Phone number protection system

ABSTRACT

This disclosure provides a method and system for protecting phone number from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.

BACKGROUND

Preventing phone numbers from being exposed to third parties is acurrent issue. Exposed phone numbers are often used for makingunsolicited telemarketing calling and even calls related to fraud.

SUMMARY OF THE INVENTION

An embodiment of the present invention relates to techniques ofinformation protection and, more specifically, to a method, a system anda computer program product for protecting phone number from beingexposed to third parties.

In an exemplary embodiment, the method includes receiving a request,from a caller smart phone, for establishing telephone communication witha callee smart phone, wherein the request contains a code to designatethe callee smart phone. The method further comprises checking whetherthe code is formally provided to the caller. The method furthercomprises: in response to determining that the code is formally providedto the caller, retrieving the phone number of the caller and the phonenumber of the callee based on the request and establishing a phone callconnection via a cellular network with the phone number of the callerand the phone number of the callee.

In an exemplary embodiment, the system includes one or more processors;a memory coupled to at least one of the one or more processors, a set ofcomputer program instructions stored in the memory and executed by atleast one of the one or more processors in order to perform actions of:receiving a request, from a caller smart phone, for establishingtelephone communication with a callee smart phone, wherein the requestcontains a code to designate the smart phone of the callee; checkingwhether the code is formally provided to the caller; and in response todetermining that the code is formally provided to the caller retrievingthe phone number of the caller and the phone number of the callee basedon the request; and establishing a phone call connection via a cellularnetwork with the phone number of the caller and the phone number of thecallee.

In an exemplary embodiment, the computer program product includes acomputer readable storage medium having program instructions embodiedtherewith, wherein the program instructions being executable by a deviceto perform a method. The method comprises: receiving a request, from acaller smart phone, for establishing telephone communication with acallee smart phone, wherein the request contains a code to designate thecallee smart phone. The method further comprises checking whether thecode is formally provided to the caller. The method further comprises:in response to determining that the code is formally provided to thecaller, retrieving the phone number of the caller and the phone numberof the callee based on the request and establishing a phone callconnection via a cellular network with the phone number of the callerand the phone number of the callee.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Through the more detailed description of some embodiments of the presentdisclosure in the accompanying drawings, the above and other objects,features and advantages of the present disclosure will become moreapparent, wherein the same reference generally refers to the samecomponents in the embodiments of the present disclosure.

FIG. 1 shows an exemplary computer system which is applicable toimplement embodiments of the present invention.

FIG. 2 shows an example data processing environment in which embodimentsof the present invention may be implemented.

FIG. 3 is a flowchart illustrating the process of a method according toan embodiment of the present invention.

FIG. 4A illustrates generation and processing of example block chainsaccording to embodiments of the present invention.

FIG. 4B illustrates generation and processing of example block chainsaccording to embodiments of the present invention.

FIG. 4C illustrates generation and processing of example block chainsaccording to embodiments of the present invention.

FIG. 4D illustrates generation and processing of example block chainsaccording to embodiments of the present invention.

DETAILED DESCRIPTION

Some preferable embodiments will be described in more detail withreference to the accompanying drawings, in which the preferableembodiments of the present disclosure have been illustrated. However,the present disclosure can be implemented in various manners, and thusshould not be construed to be limited to the embodiments disclosedherein.

Referring now to FIG. 1, in which an exemplary computer system/server 12which is applicable to implement the embodiments of the presentinvention is shown. FIG. 1 is also adapted to depict an illustrativeexample of a portable electronic device such as a communication devicewhich is applicable to implement the embodiments of the presentinvention. Computer system/server 12 is only illustrative and is notintended to suggest any limitation as to the scope of use orfunctionality of embodiments of the invention described herein.

As shown in FIG. 1, computer system/server 12 is shown in the form of ageneral-purpose computing device. The components of computersystem/server 12 may include, but are not limited to, one or moreprocessors or processing units 16, a system memory 28, and a bus 18 thatcouples various system components including system memory 28 toprocessing units 16.

Bus 18 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. By way of example, and not limitation,such architectures include Industry Standard Architecture (ISA) bus,Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, VideoElectronics Standards Association (VESA) local bus, and PeripheralComponent Interconnect (PCI) bus.

Computer system/server 12 typically includes a variety of computersystem readable media. Such media may be any available media that isaccessible by computer system/server 12, and it includes both volatileand non-volatile media, removable and non-removable media.

