Recording security control method, device and equipment

A security control and audio technology, applied in the field of communication, can solve problems such as stealing recordings and insecure user privacy information

Inactive Publication Date: 2016-12-07
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in actual use, for the mechanism that allows the user to record the user's call during the call, some applications may use this mechanism to record the user's call without the user's knowledge
In particula

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recording security control method, device and equipment
  • Recording security control method, device and equipment
  • Recording security control method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a recording security control method according to an embodiment of the present invention, which may specifically include the following steps:

[0071] Step 101, in the state of talking, judge whether there is a first process recording, if there is a first process recording, then enter step 102;

[0072] In the embodiment of the present invention, when the user uses the mobile terminal to make a call, the mobile terminal can judge whether there is a certain first process in the system that is recording in the state of a call.

[0073] The mobile terminal is, for example, a mobile phone, or other mobile terminals that can make and receive calls, and this embodiment of the present invention does not limit it.

[0074] In the embodiment of the present invention, after it is determined that the mobile terminal is in the state of a call, the invocation of the recording interface is monitored. If the...

Embodiment 2

[0086] refer to figure 2 , which shows a flow chart of the steps of an embodiment of a recording security control method according to an embodiment of the present invention, which may specifically include the following steps:

[0087] Step 201, in the state of talking, determine whether there is a first process recording; if there is a first process recording, then enter step 202;

[0088] This step is similar in principle to step 101 in Embodiment 1.

[0089] Preferably, in another embodiment of the present invention, before step 201, it also includes:

[0090] Step 200, judging whether the in-call state written in the audio call state setting interface AudioManager.setMode is received; if the in-call state written in the audio call state setting interface AudioManager.setMode is received, then enter step 201;

[0091] Such as Figure 1B As described in , when the phone application makes a call, it will pass the call state MODE_IN_CALL to the framework and hardware abstra...

Embodiment 3

[0133] refer to image 3 , which shows a flow chart of the steps of an embodiment of a recording security control method according to an embodiment of the present invention, which may specifically include the following steps:

[0134] Step 301, in the state of talking, judge whether there is a first process recording, if there is a first process recording, then enter step 302;

[0135] Step 302, judging whether the first process belongs to a designated application, and if the first process does not belong to a designated application, proceed to step 303;

[0136] Step 303, after the first process stores the recording data, delete the recording storage file at the corresponding location according to the storage path of the recording data.

[0137] In the embodiment of the present invention, it is possible to find the storage path where the recording data is stored by the first process, and then monitor whether the recording of the first process is finished, and if it is finish...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a recording security control method, a recording security control device and a piece of recording security control equipment, relating to the technical field of communication. The method comprises the steps of: in an in-call state, judging whether a first process which records exists; if the first process which records exists, judging whether the first process belongs to a designated application; and if the first process does not belong to the designated application, refusing the first process to record. According to the recording security control method, the recording security control device and the recording security control equipment provided by the invention, the problem that a call process of a user is exposed possibly so that privacy information of the user is unsecure and the privacy security of the user is threatened is solved; the call of the user can be prevented from being obtained by the process of a malicious third party application; and the privacy security for the call process of the user is improved.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a recording security control method, device and equipment. Background technique [0002] Mobile terminals of many systems, such as mobile terminals of the Android system, allow users to record when using the mobile terminal to make and receive calls. [0003] However, in actual use, for the mechanism that allows the user to record the user's call during the call, some applications may use this mechanism to record the user's call without the user's knowledge. In particular, some Trojan horse programs may steal user's recordings through the above methods. [0004] Therefore, in the above process, the user's call process may be exposed, resulting in insecurity of the user's private information. Contents of the invention [0005] In view of the above problems, the present invention proposes a recording security control method, device and equipment, which monitor the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725
CPCH04M1/72433H04M1/72463
Inventor 杨浩
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products