Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for secure call connection

A call connection and security technology, applied in security devices, computer security devices, telephone communications, etc., can solve problems such as public call security, privacy accidents, and poor use effects

Active Publication Date: 2021-05-04
JIAGUTECH CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, currently widely used smartphones, when the user forgets to bring the mobile phone, if there is an incoming call on the mobile phone at this time, anyone can answer the call by operating the command answer icon, so there may be a call security issue where the privacy is accidentally disclosed.
[0005] At present, some protective measures to prevent others from answering have begun to appear, such as setting a password to answer, but this method is not perfect. Although others cannot enter the password to answer the call, they can record the number and contact the incoming call through other mobile phones. Otherwise, the identity or other information of the caller is leaked. Secondly, the confidential object is not reliably protected. If the user's mobile phone is answered in an unlocked state, the receiver can view the confidential object through the relevant interface. Related Information
Furthermore, the existing interface setting for preventing others from answering is too obvious, so that others can easily find that the mobile phone user deliberately protects relevant privacy or confidentiality, and it is easy to be misunderstood or guessed by others, and then the use effect is not good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for secure call connection
  • A method for secure call connection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Below in conjunction with specific embodiment, further illustrate the present invention, this embodiment implements under the premise of the technical scheme of the present invention, it should be understood that these embodiments are only for illustrating the present invention and are not intended to limit the scope of the present invention.

[0027] figure 1 It is a flow chart of a secure call connection method in an embodiment of the present invention.

[0028] Such as figure 1 As shown, the embodiment of the present invention is a secure call connection method, which is implemented based on a smart phone.

[0029] In step 101, the numbers that need to be used for safe calls are preset in the confidential list. When a number in the confidential list calls, the mobile phone first processes the incoming number. The digits are randomly changed to other numbers, and the changed caller number is displayed as the caller number. Only the changed number is displayed in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe call connection method. The method includes: randomly changing the multi-digit number at the end of the caller number in the secret list to other numbers, and displaying the changed caller number as the caller number, receiving the user's operation instruction, and comparing the user's operation instruction with the preset number. Check whether the set operation instructions are consistent, if yes, enter the password input interface, compare whether the input password is consistent with the preset password, if yes, then connect the phone. The present invention can effectively prevent others from answering the user's mobile phone without authorization when the mobile phone is not with the user, causing the user's relevant privacy or confidential information to leak, effectively protecting the information security of the mobile phone user, and it is not easy for the answerer to find that the user is deliberately Protects and works great.

Description

technical field [0001] The invention belongs to the field of mobile phone safe calls, and in particular relates to a safe call connection method. Background technique [0002] With the development of the economy and the improvement of people's living standards, mobile communication technology has been widely used. As a portable mobile communication tool, mobile phones have been owned by more and more users. With the popularization of mobile phones and the enhancement of their functions, mobile phones have evolved from a simple communication tool to a multifunctional electronic portable device. Thereby provide a lot of convenience for consumers' daily life and use. [0003] Recently, due to the leakage of technical information and various personal privacy, economic or social problems have often been caused, and the [0004] The attention paid to protecting personal privacy is showing an increasing trend. However, with smartphones that are currently widely used, when the us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/16H04W12/02G06F3/0486G06F21/60H04M3/436
CPCG06F3/0486G06F21/602H04M3/436H04W4/16H04W12/02
Inventor 张毅
Owner JIAGUTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products