System memory 28 can include computer system readable media in the formof volatile memory, such as random access memory (RAM) 30 and/or cachememory 32. Computer system/server 12 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 34 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, digital versatile disk read only memory (DVD-ROM)or other optical media can be provided. In such instances, each can beconnected to bus 18 by one or more data media interfaces. As will befurther depicted and described below, system memory 28 may include atleast one program product having a set (e.g., at least one) of programmodules that are configured to carry out the functions of embodiments ofthe invention.

Program/utility 40, having a set (at least one) of program modules 42,may be stored in system memory 28 by way of example, and not limitation,as well as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, may include an implementation of a networkingenvironment. Program modules 42 generally carry out the functions and/ormethodologies of embodiments of the invention as described herein.

Computer system/server 12 may also communicate with one or more externaldevices 14 such as a keyboard, a pointing device, a display 24, etc.;one or more devices that enable a user to interact with computersystem/server 12; and/or any devices (e.g., network card, modem, etc.)that enable computer system/server 12 to communicate with one or moreother computing devices. Such communication can occur via Input/Output(I/O) interfaces 22. Still yet, computer system/server 12 cancommunicate with one or more networks such as a local area network(LAN), a general wide area network (WAN), and/or a public network (e.g.,the Internet) via network adapter 20. As depicted, network adapter 20communicates with the other components of computer system/server 12 viabus 18. It should be understood that although not shown, other hardwareand/or software components could be used in conjunction with computersystem/server 12. Examples, include, but are not limited to: microcode,device drivers, redundant processing units, external disk drive arrays,RAID systems, tape drives, and data archival storage systems, etc.

Refer now to FIG. 2, which shows an example data communicationenvironment in which embodiments of the present invention may beimplemented.

The environment illustrated in FIG. 2 comprises a cellular network 210and a plurality of smart phones 212_1, 212_2, 212_3, . . . and 212_n. Inan embodiment, each of the smart phones has a unique phone number. Usersof the smart phones may conduct telephone communications in traditionalway; in other words, a user may use his/her smart phone to dial thephone number of the smart phone of another user via cellular network 210so that a phone call is placed between them.

In traditional way of telephone communications where people make phonecalls directly via cellular network 210 as described above, if a user'sphone number is exposed to a stranger, it might be abused. For example,the stranger may use the phone number to make sale callings or fraudcallings. Further, the stranger may provide the phone number to others,potentially leading to more unsolicited callings. To prevent phonenumbers from being exposed to third parties, it might be useful to knowwho have exposed to third parties them. However, there is not amechanism that may effectively reveal the source of exposure.

According to embodiments of the invention, a telephone agent 220 isprovided for the protection of phone numbers. As shown in FIG. 2,telephone agent 220, which may be provided by an internet serviceprovider, is communicatively coupled to a cellular network 210 andaccessible by phones, such as smart phone 212_1, via the Internet (notshown). Smart phone users registered with telephone agent 220 may usecodes in place of, or as the alternative to, phone numbers to make phonecalls via telephone agent 220. In other words, the registered user donot have to use phone numbers to make calls. In addition, the codesthemselves will be protected from arbitrary exposure in telephone agent220, and exchange of them among users is trackable.

Now, assume smart phones 212_1, 212_2, 212_3, . . . and 212_n have phonenumbers PN_1, PN_2, PN_3, . . . and PN_n respectively. And they have allregistered with telephone agent 220. Hereinafter, owners of smart phones212_1, 212_2, 212_3, . . . and 212_n may also be referred to asregistered users of telephone agent 220, and will be denoted as U_1,U_2, U_3, . . . and U_n, respectively.

According to an embodiment of the invention, when a smart phone (forsimplicity, also referred to as “phone” hereinafter) 212_i (i=1 . . . n)registers with telephone agent 220, telephone agent 220 will assign toit a unique code. In an embodiment, the code will be used instead of aphone number to designate the phone. Thus a code may be called“alternative code” meaning alternative to phone number, denoted as AC_i,

According to an embodiment of the invention, a registration module 222(FIG. 2) may be configured as a functional component of telephone agent220 for handling registration related proceedings. Registration module222 may use a hash algorithm, for example, to generate code AC_i.Specifically, registration module 222 will take phone number PN_i in theform of a numeric string, such as “138xxxxxxxx”, as input of a hashfunction. The hash function outputs a hash value in the form of analphanumeric string, such as “abcnnnnnnn”, which will be code AC_icorresponding to phone number PN_i.

