting request sent by terminal side equipment in a communication process;
responding to the certificate storage starting request, and collecting multimedia data generated in the conversation process to obtain a multimedia file;
under the condition that a certificate storing ending request is received, generating a data tuple to be subjected to certificate storing, wherein the data tuple comprises media data generated based on the multimedia file, certificate storing description data of the media data, a certificate storing content abstract and a certificate storing identification, and the certificate storing description data comprises target metadata used for storing the media data;
and sending the media data to a network disk device for storage, and sending data except the media data in the data tuple to a first block chain node so as to store the data except the media data in the data tuple into a block chain.
In a second aspect, an embodiment of the present invention provides a telephone certificate storing method, which is executed by a terminal side device, and includes:
in the conversation process, sending a certificate storing starting request in a message mode, wherein the certificate storing starting request is used for requesting a certificate storing server to start to collect multimedia data generated in the conversation process so as to obtain a multimedia file;
sending a certificate storing ending request in a message mode, wherein the certificate storing ending request is used for requesting the certificate storing server to store media data generated based on the multimedia file in a data tuple to be stored to network disk equipment, and storing data except the media data in the data tuple to a block chain.
In a third aspect, an embodiment of the present invention provides a telephone verification method, which is executed by a verification server, and includes:
receiving a target verification request sent by terminal side equipment, wherein the target verification request comprises a media data storage identification; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server;
responding to the target verification request, sending a first verification request to a second block chain node, and acquiring verification description data and a verification content abstract corresponding to the verification identification sent by the second block chain node based on the first verification request, wherein the verification description data comprises target metadata for verifying the media data;
sending a second verification request to the network disk device, and receiving media data corresponding to the verification storage identifier sent by the network disk device based on the second verification request;
and sending a data tuple corresponding to the certificate storage identification to the terminal side equipment, wherein the data tuple comprises media data, certificate storage description data and a certificate storage content abstract corresponding to the certificate storage identification.
In a fourth aspect, an embodiment of the present invention provides a telephone verification method, which is executed by a terminal-side device, and includes:
sending a target verification request to a verification server, wherein the target verification request comprises a verification storage identifier of the media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server;
and receiving a data tuple corresponding to the verification storage identifier sent by the verification server based on the target verification request, wherein the data tuple comprises media data, verification storage description data and a verification storage content abstract corresponding to the verification storage identifier.
In a fifth aspect, an embodiment of the present invention further provides a telephone certificate storage apparatus, including:
the first transceiver is used for receiving a certificate storing starting request sent by terminal side equipment in a communication process;
the first processor is used for responding to the certificate storage starting request, and acquiring multimedia data generated in the conversation process to obtain a multimedia file;
the first transceiver is further used for receiving a certificate storing ending request;
the first processor is further configured to generate a data tuple to be credited under the condition that a credentialing ending request is received, where the data tuple includes media data generated based on the multimedia file, credentialing description data of the media data, a credentialing content abstract, and a credentialing identification, and the credentialing description data includes target metadata for credentialing the media data;
the first transceiver is further configured to send the media data to a network disk device for storage, and send data in the data tuple except the media data to a first block chain node, so as to store the data in the data tuple except the media data in a block chain.
In a sixth aspect, an embodiment of the present invention further provides a telephone certificate storing device, including:
the second transceiver is used for sending a certificate storing starting request in a message mode in a communication process, wherein the certificate storing starting request is used for requesting a certificate storing server to start collecting multimedia data generated in the communication process so as to obtain a multimedia file; sending a certificate storing ending request in a message mode, wherein the certificate storing ending request is used for requesting the certificate storing server to store media data generated based on the multimedia file in a data tuple to be stored to network disk equipment, and storing data except the media data in the data tuple to a block chain.
In a seventh aspect, an embodiment of the present invention further provides a telephone verification apparatus, including:
a third transceiver, configured to receive a target verification request sent by a terminal device, where the target verification request includes a storage identifier of media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server; sending a first verification request to a second blockchain node in response to the target verification request;
a third processor, configured to acquire credential description data and a credential content summary corresponding to the credential identifier sent by the second block link point based on the first verification request, where the credential description data includes target metadata for authenticating the media data;
the third transceiver is further configured to send a second verification request to the network disk device, and receive media data corresponding to the verification storage identifier sent by the network disk device based on the second verification request; and sending a data tuple corresponding to the certificate storage identification to the terminal side equipment, wherein the data tuple comprises media data, certificate storage description data and a certificate storage content abstract corresponding to the certificate storage identification.
In an eighth aspect, an embodiment of the present invention further provides a telephone verification apparatus, including:
a fourth transceiver for sending a target verification request to a verification server, the target verification request including a verification identifier of the media data; the media data are generated by the certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server; and receiving a data tuple corresponding to the verification storage identifier sent by the verification server based on the target verification request, wherein the data tuple comprises media data, verification storage description data and a verification storage content abstract corresponding to the verification storage identifier.
In a ninth aspect, an embodiment of the present invention further provides a communication device, including: a transceiver, a memory, a processor, and a program stored on the memory and executable on the processor; wherein the processor is configured to read a program in the memory to implement the steps of the method according to the first aspect; or, a step in a method as described in the second aspect above; or a step in a method as described in the aforementioned third aspect; or, a step in a method according to the fourth aspect.
In a tenth aspect, the embodiment of the present invention further provides a readable storage medium, for storing a program, where the program, when executed by a processor, implements the steps in the method according to the foregoing first aspect; or, implementing the steps in the method according to the second aspect; or, a step in the method according to the aforementioned third aspect; or implementing the steps in the method according to the fourth aspect.
In the embodiment of the invention, in the conversation process of the terminal side equipment, the media data generated in the conversation process of the terminal side equipment is collected through the certificate storing server, the collected media data is stored into the network disk equipment, and meanwhile, the certificate storing description data and the certificate storing content abstract of the media data are stored into the block chain. Therefore, the telephone certificate is collected at the network side and is stored in a decentralized mode based on the block chain, so that the possibility of tampering of the media data and the certificate description data of the media data can be greatly reduced, the validity of the certificate of the media data generated in the conversation process is guaranteed, and the reliability and the safety of the telephone certificate can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a block diagram of a network system to which an embodiment of the present invention is applicable;
FIG. 2 is a block diagram of a network system to which phone verification may be applied according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a phone authentication method according to an embodiment of the present invention;
FIG. 4 is a block chain structure diagram for forensic data;
FIG. 5 is a functional block diagram of a credential storage server;
FIG. 6 is a second flowchart of a phone authentication method according to an embodiment of the present invention;
FIG. 7 is a schematic diagram illustrating an interaction flow of a telephone authentication method according to an embodiment of the present invention;
FIG. 8 is a flowchart illustrating a telephone verification method according to an embodiment of the present invention;
fig. 9 is a second flowchart illustrating a phone verification method according to an embodiment of the present invention;
FIG. 10 is an interaction flow diagram of a phone verification method according to an embodiment of the invention;
FIG. 11 is a block diagram of a telephone authentication device according to an embodiment of the present invention;
fig. 12 is a second structural diagram of a telephone authentication device according to an embodiment of the present invention;
FIG. 13 is a block diagram of a telephone verification device according to an embodiment of the present invention;
fig. 14 is a second block diagram of a telephone verification apparatus according to an embodiment of the present invention;
fig. 15 is a schematic structural diagram of a communication device provided in the implementation of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the embodiments of the present invention are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Further, as used herein, "and/or" means at least one of the connected objects, e.g., a and/or B and/or C, means 7 cases including a alone, B alone, C alone, and both a and B present, B and C present, both a and C present, and A, B and C present.
Referring to fig. 1, fig. 1 is a block diagram of a network system to which an embodiment of the present invention is applicable, and as shown in fig. 1, the network system includes a data transmitting device 11 and a data receiving device 12.
Wherein, the data transmitting device 11 and the data receiving device 12 can communicate with each other. The data transmission apparatus 11 transmits Ciphertext information (Ciphertext Block) to the data reception apparatus 12.
In practical applications, the data sending device 11 may be a terminal side device (also referred to as a User Equipment (UE)), and the data receiving device 12 may be a network side device; alternatively, the data transmitting device 11 may be a network side device, and the data receiving device 12 may be a terminal side device, but is not limited thereto.
The terminal side Device may be a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), a vehicle-mounted Device, or the like. The network side device may be a network side device of the IMS core network, such as a base station, an Access and Mobility Management Function (AMF), a relay, an Access point, or other network elements, and may also be a network side device of the internet, such as an application server, which is not limited specifically herein.
First, an application scenario of the method provided by the embodiment of the present invention is described below.
Referring to fig. 2, fig. 2 is a structural diagram of a network system capable of applying phone license storage according to an embodiment of the present invention, and as shown in fig. 2, the network system capable of applying phone license storage may specifically include two parts, where the first part is a phone license storage part and is used for storing media data and license storage description data of the media data generated during a call of a terminal side device. The second part is a telephone verification part used for verifying the verified media data and the verification description data of the media data.
Specifically, in fig. 2, the interaction of the telephone certificate storing part may be represented by a solid line, where the telephone certificate storing part may include a terminal-side device a capable of making a telephone call, a network-side device of a core network of the terminal-side device B, IMS, a certificate storing server, a network disk device, and a blockchain. The certificate storing server can be an application server which bears MMTel service and is used for storing certificate telephone information, the application server can be deployed in a communication network, the network disk device can be used for storing media data, and the blockchain can be used for storing certificate describing data and a certificate storing content abstract of the media data.
The interaction of the phone verification part may be represented by a dashed line, wherein the phone verification part may comprise any terminal side device (which may be terminal side device B), a verification server, a network disk device and a blockchain of the call.
The network system of the telephone verification part can implement the telephone verification method of the embodiment of the invention, and the network system of the telephone verification part can implement the telephone verification method of the embodiment of the invention, which is described in detail below.
The following describes a telephone authentication method provided by an embodiment of the present invention.
Referring to fig. 3, fig. 3 is a schematic flow chart of a phone certificate storing method according to an embodiment of the present invention. The telephone credentialing method illustrated in fig. 3 may be performed by a credentialing server. The telephone certificate storing method can be applied to a telephone certificate storing device, and the telephone certificate storing device can be deployed in a certificate storing server.
As shown in fig. 3, the telephone certificate storing method may include the steps of:
step 301, receiving a certificate storing and starting request sent by a terminal side device in a communication process.
In this step, when the call is established and during the call, the two parties or one of the parties can send a request to the certificate storing server to request the certificate storing of the phone content. The call may be a video call or an audio call, and is not limited specifically here.
That is, the terminal-side device may be a calling terminal device in both parties of a call, or may be a called terminal device, which is not specifically limited herein. In the following, the two-party call is established, and the terminal side device is taken as a called terminal device as an example for explanation.
As shown in fig. 2, in a process that the terminal side device a establishes a call to the terminal side device B through the IMS core network, the network side device of the IMS core network may activate an evidence storing server deployed in the communication network, so that the evidence storing server performs an evidence storing preparation for the call.
Under the condition that the evidence storing server is activated, session context information of the call can be acquired so as to generate metadata of the evidence storing of the call based on the session context information, wherein the session context information can comprise a calling number, a called number (all numbers are recorded during multi-party calling), and call establishing time. The calling number and the called number can be From fields of RequestURI, From, To and the like in the INVITE signaling.
The metadata of this record can be expressed as (CallerID, CalleeIDSet, CallStartDateTime), CallerID representing the calling number, CalleeIDSet representing the called number, and CallStartDateTime representing the call setup date and time.
After the call between the terminal side device a and the terminal side device B is successfully established, the terminal side device a and the terminal side device B are in a call process, the terminal side device B (also may be the terminal side device a) may send a message to the certificate storing server in the call process, or send a message to the terminal side device a, the sent message may include a certificate storing starting request, and the certificate storing server may receive a message directly sent by the terminal side device B, or intercept and capture a message sent by the terminal side device B to the terminal side device a, so as to obtain the certificate storing starting request in the message, and start the certificate storing function of the call.
The terminal side device B sends the request, which may be a message carried by the IMS core network or a message carried by the internet. For example, the message sent may include any of the following:
INFO message of SIP protocol;
a Dual-Tone multi-frequency (DTMF) message;
a MESSAGE of the SIP protocol;
short messages;
unstructured Supplementary Service Data (USSD) messages;
USSD messages in the IMS domain;
internet-borne messages.
Of course, messages in other manners may also be used, and are not described in detail here.
Wherein, the receiver of the INFO message of the SIP protocol may point to the certificate storing server, or may point to the terminal side device a.
The receiver of the DTMF message points to a credentialing server, which captures DTMF key information by extracting a Real-time Transport Protocol (RTP) packet.
