CN107786731A - One kind incoming call method for secret protection, mobile terminal and computer-readable recording medium - Google Patents
One kind incoming call method for secret protection, mobile terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107786731A CN107786731A CN201710897371.8A CN201710897371A CN107786731A CN 107786731 A CN107786731 A CN 107786731A CN 201710897371 A CN201710897371 A CN 201710897371A CN 107786731 A CN107786731 A CN 107786731A
- Authority
- CN
- China
- Prior art keywords
- incoming call
- information
- user
- incoming
- secret protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Abstract
The invention discloses one kind incoming call method for secret protection, receiving incoming calling;Before the incoming call is answered, judge whether to receive the touch command pre-set;In the case where the judgment result is yes, secret protection processing is carried out to information corresponding to the incoming call according to the touch command.The invention also discloses a kind of mobile terminal and computer-readable recording medium; solve the problems, such as that secret incoming call does not expose its true identity information in correlation technique; the relevant information that secret is sent a telegram here by predetermined touch instruction carries out secret protection; avoid user not want to allow other people to see the embarrassment of secret incoming information, improve Consumer's Experience.
Description
Technical field
The present invention relates to mobile communication technology field, more particularly to a kind of incoming call method for secret protection, mobile terminal and
Computer-readable recording medium.
Background technology
With the development of mobile Internet and the popularization of intelligent mobile terminal, the customer group of intelligent mobile terminal is increasingly
Greatly, more intelligence, the demand of hommization while are also proposed to software.
In existing technology, intelligent mobile terminal in fact, although may be used also by user as a game machine or television set
Can be a learning machine, it is also possible to as paradise of baby etc., more enjoyment are brought to our life.With user
Enhancing to mobile terminal dependence, the secretary of mobile terminal is also more and more, and secret protection compares asking for care as user
Topic.
Existing mobile terminal usually includes the name of incoming person or telephone number in movement when receiving incoming call
On the screen of terminal.Although call reminding effect can be effectively played to mobile terminal user in this way,
The information of contact person can be revealed.When some incoming calls of user are not intended to be seen by other people of periphery, it is possible to user
Make troubles.
In actual applications, incoming call includes contact number or stranger's number, even harasses number, for harassing and wrecking
The processing of phone mainly includes the incoming call for being detected as harassing call is reminded or shielded, but important for some
Or how private stronger incoming call it is true ensure that some important secrets incoming calls do not expose its but without relatively good processing mode
The problem of real identity information, it is to need to solve the problems, such as incoming call handling at present.
For the problem of secret incoming call does not expose its true identity information in correlation technique, solution party is not yet proposed at present
Case.
The content of the invention
It is a primary object of the present invention to propose a kind of incoming call method for secret protection, mobile terminal and computer-readable deposit
Storage media, it is intended to solve the problems, such as that secret incoming call does not expose its true identity information in correlation technique.
To achieve the above object, the embodiment of the present invention proposes a kind of incoming call method for secret protection, including:
Receiving incoming calling;
Before the incoming call is answered, judge whether to receive the touch command pre-set;
In the case where the judgment result is yes, information corresponding to the incoming call is carried out according to the touch command hidden
Private protection processing.
Optionally, carrying out secret protection processing to information corresponding to the incoming call according to the touch command includes:
Terminate the jingle bell of the incoming call according to the touch command;
Information corresponding to the incoming call is hidden when the screen of mobile terminal is lighted again.
Optionally, carrying out secret protection processing to information corresponding to the incoming call according to the touch command includes:
After the incoming call is answered, the message registration of incoming call described in the mobile terminal is removed.
Optionally, carrying out secret protection processing to information corresponding to the incoming call according to the touch command includes:
Obtain information corresponding to the incoming call;
Determine to be used to replace the incoming call pair according to the corresponding relation of the information pre-set and Virtual User information
The Virtual User information for the presentation of information answered;
Show the Virtual User information.
Optionally, carrying out secret protection processing to information corresponding to the incoming call according to the touch command includes:
Obtain information corresponding to the incoming call;
The information according to corresponding to the corresponding relation that the information pre-set identifies with user determines the incoming call is corresponding
User mark;
The user profile according to corresponding to user mark obtains from address list;
Show the user profile.
Optionally, it is being handled to information progress secret protection corresponding to the incoming call according to the touch command
Afterwards, methods described also includes:
If receive the finger print information for verifying identity;
In the case of according to the finger print information by authentication, the normal display institute after incoming call connection
State information corresponding to incoming call.
Optionally, the touch command includes one below:Pressing for the touch-screen scheduled time is pressed by palm or finger
Pressure instruction, the pressing that the touch-screen scheduled time is pressed by the finger of predetermined quantity instruct, by being controlled by the breath screen of power key
Instruction.
Optionally, information corresponding to the incoming call includes caller ID and user's name.
Another aspect according to embodiments of the present invention, additionally provides a kind of mobile terminal, and the mobile terminal includes processing
Device, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the incoming call secret protection program stored in memory, to realize following steps:
Receiving incoming calling;
Before the incoming call is answered, judge whether to receive the touch command pre-set;
In the case where the judgment result is yes, information corresponding to the incoming call is carried out according to the touch command hidden
Private protection processing.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
Terminate the jingle bell of the incoming call according to the touch command;
Information corresponding to the incoming call is hidden when the screen of mobile terminal is lighted again.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
After the incoming call is answered, the message registration of incoming call described in the mobile terminal is removed.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
Obtain information corresponding to the incoming call;
Determine to be used to replace the incoming call pair according to the corresponding relation of the information pre-set and Virtual User information
The Virtual User information for the presentation of information answered;
Show the Virtual User information.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
Obtain information corresponding to the incoming call;
The information according to corresponding to the corresponding relation that the information pre-set identifies with user determines the incoming call is corresponding
User mark;
The user profile according to corresponding to user mark obtains from address list;
Show the user profile.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
After secret protection processing is carried out to information corresponding to the incoming call according to the touch command, if receiving
To the finger print information for verifying identity;
In the case of according to the finger print information by authentication, the normal display institute after incoming call connection
State information corresponding to incoming call.
Optionally, the touch command includes one below:Pressing for the touch-screen scheduled time is pressed by palm or finger
Pressure instruction, the pressing that the touch-screen scheduled time is pressed by the finger of predetermined quantity instruct, by being controlled by the breath screen of power key
Instruction.
Optionally, information corresponding to the incoming call includes caller ID and user's name.
Another aspect according to embodiments of the present invention, additionally provide a kind of computer-readable recording medium, the computer
Readable storage medium storing program for executing is stored with one or more program, and one or more of programs can be by one or more processor
Perform, the step of to realize above-mentioned incoming call method for secret protection.
Pass through the present invention, receiving incoming calling;Before the incoming call is answered, judge whether to receive what is pre-set
Touch command;In the case where the judgment result is yes, information corresponding to the incoming call is carried out according to the touch command
Secret protection is handled, and solves the problems, such as that secret incoming call does not expose its true identity information in correlation technique, passes through predetermined touch
The relevant information of secret incoming call is carried out secret protection by instruction, is avoided user and is not wanted to allow other people to see the awkward of secret incoming information
A word used for translation, improve Consumer's Experience.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing each one optional mobile terminal of embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the flow chart of incoming call method for secret protection according to embodiments of the present invention;
Fig. 4 is according to embodiments of the present invention according to the gesture operation of the hand-written specific character of user adjustment caller identification interface
Schematic diagram one;
Fig. 5 is according to embodiments of the present invention according to the gesture operation of the hand-written specific character of user adjustment caller identification interface
Schematic diagram two;
Fig. 6 is the schematic diagram of mobile terminal according to embodiments of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out whole monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers
Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc.
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Embodiment 1
Based on above-mentioned mobile terminal, the embodiments of the invention provide one kind incoming call method for secret protection, Fig. 3 is according to this
The flow chart of the incoming call method for secret protection of inventive embodiments, as shown in figure 3, this method comprises the following steps:
Step S301, receiving incoming calling;
Step S302, before the incoming call is answered, judge whether to receive the touch command pre-set;
Step S303, in the case where the judgment result is yes, according to the touch command to corresponding to the incoming call
Information carries out secret protection processing.
By above-mentioned steps, receiving incoming calling, before the incoming call is answered, judge whether to receive and pre-set
Touch command, in the case where the judgment result is yes, information corresponding to the incoming call is entered according to the touch command
Row secret protection is handled, and solves the problems, such as that secret incoming call does not expose its true identity information in correlation technique, is touched by predetermined
The relevant information of secret incoming call is carried out secret protection by control instruction, is avoided user and is not wanted to allow other people to see secret incoming information
Embarrassment, improve Consumer's Experience.
Had much according to the mode that the touch command carries out secret protection processing to information corresponding to the incoming call
In, in an optional embodiment, information corresponding to incoming call directly can not be shown, is specifically included:Touched according to described
Control the jingle bell of incoming call described in order fulfillment;Hidden when the screen of mobile terminal is lighted again corresponding to the incoming call
Information.Optionally, carrying out secret protection processing to information corresponding to the incoming call according to the touch command includes:Connecing
After listening the incoming call, the message registration of incoming call described in the mobile terminal is removed.
In another optional embodiment, information corresponding to the incoming call is carried out according to the touch command hidden
Information corresponding to incoming call can also be substituted for the information set before by private protection processing, in one embodiment,
It can include:Obtain information corresponding to the incoming call;Closed according to the information pre-set is corresponding with Virtual User information
System determines to be used for the Virtual User information for replacing presentation of information corresponding to the incoming call;Show the Virtual User information.
In another embodiment, can also include:Obtain information corresponding to the incoming call;According to the information that pre-sets with
The corresponding relation of user's mark determines that user corresponding to information corresponding to the incoming call identifies;According to the user mark from
User profile corresponding to being obtained in address list;Show the user profile.
Optionally, it is not desired to carry out the incoming call situation of secret protection again after secret protection is triggered in user
Under, user can be inputted by fingerprint and release secret protection, can be with tactile before cancelling as long as that is, user has passed through fingerprint authentication
The secret protection of hair, after secret protection processing is carried out to information corresponding to the incoming call according to the touch command,
If receive the finger print information for verifying identity;In the case of according to the finger print information by authentication, described
Incoming call normally shows information corresponding to the incoming call after connecting.
Above-mentioned touch command includes one below:The pressing of the touch-screen scheduled time is pressed by palm or finger to refer to
Order, the pressing that the touch-screen scheduled time is pressed by the finger of predetermined quantity instruct, and pass through the breath screen control instruction by power key.
Information corresponding to incoming call in the embodiment of the present invention includes caller ID and user's name.
When a call comes, if user is not intended to this phone and known by others, screen can be pushed down by using palm or by power supply
Key puts out screen, and now this is taken on the telephone no longer jingle bell, and the information such as number, contact person are not shown when screen is lighted again, no matter connecing
Whether listen, message registration will not be produced.This function comes into force when incoming call is not turned on, if phone has been turned on, performs above-mentioned steps
Also concealment pattern will not be entered.
In an optional embodiment, if receiving incoming telephone signal, obtain and hide incoming information;Wherein, it is described
Incoming information includes incoming call connection people's information.
Terminal obtains current incoming information when receiving the incoming telephone signal of other-end transmission.Incoming information includes
Incoming call connection people's information.It is understood that this terminal, when receiving the message of other-end transmission, terminal can also be hidden
Message content and the account for sending the message.The account can be telephone number or the account of other social networking applications,
The account can be corresponding with name.Wherein, the incoming call connection people included in the hiding incoming information of terminal can be included in end
In the address list at end, it can not also be included in the address list of terminal (i.e. stranger).
Incoming call sound function is shielded, the incoming telephone signal is prompted to user.Terminal shields incoming call sound function, and in the future
Electric signal is prompted to user.Wherein, terminal can shield incoming call sound function by locking call interface, can also be by hiding
Call interface shields incoming call sound function, to prevent unauthorized user incoming call answering.During terminal locking call interface, terminal is not rung
The answer command inputted using family.When terminal hides call interface, user can not send answer command.Terminal can pass through shake
One of which or at least two any combination mode remind user to be currently received to carry out telecommunications in dynamic, jingle bell, flashing indicator light
Number, but this is not limited to, user can also be prompted by other method, can be specifically configured according to actual conditions, herein not
It is construed as limiting.
Proof of identity is carried out to active user, terminal obtains the identity information of active user and believes the identity got
Breath with default identity information compared with, so as to judge the identity information of active user and default identity information whether
Match somebody with somebody.Wherein, default identity information is identity information corresponding to the authorized user pre-saved.Identity information is used to identify currently
Whether user is authorized user.Identity information can be the password being made up of numeral and/or letter or be known by face
The facial feature information that other technical limit spacing arrives, can also be the physiological characteristic informations such as fingerprint, but be not limited to this.Identity information can
Including one kind, may also comprise at least two.If the identity information of active user matches with default identity information, terminal is true
Recognize current user identities verification to pass through, active user is authorized user.If the identity information of active user and default identity
Information mismatches, and the verification failure of terminal check current user identities, active user is unauthorized user.Judge the body of active user
Part information can be with the method whether default identity information matches:Judge the identity information of active user and default identity
Whether information consistent, or both matching degree be more than or equal to predetermined threshold value, for example, matching degree is more than or equal to 80%, but simultaneously
Not limited to this, predetermined threshold value can be configured according to actual conditions.
Terminal is without any processing when confirming current user identities verification failure, can also terminate this flow.
Terminal, if current user identities verification passes through, shows institute when confirming that current user identities verification passes through
State incoming information and activate the incoming call sound function.The verification of terminal check current user identities is when passing through, and shows and hiding comes
Power information, so that user checks;And the incoming call sound function of shielding is activated, allow the user to send answer command.Terminal can
So that when receiving the answer command of active user's transmission, call connection is established with other-end, can also be connect in activation incoming call
During auditory function, automatic establish is connected with the call of other-end.It is understood that terminal can also show hiding disappear
Breath.
Such scheme, if terminal receives incoming telephone signal, obtain and hide incoming information;Incoming call sound function is shielded,
Incoming telephone signal is prompted to user;If passed through to current user identities verification, show incoming information and activate incoming call sound work(
Can, privacy of user can be effectively protected, ensures contact information of customer safety.
In another optional embodiment, if receiving incoming telephone signal, obtain and hide incoming information;Wherein, institute
Stating incoming information includes incoming call connection people's information.Terminal obtains current when receiving the incoming telephone signal of other-end transmission
Incoming information.Incoming information includes incoming call connection people's information.Incoming call connection people information includes name, telephone number etc..It can manage
Solution, when receiving the message of other-end transmission, terminal can also hide message content and send this to disappear this terminal
The account of breath.The account can be telephone number or the account of other social networking applications, and the account can be relative with name
Should.Wherein, the incoming call connection people included in the hiding incoming information of terminal can be included in the address list of terminal, can also not
It is included in the address list of terminal (i.e. stranger).
Further, if receiving incoming telephone signal, obtain incoming information and judge whether to find and the incoming call
The associated person information of information matches;If finding the associated person information matched with the incoming information, hide it is described come telecommunications
Breath.For example, terminal receive other-end transmission incoming telephone signal when, obtain incoming information and judge whether to find with
The associated person information for incoming call connection people's information matches that incoming information includes.If find the contact person matched with incoming information
Information, terminal hide current incoming information.If terminal can not find the associated person information matched with incoming information, terminal
Current incoming information is not hidden, terminates this flow.Now, user can check incoming information and incoming call answering.
Terminal shields incoming call sound function, by the incoming call when finding the associated person information matched with incoming information
Signal prompt is to user.Terminal shields incoming call sound function, and incoming telephone signal is prompted into user.Wherein, terminal can pass through
Call interface shielding incoming call sound function is locked, incoming call sound function can also be shielded by hiding call interface, it is non-to prevent
Authorized user's incoming call answering.During terminal locking call interface, terminal is not responding to the answer command of user's input.Terminal hides incoming call
During interface, user can not send answer command.Terminal can by one of which in vibrations, jingle bell, flashing indicator light or at least
Two kinds of any combination mode reminds user to be currently received incoming telephone signal, but is not limited to this, can also pass through other method
User is prompted, can be specifically configured according to actual conditions, be not construed as limiting herein.
Proof of identity is carried out to active user, terminal obtains the identity information of active user and believes the identity got
Breath with default identity information compared with, so as to judge the identity information of active user and default identity information whether
Match somebody with somebody.Wherein, default identity information is identity information corresponding to the authorized user pre-saved.Identity information is used to identify currently
Whether user is authorized user.Identity information includes facial feature information, the fingerprint got by face recognition technology, but simultaneously
Not limited to this, it can also be other physiological characteristic informations.Identity information can include one kind, may also comprise at least two.
Further, judge whether to get grip data;If getting grip data, identity is carried out to active user
Verification.For example, terminal examines the data measured in real time by being obtained from the sensor of band, judged according to the data that Sensor monitoring arrives
Whether grip data are got, if getting grip data, terminal recognition is that user currently holds terminal, and terminal-pair is currently used
Family carries out proof of identity.Wherein, sensor can be pressure sensor, capacitance sensor or light sensor etc., not make herein
Limit.For example terminal monitoring changes to the pressure value of side or when illumination value changes, it is hand-held eventually to be identified as user
End.Wherein, terminal can also identify that current grip state is held for left hand, right hand grip or both hands grip.
Further, terminal-pair active user, which carries out proof of identity, includes:Verified by face recognition technology described current
The facial feature information of user, and the finger print information of the verification active user.The step of facial information verifies includes:Terminal
When getting grip data, start the face image of camera collection active user, schemed by face recognition technology from face
The facial feature information of active user is obtained as in, the face of the facial feature information got and the authorized user to prestore is special
Reference breath is compared, so as to judge whether facial feature information and the facial feature information of the authorized user to prestore match.
The step of finger print information verifies includes:Terminal obtains the finger print information of active user's input, the fingerprint that will be got
Information is compared with the finger print information of default authorized user, so as to which the finger print information and the default fingerprint that judge to get are believed
Whether breath matches.If the identity information of active user matches with default identity information, terminal check current user identities school
Test by the way that active user is authorized user.If the identity information of active user mismatches with default identity information, terminal is true
Recognize current user identities verification failure, active user is unauthorized user.
The identity information of active user described in the present embodiment matches with default identity information to be referred to:Active user
Identity information it is consistent with default identity information, or both matching degree be more than or equal to predetermined threshold value, for example, matching degree is big
In or equal to 80%, but this is not limited to, predetermined threshold value can be configured according to actual conditions.It is pre- corresponding to facial feature information
If threshold value can be configured according to the accuracy of face recognition technology.
It is understood that in the present embodiment, terminal-pair active user carries out double proof of identity, first gravidity part school
Corresponding facial information verification is tested, the second weight proof of identity corresponds to finger print information verification.In other embodiments or first
Weight proof of identity corresponds to finger print information verification, and the second weight proof of identity corresponds to facial information verification.
First gravidity part checkout transaction fail when, or confirm the first weight, second weight proof of identity by when, if
The facial feature information verification passes through, and shows the incoming information.
When the facial feature information verification of terminal-pair active user passes through, or during the second weight proof of identity failure, display
Hiding incoming information, so that user checks.Now, because pickup feature is shielded, terminal can not be established logical with other-end
Words connection.
Wherein, the weight proof of identity of active user first by when, if facial feature information verification passes through and described
Finger print information verification passes through, and shows the incoming information and activates the incoming call sound function.Terminal check is to active user's
Facial feature information and finger print information verify by when, display incoming information simultaneously activates incoming call sound function.Wherein, terminal
When confirming that current user identities verification passes through, hiding incoming information is shown, so that user checks.Terminal check is to active user
Facial feature information verification pass through, and to finger print information verification pass through when, reactivation shielding incoming call sound function, with use
Family can send answer command.Now, active user can both check incoming information, and terminal can respond answering for user's transmission
Instruction is established and is connected with the call of other-end.
Further, when activating incoming call sound function, the call that can also be established automatically with other-end is connected terminal.
In the present embodiment, terminal-pair active user carries out dual identity verification (facial feature information verification and finger print information school
Test), first time proof of identity by when, show incoming information;First weight proof of identity by and second weight proof of identity lead to
It is out-of-date, reactivation incoming call sound function.
Such scheme, if terminal receives incoming telephone signal, obtain and hide incoming information;Incoming call sound function is shielded,
Incoming telephone signal is prompted to user;If passed through to current user identities verification, show incoming information and activate incoming call sound work(
Can, privacy of user can be effectively protected, ensures contact information of customer safety.
Terminal-pair user carries out twin check, can further improve the security of terminal data, pass through recognition of face skill
Art, fingerprint identification technology carry out proof of identity, rather than are manually entered password and are verified, it is possible to increase verification efficiency.
In another optional embodiment, Fig. 4 is according to embodiments of the present invention according to the hand-written specific character of user
Gesture operation adjusts the schematic diagram one of caller identification interface, such as Fig. 4, user's hand-written word in the caller identification interface of touch-screen
Female " L ".Fig. 5 is according to embodiments of the present invention according to the gesture operation of the hand-written specific character of user adjustment caller identification interface
Schematic diagram two, such as Fig. 5, touch screen controller identifies the letter " L ", obtains alphabetical " L ", is searched in the address list of mobile terminal
Initials are the contact person of " L ", for example, having found the contact person " Mr. Li " that initials are " L ".In incoming call display
Show the information that " Mr. Li " is shown in interface, to replace the information of original real incoming call people " Mr. Wang ".
According to another embodiment, user slides up or down in caller identification interface, for example, user is in incoming call display
Show in interface and slide from top to bottom.Touch screen controller identifies above-mentioned gesture, and obtains the slide downward gesture of user, according to this
Gesture information sends the dimmed instruction of brightness regulation, makes display screen dimmed according to dimmed instruction, so, the people around user can not see
Clear incoming person's information, so as to be effectively protected the privacy of user.Touch is made using the gesture of slide downward in above example
Shield dimmed, it is of course also possible to use the gesture of upward sliding makes touch-screen dimmed, the present invention is not limited the glide direction of gesture
System.
In the above-described embodiments, in addition to control touch-screen is dimmed, its definition can also be adjusted, makes coming for touch-screen
Electric display interface is more fuzzy, so as to further prevent the people around user from seeing the information of incoming person.
Receiving incoming calling, the service provided according to operator, can obtain caller ID.According to caller ID from movement
Corresponding with caller ID associated person information is searched in the local address book of terminal and/or by network from incoming information database
Search incoming person's information corresponding with caller ID.Name of incoming person's information including incoming person, head portrait, address, birthday etc., but
Not limited to this.
The incoming person's information found is shown in caller identification interface.Can be by the complete of the incoming person's information found
Portion's project is shown, can also only show the portion of incoming person's information, the present invention in caller identification interface to showing
The incoming person's information project shown is not restricted.According to a kind of embodiment, name, the phone of incoming person are shown in caller identification interface
Number and head portrait.
Obtain gesture input of the user in caller identification interface.Wherein, gesture input is the gesture of hand-written specific character
Operation.Gesture input can be the gesture operation slided up or down.
Caller identification interface is adjusted according to gesture input., will when gesture input is the gesture operation of hand-written specific character
Incoming person's information in caller identification interface is substituted for a certain contact person that initials in address list are above-mentioned specific character
Information.When gesture input is the gesture operation slided up or down, the brightness of caller identification interface is dimmed.Work as gesture
During the gesture operation for inputting to slide up or down, the definition of caller identification interface is adjusted, is allowed to fog.
According to technical scheme provided by the invention, caller id information can be adjusted in real time by the gesture of user, avoided
The embarrassment that real incoming call information is seen by people around, it can effectively protect the privacy of user.This programme is carried out without user
The extra information of numerous and diverse setting or memory, it is easy to operate, flexible, there is good Consumer's Experience.
Embodiment 2
Another aspect according to embodiments of the present invention, additionally provides a kind of mobile terminal, and Fig. 6 is according to embodiments of the present invention
Mobile terminal schematic diagram, such as Fig. 6, the mobile terminal includes processor, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the incoming call secret protection program stored in memory, to realize following steps:
Receiving incoming calling;
Before the incoming call is answered, judge whether to receive the touch command pre-set;
In the case where the judgment result is yes, information corresponding to the incoming call is carried out according to the touch command hidden
Private protection processing.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
Terminate the jingle bell of the incoming call according to the touch command;
Information corresponding to the incoming call is hidden when the screen of mobile terminal is lighted again.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
After the incoming call is answered, the message registration of incoming call described in the mobile terminal is removed.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
Obtain information corresponding to the incoming call;
Determine to be used to replace the incoming call pair according to the corresponding relation of the information pre-set and Virtual User information
The Virtual User information for the presentation of information answered;
Show the Virtual User information.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
Obtain information corresponding to the incoming call;
The information according to corresponding to the corresponding relation that the information pre-set identifies with user determines the incoming call is corresponding
User mark;
The user profile according to corresponding to user mark obtains from address list;
Show the user profile.
Optionally, the processor is additionally operable to perform incoming call secret protection program, to realize following steps:
After secret protection processing is carried out to information corresponding to the incoming call according to the touch command, if receiving
To the finger print information for verifying identity;
In the case of according to the finger print information by authentication, the normal display institute after incoming call connection
State information corresponding to incoming call.
Optionally, the touch command includes one below:Pressing for the touch-screen scheduled time is pressed by palm or finger
Pressure instruction, the pressing that the touch-screen scheduled time is pressed by the finger of predetermined quantity instruct, by being controlled by the breath screen of power key
Instruction.
Optionally, information corresponding to the incoming call includes caller ID and user's name.
Embodiment 3
Another aspect according to embodiments of the present invention, additionally provide a kind of computer-readable recording medium, the computer
Readable storage medium storing program for executing is stored with one or more program, and one or more of programs can be by one or more processor
Perform, to realize the following steps of above-mentioned incoming call method for secret protection:
S11, receiving incoming calling;
S12, before the incoming call is answered, judge whether to receive the touch command pre-set;
S13, in the case where the judgment result is yes, information corresponding to the incoming call is entered according to the touch command
Row secret protection is handled.
The embodiment of the present invention, receiving incoming calling;Before the incoming call is answered, judge whether to receive and pre-set
Touch command;In the case where the judgment result is yes, information corresponding to the incoming call is entered according to the touch command
Row secret protection is handled, and solves the problems, such as that secret incoming call does not expose its true identity information in correlation technique, is touched by predetermined
The relevant information of secret incoming call is carried out secret protection by control instruction, is avoided user and is not wanted to allow other people to see secret incoming information
Embarrassment, improve Consumer's Experience.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. one kind incoming call method for secret protection, it is characterised in that including:
Receiving incoming calling;
Before the incoming call is answered, judge whether to receive the touch command pre-set;
In the case where the judgment result is yes, privacy guarantor is carried out to information corresponding to the incoming call according to the touch command
Shield processing.
2. according to the method for claim 1, it is characterised in that according to the touch command to corresponding to the incoming call
Information, which carries out secret protection processing, to be included:
Terminate the jingle bell of the incoming call according to the touch command;
Information corresponding to the incoming call is hidden when the screen of mobile terminal is lighted again.
3. according to the method for claim 1, it is characterised in that according to the touch command to corresponding to the incoming call
Information, which carries out secret protection processing, to be included:
After the incoming call is answered, the message registration of incoming call described in the mobile terminal is removed.
4. according to the method for claim 1, it is characterised in that according to the touch command to corresponding to the incoming call
Information, which carries out secret protection processing, to be included:
Obtain information corresponding to the incoming call;
Determine to be used for replace the incoming call according to the information pre-set and the corresponding relation of Virtual User information corresponding
The Virtual User information of presentation of information;
Show the Virtual User information.
5. according to the method for claim 1, it is characterised in that according to the touch command to corresponding to the incoming call
Information, which carries out secret protection processing, to be included:
Obtain information corresponding to the incoming call;
Used according to corresponding to the corresponding relation that the information pre-set identifies with user determines the corresponding information of the incoming call
Family identifies;
The user profile according to corresponding to user mark obtains from address list;
Show the user profile.
6. according to the method for claim 1, it is characterised in that corresponding to the incoming call according to the touch command
Information carry out secret protection processing after, methods described also includes:
If receive the finger print information for verifying identity;
In the case of according to the finger print information by authentication, normally shown after incoming call connection described next
Information corresponding to electricity calling.
7. method according to any one of claim 1 to 6, it is characterised in that the touch command includes one below:
The pressing that the touch-screen scheduled time is pressed by palm or finger is instructed, and the pre- timing of touch-screen is pressed by the finger of predetermined quantity
Between pressing instruction, pass through the breath screen control instruction by power key.
8. according to the method for claim 7, it is characterised in that information corresponding to the incoming call include caller ID and
User's name.
9. a kind of mobile terminal, it is characterised in that the mobile terminal includes processor, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the incoming call secret protection program stored in memory, to realize following steps:
Receiving incoming calling;
Before the incoming call is answered, judge whether to receive the touch command pre-set;
In the case where the judgment result is yes, privacy guarantor is carried out to information corresponding to the incoming call according to the touch command
Shield processing.
