Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure call connection method

A technology for call connection and security, applied in security devices, computer security devices, telephone communications, etc., can solve the problems of poor use effect, privacy accident, public call security, etc., and achieve excellent use effect and protect information security.

Active Publication Date: 2018-06-19
JIAGUTECH CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, currently widely used smartphones, when the user forgets to bring the mobile phone, if there is an incoming call on the mobile phone at this time, anyone can answer the call by operating the command answer icon, so there may be a call security issue where the privacy is accidentally disclosed.
[0005] At present, some protective measures to prevent others from answering have begun to appear, such as setting a password to answer, but this method is not perfect. Although others cannot enter the password to answer the call, they can record the number and contact the incoming call through other mobile phones. Otherwise, the identity or other information of the caller is leaked. Secondly, the confidential object is not reliably protected. If the user's mobile phone is answered in an unlocked state, the receiver can view the confidential object through the relevant interface. Related Information
Furthermore, the existing interface setting for preventing others from answering is too obvious, so that others can easily find that the mobile phone user deliberately protects relevant privacy or confidentiality, and it is easy to be misunderstood or guessed by others, and then the use effect is not good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure call connection method
  • Secure call connection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further illustrated below in conjunction with specific embodiments. The present embodiment is implemented on the premise of the technical solution of the present invention. It should be understood that these embodiments are only used to illustrate the present invention and not to limit the scope of the present invention.

[0027] figure 1 This is a flowchart of a method for connecting a secure call according to an embodiment of the present invention.

[0028] like figure 1 As shown, an embodiment of the present invention is a method for connecting a secure call, which is implemented based on a smart phone.

[0029] In step 101, the number that needs to make a secure call is preset into the secret list, and when a number in the secret list calls, the mobile phone first processes the caller number. The digit is randomly changed to other digits, and the changed caller ID is displayed as the caller ID. Only the changed number is displayed in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure call connection method. The method includes the following steps: randomly changing the multi-digit numbers at the tail of an incoming call number in a secret list intoother numbers, displaying the changed incoming call number as the current incoming call number, receiving an operation instruction of a user, comparing whether the operation instruction of the user is consistent with a preset operation instruction, if yes, entering a password input interface, comparing whether an input password is consistent with a preset password, and if yes, putting through a call. According to the scheme of the invention, the phenomena that other people answer a mobile phone of the user without permissions when the mobile phone is not carried by the user and the leakage ofrelevant privacy or confidential information of the user is caused can be effectively prevented, the information security of the mobile phone user can be effectively protected, mobile phone receiverscannot easily find that the user protects information deliberately, and an excellent use effect can be achieved.

Description

technical field [0001] The invention belongs to the field of mobile phone safe calls, and particularly relates to a method for connecting safe calls. Background technique [0002] With the development of the economy and the improvement of people's living standards, mobile communication technology has been widely used. As a portable mobile communication tool, mobile phones have been owned by more and more users. With the popularity of mobile phones and the enhancement of mobile phone functions, mobile phones have evolved from a simple communication tool to a multi-functional electronic portable device. Thus, many conveniences are provided for the daily life and use of consumers. [0003] Recently, due to the leakage of technical information and various personal privacy, economic or social problems have often been caused, and the [0004] The attention to protecting personal privacy is showing an increasing trend. However, with the currently widely used smartphones, when th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/16H04W12/02G06F3/0486G06F21/60H04M3/436
CPCG06F3/0486G06F21/602H04M3/436H04W4/16H04W12/02
Inventor 张毅
Owner JIAGUTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products