Joke Collection Website - Public benefit messages - How is the number privacy protection realized?

How is the number privacy protection realized?

This is a communication provider realized by technical means, such as Eastcom Chen Kun.

Call flow:

1. The customer is ready to make a call, and the upper APPlication (client or app) sends the calling and called number to the secure number platform through the IP network.

2. The caller dials the auxiliary number and the call is connected to the platform.

3. The platform completes the rule matching of calling and called numbers, obtains the called number, and initiates a call to the called party.

4. The called party rings and goes off-hook, and the calling party and the called party talk.

Called process:

1. The user dials the number registered on the secure number platform.

2. The call is connected to a secure platform;

3. The platform completes the rule matching of calling and called numbers. If the binding relationship of the called number is not found, a query is initiated to the upper application to obtain the target called number.

4. After the platform obtains the target called number, it initiates a call to the called party.

5. The called party rings, the user goes off-hook, and the calling party and the called party talk.