Unlock instant, AI-driven research and patent intelligence for your innovation.

Call method and terminal

A terminal and call recording technology, applied in the field of communication, can solve problems such as poor user experience

Inactive Publication Date: 2019-03-22
XIAN ZHONGXING NEW SOFTWARE
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For mobile phone users, when they want to make encrypted calls or ordinary calls, they must switch between the two applications, which is very bad user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call method and terminal
  • Call method and terminal
  • Call method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 It is a flowchart of a calling method in an embodiment of the present invention, such as figure 1 As shown, the method of the present embodiment includes:

[0039] Step 101, calling out the built-in address book or call records, and receiving a call request;

[0040] Step 102, if the received request is to make an encrypted call, trigger the third-party secure call application to enter the call state.

[0041] The embodiment of the present invention relates to the integration of two applications, the third-party secure call application and the built-in call application of the terminal, through the fusion of the friend address book of the third-party secure call application and the built-in address book of the terminal, and based on the SDK of the third-party secure call application ( Software Development Kit (Software Development Kit), when making a secure call, the built-in address book of the terminal directly calls the third-party secure call APK (Android ...

Embodiment 2

[0044] figure 2 It is a flow chart of the method for talking in the embodiment of the present invention, such as figure 2 As shown, the method of the present embodiment includes the following steps:

[0045] Step 201, calling out the built-in address book.

[0046] Step 202, read the address book of the third-party secure call application.

[0047] Step 203 , judging whether to read the address book of the third-party secure call application for the first time, if yes, go to step 204 ; if not, go to step 205 .

[0048] Step 204, when reading for the first time, directly save the address book of the third-party secure call application into the built-in address book in the terminal (cannot be SIM (Subscriber Identity Module, Subscriber Identity Module)), then go to step 206 .

[0049] Step 205, when reading later, it is necessary to compare the read address book of the third-party secure call application with the address book saved by the terminal, and according to the com...

Embodiment 3

[0059] image 3 A schematic diagram of a terminal that is an example of the present invention, such as image 3 As shown, the terminal of this embodiment includes:

[0060] The user interface module is used to call out the built-in address book or call record, and receive a call request;

[0061] The call module is configured to trigger a third-party secure call application to enter a call state if the user interface module receives a request to dial an encrypted call.

[0062] The terminal in this embodiment does not require the user to switch back and forth between two applications when making a third-party secure call, which improves user experience.

[0063] In an embodiment, the terminal further includes:

[0064] The reading module is used for reading the address book of the third-party secure call application after the user interface module enters the built-in address book.

[0065] In an embodiment, the terminal further includes:

[0066] An update module, configure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a call method. The call method comprises the steps of: calling out a built-in address book or call records, and receiving a call making request; and, if the received request is an encrypted call making request, triggering a third-party security call application to enter a call state. The invention relates to a terminal. By means of the scheme, when an encrypted call or anordinary call is made, two applications do not need to be switched; and thus, the user experience is improved.

Description

technical field [0001] Embodiments of the present invention relate to but are not limited to the technical field of communication, especially a method and terminal for talking. Background technique [0002] The security of mobile phone calls has increasingly become the focus of attention. Major domestic operators have launched their own voice call security solutions. The advantage of this solution is that encrypted calls are naturally integrated with ordinary phone applications, but the disadvantage is that it is based on "soft encryption". , the security is not high. Many mobile phone manufacturers are now cooperating with third-party secure call application manufacturers to launch more secure "hard encryption" call solutions. However, this kind of solution is often two sets of independent applications. The APP (application) of a third-party manufacturer is used for secure calls, and the built-in APP of the mobile phone is used for ordinary calls. For mobile phone users, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/68H04M1/725H04W12/02
CPCH04M1/68H04W12/02H04M1/724H04M1/72403H04M1/72484H04M1/725
Inventor 李志刚
Owner XIAN ZHONGXING NEW SOFTWARE