The receiver of the MESSAGE, the short MESSAGE, the USSD MESSAGE of the SIP protocol and the USSD MESSAGE in the IMS domain may also point to the certificate store server.
The message carrying mode of the internet can be that an application program APP is installed on terminal side equipment, and a message is sent from a client to a certificate storing server.
The information content carried by the message body is exemplified below and can be represented in a data serialization format YAML.
MsgBody:
Type:REQ
Code:Start_MMTel_Record
RecAudio:Y
RecVideo:N
Correspondingly, the certificate storing server can receive a certificate storing starting request sent by the terminal side equipment in the call process.
Step 302, responding to the certificate storing starting request, collecting multimedia data generated in the conversation process, and obtaining a multimedia file.
In this step, the certificate storing server may respond to the certificate storing start request to start a function of collecting call contents, that is, collect multimedia data generated during a call, and continuously collect the multimedia data during the call to obtain a multimedia file. The types of multimedia data generated during the call may include various types, such as audio, video, text, AR, and the like.
Specifically, the evidence storage server can start a recording or video recording function according to the type of the call, and collects multimedia data generated in the call process, wherein sound is collected as an audio clip and stored as an audio file, video is collected as a video clip and stored as a video file, and text is collected as a text clip and stored as a text file. That is, the number of the resulting multimedia files may include one or more, determined according to the type of call.
Meanwhile, the certificate storing server responds to the certificate storing starting request, and may also record metadata of the certificate storing this time, which may be expressed as follows:
(CallerID,CalleeIDSet,CallStartDateTime,EvidStartDateTime,InitUserID)。
the CallerID represents a calling number, the CalleeeIDSet represents a called number, the CallStartDateTime represents a call setup date and time, the EidStartDateTime represents a certificate storage start date and time, the InitUserID represents a certificate storage initiator, and the terminal side device B is the certificate storage initiator under the condition that the terminal side device B initiates the certificate storage.
Then, the evidence storing server may notify other terminals participating in the call, such as the terminal side device a, in a message manner, so as to notify that the other terminals have started to collect the call content for evidence storage.
The notification mode may adopt an INFO MESSAGE of a SIP protocol, a MESSAGE of a SIP protocol, a short MESSAGE, a USSD MESSAGE, or a USSD MESSAGE in an IMS domain, or other schemes, which is not specifically limited in the embodiment of the present invention.
The information content example carried by the message body of the notification message is represented by a data serialization format YAML.
MsgBody:
Type:NOTIFY
Code:MMTel_Record_Started
InitiatedBy:<UE_B>
Step 303, in a case that a certificate storing ending request is received, generating a data tuple to be certified, where the data tuple includes media data generated based on the multimedia file, certificate storing description data of the media data, a certificate storing content abstract, and a certificate storing identifier, and the certificate storing description data includes target metadata for storing the media data.
The certificate storing end request may be sent by any one of the calling parties, such as the terminal-side device a and the terminal-side device B mentioned above, and the request of the terminal-side device B is described as an example below.
The terminal side device B may send a message to the certificate storing server in the passing process, or send a message to the terminal side device a, where the sent message may include a certificate storing end request, and the certificate storing server may receive a message directly sent by the terminal side device B, or intercept and capture a message sent by the terminal side device B to the terminal side device a, so as to obtain the certificate storing end request in the message, to request to stop collecting the call content, and to store the call content collected in the call process.
The sending of the storage ending request by the terminal side device B may be similar to the sending of the storage starting request, and is not described herein again.
In addition, the information content carried by the message body of the certificate storing end request is exemplified as follows, and can be represented by a data serialization format YAML.
MsgBody:
Type:REQ
Code:STOP-SAVE_MMTel_Record
RecAudio:Y
RecVideo:N
Correspondingly, the certificate storing server can receive a certificate storing ending request sent by the terminal side equipment in the call process.
In practical application, when the evidence storing server collects the call content in the call process, the call may be abnormal, such as suddenly disconnected, in this case, the network side device of the IMS core network may monitor whether the calling party is online, and in the case of determining that the calling party is not online, may cut off the communication link and send a message to the evidence storing server to inform the evidence storing server that the call is abnormal. At this time, the credentialing server can take the message as a credentialing end request,
in addition, if the certificate storing server does not receive the certificate storing ending request sent by the terminal side device in the call process, the network side device of the IMS core network may forward the signaling to the certificate storing server to inform that the call is ended when the call is ended, that is, when the network side device of the IMS core network receives the signaling for ending the call sent by the terminal side device. In this application scenario, the credential server may use the signaling as a credential ending request.
Correspondingly, the certificate storing server can preprocess the collected multimedia data to generate a data tuple to be stored under the condition of receiving the certificate storing ending request.
The data tuples are represented as follows:
(EvidenceID,EvidenceMeta,EvidenceMediaFileSet,EvidenceHash)。
the various elements therein are described as follows:
the evencedeid can be a certificate authority, which can be generated by a certificate authority and is required to be globally unique. The certificate storage Identifier may be a Universal Unique Identifier (UUID), or may be derived from an abstract of metadata of the certificate storage, or may be generated by other ID generation schemes, which is not specifically limited in the embodiment of the present invention.
The evenncemeta may be voucher description data, the data form may be a tuple including target metadata for voucher storage of the media data, where the target metadata is metadata recorded when voucher storage is started, and the evenncemeta may be represented as follows:
(CallerID,CalleeIDSet,CallStartDateTime,EvidenceStartDateTime,EvidenceEndDateTime,InitUserID)。
wherein, the evencenEndDateTime calls the ending date and time of the evidence storage.
Evencedediafileset may be certified media data generated from previously acquired multimedia files. Specifically, the evencedimediafileset may be denoted as evencedimemediafileset-set _ of (MediaFile), that is, the media data to be stored may be a set of multiple multimedia files, such as audio files and video files, and the media metadata of the multimedia files and the multimedia files are packaged to obtain the mediafiles.
Each media file MediaFile (FileMeta, FileBody). Wherein, FileMeta is the media metadata of certificate of deposit, represent as follows: FileMeta (FileID, StartTime, EndTime, MeidaType, Size), file identification, start and stop timestamp, media type, and Size, respectively. FileBody is a multimedia file.
The EddinceHash can be obtained by summarizing the certificate-storing content of the media data and calculating according to the certificate-storing identification, the certificate-storing description data, the media data and the random number, and the calculation is as follows:
EvidenceHash=SIGNdeposit certificate server(HASH(EvidenceID,EvidenceMeta,EvidenceMediaFileSet,r))。
Wherein, SIGNDeposit certificate server(x) Denotes that x is signed with the certificate server's private key, and hash (x) denotes that x's digest is computed. When calculating the digest, the embodiment of the present invention does not limit the specific hash algorithm, and a general hash algorithm may be used, for example, SHA-256, r may be a random number randomly generated by the credential storage server.
