Method and apparatus for protecting privacy in conversation process and mobile terminal

A call process and privacy protection technology, which is applied in the field of mobile communication, can solve the problems of user privacy leakage during the call process, and achieve the effect of protecting user privacy and improving user experience

Inactive Publication Date: 2016-11-23
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method, device and mobile terminal for privacy protection during a call, to at least solve the problem in the prior art that none of the methods involves privacy protection during a user call, resulting in privacy leakage during the user call The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting privacy in conversation process and mobile terminal
  • Method and apparatus for protecting privacy in conversation process and mobile terminal
  • Method and apparatus for protecting privacy in conversation process and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] In order to solve the problem in the prior art that none of the methods is related to the privacy protection of the user during the call, which leads to the leakage of the user’s privacy during the call, the present invention provides a method, device and method for privacy protection during the call. For the mobile terminal, the present invention will be further described in detail below with reference to the accompanying dr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and an apparatus for protecting privacy in the conversation process and a mobile terminal. The method comprises the steps of: acquiring voice input contents of a user in the conversation process; detecting whether preset conversation keywords exist in the voice input contents; and in the case that the conversation keywords exist, replacing the voice input contents corresponding to the conversation keywords in a preset time period with preset input contents so as to carry out voice transmission. By applying the method, the apparatus and the mobile terminal which are disclosed by the invention, a user can be prevented from leaking important information to other people, privacy of the user is protected, user experience is relatively good, and the problem of privacy leakage in the conversation process of the user, which is caused by the case that no any one method relates to privacy protection in the conversation process of the user in the prior art, is solved.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method, device and mobile terminal for privacy protection during a call. Background technique [0002] The voice input function in the prior art is usually that the mobile terminal analyzes the received voice, extracts the voice feature parameters in the voice, and determines whether there is a voice feature matching the extracted voice feature parameters in the voice feature model library. Voice feature parameters, if yes, identify the action behavior corresponding to the existing voice feature parameters, execute the identified action behavior, and the user experience is good [0003] The above scheme basically realizes the correspondence between speech and behavior, but the existing speech recognition methods are all for executing the user's operation instructions, that is, the user sends a speech instruction, and the mobile terminal performs the corresponding operation a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02
Inventor 周院奇
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products