CN114697036A - Telephone number access method and communication intermediary system - Google Patents
Telephone number access method and communication intermediary system Download PDFInfo
- Publication number
- CN114697036A CN114697036A CN202011588313.5A CN202011588313A CN114697036A CN 114697036 A CN114697036 A CN 114697036A CN 202011588313 A CN202011588313 A CN 202011588313A CN 114697036 A CN114697036 A CN 114697036A
- Authority
- CN
- China
- Prior art keywords
- token
- user
- telephone number
- access
- holder
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000004891 communication Methods 0.000 title claims description 34
- 238000012795 verification Methods 0.000 claims abstract description 9
- 230000000694 effects Effects 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 4
- 230000006870 function Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
- H04M1/27457—Management thereof, e.g. manual editing of data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Library & Information Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
A telephone number access method comprising: generating a token corresponding to a phone number and issuing the token to a holder of the phone number, wherein the token includes a user restriction; receiving an access request for a legitimate user who meets the user restriction to access the phone number based on the token; and granting the legitimate user access to the telephone number based on the verification of the validity of the token. The method effectively prevents the telephone number of the user from being leaked, and protects the personal privacy of the user.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for accessing a phone number.
Background
At the present stage, the telephone number of the user is often leaked or acquired by lawbreakers, so that the user receives various fraudulent and harassing calls, short messages and the like. It is difficult to restrict the minimal collection of user information by the enterprise and to ensure that the user's personal information, such as telephone numbers, is not abused by prior art means.
Because the telephone number is completely named in China, the information of a person such as a real name, a social contact account number, an address, a living habit and the like can be acquired through the telephone number. In addition, data such as contact information of a user is usually stored in a server of an organization such as an enterprise and a service provider or an individual, the storage form and the encryption level are greatly different, the condition that a telephone number is leaked is difficult to reverse due to the existing modes, and the user also has difficulty in requiring the service provider authorized to use the telephone number to delete own private information.
Disclosure of Invention
An object of the present invention is to provide a telephone number access method which enables an access subject to access a telephone number of a user without knowing the telephone number thereof.
In order to achieve the above object, the present invention provides a technical solution as follows.
A telephone number access method comprising: generating a token corresponding to the phone number and issuing the token to a holder of the phone number, wherein the token includes user restrictions; receiving an access request of a legal user according with user limitation for accessing the telephone number based on the token; and granting the legitimate user access to the telephone number based on the verification of the validity of the token.
Optionally, generating the token comprises setting an identification information field of the intermediary node in the token, wherein the intermediary node is configured to generate the token.
Optionally, generating the token further comprises setting a usage mode limit of the token, the usage mode limit being used to limit a mode in which a legitimate user uses the token.
Optionally, generating the token further comprises setting a usage restriction specific to a legitimate user.
Optionally, the method further comprises accepting editing and/or management of the token by a holder of the telephone number.
Optionally, the method further comprises modifying the user restrictions and/or the usage pattern restrictions of the token based on the holder's editing and/or management of the token, wherein the usage pattern restrictions are used to define the pattern in which legitimate users use the token.
The present invention also discloses a communication mediation system configured to permit a legitimate user to access a telephone number based on a token, the communication mediation system including at least one mediation node, the mediation node including: a token generation section configured to generate a token corresponding to the telephone number and issue the token to a holder of the telephone number, wherein the token includes a user restriction; a token access section configured to receive an access request of a legitimate user, which conforms to the user restriction, to access the phone number based on the token, and to grant the legitimate user access to the phone number based on verification of validity of the token.
Optionally, the token generation part is further configured to set an identification information field of the token generation part in the token.
Optionally, the intermediary node further comprises a token management section configured to modify user restrictions of the token and/or usage restrictions of the token.
The invention also discloses a communication system for permitting access to a telephone number based on a token, the system comprising a first terminal of a holder of the telephone number, a second terminal of a legitimate user of the token and the communication mediation system; the communication mediation system is configured to generate a token corresponding to the phone number based on a first request from the first terminal; receiving a second request from the second terminal for access to the telephone number based on the token; the validity of the token is verified and legitimate users are granted access to the telephone number.