Those skilled in the art shall appreciate that any feasible algorithmsmay be employed to generate alternative codes. Therefore, the presentinvention is not limited to using hash algorithms as above. And theformat of the code is not limited that shown above. In fact, it is evenpossible that code AC_i corresponding to phone number PN_i phone numberPN_i itself, though it is not recommended.

Registration module 222 may save code AC_i in association with phonenumber PN_i to indicate their one-to-one corresponding relationship. Inthis way, telephone agent 220 may generate codes for all registeredsmart phones 212_1, 212_2, 212_3, . . . and 212_n. The generated codesare saved in association with respective phone numbers, so that allcodes are uniquely mapped to respective phone numbers, as shown in Table1 below.

TABLE 1 Smart Phone User_id Phone Number Alternative Code 212_1 U_1 PN_1AC_1 212_2 U_2 PN_2 AC_2 212_3 U_3 PN_3 AC_3 . . . . . . . . . . . .212_n U_n PN_n AC_n

In the following, operation of the telephone agent 220 will be describedby referring to FIG. 3. FIG. 3 is a flowchart illustrating a process 300of a method according to an embodiment of the present invention. Process300 is implemented at telephone agent 220.

In Step 310, telephone agent 220 receives a request, from a caller smartphone, for establishing telephone communication with a callee smartphone, wherein the request contains a code to designate the smart phoneof the callee.

Step 310 is triggered as one of the smart phone users attempts to make acall to another via telephone agent 220. For example, assume user U_2 ofsmart phone 212_2 (referred to as “caller” here) wants to call user U_1of smart phone 212_1 (referred to as “callee” here) via telephone agent220. Caller U_2 may send a request to telephone agent 220 to indicateso. The information contained in the request includes, among otherthings, code AC_1 of smart phone 212_1 of the callee. The request issent via the internet and received by telephone agent 220.

Next, it is to determine whether the request is valid according topre-defined criteria. If it is valid, caller U_2 is allowed to make acall to callee U_1 by using alternative code AC_1. Otherwise, caller U_2is prevented from making the call with alternative code AC_1.

So, in Step 320, it is checked whether code AC_1 contained in therequest is formally provided to the caller. If it is determined that thecode is not formally provided to the caller, the process will end. If itis determined that the code is formally provided to the caller, theprocess will proceed to Step 330.

In the context of the invention, an alternative code is said to beformally provided to the caller if the provision of the code is recordedand is retrievable by telephone agent 220. Alternative codes may beformally exchanged among registered users of telephone agent 220.Specifically, one user may provide an alternative code to another one.The provision of the code will be saved in a transaction record and maybe verified later by telephone agent 220 by looking at the record. Forexample, user U_1 (e.g., a buyer visiting an online shopping website)may formally provide AC_1 to user U_2 (e.g., an online seller). Usuallythat means that user U_1 would allow user U_2 to use AC_1; in otherwords, U_2 is entitled to calling U_1 with AC_1. In addition, if userU_2 has formally obtained AC_1, user U_2 may in turn formally provide itto a third user U_3 (e.g., a courier). Then, user U_3 will be entitledto calling U_1 with AC_1.

In Step 330, telephone agent 220 retrieves phone number PN_2 of callerU_2 and phone number PN_1 of the callee U_1 based on the request.Specifically, phone number PN_2 and phone number PN_1 may be obtainedfrom information contained in the request For example, telephone agent220 may retrieve phone number PN_1 corresponding to alternative codeAC_1 contained in the request from Table 1. In addition, telephone agent220 may retrieve phone number PN_2 corresponding to user_id U_2 includedas a part of user information included in the information contained inthe request.

Next, in Step 340, telephone agent 220 establishes a phone callconnection via cellular network 210 by using phone number PN_2 and phonenumber PN_1 respectively. As a result, caller U_2 may now conducttelephone communication with callee U_1 via cellular network 210.

In practice, telephone agent 220 may have a functional component,authorizer 226, configured to enable existingInternet-to-telecommunications network service, like Skype™. Thenauthorizer 226 may dial phone number PN_2 and phone number PN_1respectively to set two channels, and link the two channels via internetso that the phone call connection via cellular network 210 may beestablished between smart phone 212_2 and smart phone 212_1.

In practice, steps 320, 330 and 340 may be implemented by authorizer 226of telephone agent 220.

The process 300 of a method implemented at telephone agent 220 accordingto an embodiment of the present invention is thus described. Next, moreimplementing details will be provided with respect to Step 320 ofprocess 300.