A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or
Multiple programs, one or more of programs can be appointed by one or more computing device with realizing in claim 1-8
The step of one incoming call method for secret protection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710897371.8A CN107786731A (en) | 2017-09-28 | 2017-09-28 | One kind incoming call method for secret protection, mobile terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710897371.8A CN107786731A (en) | 2017-09-28 | 2017-09-28 | One kind incoming call method for secret protection, mobile terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107786731A true CN107786731A (en) | 2018-03-09 |
Family
ID=61434297
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710897371.8A Pending CN107786731A (en) | 2017-09-28 | 2017-09-28 | One kind incoming call method for secret protection, mobile terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107786731A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2509310A1 (en) * | 1999-05-17 | 2012-10-10 | Kyocera Corporation | Portable videophone unit |
CN105657124A (en) * | 2016-03-14 | 2016-06-08 | 北京珠穆朗玛移动通信有限公司 | Caller identification method and mobile terminal |
CN105744082A (en) * | 2016-04-13 | 2016-07-06 | 北京小米移动软件有限公司 | Method and device for processing call record and mobile terminal |
US9451072B1 (en) * | 2015-06-25 | 2016-09-20 | Motorola Mobility Llc | Phone call management based on presence of nearby people |
CN106506867A (en) * | 2016-12-14 | 2017-03-15 | 北京珠穆朗玛移动通信有限公司 | A kind of call method and mobile terminal |
CN106953987A (en) * | 2017-04-20 | 2017-07-14 | 北京奇虎科技有限公司 | A kind of call processing method and device and mobile terminal |
-
2017
- 2017-09-28 CN CN201710897371.8A patent/CN107786731A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2509310A1 (en) * | 1999-05-17 | 2012-10-10 | Kyocera Corporation | Portable videophone unit |
US9451072B1 (en) * | 2015-06-25 | 2016-09-20 | Motorola Mobility Llc | Phone call management based on presence of nearby people |
CN105657124A (en) * | 2016-03-14 | 2016-06-08 | 北京珠穆朗玛移动通信有限公司 | Caller identification method and mobile terminal |
CN105744082A (en) * | 2016-04-13 | 2016-07-06 | 北京小米移动软件有限公司 | Method and device for processing call record and mobile terminal |
CN106506867A (en) * | 2016-12-14 | 2017-03-15 | 北京珠穆朗玛移动通信有限公司 | A kind of call method and mobile terminal |
CN106953987A (en) * | 2017-04-20 | 2017-07-14 | 北京奇虎科技有限公司 | A kind of call processing method and device and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108196741A (en) | Application split screen method, terminal and computer readable storage medium based on flexible screen | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN109085990A (en) | A kind of gestural control method, mobile terminal and computer readable storage medium | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN107682547A (en) | A kind of voice messaging regulation and control method, equipment and computer-readable recording medium | |
CN107844231A (en) | A kind of interface display method, mobile terminal and computer-readable recording medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN107392013A (en) | A kind of terminal safety protection method, terminal and computer-readable recording medium | |
CN108039995A (en) | Message sending control method, terminal and computer-readable recording medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN107463255A (en) | A kind of video broadcasting method, terminal and computer-readable recording medium | |
CN108172161A (en) | Display methods, mobile terminal and computer readable storage medium based on flexible screen | |
CN108459814A (en) | Using startup method, mobile terminal and computer readable storage medium | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN107239193A (en) | A kind of contact person's adding method, mobile terminal and computer-readable recording medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107770356A (en) | A kind of communication establishing method, equipment and computer-readable recording medium | |
CN108280334A (en) | A kind of unlocked by fingerprint method, mobile terminal and computer readable storage medium | |
CN110045830A (en) | Application operating method, apparatus and computer readable storage medium | |
CN108124055A (en) | Prompting message control method, flexible screen terminal and computer readable storage medium | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium | |
CN109561221A (en) | A kind of call control method, equipment and computer readable storage medium | |
CN109766211A (en) | Method, terminal and the storage medium of shuangping san false-touch prevention | |
CN107526954A (en) | A kind of right management method, mobile terminal and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180309 |
|
WD01 | Invention patent application deemed withdrawn after publication |