The telephone number access method provided by the invention can effectively prevent the telephone number of the user from being leaked, protects the personal privacy of the user, can help the user to uniformly inquire and manage the authorized use condition of the telephone number of the user, and prevents the telephone number from being continuously abused. The telephone number access method is safe and convenient, is suitable for various application scenes, and can be widely applied in the industry.
Drawings
Fig. 1 shows a flow diagram of a telephone number access method according to one embodiment of the invention.
Fig. 2 is a block diagram showing a communication mediation system according to another embodiment of the present invention.
Detailed Description
In the following description specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that embodiments of the invention may be practiced without these specific details. In the present invention, specific numerical references such as "first element", "second device", and the like may be made. However, specific numerical references should not be construed as necessarily subject to their literal order, but rather construed as "first element" as opposed to "second element".
The specific details set forth herein are merely exemplary and may be varied while remaining within the spirit and scope of the invention. The term "coupled" is defined to mean directly connected to a component or indirectly connected to the component via another component.
Preferred embodiments of methods, systems and devices suitable for implementing the present invention are described below with reference to the accompanying drawings. Although embodiments are described with respect to a single combination of elements, it is to be understood that the invention includes all possible combinations of the disclosed elements. Thus, if one embodiment includes elements A, B and C, while a second embodiment includes elements B and D, the invention should also be considered to include A, B, C or the other remaining combinations of D, even if not explicitly disclosed.
According to an embodiment of the present invention, there is provided a phone number access method, as shown in FIG. 1, including steps S10-S12-S14 and optionally step S16.
Step S10: a token corresponding to the telephone number is generated.
In this step, the token generation means may generate a token corresponding to the telephone number thereof in accordance with a request of the telephone number holder. Alternatively, the token generation means may actively generate the corresponding token in order to protect the telephone number of the user. In particular, the token generation apparatus (also referred to as a generation node) may be served by a certain communication node or base station in the wireless communication system, or may be implemented by a separate apparatus accessing the communication network.
The generated token corresponds one-to-one to the user's telephone number from which a unique token can be determined according to a generation algorithm, but such an algorithm is irreversible, i.e. the user's telephone number cannot be derived from the token. In this way, the user of the token can use the token but cannot know the telephone number of the user. The token may be represented by a 16-ary number. User restriction information may be included in the token indicating the entities that may use the token. In some embodiments, the user restriction information may be provided as a separate field of the token. In other embodiments, a 16-ary random number is generated with the telephone number of the subscriber and the user limit set by the subscriber together as a field, and the user limit is no longer used alone as a field for the token. As a specific example, the algorithm for generating the random number may adopt a uuid (universal Unique identifier) generation algorithm, a 16-ary random number is generated by using the telephone number of the user as a main field of the token, the token further includes a timestamp field for indicating the expiration time or the validity period of the token, and the token further includes an identification information (or a Unique number of the node in the wireless communication system) field of a generation node (a communication node or a base station generating the token) of the generation node so as to permit the generation node to edit or modify the attribute information of the token generated by the generation node; user restriction information may be provided as an additional field of the token. In some embodiments, the token further comprises an activity flag that indicates whether the token is valid. The activity identification may correspond to a timestamp field to indicate the current state and expiration date of the token. Alternatively, the activity identification may also correspond to a user limit to indicate whether the token is valid for a certain user (or class of users). When generating the token, the various fields or identification information may be generated together, including a random number field, a timestamp field, an identification information field of the generation node, and a user restriction field. At least a portion of which may be edited or modified in a subsequent process by the holder of the telephone number.
By way of example, the identification information of the generating node takes 8-bit bytes, the timestamp takes 10-bit bytes, and the random number takes 32-bit bytes, so that the token takes 50 bytes in total. In other examples, the token may include a number of different fields and occupy a greater number of bytes.
After generating the token corresponding to the phone number, the generating node may issue the token to the holder of the phone number. The holder can authorize the token to users, including merchants, different users, apps on smart terminals, and the like. The first user may forward the token to the second user with special authorization by the holder. The user restriction information in the token can further determine which users are "legitimate users" that are desirable to the holder of the telephone number. These legitimate users can use the token to access the telephone number, and illegitimate users can be denied access to the telephone number even if they obtain the token.
