Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method of call handling strategy

A strategy and consistent technology, applied in the information field, can solve problems such as the suspicious fraud list number list on the call control side, so as to prevent leakage and ensure security.

Active Publication Date: 2020-02-21
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +2
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the call handling of fraudulent calls, the calling number is usually matched with the suspected fraudulent number and number segment. However, from the perspective of security, the management side does not want the call control side to be able to obtain the list of suspected fraudulent numbers. Therefore, how to ensure the security of suspicious fraudulent numbers and number segment data in fraudulent call handling strategies and prevent sensitive data leakage has become a technical problem that technicians urgently need to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method of call handling strategy
  • Encryption method of call handling strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0013] Such as figure 1 As shown, a method for encrypting call handling policy data of the present invention includes:

[0014] Step 1, the management device uses an asymmetric encryption algorithm to generate a public key and a private key, and provides the public key to the control device installed on the communication network service server;

[0015] Step 2: The management device encrypts the call handling strategy with a public key, and the strategy includes suspicious fraudulent number data and suspicious fraudulent number segment data, wherein the suspicious fraudulent number data is a suspicious fraudulent number encrypted with a public key, and the suspicious fraudulent The number segment data is composed of the length of the suspected fraudulent number s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An encryption method of a call handling strategy comprises the following steps: a management device generates a public key and a private key by using an asymmetric encryption algorithm, and provides the public key to a control device on a communication service server; the management device encrypts a fraud phone call processing strategy through a public key; wherein the strategy comprises suspicious fraud number data and suspicious fraud number segment data, the suspicious fraud number data is a suspicious fraud number encrypted by using a public key, the suspicious fraud number segment data is composed of a suspicious fraud number segment length and an encrypted suspicious fraud number segment, and then synchronizing a call processing strategy to the control device; and the control deviceextracts the number from the call triggered to the service server, matches the extracted number with the call processing strategy, and when the extracted number is consistent with the call processingstrategy, indicates that the call is a suspicious fraud call and processes the call. The invention belongs to the technical field of information, and can ensure the safety of suspicious fraud numbersand number segment data in a call processing strategy and prevent sensitive data leakage.

Description

technical field [0001] The invention relates to an encryption method for a call handling policy, belonging to the field of information technology. Background technique [0002] Mobile communication technology facilitates people's life and work, and has made an indelible contribution to the development of social economy. However, where there is light, there must be darkness. In recent years, malicious acts such as fraudulent calls have been banned repeatedly. In order to effectively combat fraudulent calls, it is necessary to form a communication protection network against fraudulent calls. [0003] In the call handling of fraudulent calls, the calling number is usually matched with the suspected fraudulent number and number segment. However, from the perspective of security, the management side does not want the call control side to be able to obtain the list of suspected fraudulent numbers. Therefore, how to ensure the security of suspicious fraudulent numbers and number s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/12H04W12/03H04W12/041H04W12/126
CPCH04W12/12H04W12/04
Inventor 林格平侯伟黄远刘发强宁珊张建宇陈杰陈金东董博谦王方青
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products