Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted call control method and terminal

A technology for encrypted calls and control methods, applied in wireless communication, security devices, electrical components, etc., can solve problems such as bad experience

Inactive Publication Date: 2017-11-10
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the call hold function is prohibited in these encrypted communication schemes. Specifically, in an encrypted call system, the source voice needs to be encrypted on the source terminal before being transmitted to the network. After the encrypted voice reaches the destination terminal, it needs to be encrypted. The voice can only be restored by decryption. If the existing encrypted communication scheme is applied, the destination terminal often receives voice streams such as ringtones from the network during the hold process of the encrypted call, and the encrypted call also decrypts these voice streams by default. , however, these voice streams are not encrypted. In this way, the unencrypted voice stream becomes noise due to the decryption operation. In the end, what the user of the destination terminal hears when the source terminal is on hold is all Noise, bringing bad experience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted call control method and terminal
  • Encrypted call control method and terminal
  • Encrypted call control method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0053] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0054] figure 1 A flow chart of an encrypted call control method according to an embodiment of the present invention is shown.

[0055] Such as figure 1 As shown, the encrypted call control method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encrypted call control method and a terminal. The encrypted call control method comprises the steps that an encrypted call control command is received in the encrypted call process; and a corresponding encrypted call processing request is sent to a receiving party terminal of an encrypted call according to the encrypted call control command, so that the receiving party terminal can determine whether to decrypt follow-up speech streams or not according to the encrypted call processing request. According to the technical scheme, due to the fact that the condition that the receiving party terminal falsely decrypts the speech streams from the Internet can be avoided in the encrypted call keeping process, noise generated by false decryption is avoided, and the user experience obtained when call keeping is conducted in the encrypted call is improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular, to an encrypted call control method and a terminal. Background technique [0002] Currently, CS domain (Circuit Switched Domain) voice calls based on GSM (Global System for Mobile Communications) and WCDMA (Wideband Code Multiple Access), and PS (Packet Switched) domain voice calls based on Volte (Wideband Voice Function) support single On hold, that is, during a voice call, the original call is temporarily suspended. During the suspension period, the original call is not hung up. When the user needs to resume the original call, the user can choose to activate the original call, and the original call will continue. [0003] However, due to the actual needs of users, encrypted calls are often required. Although operators have launched end-to-end encrypted communications in the CS domain, they can provide end-to-end voice encryption for users. For example, China Unicom has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W76/02H04W76/04
CPCH04W12/02H04W76/25H04W12/033H04W12/037
Inventor 李小辉
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products