Softphone encryption and decryption method, device and computer-readable storage medium
An encryption, decryption, and softphone technology, applied in the field of network communication, can solve the problems of encrypted phone number leakage, personal information leakage, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0047] The invention provides a soft phone encryption and decryption method.
[0048] Please refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the softphone encryption and decryption method of the present invention. In this embodiment, the softphone encryption and decryption method includes:
[0049] Step S10, when receiving the call command of the softphone, obtain the phone number corresponding to the call command, and encrypt the phone number to generate a ciphertext phone number;
[0050]The softphone encryption and decryption method of this embodiment is suitable for encrypting and decrypting the customer's phone number when the artificial agent contacts the customer through the softphone, so as to ensure the security of the customer's personal information. The local system i...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com