As previously stated, in Step 320, telephone agent 220 will checkwhether alternative code AC_1 contained in the request is formallyprovided to the caller. In the context of the invention, alternativecodes may be formally exchanged among registered users of telephoneagent 220. In other words, one user may provide an alternative code toanother one, and the fact will be recorded by the telephone agent 220.For example, user U_1 may formally provide AC_1 to user U_2. Usuallythat means that user U_1 would allow user U_2 to use AC_1; in otherwords, U_2 is entitled to calling U_1 with AC_1. In addition, if userU_2 has formally obtained AC_1, user U_2 may in turn formally provide itto a third user U_3. Then, user U_3 will be entitled to calling U_1 withAC_1. In the context of the invention, an alternative code is said to beformally provided to the caller if the provision of the alternative codeis recorded and is retrievable by telephone agent 220.

Those skilled in the art may appreciate that the provision of thealternative code may be recorded in different ways. For example, to meetthe pre-defined criteria, the provision of the alternative code may besaved in a table that is readily retrievable.

Inventors of this invention, however, specifically proposes to employthe well-known block chain technology and use a block chain transactionrecord to save the provision of an alternative code.

Correspondingly, according to an embodiment of the invention, thechecking whether the code is formally provided to the caller compriseschecking whether there is a block chain transaction record indicatingthat the code was provided to the caller by either the callee or a thirduser.

In the following paragraphs, description will be provided as to how toemploy existing the block chain technology to save the provision of analternative code as a block chain transaction record.

According to an embodiment of the invention, a block chain isestablished and maintained for each of smart phones 212_1, 212_2, 212_3,. . . and 212_n. A block chain transaction record is generated and addedto a block chain as a result of a block chain transaction in response tothe code being provided to the caller by either the callee or a thirduser. In other words, the provision of alternative code AC_1 from oneuser to another U_2 may be saved as a transaction record in a blockchain.

According to an embodiment of the invention, block chain is associatedwith the smart phone of the callee. In other words, the block chaintransaction record may be located in a block chain associated with thesmart phone of the callee 212_1 or user U_1.

Correspondingly, according to an embodiment of the invention, thechecking whether the is formally provided to the caller may comprisechecking whether there is a block chain transaction record indicatingthat the code was provided to the caller by either the callee or a thirduser. In other words, by checking information in the block chainassociated with the callee's phone, it may be determined whether or notalternative code AC_1 has been formally provided to caller U_2 by eithercallee U_1 or a third user other than U_1.

Referring to FIG. 4A, which shows example block chains establishedaccording to embodiments of the invention. For simplicity, there areonly illustratively shown three block chains 232_1, 232_2 and 232_3.They are respectively corresponding to smart phones 212_1, 212_2 and212_3. According to an embodiment of the invention, the block chains areestablished by registration module 222 of telephone agent 220 when thesmart phones register with telephone agent 220.

In block chain 232_1 of FIG. 4A, initially there is only one block A,hereinafter also referred to as “root block”, as shown by the solid lineblock. Root block A contains at least phone number PN_1 and itscorresponding alternative code AC_1, the latter being generated bytelephone agent 220 as previously mentioned.

Root block A may contain additional registration information including,without limitation, user_id, registration time, etc.

Similarly, block B is a root block of block chain 232_2, containing atleast phone number PN_2 and alternative code AC_2. And block I is a rootblock of block chain 232_3, containing at least phone number PN_3 andalternative code AC 3.

Block chains 232_1, 232_2 and 232_3 may be stored in a block chainnetwork 230, as shown in FIG. 2, in the form a database. Block chainnetwork 230 is maintained by telephone agent 220.

Refer to FIG. 4B. According to embodiments of the invention, one usermay provide his/her own alternative code to another user via telephoneagent 220. The provision of the alternative code can be saved in a blockof the block chain corresponding to the alternative code. For example,user U_1 may provide AC_1 to user U_2. This fact can be recorded byadding a new block G into block chain 232_1 corresponding alternativecode AC_1, as depicted in FIG. 4B. Block G may contain at least thefollowing information:

<SENDER: 212_1; RECEIVER: 212_2>, which means that smart phone 212_1(“SENDER”) has provided its AC_1 to smart phone 212_2 (“RECEIVER”).

Refer to FIG. 4C. According to embodiments of the invention, a user mayalso provide another user's alternative code to a third user viatelephone agent 220. The provision of the alternative code will berecorded in a block of the block chain corresponding to the alternativecode in the same way as in FIG. 4B. For example, user U_2 have receivedAC_1 from U_1. Then user U_2 may in turn provide AC_1 to user U_3. Thisfact can be recorded by adding a new block H into block chain 232_1corresponding to alternative code AC_1, as depicted in FIG. 4C. Block Hmay contain at least the following information:

<SENDER: 212_2; RECEIVER: 212_3>, which means that smart phone 212_2(“SENDER”) has provided AC_1 to smart phone 212_3 (“RECEIVER”).

In this way, each of the block chains may be expanded over time. Forexample, as shown in FIG. 4D, at a certain point of time, block chain232_1 comprises blocks A, G, H and M. Block chain 232_2 comprises blocksB, C, D, E and F. And block chain 232_3 comprises blocks I, J and L.

The above paragraphs in connection with FIGS. 4A to 4B have describedestablishing block chains for individual smart phones and recording theprovision of an alternative code in a block of the block chaincorresponding to the alternative code.

According to an embodiment of the invention, the block (also referred toas “block chain transaction record” or simply “transaction record” inthis specification) is generated and added to the block chain as aresult of a block chain transaction in response to the alternative codebeing provided to the caller by another user. In other words, theprocess of the provision of an alternative code from one user to anotheris implemented as a block chain transaction.

The concept of block chain transaction is well known in prior art blockchain technology. Those skilled in the art shall also be familiar withhow a block chain transaction is executed. Thus, details of theexecution of block chain transaction will not be provided here in lengthso as not to obscure the invention. However, for better understanding ofthe invention, it would be advantageous to give a simple example in thefollowing paragraphs.

Assume, for the purpose of the invention, smart phones 212_1, 212_2,212_3, . . . and 212_n as well as transaction module 224 of telephoneagent 220 constitute participant nodes of a block chain system.Transaction module 224 and each of the smart phones are appropriatelyconfigured to enable block chain operations, with transaction module 224serving as a control node.

For example, if user U_1 would provide AC_1 to user U_2, as is describedwith reference to FIG. 4B, a block chain transaction request may beraised from smart phone 212_1 to transaction module 224. The request maycontain, among other things, the following information:

-   -   Transaction record: record={sender: U_1,        -   receiver: U_2,        -   alternative code: AC_I}    -   U_1's signature

In response to the request, transaction module 224 generates a blockchain transaction which contains the following information:

 Transaction ID that uniquely identifies the transaction;

 Public key of U_1;

 Signature of U_1, encrypted by U_1's private key;

 Chaincode_operation  //Record transaction details of sending whichalternative code to which receiver. The operation can be represented by following pseudocode// Function_ChaincodeOperation(String: sender, String: receiver,  String:alphanumeric)  {   record={sender: U_1,       receiver: U_2,      alternative code :AC_1}   return record  }

 Chain code and chain code hash  //The chain source code above and itshash value which are used for  other nodes to verify if the operationresult matches the source chain  code and its hash value.//

Transaction module 224 may broadcast the block chain transaction to allparticipant nodes. Then, other participant nodes 212_2, 212_3, . . . and212_n may use U_1's public key, chain code and chain code hash value toverify the transaction. If a certain number of nodes (the number may bepre-defined to include most or all nodes) have verified and agreed,Transaction module 224 may add block G to U_1's block chain 232_1.

After being provided with AC_1 in this way, smart phone 212_2 is enabledto use AC_1 to make a call to smart phone 212_1 via telephone agent 220,as described in connection with FIG. 3.

As previously mentioned, a user may also provide another user'salternative code to a third user via telephone agent 220. In a similarway, the fact may be recorded in a transaction record of the block chaincorresponding to the alternative code. For example, after obtaining AC_1from user U_1, user U_2 may want to share it with user U_3. User U_2 mayprovide AC_1 to user U_3 in a similar way as above. This fact may berecorded in a new block H which is added to block chain 232_1corresponding to AC_1, as depicted in FIG. 4C. The information recordedin block H might look like <SENDER: 212_2; RECEIVER: 212_3>, from whichit may be determined that smart phone 212_2 has provided smart phone212_3 with AC_1.

In the above, the method of protecting phone number from being exposedto third parties according to embodiments of the invention is described.

With the invention, phone users are assigned codes that are uniquelyassociated with their phone numbers. The users may call each other usingthe codes as the alternative to the phone numbers, especially inconducting business transactions where, for example, an online shoppingbuyer would not like to expose his phone number to an online seller.Because users' phone numbers are not exchanged, the risk of the phonenumbers themselves being exposed to third parties (e.g., leaked) isreduced.