Step 304, sending the media data to a network disk device for storage, and sending data in the data tuple except the media data to a first block chain node, so as to store the data in the data tuple except the media data into a block chain.
The network disk device does not limit specific devices, and devices for storing the media data can be called network disk devices, the media data or the packed files of the media data can be sent to the network disk devices for storage, and when the media data or the packed files of the media data are stored, the storage identification can be used as a query index of the network disk devices, so that the media data can be conveniently verified.
Meanwhile, the certificate storing identification, the certificate storing description data, the certificate storing content abstract and the random number for generating the certificate storing content abstract can be sent to the first block chain node so as to store the data into the block chain.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a block chain for storing evidence data, and as shown in fig. 4, the block chain may further include a first block chain node under the condition that the block chain includes a block chain account book and a sorting node, where the first block chain link point may be referred to as an evidence uplink node, the evidence server may send the evidence data to the evidence uplink node, the evidence uplink node may perform consensus on the data by using a consensus algorithm to generate an evidence storage block, and after the evidence storage block is identified by other block chain link points, the evidence storage block is written into the block chain.
The above steps can all be executed by the certificate storing server, an embodiment of the present invention further provides a certificate storing server, referring to fig. 5, where fig. 5 is a functional structure diagram of the certificate storing server, and as shown in fig. 5, the core function of the certificate storing server is:
during the MMTel calling, acquiring the MMTel media content according to the request of the terminal side equipment;
packaging the collected media content, and calculating the abstract of the evidence storing content;
storing the evidence storing content abstract into a block chain;
the media content is stored on the network disk device.
In fig. 5, solid lines represent media content streams and forensic content streams, and dashed lines represent forensic control, such as forensic-related start, notification, and stop messages. The IMS access interconnection represents a MESSAGE delivered through the IMS core network, such as an INFO MESSAGE of the SIP protocol, a DTMF MESSAGE, a MESSAGE of the SIP protocol, a short MESSAGE, USSD, or USSD in the IMS domain, i.e., USSI, and the like, and the internet access interconnection represents a MESSAGE delivered through the internet, such as a MESSAGE carried by a protocol such as MESSAGE Queue Telemetry Transport (MQTT).
It should be noted that, if the execution of deposit control and/or the deposit notification message adopts the IMS in-band manner, that is, the SIP MESSAGE instruction, the IMS core network needs to carry and forward the deposit control and/or the deposit notification message, such as the message of the deposit start request and the message of the deposit end request, to the deposit server.
In this embodiment, in the call process of the terminal side device, the certificate storing server acquires media data generated by the terminal side device in the call process, stores the acquired media data into the network disk device, and simultaneously stores certificate storing description data and certificate storing content abstract of the media data into the block chain. Therefore, the telephone certificate is collected at the network side and is stored in a decentralized mode based on the block chain, so that the possibility of tampering of the media data and the certificate description data of the media data can be greatly reduced, the validity of the certificate of the media data generated in the conversation process is guaranteed, and the reliability and the safety of the telephone certificate can be improved.
Optionally, before step 301, the method further includes:
receiving a call calling signaling sent by a network side device, wherein the call calling signaling is used for establishing a call of the terminal side device;
and responding to the conversation call signaling, analyzing the conversation call signaling to obtain conversation context information, wherein the target metadata comprises metadata generated based on the conversation context information.
In this embodiment, the network side device may configure the iFC rule, configure the call authentication function, and point to the authentication server, so as to establish an audio or video call in a Back-to-Back User Agent (B2 BUA) manner, and connect the authentication server in series in the call path.
The method comprises the steps that calling terminal equipment and called terminal equipment establish calling, the calling terminal equipment sends a call signaling to network side equipment of an IMS core network, and the network side equipment triggers an iFC rule according to the call signaling so as to activate a certificate storage function of a certificate storage server.
Specifically, the network side device may forward the call signaling to the certificate storage server, and the certificate storage server analyzes the call signaling to obtain session context information, and generates certificate storage metadata based on the session context information, and then returns the call signaling to the network side device, and the network side device establishes a call link between the terminal side devices based on the call signaling.
The calling process can have interaction of call initiating signaling INVITE, ringing RING, off-hook 200OK and other communication calling signaling. During the call process, the network side device may forward the received call signaling to the certificate storing server.
In this embodiment, the iFC rule is configured in the network side device, and the iFC rule is triggered to activate the certificate storing server, so that the certificate storing server can prepare for telephone certificate storing.
Optionally, after the step 304, the method further includes:
and sending a certificate storage result to terminal side equipment participating in the conversation process, wherein the certificate storage result comprises data sent to the first block link point for certificate storage.
In this embodiment, the evidence storing result may be notified to all participants of the call, including: and the terminal side equipment performs data verification based on the obtained verification result.
The notification mode may be an INFO MESSAGE of the SIP protocol, a MESSAGE of the SIP protocol, a short MESSAGE, USSD, USSI, or other schemes.
Optionally, after the step 304, the method further includes:
receiving a certificate storage index sent by the first block chain node, wherein the certificate storage index is used for representing the storage position of data sent to the first block chain link node for certificate storage in a block chain;
the certificate storing result also comprises the certificate storing index.
In this embodiment, after the data is stored in the block chain, the first block link point may feed back the evidence storage index to the evidence storage server, where the evidence storage index represents a storage location of the data in the block chain, and the evidence storage index may be obtained by splicing the block ID and the intra-block transaction ID.
After that, the authentication server can send the authentication index and other data to the terminal side device as the authentication result, so as to facilitate the terminal side device to perform data authentication.
Optionally, the certificate storage content digest is determined by performing hash operation based on the media data, the certificate storage description data of the media data, and the certificate storage identifier.
In this embodiment, the certificate storing content digest may be a target digest, or may be obtained by signing a target digest based on a private key of the certificate storing server. And the target abstract is obtained by carrying out hash operation on the media data, the certificate storing description data of the media data and the certificate storing identification. Therefore, the certificate storing content abstract is obtained through a signature technology and a Hash operation technology and stored in the block chain, and the safety of the certificate storing content abstract and the effectiveness of media data can be improved.
