Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for ensuring call communication security, device and user terminal

A user terminal and security technology, which is applied to security devices and key distribution, can solve the problems of unreliability and deceive the called party, and achieve the effect of ensuring the security of calls and preventing tampering.

Inactive Publication Date: 2016-06-22
ZTE CORP
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of telecommunication services, various voice call functions have become very popular. In telecommunication services, the caller ID service will be used. The called party will judge the identity of the other party according to the phone number of the caller ID. Illegal technology will modify the calling number in the network, control the caller ID number of the called party, disguise the phone number as a number trusted by the called party, and achieve the purpose of deceiving the called party, so when it involves major interests During a voice call, it is unreliable to trust the other party based on the caller ID alone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ensuring call communication security, device and user terminal
  • Method for ensuring call communication security, device and user terminal
  • Method for ensuring call communication security, device and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0053] figure 1 Shows a flow chart of the steps of a signal mixed output method provided by an embodiment of the present invention, refer to figure 1 , The embodiment of the present invention provides a method for ensuring the security of a call, including the following steps:

[0054] Step 101: During a voice call between the first user terminal and a second user terminal, verify the identity of the second user terminal, and obtain a verification result;

[0055] Step 102: When the verification result is that the identity verification is successful, keep the voice call;

[0056] Step 103: When the verification result is that the identity verification fails, the voice call is ended.

[0057] The method is used in a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method for ensuring call communication security, a device for ensuring call communication security and a user terminal. The method is used for a first user terminal and includes the following steps that: in a process in which voice call communication is carried out between the first user terminal and a second user terminal, the identity of the second user terminal is verified, and a verification result is obtained; when the verification result indicates that the identity verification is successful, the voice call communication is maintained; when the verification result indicates that the identity verification fails, the voice call communication is terminated. With the method, device and user terminal provided by the embodiment of the invention adopted, the identity of a user can be prevented from being tampered, and call communication security can be ensured.

Description

Technical field [0001] The embodiment of the present invention relates to the field of call security, in particular to a method, device and user terminal for ensuring call security. Background technique [0002] With the rapid development of telecommunication services, various voice call functions have become very popular. In telecommunication services, the caller ID service is used. The called party will determine the identity of the caller based on the phone number displayed by the caller ID. Illegal technology will modify the calling number in the network, control the caller ID number of the called party, disguise the phone number as a number trusted by the called party, and achieve the purpose of deceiving the called party, so it involves significant interests. During a voice call, trusting the other party based solely on the caller ID is unreliable. Summary of the invention [0003] The purpose of the embodiments of the present invention is to provide a method, device and us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04L9/32H04L9/08H04W12/041H04W12/06
CPCH04L9/08H04L9/32H04L63/0861H04W12/06H04W12/02H04W12/126
Inventor 任斌钟安利
Owner ZTE CORP