Furthermore, since a first user may call a second user via telephoneagent 220 only if the first user is formally provided with the seconduser's alternative code, the second user may effectively avoid beingdisturbed by unsolicited phone calls via telephone agent 220. If thesecond user doubts that an unsolicited phone call is due to exposure ofhis alternative code to a third party, it is easy for him to find outthe source of exposure from the block chain associated with him. Becausethe block chain is temper resistant, the finding out may serve asevidence for possible legal actions against the act of exposure if. Inthis way, actions of arbitrarily exposure alternative codes might bemitigated so that the alternative codes may also be effectivelyprotected from being exposed to third parties. For example, an onlineshopping buyer (e.g., U_1) may formally provide his alternative code toan online seller (e.g., U_2) to facilitate a transaction. I would benormal for the seller to formally provide the code to a courier (e.g.,U_3) for delivering the goods ordered by the buyer. Should the couriersell the code to another online seller by formally providing the code,for example by a block chain transaction, the courier might be facingpotential legal action brought against him with the formal record, suchas the block chain record, of the provision as supportive evidence.

Under the same inventive concept, the invention also provides a systemwhich comprises one or more processors; a memory coupled to at least oneof the one or more processors, a set of computer program instructionsstored in the memory and executed by at least one of the one or moreprocessors in order to perform actions of: receiving a request, from acaller smart phone, for establishing telephone communication with asmart phone of the callee, wherein the request contains a code todesignate the smart phone of the callee; checking whether the code isformally provided to the caller; and in response to determining that thecode is formally provided to the caller, retrieving the phone number ofthe caller and the phone number of the callee based on the request; andestablishing a phone call connection via a cellular network with thephone number of the caller and the phone number of the callee.

According to an embodiment of the invention, wherein the code isuniquely corresponding to the phone number of the callee.

According to an embodiment of the invention, the checking whether thecode is formally provided to the caller comprises checking whether thereis a block chain transaction record indicating that the code wasprovided to the caller by either the callee or a third user.

According to an embodiment of the invention, the block chain transactionrecord is generated and added to a block chain as a result of a blockchain transaction in response to the code being provided to the callerby either the callee or a third user.

According to an embodiment of the invention, the block chain isassociated with the smart phone of the callee.

The invention also provides a computer program product which comprises acomputer readable storage medium having program instructions embodiedtherewith, wherein the program instructions being executable by a deviceto perform a method which comprises: receiving a request, from a callersmart phone, for establishing telephone communication with a smart phoneof the callee, wherein the request contains a code to designate thesmart phone of the callee; checking whether the code is formallyprovided to the caller; and in response to determining that the code isformally provided to the caller, retrieving the phone number of thecaller and the phone number of the callee based on the request; andestablishing a phone call connection via a cellular network with thephone number of the caller and the phone number of the callee.

According to an embodiment of the invention, wherein the code isuniquely corresponding to the phone number of the callee.

According to an embodiment of the invention, the checking whether thecode is formally provided to the caller comprises checking whether thereis a block chain transaction record indicating that the code wasprovided to the caller by either the callee or a third user.

According to an embodiment of the invention, the block chain transactionrecord is generated and added to a block chain as a result of a blockchain transaction in response to the code being provided to the callerby either the callee or a third user.

According to an embodiment of the invention, the block chain isassociated with the smart phone of the callee.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

1. A method comprising: receiving a request, from a smart phone of acaller, for establishing telephone communication with a smart phone of acallee, wherein the request contains a code to designate the smart phoneof the callee; checking whether the code is formally provided to thecaller; and in response to determining that the code is formallyprovided to the caller, retrieving a phone number of the caller and aphone number of the callee based on the request; and establishing aphone call connection via a cellular network with the phone number ofthe caller and the phone number of the callee.
 2. The method of claim 1,wherein the code is associated with the phone number of the callee. 3.The method of claim 1, further comprising checking whether there is ablock chain transaction record indicating that the code was provided tothe caller by the callee.
 4. The method of claim 3, further comprisinggenerating the block chain transaction record.
 5. The method of claim 4,further comprising adding the block chain transaction record to a blockchain based on a block chain transaction in response to the code beingprovided to the caller by the callee.
 6. The method of claim 5, whereinthe block chain is associated with the smart phone of the callee.
 7. Themethod of claim 1, further comprising in response to determining thatthe code is not formally provided to the caller, not establishing aphone call connection via a cellular network.