CN108184212B - Safe call connection method - Google Patents

Safe call connection method Download PDF

Info

Publication number
CN108184212B
CN108184212B CN201711444893.9A CN201711444893A CN108184212B CN 108184212 B CN108184212 B CN 108184212B CN 201711444893 A CN201711444893 A CN 201711444893A CN 108184212 B CN108184212 B CN 108184212B
Authority
CN
China
Prior art keywords
call
user
password
operation instruction
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711444893.9A
Other languages
Chinese (zh)
Other versions
CN108184212A (en
Inventor
张毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIAGUTECH Co.,Ltd.
Nanjing nanjizhi agricultural machinery science and Technology Research Institute Co., Ltd
Original Assignee
Jiagutech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiagutech Co ltd filed Critical Jiagutech Co ltd
Priority to CN201711444893.9A priority Critical patent/CN108184212B/en
Publication of CN108184212A publication Critical patent/CN108184212A/en
Application granted granted Critical
Publication of CN108184212B publication Critical patent/CN108184212B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a safe call connection method. The method comprises the following steps: randomly changing a plurality of digits at the tail part of the incoming call number in the secret list into other digits, displaying the changed incoming call number as the incoming call number, receiving an operation instruction of a user, comparing whether the operation instruction of the user is consistent with a preset operation instruction, if so, entering a password input interface, comparing whether an input password is consistent with a preset password, and if so, switching on the call. The invention can effectively prevent other people from receiving the mobile phone of the user without permission when the mobile phone is beside the user, thereby causing the leakage of the related privacy or confidential information of the user, effectively protecting the information security of the mobile phone user, being difficult for the receiver to find that the user is protected intentionally, and having excellent use effect.

