Call method and terminal
A terminal and call recording technology, applied in the field of communication, can solve problems such as poor user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] figure 1 It is a flowchart of a calling method in an embodiment of the present invention, such as figure 1 As shown, the method of the present embodiment includes:
[0039] Step 101, calling out the built-in address book or call records, and receiving a call request;
[0040] Step 102, if the received request is to make an encrypted call, trigger the third-party secure call application to enter the call state.
[0041] The embodiment of the present invention relates to the integration of two applications, the third-party secure call application and the built-in call application of the terminal, through the fusion of the friend address book of the third-party secure call application and the built-in address book of the terminal, and based on the SDK of the third-party secure call application ( Software Development Kit (Software Development Kit), when making a secure call, the built-in address book of the terminal directly calls the third-party secure call APK (Android ...
Embodiment 2
[0044] figure 2 It is a flow chart of the method for talking in the embodiment of the present invention, such as figure 2 As shown, the method of the present embodiment includes the following steps:
[0045] Step 201, calling out the built-in address book.
[0046] Step 202, read the address book of the third-party secure call application.
[0047] Step 203 , judging whether to read the address book of the third-party secure call application for the first time, if yes, go to step 204 ; if not, go to step 205 .
[0048] Step 204, when reading for the first time, directly save the address book of the third-party secure call application into the built-in address book in the terminal (cannot be SIM (Subscriber Identity Module, Subscriber Identity Module)), then go to step 206 .
[0049] Step 205, when reading later, it is necessary to compare the read address book of the third-party secure call application with the address book saved by the terminal, and according to the com...
Embodiment 3
[0059] image 3 A schematic diagram of a terminal that is an example of the present invention, such as image 3 As shown, the terminal of this embodiment includes:
[0060] The user interface module is used to call out the built-in address book or call record, and receive a call request;
[0061] The call module is configured to trigger a third-party secure call application to enter a call state if the user interface module receives a request to dial an encrypted call.
[0062] The terminal in this embodiment does not require the user to switch back and forth between two applications when making a third-party secure call, which improves user experience.
[0063] In an embodiment, the terminal further includes:
[0064] The reading module is used for reading the address book of the third-party secure call application after the user interface module enters the built-in address book.
[0065] In an embodiment, the terminal further includes:
[0066] An update module, configure...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