According to some embodiments of the invention, the manner (or permission) of using the token includes calling a phone, sending a short message (or multimedia message), a video call, and a voice call. The holder of the telephone number can initially set the user restriction information of the token and the use mode restriction information of the token. The usage pattern limits the pattern used to define the usage of the token by each legitimate user. According to some embodiments, the holder of the phone number may set different usage modes (or usage rights) for each specific legitimate user, for example, a first legitimate user may only use the token to send a short message, and a second legitimate user may use the token to call/dial a phone call, send a short message, and so on. In other embodiments, the second legitimate user is a token obtained from the first legitimate user, in which case the restriction on usage may specify that the second legitimate user's usage rights are not higher (or at least one level lower) than the first legitimate user.
Step S12: an access request is received for a legitimate user to access the telephone number based on the token.
A legitimate user cannot obtain the telephone number itself, but can obtain a token (which corresponds to the telephone number) from the holder of the telephone number and use the token to access the telephone number. In step S12, the token generation node receives a request for access to a telephone number by a legitimate user that meets the user restrictions. An access request by a legitimate user may carry a token or an encrypted version of the token. The access request may further include a usage pattern/deadline scheme indicating a pattern in which a legitimate user desires to use the token and/or a deadline for using the token. Alternatively, other nodes (hereinafter referred to as partner nodes) in the same network as the generation node of the token may receive requests of legitimate users for accessing the telephone number based on the token, and forward the access requests to the generation node of the token for processing. The term "same network" is used broadly to encompass the same local area network, wide area network, or other internet network that facilitates the communication of the generating node and the partner node with each other.
The generating node will reject access requests from unauthorized users. Where the access request includes a usage/deadline plan, the generating node may initially check the usage plan and the deadline plan. For access requests whose usage plan exceeds the usage limit of the token, the generating node may deny the access request. In the event that the lifetime plan does not coincide with the lifetime limit of the token, the generating node grants the visitor's access request only for the period of time (if any) during which the lifetime plan coincides with the lifetime limit.
Step S14: based on the verification of the validity of the token, a legitimate user is granted access to the telephone number.
After receiving the access request, the generating node verifies the token information included in the access request, including verifying the token validity, user restrictions and/or usage restrictions, in step S14. Specifically, a timestamp field of the node authentication token is generated to determine whether the token is within a validity period, a user restriction field of the token (if any) is authenticated to determine whether a user issuing the current access request meets the user restriction, and a usage pattern restriction field of the token is authenticated to determine a pattern (or usage rights thereof) by which a legitimate user issuing the current access request can use the token. And when any verification fails, the generation node can reject the access request.
After the verification is passed, the generating node will grant access to the telephone number of the telephone number holder to the legitimate user. In some embodiments, a partner node in the same network as the generating node is closer to a potential user in the network location, and a request for access to the telephone number by the potential user is received by the partner node and forwarded to the generating node. And generating a verification result of the node to the token and informing the potential user through the partner node.
Step S16: the holder of the telephone number is accepted for the management of the token.
In optional step S16, the generating node opens a management interface to the holder of the telephone number for the holder to manage the token corresponding to its telephone number. Management may include setting or editing various attributes or field information of the token, including a timestamp field, a user restriction field, and a usage restriction field.
In some embodiments, step S16 may be performed multiple times, and may also be performed between steps S12 and S14 before step S12. In other words, once the token corresponding to the telephone number is generated, the holder of the telephone number can edit the token at any time to limit which visitors can use the token in which way, so that the user can be effectively prevented from receiving a harassing call or short message, and the use experience of the user is improved.
According to another embodiment of the present invention, a communication mediation system is provided that is configured to permit a legitimate user to access a telephone number of the user based on a token. As shown in fig. 2, the system includes at least one intermediate node 20, and the intermediate node 20 includes a token generation section 201, a token access section 203, and an optional token management section 205. In some embodiments, some intermediary nodes may include only the token generator 201, and another part of intermediary nodes may include both the token generator 201 and the token access 203. The intermediate nodes 20 may be coupled to each other via the internet. Meanwhile, the intelligent terminal (hereinafter, referred to as a user terminal) 10 of the phone number holder and the service terminal (hereinafter, referred to as a service terminal) 30 of the token user also access the internet. The internet may be a wireless communication network provided by a communication operator, and each intermediate node may be a base station. The token generation unit 201, the token access unit 203, and the token management unit 205 in the broker node 20 are coupled to each other, and collectively implement various functions of the broker node.
Specifically, the token generation unit 201 may generate a token corresponding to the holder telephone number in response to a request from the user terminal 10. Alternatively, in order to protect the phone number of the holder, the token generation unit 201 may actively generate a token corresponding to the phone number and issue the token to the user terminal 10. The generated token includes user restriction information indicating the entities that can use the token, which can be used to determine which token users are "legitimate users" that meet the telephone number holder's expectations. The token may also include usage pattern restriction information that defines the pattern (or usage rights) in which each legitimate user uses the token. The token generation unit 201 may further set a unique usage pattern for each specific legitimate user. Upon receipt of the token, the telephone number holder may forward the token to one or more service terminals 30 via the user terminal 10, thereby authorizing the service terminals 30 to use the token to access the telephone number. The token access section 203 receives a request for access to the telephone number by a legitimate user based on the token, and permits access to the telephone number by the legitimate user after verifying the validity of the token.
In some embodiments of the present invention, the token generation part 201 is further configured to set (or add) a token generation part identification information field in the token so as to permit the token generation part 201 to edit or change the attributes of the token it generates at a later time.
In some embodiments of the present invention, some intermediary nodes 20 include a token manager 205, and after initially setting the user restrictions and the usage restrictions of the token, the phone number holder may modify both via the token manager 205. As an example, the token management part 205 identifies the token generation part identification information field of the current token, and accepts editing or management of the current token by the telephone number holder if it is determined that the current token is generated by the token generation part 201 located in the same mediation node 20.
In some embodiments of the invention, at least a portion of the communication mediation system may be implemented using a distributed set of computing devices connected by a communication network, or, alternatively, based on a "cloud". In such a system, multiple computing devices operate together to provide services by using their shared resources. A "cloud" based implementation may provide one or more advantages, including: openness, flexibility, scalability, centrally manageable, connected across multiple geographic areas, and the ability to use multiple mobile or data network operators for network connectivity.
Some embodiments of the present invention provide a communication system for granting token-based access to a telephone number, the system comprising a first terminal of a holder of the telephone number, a second terminal of a legitimate user of the token, and the communication mediation system described above. The communication intermediation system generates a token corresponding to the telephone number based on a first request from the first terminal, receives a second request for access to the telephone number based on the token from the second terminal, and verifies the validity of the token and permits a legitimate user to access the telephone number.
According to an embodiment of the present invention, a method for applying the above-mentioned phone number access method to a short message authentication function required by an APP service is provided. When a user needs to perform operations such as registration, login, authentication, information notification and the like when using the APP service, the APP service provider may need to send a short message or make a call for authentication or notification. If the phone number holder has not previously created a token for the APP service, the phone number holder may request the token generation apparatus to generate a token corresponding to its phone number, and edit restriction information (user restriction and usage restriction), activity identification (current state, expiration date), identification information, and the like included in the token; after the token generating device generates the token, the token is sent to the telephone number holder; the holder authorizes the token to a user, such as an APP facilitator; the user edits the content of the short message and uses the token to send the short message; the token access device, after receiving an access request of a token user, verifies the identity of the user and verifies the validity of the token, and then permits a legitimate user to send a short message or make a call.
In the process that the user telephone number is authorized to the APP service, if the token of the telephone number holder is obtained by a malicious user, the token access device verifies that the malicious user is not in the token authorization object, and the malicious user can be refused to use the telephone number of the user; if the authorized APP service does not allow the user to abuse the authorized token, such as sending a spam message to the user or dialing a malicious phone call, and the token access device permits access to the user's phone number after verifying the token user identity and token validity, the user can edit the authorized token attribute or terminate the token to the token management device after receiving the message or receiving the malicious phone call; if the authorized APP service skips the token access device to directly abuse the authorized token to send spam messages to the user or dial malicious calls, the authorized token is set to be invalid, and the token management part terminates the use authority of the token.
