Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal and security calling method of mobile terminal

A mobile terminal and security technology, applied in the field of communications, can solve problems such as user loss and inconvenience in actual use, and achieve the effect of ensuring security

Active Publication Date: 2013-08-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially when users make some special calls, such as calling a bank to handle business, they need to enter important information such as bank account and password. If the mobile phone is monitored, it may bring great losses to the user.
[0003] In summary, the existing secure call technology for mobile terminals obviously has inconvenience and defects in actual use, so it is necessary to improve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and security calling method of mobile terminal
  • Mobile terminal and security calling method of mobile terminal
  • Mobile terminal and security calling method of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] see figure 1 , the present invention provides a mobile terminal for implementing secure calls. The mobile terminal 100 may be a device capable of talking, such as a mobile phone, and is mainly used for information protection at the communication framework layer. The mobile terminal 100 includes:

[0035] The number receiving module 10 is used for receiving the input of the number. In a specific application, the number receiving module 10 can receive number input from other terminals before the call starts, and can also receive digital input of user information and other business information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of communication, and provides a security calling method of a mobile terminal. The method is used for protecting transmitted information of the mobile terminal at a communication frame layer, and comprises the following steps that an input number is received; the number is encrypted or substituted before entering the communication frame layer; and the encrypted and substituted number is decrypted or reversely substituted after transmitted out of the communication frame layer. The invention further provides the mobile terminal for realizing the method correspondingly. With the adoption of the method and the mobile terminal, user information concerned during a calling course of the mobile terminal can be protected effectively.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for secure calling of a mobile terminal and the mobile terminal. Background technique [0002] With the development of communication technology, various mobile terminals are gradually popularized, but at the same time, the protection of user information by mobile terminals also arises. For example, the process of making a call on a mobile phone based on the Android system follows the upper-layer applications such as dial pad, contacts, and text messages to initiate calls. After passing through the communication framework layer, this common framework then enters the wireless interface layer. The communication framework link in this process is public. When a user makes a call, the phone number entered can be easily monitored through this public framework. Especially when the user dials some special calls, such as when dialing a bank phone to handle business, it is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W88/02
Inventor 邵刚顾志红
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD