Call authentication method, and terminal

A terminal and call request technology, applied in the direction of telephone communication, wireless communication, security device, etc., can solve the problems of leakage of user's personal privacy, poor user experience, embarrassment of seeing or answering, etc., so as to protect the privacy of calls and improve privacy. Sex, the effect of protecting privacy

Inactive Publication Date: 2018-09-04
SHANGHAI IUV SOFTWARE DEV CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In real life, people use terminal devices such as mobile phones to make calls, etc. In the prior art, when the terminal used by the user receives a call request from an external contact, it will display the call information of the external contact, and people other than the user will also You can answer and view the incoming call information. For some private calls, being seen or answered by external contacts will inevitably cause embarrassment or leak the user's personal privacy, causing a bad experience for the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call authentication method, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following description with reference to the accompanying drawings is provided to facilitate a comprehensive understanding of various embodiments of the present application as defined by the claims and their equivalents. These examples include various specific details to facilitate understanding, but these are to be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the various embodiments described herein can be made without departing from the scope and spirit of the application. Also, the present application will omit descriptions of well-known functions and constructions in order to briefly and clearly describe the present application.

[0058]The terms and phrases used in the following description and claims are not limited to the bibliographical meanings, but merely to enable a clear and consistent understanding of the application. Accordingly, it will be understood by those skill...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of smart terminals, in particular to a call authentication method, and a terminal. The method is applied to the terminal, and comprises the following steps: acquiring identity information of a user when a call request from a caller is received; judging whether the identity information is identical to preset identity information or not; if the identity information is identical to the preset identity information, activating a first answering mode and a second answering mode; if the identity information is not identical to the preset identity information, only activating the first answering mode; identifying the answering mode selected by the user when the user answers the call request; and triggering a call mode associated with the answering modefor a call between the user and the caller, wherein the answering modes comprise the first answering mode and the second answering mode, and the call modes comprise a call protection mode associated with the first answering mode, and a normal call mode associated with the second answering mode. The call authentication method and the terminal provided by the invention have the advantages that the user can be distinguished from other people through the different call modes, so that the call privacy of the user is protected.

Description

technical field [0001] The present application relates to the technical field of intelligent terminals, and in particular to an authenticated call method and terminal. Background technique [0002] Due to its combination of convenience and entertainment, terminals such as mobile phones have increasingly become an indispensable part of people's daily life. With the continuous development of smart terminal technology, terminals such as mobile phones have more and more functions. People have higher and higher requirements for mobile phones and other terminals. While enjoying the basic functions brought by mobile phones and other terminals, people also put forward higher requirements for the security, humanization and intelligence level of mobile phones and other terminals. [0003] In real life, people use terminal devices such as mobile phones to make calls, etc. In the prior art, when the terminal used by the user receives a call request from an external contact, it will disp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04M1/725
CPCH04W12/02H04W12/06H04M1/72484
Inventor 王潇滨张志勇
Owner SHANGHAI IUV SOFTWARE DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products