Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private contact camouflage method and mobile terminal

A technology for private contacts and mobile terminals, applied in the field of private contact camouflage methods and mobile terminals, can solve the problems of inability to prompt, increase the risk of private contacts being leaked, easily cause others, etc., and achieve the effect of enhancing confidentiality and security.

Active Publication Date: 2012-03-28
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing mobile terminals, when communicating with private contacts, such as receiving a call from a private contact, the mobile terminal caller interface only displays "unknown" as a prompt, which is likely to arouse the curiosity of others
Moreover, when the user sets multiple private contacts in the mobile terminal, it is impossible to judge which private contact is calling based on the "unknown" prompt on the caller display interface. Only after the call is connected can the specific private contact be known. contact person
Although this method of camouflaging private contacts is simple, it is not convenient for users to judge the identity of the caller at the first time, and it is easy to arouse the curiosity of others, which increases the risk of private contacts being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private contact camouflage method and mobile terminal
  • Private contact camouflage method and mobile terminal
  • Private contact camouflage method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] See figure 1 , is a schematic structural diagram of the first embodiment of the mobile terminal of the present invention. The mobile terminal in this embodiment is a mobile phone, such as figure 1 As shown, the mobile terminal includes: a search module 10, a display module 20, wherein:

[0045] The search module 10 is configured to search for preset masquerading information matching the private contact when communicating with the private contact.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a private contact camouflage method and a mobile terminal. The private contact camouflage method comprises the following steps of: when communicating with a private contact, checking preset camouflage information matched with the private contact; and displaying the information of the private contact as the checked camouflage information. The purpose of the invention is to provide a private contact camouflage method and a mobile terminal, which are convenient for a user to judge the identity of the opposite communication party at the first time without causing any curiosity and doubt, thereby enhancing the confidentiality and security of the private contact.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for disguising a private contact and a mobile terminal. Background technique [0002] In the existing mobile terminal, when communicating with a private contact, such as receiving a call from a private contact, the incoming call interface of the mobile terminal only displays "unknown" as a prompt, which easily arouses the curiosity of others. Moreover, when the user sets multiple private contacts in the mobile terminal, it is impossible to judge which private contact is calling based on the "unknown" prompt on the caller display interface. Only after the call is connected can the specific private contact be known. contacts. Although the camouflage method of this private contact is simple, it is not convenient for the user to judge the identity of the calling party at the first time, and it is easy to arouse the curiosity of others, which increases the risk of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04M1/57H04M1/72454
Inventor 于慧娟
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products