Confidential call communication method and user terminal
A technology of a user terminal and a communication method, which is applied to the communication method of a confidential call and the field of user terminals, can solve the problems of inability to realize the call waiting or call holding service of the confidential call, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Please refer to figure 1 , which is a schematic flowchart of a communication method for a secure call according to Embodiment 1 of the present invention. Such as figure 1 As shown, in this embodiment, the communication method of the confidential call is specifically as follows:
[0038] First, step S10 is executed: user terminal A establishes a first call with user terminal B, and during the establishment of the first call, user terminal A acquires and saves the first identification and the first key used for the first call, and at the same time The user terminal A establishes a one-to-one correspondence between the stored first identifier and the first key.
[0039] In this embodiment, the user terminal A is a user terminal that needs to implement the supplementary service of confidential calls, that is, to realize call waiting and call hold. Therefore, in the description of the present invention, the user terminal B and the subsequent user terminal C will not be des...
Embodiment 2
[0057] Please refer to figure 2 , which is a schematic flowchart of a communication method for a secure call according to Embodiment 2 of the present invention. Such as figure 2 As shown, in this embodiment, the communication method of the confidential call includes the following steps:
[0058] Step S20: User terminal A establishes a first call with user terminal B, obtains and saves the first identification and the first key used for the first call, and user terminal A compares the stored first identification and first key Establish a one-to-one correspondence.
[0059] Step S21: User terminal A connects to the first call, and uses the first key corresponding to the first identifier to conduct a secure conversation with user terminal B.
[0060] Step S22: User terminal A holds the first call.
[0061] Step S23: User terminal A establishes a second call with user terminal C, acquires and saves the second identification and second key used for the second call, and user t...
Embodiment 3
[0068] Please refer to image 3 , which is a schematic structural diagram of a user terminal according to Embodiment 3 of the present invention. Such as image 3 As shown, the user terminal 30 includes:
[0069] A call management unit 31, configured to perform call control on several calls; and obtain the identification of each call;
[0070] The key management unit 32 is used to obtain the key of each call; save the identification and key of each call, and establish a one-to-one correspondence between the identification and key of each saved call; and use the saved The key corresponding to the identification of each call encrypts and decrypts the communication data of the call;
[0071] a sending unit 33, configured to send communication data;
[0072] The receiving unit 34 is configured to receive communication data.
[0073] The call control includes: call establishment, call connection, call hold, call recovery and call hang up.
[0074] Specifically, when the user t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 