The various optional implementations described in the embodiments of the present invention may be implemented in combination with each other or implemented separately without conflict, and the embodiments of the present invention are not limited thereto.
Referring to fig. 6, fig. 6 is a second flowchart of a phone authentication method according to an embodiment of the present invention. The telephone certificate storing method of the embodiment of the invention can be executed by the terminal side equipment. The telephone certificate storing method can be applied to a telephone certificate storing device, and the telephone certificate storing device can be deployed in terminal side equipment.
As shown in fig. 6, the telephone certificate storing method may include the steps of:
step 601, in the conversation process, sending a certificate storing starting request in a message mode, wherein the certificate storing starting request is used for requesting a certificate storing server to start collecting multimedia data generated in the conversation process so as to obtain a multimedia file;
step 602, sending a certificate storing end request in a message manner, where the certificate storing end request is used to request the certificate storing server to store media data generated based on the multimedia file in a data tuple to be stored in a network disk device, and store data in the data tuple except the media data in a block chain.
Optionally, the message that the terminal side device sends the request includes any one of the following:
a message carried by the communications network;
internet-borne messages.
It should be noted that, the present embodiment is taken as an embodiment of the certificate storing server corresponding to the above method embodiment, and therefore, reference may be made to the relevant description in the above method embodiment, and the same beneficial effects may be achieved. To avoid repetition of the description, the description is omitted.
For ease of understanding, examples are illustrated below:
referring to fig. 7, fig. 7 is a schematic view illustrating an interaction flow of a telephone certificate storing method according to an embodiment of the present invention, and as shown in fig. 7, the flow is as follows:
network side equipment of an IMS core network configures an iFC rule in advance;
the terminal side equipment A and the terminal side equipment B establish a call, and the network side equipment activates a certificate storing server to register a certificate storing function for the call;
the terminal side equipment B requests to start a certificate storage function;
the certificate storing server starts to collect call content;
the evidence storing server continuously collects and stores the conversation content during the conversation;
the terminal side equipment B requests to stop collecting and implement storing certificate so as to permanently store the conversation content;
the certificate storing server processes the certificate storing content;
the certificate storing server stores the telephone content to the network disk equipment;
the certificate storing server stores the abstract of the certificate storing content of the telephone content, the description data of the certificate storing content and the like to the block chain;
the certificate storing server informs the terminal side device A and the terminal side device B of the certificate storing result.
The following describes a telephone verification method according to an embodiment of the present invention.
Referring to fig. 8, fig. 8 is a flowchart illustrating a telephone verification method according to an embodiment of the present invention. The phone verification method shown in fig. 8 may be performed by a verification server. The telephone verification method can be applied to a telephone verification device, and the telephone verification device can be deployed in a verification server.
As shown in fig. 8, the phone verification method may include the steps of:
step 801, receiving a target verification request sent by a terminal side device, wherein the target verification request includes a storage verification identifier of media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server;
step 802, in response to the target verification request, sending a first verification request to a second blockchain node, and acquiring verification description data and a verification content abstract corresponding to the verification identifier sent by the second blockchain node based on the first verification request, where the verification description data includes target metadata for verifying the media data;
step 803, sending a second verification request to the network disk device, and receiving media data corresponding to the verification storage identifier sent by the network disk device based on the second verification request;
step 804, sending a data tuple corresponding to the certificate-storing identification to the terminal side device, where the data tuple includes media data, certificate-storing description data, and a certificate-storing content abstract corresponding to the certificate-storing identification.
In this embodiment, the terminal-side device may be any terminal-side device participating in a call, and the terminal-side device B is described as an example below.
The terminal side device B may send a target verification request to the verification server, where the target verification request may carry the verification storage identifier, or may carry the verification storage identifier and the verification storage index.
The query server receives a target verification request sent by the terminal side equipment, and responds to the target verification request, and sends a first verification request to the second blockchain node. The second block link point may be referred to as a verified uplink node, as shown in fig. 4.
The first verification request may include a verification identifier or may include a verification index, which is not specifically limited herein.
The second block chain node queries the certificate storage transaction information to obtain certificate storage description data and a certificate storage content abstract corresponding to the certificate storage identification, in order to ensure safety, the second block chain node can encrypt the queried data to obtain ciphertext information, and the encryption process specifically comprises the following steps:
ENCverification server(SIGNBlock chain(certificate storage identification, certificate storage description data, certificate storage content abstract, random number r2)) | | r 2.
Wherein, ENCVerification server(x) Representing encryption with the public key of the verification server; SIGNBlock chain(x) Representing signing with the private key of the second blockchain node, the random number r being a random number for generating a digest of the certified content, and r2 being for ENCVerification server(x) And SIGNBlock chain(x) And (4) calculating.
And the second block link point feeds the ciphertext information back to the verification server, and the verification server can decrypt the ciphertext information to finally obtain the verification description data and the verification content abstract corresponding to the verification identification.
Meanwhile, the verification server can also send a second verification request to the network disk device, the second verification request can carry a verification storage identifier, and the network disk device retrieves the related media data and feeds the media data back to the verification server.
The verification server summarizes all contents required for verification, including:
(EvidenceID,EvidenceMeta,EvidenceMediaFileSet,EvidenceHash)。
wherein: the evencedeid is provided by terminal B, the evencedeta and the evencedhash are provided by the blockchain, and the evencedediafiileset is provided by the network disk device.
Finally, the information is returned to the verified terminal side equipment.
Optionally, before step 804, the method further includes:
determining a target evidence storing content abstract based on the evidence storing identification, the media data corresponding to the evidence storing identification and the evidence storing description data;
the step of sending the data tuple corresponding to the certificate-storing identification to the terminal side equipment comprises the following steps:
and under the condition that the evidence storing content abstract corresponding to the evidence storing identification is consistent with the target evidence storing content abstract, sending a data tuple corresponding to the evidence storing identification to the terminal side equipment.
In this embodiment, the verification server may further verify the validity of the media data, so as to prevent the media data from being tampered. That is, the verification server obtains the media data from the network disk device, and after obtaining the verification description data, the verification identifier and the random number r from the blockchain, calculates the target verification content abstract according to the following scheme.
Summary of contents of target deposit certificate (SIGN)Deposit certificate server(HASH(EvidenceID,EvidenceMeta,EvidenceMediaFileSet,r))。
And comparing the target evidence storing content abstract with the evidence storing content abstract extracted from the blockchain, wherein under the condition of consistency, the media data is not falsified and is correspondingly sent to the terminal side equipment, and if the media data is not consistent with the evidence storing content abstract, the media data is possibly falsified, and the terminal side equipment can be correspondingly informed.
