Softphone encryption and decryption method, device and computer-readable storage medium

An encryption, decryption, and softphone technology, applied in the field of network communication, can solve the problems of encrypted phone number leakage, personal information leakage, etc.

Active Publication Date: 2019-07-23
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a softphone encryption and decryption method, device and computer-readable storage medium, aiming to solve the problem of leakage of encrypted telephone numbers in the prior art, resulting in leakage of personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Softphone encryption and decryption method, device and computer-readable storage medium
  • Softphone encryption and decryption method, device and computer-readable storage medium
  • Softphone encryption and decryption method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] The invention provides a soft phone encryption and decryption method.

[0048] Please refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the softphone encryption and decryption method of the present invention. In this embodiment, the softphone encryption and decryption method includes:

[0049] Step S10, when receiving the call command of the softphone, obtain the phone number corresponding to the call command, and encrypt the phone number to generate a ciphertext phone number;

[0050]The softphone encryption and decryption method of this embodiment is suitable for encrypting and decrypting the customer's phone number when the artificial agent contacts the customer through the softphone, so as to ensure the security of the customer's personal information. The local system i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a method and a device for encrypting and decrypting softphone, as well as a computer-readable storage medium. The method for encrypting and decrypting softphone includes: in response to a softphone call instruction, obtaining a phone number corresponding to the call instruction, and encrypting the phone number to generate a cipher text phone number; sending the cipher text phone number to the phone-platform server for the phone-platform server to return the cipher text phone number to the local-system server through a private network; decrypting the cipher text phone number to obtain a plaintext phone number at local-system server, and sending the plaintext phone number to the phone-platform server through the private network.

Description

technical field [0001] The present invention mainly relates to the technical field of network communication, in particular, to a softphone encryption and decryption method, device and computer-readable storage medium. Background technique [0002] Softphone, also known as IP phone, transmits voice through Internet Protocol (IP). As long as it is in the same network, it can make unrestricted calls. It can support PC (personal computer, computer) to PC, PC to phone, phone to PC and other calling methods. At present, the phones used by artificial agents in many service systems are softphones. When making a call, the artificial agents obtain the encrypted phone number stored in the local system server, and send the encrypted phone number and key to the phone platform server through the public network. The platform server decrypts the encrypted phone number according to the key to make a call. The encrypted phone number and key are sent through the public network, and there is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M7/00H04W12/02H04M3/51H04L9/08
CPCH04L9/0869H04M3/51H04M7/0078H04W12/02H04L63/0428H04L65/1059H04L65/1069H04L65/1096H04L2209/42H04M15/06H04M15/48H04M15/755H04M2203/6027H04L9/3297H04L63/0272
Inventor 易周成
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products