Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication privacy protection method, device, device and computer-readable storage medium

A privacy protection and counterparty technology, applied in the field of communication applications, can solve problems such as user real number harassment, achieve the effect of avoiding privacy disputes, ensuring user information security, and preventing personal information leakage

Active Publication Date: 2021-06-08
RAJAX NETWORK &TECHNOLOGY (SHANGHAI) CO LTD
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, there may be some privacy disputes such as the product or service provider calling the user's real number to harass

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication privacy protection method, device, device and computer-readable storage medium
  • Communication privacy protection method, device, device and computer-readable storage medium
  • Communication privacy protection method, device, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to enable those skilled in the art to better understand the solutions of the present disclosure, the following will clearly and completely describe the technical solutions in the exemplary embodiments of the present disclosure with reference to the accompanying drawings in the exemplary embodiments of the present disclosure.

[0067] In some processes described in the specification and claims of the present disclosure and the descriptions in the above drawings, a plurality of operations appearing in a specific order are included, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present disclosure provide a communication privacy protection method, device, device, and computer-readable storage medium. The communication privacy protection method includes: binding the called party to the called party with a proxy number, wherein the called party's number learned by the calling party in communication is the called party's bound proxy number; Binding to the calling party and the called party, wherein, the other party’s number learned by the calling party and the called party in the communication is the two-way binding proxy number; The above-mentioned two-way binding proxy number initiates a call, so that the number privacy protection can be preferentially provided to both the calling party and the called party without prior customization. In the embodiment of the present disclosure, by binding the called binding proxy number and the two-way binding proxy number, the security of user information during communication can be ensured, privacy disputes can be avoided, and personal information leakage can be prevented.

Description

technical field [0001] Embodiments of the present disclosure relate to the technical field of communication applications, and in particular, to a communication privacy protection method, device, device, and computer-readable storage medium. Background technique [0002] In the field of communication, when communicating between users, the communication between users may face privacy protection issues. For example, in the commercial field, when the commodity or service provider needs to communicate with the user, the commodity or service provider and the user usually use the telephone, which requires timely confirmation of the communication between the two parties. Therefore, there is a problem of leakage of personal privacy of users, goods or service providers. For example, there may be some privacy disputes such as product or service providers dialing the user's real number to harass. In consideration of the confidentiality of public data, anonymous trumpet and information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M3/42H04W12/02H04W76/11H04W76/18
CPCH04M3/42008H04W12/02H04W76/11H04W76/18
Inventor 胡立亮
Owner RAJAX NETWORK &TECHNOLOGY (SHANGHAI) CO LTD