Method for encrypting telephone number

A number and calling number technology, applied in the field of phone number confidentiality, can solve the problem that the called party cannot initiate a call contact, and the original caller cannot contact the original caller.

Inactive Publication Date: 2009-03-04
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing telephone number confidentiality service can keep the identity of the calling party confidential, but this method prevents the called party from actively initiating a call with the original calling party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting telephone number
  • Method for encrypting telephone number
  • Method for encrypting telephone number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below at first provide a system structural representation of the present invention, as figure 1 shown. In this illustration, the calling party is a mobile phone user. The service control point plays a role in controlling and processing intelligent services in the whole network, and mainly completes the telephone number encryption / decryption function in the present invention; the mobile switching center / service switching point mainly completes the service switching function and the call control function; the home location register HLR is mainly used to save the basic information of the mobile phone. The Visited Location Register (VLR: Visited Location Register) mainly stores the relevant information of registered mobile users entering its control area. In this schematic diagram, it is assumed that each mobile switching center has the function of SSP, and also has a built-in visitor location register (VLR). Among them, the service control point and the service exchange...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a calling number encrypting method which comprises the following steps: a calling party initiates a calling number encrypting service; a service switching point triggers the service to a service controlling point according to an encrypting special service prefix; the service controlling point switches the telephone number of the calling party into an encrypting number, and returns a message carrying the encrypting number to the service switching point; and during calling connection, the service switching point modifies the original calling telephone number into the encrypting number which is presented to a called party. The telephone number of the calling party can be protected by the calling number encrypting method, and the called party is allowed to conduct various communication with the calling party again at the same time, thereby not only ensuring the convenience of communication of a user, but also guaranteeing the safety of the personal information of the user.

Description

technical field [0001] The invention belongs to the technical field of communication, and more specifically relates to a method for keeping telephone numbers secret. Background technique [0002] With the continuous development of communication technology, telephone communication has become an indispensable way of contact in our life, and the caller ID function has also brought us a lot of convenience. However, because some merchants or individuals will use the caller ID function to disclose our personal information such as mobile phone numbers and home numbers for their own improper economic interests, harassment calls or advertising calls have also entered our lives, making While we enjoy convenient communication, we also feel some inconvenience. [0003] In order to protect the phone number from being known by unfamiliar people, some users have applied for the mobile phone number confidentiality service, that is, the called party cannot display the calling number. Chine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/22H04Q3/72H04M3/42
Inventor 范涛陈士金
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products