Call processing method and apparatus

A technology of call processing and call request, applied in the direction of telephone communication, electrical components, branch equipment, etc., it can solve problems such as falling on friends, mobile phones falling on the desk of the office, exposure of personal privacy information of the owner, etc., to avoid privacy The effect of information leakage

Inactive Publication Date: 2016-10-05
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are often situations in life where the mobile phone is not with the owner. For example, when a mobile phone owner is suddenly busy going to a meeting or something urgent, he often leaves the mobile phone on the office table, or fall on friends
At this time, if an important and sensitive caller calls, the mobile phone will often be answered by other people, and at this time, it may lead to the leakage of the owner's personal privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call processing method and apparatus
  • Call processing method and apparatus
  • Call processing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment 1 of the present invention provides a call processing method, such as figure 1 As shown, the method includes the following steps:

[0051] Step 101: When receiving a call request initiated by the first terminal, the second terminal executes a masquerade display process and a human eye recognition process;

[0052] In this step, the first terminal refers to a terminal included in the preset list of the second terminal; the preset list is used to store information of sensitive contacts, and the information may be identification information used to identify a contact; for example , phone number, contact name, etc.; therefore, before this step, the second terminal needs to pre-set the preset list, for example, the second terminal user can set one or more contacts in the second terminal as required for sensitive contacts. Therefore, the first terminal is the sensitive contact set for the user of the second terminal.

[0053] When receiving the call request init...

Embodiment 2

[0064] Embodiment 2 of the present invention provides a call processing method, such as figure 2 As shown, the method includes the following steps:

[0065] Step 201: When receiving a call request initiated by the first terminal, the second terminal executes a masquerade display process, a human eye recognition process, and a call rejection process;

[0066] In this step, the first terminal refers to a terminal included in the preset list of the second terminal; the preset list is used to store information of sensitive contacts, and the information may be identification information used to identify a contact; For example, phone numbers, names of contacts, etc.; therefore, before this step, the second terminal needs to pre-set a preset list, for example, the user of the second terminal can add one or more contacts in the second terminal to Set as a sensitive contact. Therefore, the first terminal is the sensitive contact set for the user of the second terminal.

[0067] Whe...

Embodiment 3

[0078] Embodiment 3 of the present invention provides a call processing device, which is located on the second terminal, such as image 3 As shown, the device includes: a control module 31, a masquerading display module 32, a human eye recognition module 33, a call masquerading module 34, and a call rejection module 35; wherein,

[0079] The control module 31 is configured to trigger the masquerade display module 32 to execute the masquerade display process when receiving the call request initiated by the first terminal, trigger the human eye recognition module 33 to execute the human eye recognition process, and when the human eye recognition fails and the first When the call between the terminal and the second terminal is established, the call masquerading module 34 is triggered to execute the call masquerading process; or,

[0080] The control module 31 is configured to trigger the masquerade display module 32 to execute the masquerade display process, trigger the human eye...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a call processing method. According to the method, when a call request initiated by a first terminal is received, a second terminal executes the disguise display process and the human eye recognition process. When the human eye recognition is failed and the call is established, the call disguise process is performed. Or, when the call request initiated by the first terminal is received, the second terminal executes the disguise display process, the human eye recognition process and the call rejecting process. When the human eye recognition is successful, the call rejecting process is terminated. Meanwhile, the normal call process is performed. The invention also discloses a call processing apparatus.

Description

technical field [0001] The invention relates to the field of mobile terminals, in particular to a call processing method and device. Background technique [0002] With the development of communication technology, mobile terminals such as mobile phones have become an indispensable tool in people's daily life. [0003] Every mobile phone user may have one or more sensitive contacts, especially for some business people, for calls made by these sensitive contacts, they may not want to be answered by others, or even others Be aware of your connection to certain sensitive contacts. However, there are often situations in life where the mobile phone is not with the owner. For example, when a mobile phone owner is suddenly busy going to a meeting or something urgent, he often leaves the mobile phone on the office table, or Fall on a friend. At this time, if there is an important and sensitive caller to call, the mobile phone will often be answered by other people, and at this time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/72433H04M1/72463H04M1/72484
CPCH04M1/667H04M1/725
Inventor 王宇航叶青房新凯
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products