In this embodiment, the terminal side device may request the verification server to query the media data through the verification identifier, and the verification server may obtain the verification description data and the verification content abstract of the media data from the block chain based on the verification identifier, and obtain the media data from the network disk device, and then return the data to the terminal side device.
Referring to fig. 9, fig. 9 is a second flowchart of a phone verification method according to an embodiment of the present invention. The telephone verification method shown in fig. 9 may be performed by the terminal-side device. Among them, the telephone verification method is applicable to a telephone verification apparatus which can be deployed in a terminal-side device.
As shown in fig. 9, the phone verification method may include the steps of:
step 901, sending a target verification request to a verification server, where the target verification request includes a verification storage identifier of media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server;
step 902, receiving a data tuple corresponding to the verification identifier sent by the verification server based on the target verification request, where the data tuple includes media data, verification description data, and a verification content summary corresponding to the verification identifier.
It should be noted that, the present embodiment is taken as an embodiment of the verification server corresponding to the above method embodiment, and therefore, reference may be made to the relevant description in the above method embodiment, and the same beneficial effects may be achieved. To avoid repetition of the description, the description is omitted.
For ease of understanding, examples are illustrated below:
referring to fig. 10, fig. 10 is a schematic view illustrating an interaction flow of a phone verification method according to an embodiment of the present invention, and as shown in fig. 10, the flow is as follows:
the terminal side equipment B requests a verification server for verifying the conversation content;
the checking server requests the block chain to inquire the summary of the checking content and the checking description data;
feeding back the summary of the certificate contents and the certificate description data by the block chain;
the checking server requests the network disk device to check the media data;
the network disk equipment feeds back media data;
the certification server determines validity of the media data based on the queried data to prevent the media data from being tampered.
The following describes a telephone authentication device provided in an embodiment of the present invention.
Referring to fig. 11, fig. 11 is a structural diagram of a telephone authentication device according to an embodiment of the present invention. As shown in fig. 11, the telephone certificate storing apparatus 1100 includes:
a first transceiver 1101, configured to receive a certificate storing start request sent by a terminal-side device in a call process;
the first processor 1102 is configured to respond to the certificate storing start request, and acquire multimedia data generated in the call process to obtain a multimedia file;
the first transceiver 1101, further configured to receive a certificate ending request;
the first processor 1102 is further configured to generate a data tuple to be credited under the condition that a credentialing ending request is received, where the data tuple includes media data generated based on the multimedia file, credentialing description data of the media data, a credentialing content summary, and a credentialing identification, and the credentialing description data includes target metadata for credentialing the media data;
the first transceiver 1101 is further configured to send the media data to a network disk device for storage, and send data in the data tuple except the media data to a first block chain node, so as to store the data in the data tuple except the media data in a block chain.
Optionally, the first transceiver 1101 is further configured to receive a call signaling sent by a network side device, where the call signaling is used to establish a call of the terminal side device;
the first processor 1102 is further configured to parse the call signaling to obtain session context information in response to the call signaling, where the target metadata includes metadata generated based on the session context information.
Optionally, the first transceiver 1101 is further configured to send a certificate storage result to the terminal side device participating in the call process, where the certificate storage result includes data sent to the first block link point for certificate storage.
Optionally, the first transceiver 1101 is further configured to receive a certificate storage index sent by the first blockchain node, where the certificate storage index is used to characterize a storage location of data sent to the first blockchain link point for certificate storage in a blockchain;
the certificate storing result also comprises the certificate storing index.
Optionally, the evidence storing content abstract is determined by performing hash operation based on the media data, the evidence storing description data of the media data, and the evidence storing identifier.
The telephone certificate storing apparatus 1100 can implement the processes of the method embodiment of fig. 3 in the embodiment of the present invention, and achieve the same beneficial effects, and is not described herein again to avoid repetition.
Referring to fig. 12, fig. 12 is a second structural diagram of a telephone authentication device according to an embodiment of the present invention. As shown in fig. 12, the telephone authentication apparatus 1200 includes:
the second transceiver 1201 is configured to send a certificate storage start request in a message manner during a call, where the certificate storage start request is used to request a certificate storage server to start collecting multimedia data generated during the call, so as to obtain a multimedia file; sending a certificate storing ending request in a message mode, wherein the certificate storing ending request is used for requesting the certificate storing server to store media data generated based on the multimedia file in a data tuple to be stored to network disk equipment, and storing data except the media data in the data tuple to a block chain.
Optionally, the message that the terminal side device sends the request includes any one of the following:
a message carried by the communications network;
internet-borne messages.
The telephone certificate storing apparatus 1200 can implement each process of the method embodiment of fig. 6 in the embodiment of the present invention, and achieve the same beneficial effects, and is not described herein again to avoid repetition.
The following describes a telephone verification apparatus according to an embodiment of the present invention.
Referring to fig. 13, fig. 13 is a block diagram of a telephone verification apparatus according to an embodiment of the present invention. As shown in fig. 13, the telephone verification apparatus 1300 includes:
a third transceiver 1301, configured to receive a target verification request sent by a terminal side device, where the target verification request includes a storage identifier of media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server; sending a first verification request to a second blockchain node in response to the target verification request;
a third processor 1302, configured to obtain evidence description data and an evidence content summary corresponding to the evidence identifier sent by the second block link point based on the first verification request, where the evidence description data includes target metadata for evidence storage of the media data;
the third transceiver 1301 is further configured to send a second verification request to a network disk device, and receive media data corresponding to the verification identifier sent by the network disk device based on the second verification request; and sending a data tuple corresponding to the certificate storage identification to the terminal side equipment, wherein the data tuple comprises media data, certificate storage description data and a certificate storage content abstract corresponding to the certificate storage identification.
Optionally, the third processor 1302 is further configured to determine a target evidence storing content abstract based on the evidence storing identifier, the media data corresponding to the evidence storing identifier, and the evidence storing description data;
the third transceiver 1301 is further configured to send a data tuple corresponding to the certificate authority identifier to the terminal side device when the certificate authority content digest corresponding to the certificate authority identifier is consistent with the target certificate authority content digest.
The telephone verification apparatus 1300 can implement each process of the method embodiment of fig. 8 in the embodiment of the present invention, and achieve the same beneficial effects, and is not described herein again to avoid repetition.
Referring to fig. 14, fig. 14 is a second structural diagram of a telephone verification apparatus according to an embodiment of the present invention. As shown in fig. 14, the telephone verification apparatus 1400 includes:
a fourth transceiver 1401 for sending a target verification request to a verification server, the target verification request comprising a verification identifier of the media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server; and receiving a data tuple corresponding to the verification storage identifier sent by the verification server based on the target verification request, wherein the data tuple comprises media data, verification storage description data and a verification storage content abstract corresponding to the verification storage identifier.
The telephone verification apparatus 1400 can implement the processes of the method embodiment of fig. 9 in the embodiment of the present invention, and achieve the same beneficial effects, and is not described herein again to avoid repetition.
The embodiment of the invention also provides communication equipment. Referring to fig. 15, a communication device may include a processor 1501, a memory 1502, and a program 15021 stored on the memory 1502 and operable on the processor 1501.
In the case that the communication device is a certificate server, when being executed by the processor 1501, the program 15021 may implement any steps in the method embodiment corresponding to fig. 3 and achieve the same advantageous effects, which are not described herein again.
In a case that the communication device is a terminal-side device, when the program 15021 is executed by the processor 1501, any steps in the method embodiment corresponding to fig. 6 may be implemented and the same advantageous effects may be achieved, which are not described herein again.
In the case that the communication device is a verification server, when executed by the processor 1501, the program 15021 may implement any steps in the method embodiment corresponding to fig. 8 and achieve the same advantageous effects, which are not described herein again.
In a case that the communication device is a terminal-side device, when the program 15021 is executed by the processor 1501, any steps in the method embodiment corresponding to fig. 9 may be implemented and the same advantageous effects may be achieved, which are not described herein again.
Those skilled in the art will appreciate that all or part of the steps of the method according to the above embodiments may be implemented by hardware related to program instructions, and the program may be stored in a readable medium. An embodiment of the present invention further provides a readable storage medium, where a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, any step in the method embodiments corresponding to fig. 3, fig. 6, fig. 8, or fig. 9 may be implemented, and the same technical effect may be achieved, and in order to avoid repetition, details are not repeated here.
The storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (16)

1. A telephone credentialing method executed by a credentialing server, the method comprising:
receiving a certificate storing starting request sent by terminal side equipment in a communication process;
responding to the certificate storage starting request, and collecting multimedia data generated in the conversation process to obtain a multimedia file;
under the condition that a certificate storing ending request is received, generating a data tuple to be subjected to certificate storing, wherein the data tuple comprises media data generated based on the multimedia file, certificate storing description data of the media data, a certificate storing content abstract and a certificate storing identification, and the certificate storing description data comprises target metadata used for storing the media data;
and sending the media data to a network disk device for storage, and sending data except the media data in the data tuple to a first block chain node so as to store the data except the media data in the data tuple into a block chain.
2. The method according to claim 1, wherein before the step of receiving the certificate starting request sent by the terminal side device during the call, the method further comprises:
receiving a call calling signaling sent by network side equipment, wherein the call calling signaling is used for establishing a call of the terminal side equipment;
and responding to the conversation call signaling, analyzing the conversation call signaling to obtain conversation context information, wherein the target metadata comprises metadata generated based on the conversation context information.
3. The method of claim 1, wherein after the step of sending the media data to a network disk device for storage and sending data in the tuple of data other than the media data to the first blockchain node, the method further comprises:
and sending a certificate storage result to terminal side equipment participating in the conversation process, wherein the certificate storage result comprises data sent to the first block link point for certificate storage.
4. The method of claim 3, wherein after the step of sending the media data to a network disk device for storage and sending the data in the tuple of data other than the media data to the first blockchain node, the method further comprises:
receiving a certificate storage index sent by the first block chain node, wherein the certificate storage index is used for representing the storage position of data sent to the first block chain link node for certificate storage in a block chain;
the certificate storing result also comprises the certificate storing index.
5. The method of claim 1, wherein the forensic content digest is determined by a hash operation based on the media data, forensic description data for the media data, and a forensic identification.
6. A telephone certificate storing method is executed by a terminal side device, and is characterized by comprising the following steps:
in the conversation process, sending a certificate storing starting request in a message mode, wherein the certificate storing starting request is used for requesting a certificate storing server to start to collect multimedia data generated in the conversation process so as to obtain a multimedia file;
sending a certificate storing ending request in a message mode, wherein the certificate storing ending request is used for requesting the certificate storing server to store media data generated based on the multimedia file in a data tuple to be stored to network disk equipment, and storing data except the media data in the data tuple to a block chain.
7. The method according to claim 6, wherein the message requesting the terminal side device to send comprises any one of the following:
a message carried by the communications network;
messages carried by the internet.
8. A telephone verification method performed by a verification server, the method comprising:
receiving a target verification request sent by terminal side equipment, wherein the target verification request comprises a media data storage identification; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server;
responding to the target verification request, sending a first verification request to a second block chain node, and acquiring verification description data and a verification content abstract corresponding to the verification identification sent by the second block chain node based on the first verification request, wherein the verification description data comprises target metadata for verifying the media data;
sending a second verification request to the network disk device, and receiving media data corresponding to the verification storage identifier sent by the network disk device based on the second verification request;
and sending a data tuple corresponding to the certificate storage identification to the terminal side equipment, wherein the data tuple comprises media data, certificate storage description data and a certificate storage content abstract corresponding to the certificate storage identification.
9. The method of claim 8, wherein before the step of sending the data tuple corresponding to the credential identifier to the terminal-side device, the method further comprises:
determining a target evidence storing content abstract based on the evidence storing identification, the media data corresponding to the evidence storing identification and the evidence storing description data;
the step of sending the data tuple corresponding to the certificate-storing identification to the terminal side device includes:
and under the condition that the evidence storing content abstract corresponding to the evidence storing identification is consistent with the target evidence storing content abstract, sending a data tuple corresponding to the evidence storing identification to the terminal side equipment.
10. A telephone verification method performed by a terminal-side device, the method comprising:
sending a target verification request to a verification server, wherein the target verification request comprises a verification storage identifier of the media data; the media data are generated by the certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server;
and receiving a data tuple corresponding to the verification storage identifier sent by the verification server based on the target verification request, wherein the data tuple comprises media data, verification storage description data and a verification storage content abstract corresponding to the verification storage identifier.