According to another embodiment of the present invention, there is provided a method for applying the above-described phone number access method to a function of disclosing a contact address of a user. When a user encounters a situation that the user needs to disclose his/her own contact for use by other people, for example, the user is provided with a courier, a business card, a notice and the like that the user needs to disclose his/her own contact, the phone number holder may request the token generation device to generate a token corresponding to his/her phone number, and set an active identifier (current state, valid period) of the token; the token generation device generates a token according to the user setting and then sends the token to the telephone number holder; the phone number holder can disclose the obtained token in the form of link, two-dimensional code and the like; the user can send information to the disclosed token or make a call by means of code scanning, link clicking and the like; the token access device verifies the validity of the token after receiving the access request of the token user, and then permits the user to send a short message or make a call. When the user no longer needs to disclose own contact information, the token management device can edit the activity identifier of the token to stop the effective state of the token or change the authorized object of the token into a specific person, and the token management device changes the state of the token after receiving the user request, so that the telephone number holder no longer receives short messages or calls from the token user.
There is also provided, in accordance with some embodiments of the present invention, a machine-readable storage medium having stored thereon a collection of computer-executable instructions which, when executed by a processor, implement the telephone number access method described above. According to further embodiments of the present invention, there is also provided a computer device including a memory, a processor, and a computer program stored on the memory and executed by the processor, wherein the processor implements the steps of the above-described telephone number access method when executing the computer program.
Those of skill in the art would appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the aspects disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To demonstrate interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The above description is only for the preferred embodiment of the present invention and is not intended to limit the scope of the present invention. Various modifications may be made by those skilled in the art without departing from the spirit of the invention and the appended claims.
Claims (15)
1. A telephone number access method comprising:
generating a token corresponding to a phone number and issuing the token to a holder of the phone number, wherein the token includes a user restriction;
receiving an access request for a legitimate user who meets the user restriction to access the phone number based on the token; and
granting the legitimate user access to the telephone number based on the verification of the validity of the token.
2. The method of claim 1, wherein the generating the token comprises setting an identification information field of a mediation node in the token, wherein the mediation node is configured to generate the token.
3. The method of claim 1, wherein generating the token further comprises setting usage restrictions for the token, the usage restrictions defining a manner in which the legitimate user uses the token.
4. The method of claim 2, wherein the manner of using the token comprises at least one of:
calling a telephone; sending short messages and/or multimedia messages; video call; and, voice calls.
5. The method of claim 1, wherein the generating the token further comprises at least one of:
setting an activity flag of the token to indicate whether the token is valid;
setting an expiration date of the token.
6. The method of claim 1, wherein the generating the token further comprises setting the usage pattern limit specific to the legitimate user.
7. The method of claim 1, further comprising:
accepting editing and/or management of the token by the holder of the telephone number.
8. The method of claim 7, further comprising:
modifying the user restrictions and/or usage restrictions of the token based on the holder's editing and/or management of the token, wherein the usage restrictions are used to define the manner in which the legitimate user accesses the token.
9. A communication mediation system configured to permit a legitimate user to access a telephone number based on a token, the communication mediation system comprising at least one mediation node, the mediation node comprising:
a token generation section configured to generate a token corresponding to a telephone number and issue the token to a holder of the telephone number, wherein the token includes a user restriction;
a token access section configured to receive an access request for a legitimate user who meets the user restriction to access the telephone number based on the token, and to grant the legitimate user access to the telephone number based on verification of validity of the token.
10. The communication mediation system of claim 9, wherein the token generation section is further configured to set an identification information field of the token generation section in the token.
11. The communication mediation system of claim 9, the mediation node further comprising:
a token management portion configured to modify a user restriction of the token and/or a usage restriction of the token.
12. The communication mediation system of claim 9, 10, or 11, wherein the communication mediation system is deployed based on a wireless communication network and/or a cloud computing system provided by a communication carrier.
13. A communication system for granting access to a telephone number on the basis of a token, the system comprising a first terminal of a holder of the telephone number, a second terminal of a legitimate user of the token, and the communication mediation system of any one of claims 9 to 12;
wherein the communication mediation system is configured to:
generating the token corresponding to the phone number based on a first request from the first terminal;
receiving a second request from the second terminal to access the phone number based on the token; and
verifying the validity of the token and granting the legitimate user access to the telephone number.
