Method for extracting key information in call, and mobile terminal
A key information, mobile terminal technology, applied in the field of communication, can solve problems such as trouble
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] see figure 1 , figure 1 It is a schematic flowchart of a method for extracting key information during a call disclosed by an embodiment of the present invention. Wherein, the method shown in the embodiment of the present invention is applicable to any mobile terminal with a calling function, for example, a smart phone, a tablet computer, and the like. When the user answers the call, or the user makes a call and the other party answers the call, a call connection is successfully established between the terminal used by the user and the terminal used by the other party. Such as figure 1 As shown, the method for extracting key information in the call may include the following steps:
[0058] 101. During a call, the mobile terminal collects audio information during the call in real time.
[0059] In the embodiment of the present invention, when the mobile terminal establishes a call connection, the key information extraction button and the edit button in the call can be...
Embodiment 2
[0070] see figure 2 , figure 2 It is a schematic flowchart of another method for extracting key information during a call disclosed in an embodiment of the present invention. Such as figure 2 As shown, the method for extracting key information in the call may include the following steps:
[0071] 201-203. Wherein, steps 201 to 203 are the same as steps 101 to 103 described in the first embodiment, and will not be repeated in this embodiment of the present invention.
[0072] Wherein, before step 201 is executed, as an optional implementation manner, the mobile terminal may detect the call duration of call establishment, and when the call duration reaches a preset duration threshold, step 201 is executed. Wherein, the preset duration threshold can be a preset duration value, for example, 1 minute or 30 seconds, which can be set by the user himself, or can be set as a default value by the mobile terminal, and the statistically obtained call duration can be accurate to min...
Embodiment 3
[0085] see image 3 , image 3 It is a schematic flowchart of another method for extracting key information during a call disclosed in an embodiment of the present invention. Such as image 3 As shown, the method for extracting key information in the call may include the following steps:
[0086] 301-304. Wherein, steps 301 to 304 are the same as steps 101 to 104 described in Embodiment 1, and will not be repeated in this embodiment of the present invention.
[0087] 305. The mobile terminal receives the modification operation instruction for the key information input by the user, and modifies the key information according to the modification operation instruction, so as to obtain the target key information.
[0088] In the embodiment of the present invention, the user can modify the key information such as deletion, and can also edit the key information. Specifically, a text input interface pops up for the user to input text and modify the key information.
[0089]As an ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