11. A telephone certificate-depositing apparatus, comprising:
the first transceiver is used for receiving a certificate storing starting request sent by terminal side equipment in a communication process;
the first processor is used for responding to the certificate storage starting request, and acquiring multimedia data generated in the conversation process to obtain a multimedia file;
the first transceiver is also used for receiving a certificate storing and ending request;
the first processor is further configured to generate a data tuple to be credited under the condition that a credentialing ending request is received, where the data tuple includes media data generated based on the multimedia file, credentialing description data of the media data, a credentialing content abstract, and a credentialing identification, and the credentialing description data includes target metadata for credentialing the media data;
the first transceiver is further configured to send the media data to a network disk device for storage, and send data in the data tuple except the media data to a first block chain node, so as to store the data in the data tuple except the media data in a block chain.
12. A telephone certificate-depositing apparatus, comprising:
the second transceiver is used for sending a certificate storing starting request in a message mode in a communication process, wherein the certificate storing starting request is used for requesting a certificate storing server to start to collect multimedia data generated in the communication process so as to obtain a multimedia file; sending a certificate storing ending request in a message mode, wherein the certificate storing ending request is used for requesting the certificate storing server to store media data generated based on the multimedia file in a data tuple to be subjected to certificate storing to network disk equipment, and storing data except the media data in the data tuple to a block chain.
13. A telephone verification device, comprising:
a third transceiver, configured to receive a target verification request sent by a terminal device, where the target verification request includes a storage identifier of media data; the media data are generated by a certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server; sending a first verification request to a second blockchain node in response to the target verification request;
a third processor, configured to acquire credential description data and a credential content summary corresponding to the credential identifier sent by the second block link point based on the first verification request, where the credential description data includes target metadata for authenticating the media data;
the third transceiver is further configured to send a second verification request to the network disk device, and receive media data corresponding to the verification storage identifier sent by the network disk device based on the second verification request; and sending a data tuple corresponding to the certificate storage identification to the terminal side equipment, wherein the data tuple comprises media data, certificate storage description data and a certificate storage content abstract corresponding to the certificate storage identification.
14. A telephone verification device, comprising:
a fourth transceiver for sending a target verification request to a verification server, the target verification request including a verification identifier of the media data; the media data are generated by the certificate storing server based on a multimedia file, and the multimedia file is obtained by collecting the multimedia data generated in the call process of the terminal side equipment based on the certificate storing server; and receiving a data tuple corresponding to the verification identifier sent by the verification server based on the target verification request, wherein the data tuple comprises media data, verification description data and a verification content abstract corresponding to the verification identifier.
15. A communication device, comprising: a transceiver, a memory, a processor, and a program stored on the memory and executable on the processor; the processor is used for reading the program in the memory to realize the steps in the telephone certificate storing method according to any one of claims 1 to 5; or, a step in a telephone deposit method according to any one of claims 6 to 7; or, a step in a telephone verification method as claimed in any one of claims 8 to 9; or, as in claim 10.
16. A readable storage medium storing a program, wherein the program, when executed by a processor, implements the steps in the telephone credentialing method of any one of claims 1 to 5; or, a step in a telephone deposit method according to any one of claims 6 to 7; or, a step in the telephone verification method of any one of claims 8 to 9; or, as in claim 10.
CN202110005369.1A 2021-01-05 2021-01-05 Telephone verification method, related device and communication equipment Pending CN114726843A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110005369.1A CN114726843A (en) 2021-01-05 2021-01-05 Telephone verification method, related device and communication equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110005369.1A CN114726843A (en) 2021-01-05 2021-01-05 Telephone verification method, related device and communication equipment

Publications (1)

Publication Number Publication Date
CN114726843A true CN114726843A (en) 2022-07-08

Family

ID=82233896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110005369.1A Pending CN114726843A (en) 2021-01-05 2021-01-05 Telephone verification method, related device and communication equipment

Country Status (1)

Country Link
CN (1) CN114726843A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376552A (en) * 2018-08-21 2019-02-22 阿里巴巴集团控股有限公司 A kind of evidence collection method and system for depositing card based on block chain
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
CN110516458A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 Data processing method, device and computer equipment based on block chain technology
CN111552676A (en) * 2020-04-26 2020-08-18 北京众享比特科技有限公司 Block chain based evidence storing method, device, equipment and medium
US20200293515A1 (en) * 2019-06-03 2020-09-17 Alibaba Group Holding Limited Service processing system and method based on blockchain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376552A (en) * 2018-08-21 2019-02-22 阿里巴巴集团控股有限公司 A kind of evidence collection method and system for depositing card based on block chain
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
US20200293515A1 (en) * 2019-06-03 2020-09-17 Alibaba Group Holding Limited Service processing system and method based on blockchain
CN110516458A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 Data processing method, device and computer equipment based on block chain technology
CN111552676A (en) * 2020-04-26 2020-08-18 北京众享比特科技有限公司 Block chain based evidence storing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
US8824684B2 (en) Dynamic, selective obfuscation of information for multi-party transmission
US9749318B2 (en) Key management in a communication network
US20090025075A1 (en) On-demand authentication of call session party information during a telephone call
US20090046839A1 (en) Verifying authenticity of called party in telephony networks
CN109345245B (en) Short message verification method, device, network and storage medium based on block chain
US7764945B2 (en) Method and apparatus for token distribution in session for future polling or subscription
US8694789B2 (en) System and method for generating a non-repudiatable record of a data stream
WO2015158114A1 (en) Intelligent communication method, terminal and system
CN105119877A (en) Voice verification method, device and system
US9077806B2 (en) Method, system and apparatus for implementing secure call forwarding
US11496319B2 (en) Method of identity authentication for voice over internet protocol call and related device
US20170104870A1 (en) A method to authenticate calls in a telecommunication system
CN102802150B (en) phone number verification method, system and terminal
CN112738575A (en) Screen projection implementation method, device and system
CN113556362B (en) Encryption session establishment and maintenance method based on block chain intelligent contract
US20090025062A1 (en) Verifying authenticity of conference call invitees
CN102811369B (en) Security authentication method during video sharing and handheld equipment
WO2016177222A1 (en) Missed call reminding method and device
CN110048928B (en) Information submitting, obtaining and interacting method, device, equipment and system
CN114726843A (en) Telephone verification method, related device and communication equipment
CN113194069B (en) Communication tracing method, communication tracing device and medium based on block chain
CN108924142A (en) A kind of secure voice intercommunication means of communication based on Session Initiation Protocol
CN114040385A (en) VoLTE-based encrypted call system and method
CN113612734A (en) Cross-network remote court trial media stream transmission method and device
Cattaneo et al. Reliable voice-based transactions over VoIP communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination