Unlock instant, AI-driven research and patent intelligence for your innovation.

Processing method and device of virtual number

A virtual number and processing method technology, applied in the field of communication security, can solve the problems of poor number privacy security and poor user experience, and achieve the effects of protecting number privacy security, reducing spam pushes, and improving user experience.

Inactive Publication Date: 2017-03-08
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the above technical problems, the present invention provides a virtual number processing method and device, which solves the problems of poor number privacy security and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method and device of virtual number
  • Processing method and device of virtual number
  • Processing method and device of virtual number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Such as figure 1 As shown, Embodiment 1 of the present invention provides a virtual number processing method. The process of pre-applying for a virtual number is related to the applicant's identity information, that is, different applicants correspond to different application creation processes. The following will describe the situation of the user terminal applying for a virtual number, which specifically includes the following steps:

[0072] Step S11: Obtain a virtual number application request carrying the user's real number and a third-party number.

[0073] User terminals can apply through channels such as the official APP, online business hall, SMS business hall, or customer service hotline, or through uplink instructions.

[0074] Step S12: According to the user's real number and the third-party number, assign a virtual number to the corresponding user terminal, and feed it back to the user terminal.

[0075] Specifically, there is no limit to the allocation a...

Embodiment 2

[0092] The process of pre-applying for a virtual number is related to the identity information of the applicant, that is, the application creation process is different for different applicants. Embodiment 1 is described by taking the self-application by the user terminal as an example, and the following will describe the situation where a third party applies for a virtual number to protect the user's privacy. Such as image 3 As shown in , pre-create the mapping relationship between real numbers, virtual numbers and third-party numbers, including the following steps:

[0093] Step S21: Obtain a virtual number application request carrying the user's real number and a third-party number.

[0094] Here, the third party can be pre-authorized. For example, only a third party with a higher credit rating (such as a bank or other service organization) has the right to apply for a virtual number for the user.

[0095] Step S22: Send an authentication request to the corresponding user...

Embodiment 3

[0120] The above embodiments 1 and 2 respectively introduce in detail the application process of virtual numbers by applicants with different identity information. The following will further introduce the communication service process using virtual numbers in combination with specific application scenarios.

[0121] The calling party may be a user terminal or a third-party platform; when the identity information of the calling party is different, the response strategy to the communication service request is different. The following will take the calling party as a user terminal as an example to illustrate, for example Figure 5 As shown, the process for the calling party to determine the response strategy for the user terminal specifically includes the following steps:

[0122] Step S31: Receive the communication service request sent by the user terminal, where the communication service request carries the real number of the user and the number of the third party.

[0123] Whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a processing method and device of a virtual number. The method comprises the following steps: acquiring a virtual number application request carrying a user real number and a third party number; distributing a virtual number for a corresponding user terminal according to the user real number and the third party number, and feeding back to the user terminal; creating a mapping relation among the user real number, the virtual number and the third party number, and saving the mapping relation to the local. The used virtual numbers are different when the real number of the same user terminal is corresponding to different third party numbers, namely, the same virtual number cannot be shared between different third parties, the number privacy of a user is protected, the spam push which is not the user intention can be effectively reduced, and the user experience is greatly improved.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a virtual number processing method and device. Background technique [0002] At present, when users provide their own contact numbers to third parties (such as service providers, content providers, real estate agencies, property management centers, etc.), or order services from service providers and content providers (SP, CP, public accounts), At that time, whether the user ordered through the uplink message or through online business halls, customer service hotlines and other channels, he needs to directly expose his number to the third party; on the other hand, with the rapid growth of mobile Internet services, user numbers have been It has gradually become the key information in the mobile Internet. A number can be an ordinary social account, or it may involve online financial services, and it is also the user's private data. Due to the complex composition of third parti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/42
CPCH04M3/42
Inventor 孙仁峰刘世礁侯振强
Owner ZTE CORP