Processing method and device of virtual number
A virtual number and processing method technology, applied in the field of communication security, can solve the problems of poor number privacy security and poor user experience, and achieve the effects of protecting number privacy security, reducing spam pushes, and improving user experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] Such as figure 1 As shown, Embodiment 1 of the present invention provides a virtual number processing method. The process of pre-applying for a virtual number is related to the applicant's identity information, that is, different applicants correspond to different application creation processes. The following will describe the situation of the user terminal applying for a virtual number, which specifically includes the following steps:
[0072] Step S11: Obtain a virtual number application request carrying the user's real number and a third-party number.
[0073] User terminals can apply through channels such as the official APP, online business hall, SMS business hall, or customer service hotline, or through uplink instructions.
[0074] Step S12: According to the user's real number and the third-party number, assign a virtual number to the corresponding user terminal, and feed it back to the user terminal.
[0075] Specifically, there is no limit to the allocation a...
Embodiment 2
[0092] The process of pre-applying for a virtual number is related to the identity information of the applicant, that is, the application creation process is different for different applicants. Embodiment 1 is described by taking the self-application by the user terminal as an example, and the following will describe the situation where a third party applies for a virtual number to protect the user's privacy. Such as image 3 As shown in , pre-create the mapping relationship between real numbers, virtual numbers and third-party numbers, including the following steps:
[0093] Step S21: Obtain a virtual number application request carrying the user's real number and a third-party number.
[0094] Here, the third party can be pre-authorized. For example, only a third party with a higher credit rating (such as a bank or other service organization) has the right to apply for a virtual number for the user.
[0095] Step S22: Send an authentication request to the corresponding user...
Embodiment 3
[0120] The above embodiments 1 and 2 respectively introduce in detail the application process of virtual numbers by applicants with different identity information. The following will further introduce the communication service process using virtual numbers in combination with specific application scenarios.
[0121] The calling party may be a user terminal or a third-party platform; when the identity information of the calling party is different, the response strategy to the communication service request is different. The following will take the calling party as a user terminal as an example to illustrate, for example Figure 5 As shown, the process for the calling party to determine the response strategy for the user terminal specifically includes the following steps:
[0122] Step S31: Receive the communication service request sent by the user terminal, where the communication service request carries the real number of the user and the number of the third party.
[0123] Whe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