Description

Safe call connection method
Technical Field
The invention belongs to the field of mobile phone secure call, and particularly relates to a secure call connection method.
Background
With the development of economy and the improvement of living standard of people, mobile communication technology is widely applied, and mobile phones are owned by more and more users as portable mobile communication tools. With the popularization of mobile phones and the enhancement of the functions of mobile phones, mobile phones have evolved from a simple communication tool to a multifunctional electronic portable device. Thereby providing a lot of convenience for the daily life and use of the consumers.
Recently, economic or social problems are often caused by technical information and various privacy leaks, and further, the problems are solved
The concern of protecting personal privacy is on an increasing trend. However, in the currently widely used smart phone, when a user forgets to take the smart phone, if the smart phone has an incoming call, anyone can answer the icon through an operation instruction to make a call, so that a call security problem that privacy is accidentally disclosed may be caused.
At present, some protective measures for preventing other people from answering such as password answering are started, but the method is not perfect, although other people cannot input passwords to answer a call, the number can be recorded and the caller can be contacted through other mobile phones, so that the identity or other information of the caller is leaked, secondly, a confidential object is not reliably protected, and if the mobile phone of a user is answered by the caller in an unlocked state, the listener can see the related information of the confidential object through a related interface. Moreover, the existing interface for preventing others from answering is too obvious, so that others can easily find that the mobile phone user carelessly protects the relevant privacy or confidentiality, misunderstanding or guessing of others is easy, and the using effect is poor.
Disclosure of Invention
The invention aims to provide a safe call connection method aiming at the defects in the prior art.
In order to achieve the above object, the present invention provides a secure call connection method, including:
the tail multi-digit digits of the incoming call number in the secret list are randomly changed to other digits,
and displays the changed incoming call number as an incoming call number,
receiving an operation instruction of a user, and sending the operation instruction,
comparing whether the operation instruction of the user is consistent with the preset operation instruction, if so, entering a password input interface,
and comparing whether the input password is consistent with the preset password, and if so, switching on the call.
Preferably, when the operation instruction of the user is compared with the preset operation instruction, the call is connected, the voice signal of the calling party is shielded for the preset time after the call is connected, and then the call is hung up, and the voice signal of the answering party is transmitted to the calling party.
Preferably, when the operation instruction of the user is compared to be inconsistent with a preset operation instruction, the call record of the time is synchronized into the call record, and when the operation instruction of the user is compared to be consistent with the preset operation instruction, the call record of the time is not synchronized into the call record.
Preferably, the password comprises a numeric combination password, a squared figure password or a line graph password of a dragging operation instruction.
Preferably, the operation instruction for entering the password input interface is to click the HOME key 3 times.
Preferably, the number of times that the operation command of the comparison user does not match the preset operation command is accumulated, and the number is prohibited from incoming for the set accumulated number of times and the call prohibition time.
Preferably, the accumulated number of times and the call barring time are:
the accumulation is continued for 2 times, the inhibition is carried out for 1 hour,
the accumulation was continued for 3 times, prohibited for 4 hours,
the accumulation is continued for more than 4 times and prohibited for 24 hours.
Preferably, the setting and storage interface of the secret list is provided with an entry password, a blank memorandum is displayed before a correct entry password is input, and the setting and storage interface of the secret list is displayed after the correct entry password is input in the memorandum.
Has the advantages that: the invention can effectively prevent other people from receiving the mobile phone of the user without permission when the mobile phone is beside the user, thereby causing the leakage of the related privacy or confidential information of the user, effectively protecting the information security of the mobile phone user, being difficult for the receiver to find that the user is protected intentionally, and having excellent use effect.
Drawings
Fig. 1 is a flow chart of a secure call connection method according to an embodiment of the present invention;
FIG. 2 is a flow diagram of entering a privacy list setup and storage interface.
Detailed Description
The present invention will be further illustrated by the following specific examples, which are carried out on the premise of the technical scheme of the present invention, and it should be understood that these examples are only for illustrating the present invention and are not intended to limit the scope of the present invention.
Fig. 1 is a flowchart of a secure call connection method according to an embodiment of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a secure call connection method, which is implemented based on a smart phone.
In step 101, the number to be securely called is preset in the secret list, when a call comes from a number in the secret list, the mobile phone processes the incoming call number, wherein the process is to randomly change the tail multiple digits of the incoming call number in the secret list into other digits, and display the changed incoming call number as the incoming call number. Only the changed number is displayed in the caller ID without displaying the user name of the number. Generally, 5 to 8 digits at the end of the mobile phone number can be selected to be changed, and 3 digits in front of the mobile phone number are not changed. When the user of the mobile phone is not present and other people see the incoming call display, the displayed number is still like a normal mobile phone number. However, even if the displayed number is recorded by others, the real person dialing the phone call cannot be contacted through other mobile phones, so that information leakage in the secret list set by the user can be avoided.
In step 102, the mobile phone receives an operation instruction of a user.
In step 103, in order to prevent others from seeing that a certain contact person is intentionally hidden by a user, when a call comes from a number in a privacy list, the interface displayed on the mobile phone is the same as that displayed on a normal number call, the displayed contents include a call-on key, a hang-up key, and the like, and a password input area is not displayed. An operation instruction for entering the password input interface is preset in the mobile phone, for example, an HOME key or a voice key is clicked, and in order to prevent a listener from easily entering the password input interface by mistake, the number of times of clicking the HOME key or the voice key is preferably set to be more than 2 times. When a call comes from a number in the secret list, a user can enter a password input interface by executing a preset operation instruction. The mobile phone compares whether the operation instruction of the user is consistent with the preset operation instruction or not, and the mobile phone can enter the password input interface only when the executed operation instruction is consistent with the preset operation instruction.
In step 104, since the interface displayed by the mobile phone is the same as the interface displayed by the ordinary number caller, when the general call is answered by pressing down or sliding the answer button, the operation instruction of the user is different from the operation instruction of the pre-selected and set password input interface, but the call can be directly connected, but after the call is connected, the mobile phone can shield the voice signal of the caller, so that the listener can not hear the voice of the caller, when the set time is reached after the call is connected, the call is automatically hung up, and the connection time is preferably set to be 1-3 seconds. During the switching on period, the voice signal of the receiver can be normally transmitted to the calling party, so that the calling party can hear the voice of the receiver. After the calling party hears the sound of the receiver, the user of the receiver, other than the mobile phone, can be judged, and an incorrect answering mode is adopted. Therefore, abnormal call caused by the fact that the calling party mistakenly thinks that the calling party is a signal problem can be avoided, and the calling party can be prevented from dialing the mobile phone again after the call is stopped. Because the call is connected, the receiver can not hear the sound because the receiver thinks that the signal problem is caused, and the privacy of a certain contact person can not be set by the user of the mobile phone, thereby protecting the personal privacy of the mobile phone user.
In step 105, after entering the password input interface, the user can input the password of the phone call, and the mobile phone compares whether the input password of the phone call is consistent with the preset password, and the phone call is connected when the input password is consistent with the preset password. The password for connecting the telephone can be set as a digital combination password, a Sudoku gesture password or a line graph password of a dragging operation instruction.
In step 106, when the password input is inconsistent, a prompt for inputting the password again to answer is displayed.
In step 107, when the operation instruction of the comparison user is inconsistent with the preset operation instruction, the mobile phone synchronizes the call record to the call record, the mobile phone user can see the incoming call of the other party by looking up the call record, and the synchronized mobile phone number in the call record is the number after the random conversion of the tail. The mobile phone user can find the corresponding contact in the secret list according to the first digits without random change, and can find the incoming call and reply to the opposite party in time. If others refer to the call records privately, the numbers referred are changed numbers without using purpose, and the privacy of the mobile phone user cannot be stolen.
In step 108, when the operation instruction of the user is compared to be consistent with the preset operation instruction, the mobile phone will not synchronize the call record into the call record. After a part of correct answering operation instructions are executed, the call record is not stored, so that others are prevented from finding the call record.
In step 109, if the other person takes an incorrect call to answer when the secret number is called, in this case, in order to prevent the caller from frequently dialing the mobile phone and making the other person doubtful, the first incorrect answer is set not to be forbidden, when the incorrect answer is more than two times, the number is forbidden according to the set accumulated incorrect answer times and the forbidden incoming call time, and when the number is called in the forbidden state, the calling party is prompted by voice, such as "in call" or "no person answer". And when the operation instruction of the comparison user is inconsistent with the preset operation instruction, determining that the answer is wrong. The preferred cumulative number of times and the call barring time are set as: accumulating 2 times of continuous error answering, forbidding 1 hour, accumulating 3 times of continuous error answering, forbidding 4 hours, accumulating more than 4 times of continuous error answering and forbidding 24 hours. And other wrong answering times and corresponding call-in forbidding time can be set according to actual needs. And after correct answering, clearing the accumulated times.
FIG. 2 is a flow chart of setting and storing a secret list according to an embodiment of the present invention
In order to prevent others from obtaining confidential contact data from the setting and storage interface of the confidential list. The setting of the secret list and the storage interface are provided with the entering password, namely, the secret list is protected by the password. In order to prevent others from discovering the abnormality, the interface for inputting the password in the embodiment of the invention preferably does not adopt a traditional password input interface, so that others can easily discover the privacy content with the password protection stored inside.
In step 201, the user enters a setup and store menu for the privacy list.
In step 202, the mobile phone displays a blank memo interface or a blank short message interface.
In step 203, the mobile phone determines whether the password entered by the user in the blank memo interface is correct.
In step 204, if the password entered in the blank memo interface is correct, the mobile phone displays a setup and storage interface of the secret list for the user to set up, refer or otherwise operate.
In step 205, if no password is entered in the blank memo or the entered password is incorrect, the handset will keep displaying the interface of the blank memo.
The invention can effectively prevent other people from receiving the mobile phone of the user without permission when the mobile phone is beside the user, thereby causing the leakage of the related privacy or confidential information of the user, effectively protecting the information security of the mobile phone user, being difficult for the receiver to find that the user is protected intentionally, and having excellent use effect.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (6)

1. A secure call connection method is characterized by comprising the following steps:
randomly changing the tail multi-digit number of the incoming call number in the secret list into other digits, displaying the changed incoming call number as the incoming call number,
receiving an operation instruction of a user, and sending the operation instruction,
comparing whether the operation instruction of the user is consistent with the preset operation instruction, if so, entering a password input interface,
comparing whether the input password is consistent with the preset password, if so, connecting the call;
when the operation instruction of the user is not consistent with the preset operation instruction, the call is connected, after the call is connected, the voice signal of the calling party is shielded for the preset time and then hung up, and the voice signal of the answering party is transmitted to the calling party;
and accumulating the times of inconsistency between the operation instruction of the comparison user and the preset operation instruction, and forbidding the number to call according to the set accumulated times and the call forbidding time.
2. The method according to claim 1, wherein the call record is synchronized to the call record when the operation command of the user is compared to be inconsistent with a preset operation command, and the call record is not synchronized to the call record when the operation command of the user is compared to be consistent with the preset operation command.
3. The secure call connection method according to claim 1, wherein the password comprises a combination of numbers password, a squared gesture password, or a line graph password of a drag operation command.
4. The secure call connection method according to claim 1, wherein the operation instruction for entering the password input interface is to click an HOME key 3 times.
5. The secure call connection method according to claim 1, wherein the accumulated number of times and the call prohibition time are:
the accumulation is continued for 2 times, the inhibition is carried out for 1 hour,
the accumulation was continued for 3 times, prohibited for 4 hours,
the accumulation is continued for more than 4 times and prohibited for 24 hours.
6. The method as claimed in claim 1, wherein the setup and storage interface of the secret list is provided with an entry password, a blank memo is displayed before a correct entry password is entered, and the setup and storage interface of the secret list is displayed after a correct entry password is entered in the memo.
CN201711444893.9A 2017-12-27 2017-12-27 Safe call connection method Active CN108184212B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711444893.9A CN108184212B (en) 2017-12-27 2017-12-27 Safe call connection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711444893.9A CN108184212B (en) 2017-12-27 2017-12-27 Safe call connection method

Publications (2)

Publication Number Publication Date
CN108184212A CN108184212A (en) 2018-06-19
CN108184212B true CN108184212B (en) 2021-05-04

Family

ID=62547669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711444893.9A Active CN108184212B (en) 2017-12-27 2017-12-27 Safe call connection method

Country Status (1)

Country Link
CN (1) CN108184212B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104868A (en) * 2009-12-17 2011-06-22 深圳富泰宏精密工业有限公司 Private calling system and method
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102938801A (en) * 2012-10-30 2013-02-20 北京小米科技有限责任公司 Method and device for processing private messages
CN103002117A (en) * 2011-09-15 2013-03-27 胡光力 Phone information encryption method and phone information encryption system
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal
CN105187672A (en) * 2015-10-30 2015-12-23 宁波萨瑞通讯有限公司 Incoming call answering method and mobile terminal
CN105491207A (en) * 2014-09-15 2016-04-13 北京壹人壹本信息科技有限公司 Communication prompt method and system for private contact person, and mobile terminal
CN106534586A (en) * 2016-12-19 2017-03-22 北京奇虎科技有限公司 Mobile terminal and contact person information processing method and device thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104868A (en) * 2009-12-17 2011-06-22 深圳富泰宏精密工业有限公司 Private calling system and method
CN103002117A (en) * 2011-09-15 2013-03-27 胡光力 Phone information encryption method and phone information encryption system
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102938801A (en) * 2012-10-30 2013-02-20 北京小米科技有限责任公司 Method and device for processing private messages
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal
CN105491207A (en) * 2014-09-15 2016-04-13 北京壹人壹本信息科技有限公司 Communication prompt method and system for private contact person, and mobile terminal
CN105187672A (en) * 2015-10-30 2015-12-23 宁波萨瑞通讯有限公司 Incoming call answering method and mobile terminal
CN106534586A (en) * 2016-12-19 2017-03-22 北京奇虎科技有限公司 Mobile terminal and contact person information processing method and device thereof

Also Published As

Publication number Publication date
CN108184212A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
US20070021103A1 (en) Method of protecting information in a mobile communication device
CN105491207B (en) A kind of private contact communication prompting method, system and mobile terminal
CN104967748A (en) Application service safe operation method
US20140245457A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
CN101827148A (en) Fingerprint identification system applied to mobile phone and operating method thereof
WO2014131308A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN101895633A (en) Mobile terminal and unlocking method thereof
CN104038613B (en) The method and apparatus of information security management
CN104333662A (en) Mobile terminal and encrypting method and device for telephone answering of mobile terminal
CN103188371A (en) Private communication method and communication terminal
CN102238286B (en) Call record concealing method and system
CN101483861A (en) Method for mobile phone information safety protection
CN103269402A (en) System and method for protecting mobile phone privacy
CN104468988B (en) A kind of mobile terminal and the telephone receiving method and apparatus under non-security mode thereof
CN103338314A (en) Method for realizing information safety through conversation and mobile terminal thereof
CN101656966A (en) Data protection method of mobile terminal, device thereof and mobile terminal
CN105516500B (en) Method and system for selecting equipment mode
WO2011088660A1 (en) Method and apparatus for protecting cell-phone information content
CN108184212B (en) Safe call connection method
WO2017020598A1 (en) Contact information management method, apparatus and terminal
CN106714147A (en) Privacy short message protection method
CN1394427A (en) Method for automatic concealed dialling reporting loss of mobile telephone
CN105898025A (en) Stolen mobile terminal finding method and device
KR101560402B1 (en) Apparatus and method of providing automatic lock function in mobile communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220129

Address after: Room 211, Tsinghua Lihe building, No. 1, Xingzhi Road, Jiangbei new area, Nanjing, Jiangsu 210000

Patentee after: JIAGUTECH Co.,Ltd.

Patentee after: Nanjing nanjizhi agricultural machinery science and Technology Research Institute Co., Ltd

Address before: 210000 Room 501, block a, animation building, No. 11, Xinghuo Road, high tech Zone, Nanjing, Jiangsu Province

Patentee before: JIAGUTECH Co.,Ltd.

TR01 Transfer of patent right