14. A machine-readable storage medium having stored thereon a collection of computer-executable instructions which, when executed by a processor, implement the method of any one of claims 1 to 8.
15. A computer device comprising a memory, a processor and a computer program stored on the memory and executed by the processor, wherein the processor implements the steps of the method according to any one of claims 1 to 8 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011588313.5A CN114697036A (en) | 2020-12-29 | 2020-12-29 | Telephone number access method and communication intermediary system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011588313.5A CN114697036A (en) | 2020-12-29 | 2020-12-29 | Telephone number access method and communication intermediary system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114697036A true CN114697036A (en) | 2022-07-01 |
Family
ID=82129538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011588313.5A Pending CN114697036A (en) | 2020-12-29 | 2020-12-29 | Telephone number access method and communication intermediary system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114697036A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1703917A (en) * | 2002-10-09 | 2005-11-30 | 诺基亚有限公司 | Method and arrangement for concealing true identity of user in communications system |
US20100299731A1 (en) * | 2006-03-08 | 2010-11-25 | Steven Paul Atkinson | Electronic System for Securing Electronic Services |
CN102739879A (en) * | 2011-04-04 | 2012-10-17 | 米特尔网络公司 | Mobile speech attendant access |
CN103477618A (en) * | 2011-04-20 | 2013-12-25 | 瑞典爱立信有限公司 | A method of and a server for establishing communication in a telecommunication system wherein calling party identity is withheld |
-
2020
- 2020-12-29 CN CN202011588313.5A patent/CN114697036A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1703917A (en) * | 2002-10-09 | 2005-11-30 | 诺基亚有限公司 | Method and arrangement for concealing true identity of user in communications system |
US20100299731A1 (en) * | 2006-03-08 | 2010-11-25 | Steven Paul Atkinson | Electronic System for Securing Electronic Services |
CN102739879A (en) * | 2011-04-04 | 2012-10-17 | 米特尔网络公司 | Mobile speech attendant access |
CN103477618A (en) * | 2011-04-20 | 2013-12-25 | 瑞典爱立信有限公司 | A method of and a server for establishing communication in a telecommunication system wherein calling party identity is withheld |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109511115B (en) | Authorization method and network element | |
JP4267708B2 (en) | Apparatus for improving security in a communication system that supports user mobility | |
KR101202671B1 (en) | Remote access system and method for enabling a user to remotely access a terminal equipment from a subscriber terminal | |
EP3008935B1 (en) | Mobile device authentication in heterogeneous communication networks scenario | |
US9197639B2 (en) | Method for sharing data of device in M2M communication and system therefor | |
KR101047641B1 (en) | Enhance security and privacy for security devices | |
US8411562B2 (en) | Network system and method for providing an ad-hoc access environment | |
EP1102157B1 (en) | Method and arrangement for secure login in a telecommunications system | |
CA2468599C (en) | Use of a public key key pair in the terminal for authentication and authorization of the telecommunication subscriber in respect of the network operator and business partners | |
CN112637214A (en) | Resource access method and device and electronic equipment | |
US20030017822A1 (en) | Method and network arrangement for accessing protected resources using a mobile radio terminal | |
CN113079258A (en) | Number privacy protection method, network device and computer storage medium | |
WO2021170506A1 (en) | Method of providing a communication function in a user equipment | |
US20050114530A1 (en) | Method and apparatus for granting selective access to a wireless communication device | |
CN111614687A (en) | Identity verification method, system and related device | |
KR20100060130A (en) | System for protecting private information and method thereof | |
CN103069767B (en) | Consigning authentication method | |
CN111385794A (en) | Mobile communication network privacy protection method and system for industry users | |
WO2013071836A1 (en) | Method and apparatus for processing client application access authentication | |
CN105392112B (en) | Guard method, equipment and the system of MTC device information | |
KR20070009490A (en) | System and method for authenticating a user based on the internet protocol address | |
CN114697036A (en) | Telephone number access method and communication intermediary system | |
CN106487776A (en) | A kind of method of protection equipment for machine type communication, network entity and system | |
KR100623293B1 (en) | Method for authenticating the subscriber of mobile terminal using callback message | |
RU2801856C2 (en) | Method for termination of use in cellular networks of mobile devices that violate legislation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |