CN110830655B - Call method and device - Google Patents

Call method and device Download PDF

Info

Publication number
CN110830655B
CN110830655B CN201911095073.2A CN201911095073A CN110830655B CN 110830655 B CN110830655 B CN 110830655B CN 201911095073 A CN201911095073 A CN 201911095073A CN 110830655 B CN110830655 B CN 110830655B
Authority
CN
China
Prior art keywords
call
terminal
hang
setting
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911095073.2A
Other languages
Chinese (zh)
Other versions
CN110830655A (en
Inventor
潘红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shengpay E Payment Service Co ltd
Original Assignee
Shanghai Shengpay E Payment Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shengpay E Payment Service Co ltd filed Critical Shanghai Shengpay E Payment Service Co ltd
Priority to CN201911095073.2A priority Critical patent/CN110830655B/en
Publication of CN110830655A publication Critical patent/CN110830655A/en
Application granted granted Critical
Publication of CN110830655B publication Critical patent/CN110830655B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals

Abstract

The embodiment of the application discloses a conversation method and a conversation device. One embodiment of the method comprises: responding to the condition that the conversation between the first terminal and the second terminal is in an answering state, and locking and setting the conversation; in response to detecting the preset operation, the lock setting is released. According to the embodiment of the application, in the process of the call of the user, other users are prevented from directly hanging up the call without permission of the call user, and therefore smooth call is ensured.

Description

Call method and device
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to the technical field of internet, and particularly relates to a conversation method and device.
Background
With the development of conversation technology, it has become an indispensable part of life for users to converse with other users through telephones or other electronic devices. In the process of voice or video call, a hang-up key is generally displayed on a screen, and the call can be ended by operating the hang-up key.
In daily life, when a user makes a call, children may be around the user, and the children may cause obstacles to the call of the user, even hang up the call.
Disclosure of Invention
The embodiment of the application provides a conversation method and a conversation device.
In a first aspect, an embodiment of the present application provides a call method, which is applied to a first terminal, and the method includes: responding to the condition that the conversation between the first terminal and the second terminal is in an answering state, and locking and setting the conversation; in response to detecting the preset operation, the lock setting is released.
In a second aspect, an embodiment of the present application provides a communication device, including: the locking unit is configured to respond to the condition that the call of the first terminal and the second terminal is in an answering state, and lock the call; an unlocking unit configured to release the lock setting in response to detection of a preset operation.
In a third aspect, an embodiment of the present application provides a call method, which is applied to a second terminal, and the method includes: receiving a locking request sent by a first terminal when a call between the first terminal and a second terminal is in an answering state, wherein the locking request is used for requesting to lock the call; and in response to reaching a preset condition, feeding back locking agreement information to the first terminal, and/or performing locking setting on the call.
In a fourth aspect, an embodiment of the present application provides a communication apparatus, which is applied to a second terminal, and the apparatus includes: a receiving unit configured to receive a lock request sent by a first terminal when a call between the first terminal and a second terminal is in an answering state, wherein the lock request is used for requesting to lock the call; a feedback unit configured to feed back lock agreement information to the first terminal and/or perform lock setting on the call in response to reaching a preset condition.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: one or more processors; a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement a method as in any embodiment of the telephony method.
In a sixth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method as in any embodiment of the call method.
According to the call scheme provided by the embodiment of the application, firstly, the call is locked and set in response to the call between the first terminal and the second terminal being in the answering state. Thereafter, in response to detection of a preset operation, the lock setting is released. According to the embodiment of the application, in the process of the call of the user, other users are prevented from directly hanging up the call without permission of the call user, and therefore smooth call is ensured.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram to which some embodiments of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a telephony method in accordance with the present application;
FIG. 3 is a flow chart of yet another embodiment of a telephony method according to the present application;
FIG. 4 is a flow chart of yet another embodiment of a method of telephony according to the present application;
FIG. 5 is a flow chart of yet another embodiment of a telephony method in accordance with the present application;
FIG. 6 is a flow chart of yet another embodiment of a telephony method in accordance with the present application;
FIG. 7 is a flow chart of yet another embodiment of a method of telephony in accordance with the present application;
FIG. 8 is a schematic block diagram of one embodiment of a communicator according to the present application;
FIG. 9 is a schematic block diagram of a computer system suitable for use in implementing an electronic device according to some embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the telephony method or telephony device of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminals 101, 102 and a network 103. Network 103 is the medium used to provide communication links between terminals 101 and 102. Network 103 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminals 101, 102 to interact with each other via the network 103 to receive or send messages or the like. The terminals 101 and 102 may have various communication client applications installed thereon, such as a call application, a video application, a live application, an instant messaging tool, a mailbox client, social platform software, and the like.
Here, the terminals 101 and 102 may be hardware or software. When the terminals 101, 102 are hardware, they may be various electronic devices having a display screen, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminals 101 and 102 are software, they can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
It should be noted that the communication method provided in the embodiment of the present application is generally executed by the terminal 101 or the terminal 102, and accordingly, the communication device is generally disposed in the terminal 101 or the terminal 102.
It should be understood that the number of terminals, networks, and servers in fig. 1 are merely illustrative. There may be any number of terminals, networks, and servers, as desired for an implementation.
Continuing to refer to FIG. 2, a flow 200 of one embodiment of a telephony method in accordance with the present application is shown. The conversation method is applied to a first terminal and comprises the following steps:
step 201, responding to that the call between the first terminal and the second terminal is in an answering state, and locking the call.
In this embodiment, if the first terminal and the second terminal are in a call with each other, the execution body of the call method (for example, the terminal 101 shown in fig. 1) may perform a lock setting on the call. The call may be a voice call or other call such as a video call. Is in an answering state, i.e. the call between the two terminals is in a connected state.
In practice, the locking arrangement may be varied. For example, the locking setting may be that no operation can be performed on the call, for example, no input to a keyboard, no hang-up, and the like can be performed. The target of the locking setting may be the device, that is, the first terminal, or the opposite device of the call, that is, the second terminal.
In some optional implementations of this embodiment, step 201 may include:
responding to the condition that the conversation between the first terminal and the second terminal is in an answering state, and if the locking operation of a user on the conversation is detected, carrying out locking setting on the conversation; or if the first terminal is preset with setting information, responding to the call between the first terminal and the second terminal being in an answering state, and performing locking setting on the call, wherein the setting information is used for indicating that the first terminal performs locking setting on the call when the call is connected.
In these alternative implementations, the execution subject may perform the lock setting on the call when a lock operation of the call by the user is detected. For example, the locking operation may be an operation of a lock button on the screen or an operation of an entity button. In addition, the execution main body may also perform the lock setting on the call in response to setting information that the first terminal is previously provided with an instruction to perform the lock setting. Specifically, the setting information here may be default setting information in the system or in an application where the call is located, or may be preset by a user or a developer.
In these implementation manners, the user can flexibly determine whether to perform the locking setting through the instant locking operation, and also can avoid the problem that the call is hung up by other users due to forgetting to perform the locking setting or inconvenient performing the locking setting in the call through the preset setting information.
In some optional implementations of this embodiment, before performing the lock setting on the call in step 201, the method further includes: sending a locking request to a second terminal, wherein the locking request is used for requesting to lock the call; and receiving the locking agreement information fed back by the second terminal for the locking request.
In these alternative implementations, the executing entity may send a lock request to the second terminal. After that, the executing entity may receive the lock grant information fed back by the second terminal with respect to the lock request. In particular, the lock request may request a lock setup at the first terminal and/or the second terminal. That is, the execution main body may request the second terminal to agree with the execution main body to perform the lock setting, or may request the second terminal to perform the lock setting on the second terminal. The lock agreement information indicates that the second terminal agrees to the lock setting requested by the lock request. The lock agreement information may be transmitted by the second terminal in various situations, for example, may be transmitted by the user of the second terminal in a situation where the second terminal operates a button indicating agreement to the lock request.
In practice, if the lock request is used to request to lock the call to the first terminal, the first terminal may perform lock setting on the call in the present device in response to receiving the lock agreement information fed back by the second terminal. If the locking request is used for requesting the second terminal to lock the call, the second terminal can perform locking setting on the call at the second terminal. If the lock request is used to request the first terminal and the second terminal to lock the call, the second terminal may lock the call at the second terminal, and after receiving the lock agreement information, the first terminal may also lock the call at the first terminal.
As shown in fig. 3, the executing entity may send a lock request to the second terminal, and after receiving the lock agreement information, display a lock confirmation option to allow the user to confirm whether to perform the lock setting, and if so, the device may perform the lock setting, and the user of the device loses the right to end the call and has a unique right to hang up the call.
In these implementation manners, the first terminal sends the locking request to the second terminal, so that the device can lock the call, and the locking of the call is in accordance with the wishes of both parties of the call in the process of allowing the device of the other party to participate in the call locking process. In addition, the opposite side equipment can be prompted to realize locking setting.
In some optional implementations of this embodiment, the performing a lock setting on a call in step 201 may include: and locking and setting a hang-up button of the call, wherein the locking and setting comprises a forbidden setting or a hidden setting.
In these alternative implementations, the lock setting may be on a hang-up button. The lock setting may be a disable setting or a hide setting for the hang-up button. After the setting of the disable is performed, the hang-up button can be disabled, that is, the user operates the hang-up button, and the call cannot be hung up. While after the hidden setting is made, the hang-up button may be hidden, in which case the hang-up button is not visible to the user. In practice, the hang-up button may be a hang-up button displayed on the screen, or may be an entity hang-up button, such as a screen locking key. The hidden setting of the hang-up button is for the hang-up button displayed on the screen.
These alternative implementations may disable or hide the hang-up button to ensure that the user is not disturbed by children or the like during the call.
In response to detecting the preset operation, the lock setting is released 202.
In this embodiment, the execution body may release the lock setting in response to detection of a preset operation. Specifically, the preset operation may be various operations, for example, a common operation of two buttons, which may be a screen lock key, a volume adjustment key, and the like.
It should be noted that, in the present application, the lock setting, the hang-up operation, the sent lock request and hang-up request, and the feedback information generated for the lock request and hang-up request of the first terminal and the second terminal may all be consistent.
The method provided by the embodiment of the application can avoid other users from directly hanging up the call without permission of the user in the call process of the user, thereby ensuring smooth call.
Further, the present application also provides a flow 400 of another embodiment of the call method. The process 400 of the communication method includes the following steps:
step 401, in response to that the call between the first terminal and the second terminal is in an answering state, disabling the call.
In this embodiment, if the first terminal and the second terminal are in a call with each other, the execution body of the call method (for example, the terminal shown in fig. 1) may disable the call. The call may be a voice call or other call such as a video call. The terminal is in the answering state, namely the two terminals are in the connection state of the call.
Step 402, in response to detecting a disablement release operation of the hang-up button, displaying a keyboard for receiving password input.
In the present embodiment, the preset operation is a disable release operation. The execution main body may display a keyboard for receiving password input to the user in response to detecting the disable release operation of the hang-up button. The disablement removal operation may trigger the execution subject to receive the operation of removing the disablement setting. The disablement release operation may be an operation of a hang-up button or other buttons displayed on the screen, or may be an operation of a certain physical button of the first terminal.
In step 403, in response to detecting the fingerprint unlocking operation or detecting the password input operation on the keyboard, the forbidden setting of the hang-up button is released.
In this embodiment, the user may input a correct password into the keyboard displayed on the first terminal, or perform a fingerprint unlocking operation on the first terminal, thereby releasing the disabled setting of the hang-up button. The fingerprint unlocking operation refers to an operation of inputting a backed-up fingerprint, and specifically may be pressing or hovering a finger on a fingerprint receiving area of the first terminal. If the execution main body detects fingerprint unlocking operation or password input operation, the forbidden setting can be removed, and the call can be hung up.
As shown in fig. 4, it is shown that, in the process of a call between a first device and a second device, if the device is preset with the setting information indicating to perform the locking setting, or detects a locking operation, the call may be locked, that is, the setting is disabled. The user clicks the hang-up button, namely, the forbidden release operation is carried out, and the execution main body can be unlocked through the fingerprint or the password, so that the call is hung up.
According to the embodiment, the forbidden setting can be released by inputting the password or the fingerprint, so that the situation that other users directly release the forbidden setting without permission of the users and hang up the call is avoided.
Further, the present application also provides a flow 500 of another embodiment of the call method. The process 500 of the communication method includes the following steps:
step 501, responding to that the call between the first terminal and the second terminal is in an answering state, and hiding the call.
In this embodiment, if the first terminal and the second terminal are in a call with each other, the execution body of the call method (for example, the terminal shown in fig. 1) may hide the call. The call may be a voice call or other call such as a video call. The terminal is in the answering state, namely the two terminals are in the connection state of the call.
Step 502, in response to detecting the hidden releasing operation of the hang-up button, releasing the hidden setting of the hang-up button, so that the hang-up button is displayed in the call interface of the call.
In this embodiment, the hidden setting makes the hang-up button invisible in the call interface of the call, and the preset operation is a hidden release operation. The execution main body may release the hidden setting of the hang-up button after detecting the hidden release operation by the user. In this way, the hang-up button can be redisplayed on the call interface of the call. In practice, the concealment release operation may be an operation on a displayed area or some physical button.
The user in this embodiment can hide and redisplay the hang-up button by using the hidden setting and the hidden releasing operation, so that the hang-up button can be controlled, and interference of other users to the call is avoided.
In some optional implementations of the embodiment, the hiding release operation includes a shaking operation, or a click operation or a sliding operation on a call interface of the call.
In these alternative implementations, the hiding release operation of the device by the user may include a shaking operation of the device, and may also include a clicking operation or a sliding operation of the call interface. The click operation may be a click operation or a continuous click operation on a designated area in the call interface, or may be a continuous click operation on an arbitrary area in the call interface.
As shown in fig. 5, it is shown that the executing body may judge whether the setting information is set in advance after the call of the first terminal and the second terminal is connected. If yes, the hang-up button is directly hidden, and if not, the hang-up button is hidden under the condition that the hidden operation, namely the locking operation, is received. Then, the execution subject receives the double-click or shaking operation, and a hang-up button can be displayed.
These implementations may enable quick unhooking of the hang-up button by a shaking, clicking or sliding operation.
In some optional implementations of the foregoing embodiments, the method further includes:
and receiving a hang-up request sent by the second terminal, wherein the hang-up request is used for requesting to hang up the call.
In these alternative implementations, for the first terminal and the second terminal that are engaged in a call, either one of the terminals may send a hang-up request to the other terminal. The execution main body may receive the hang-up request after the second terminal sends the hang-up request to the execution main body.
The implementation modes can realize that the first terminal participates in the control of the second terminal on the ending of the call, thereby avoiding that other users directly hang up the call without permission on the side of the second terminal.
In some optional application scenarios of these implementations, the method may further include: and in response to the detection of the hang-up agreement operation, feeding back hang-up agreement information to the second terminal and/or hanging up the call.
In these optional application scenarios, if the hang-up agreement operation of the user is detected, the execution subject may feed back hang-up agreement information to the second terminal, so that the second terminal hangs up the call. In addition, the execution main body can also directly hang up the call. Specifically, the hang-up consent operation may be an operation indicating that the user agrees to hang up the call.
The application scenes can realize the hanging up of the call by feeding back to the second terminal after receiving the hanging up request of the second terminal, and can also hang up the call by self, so that the call is hung up in various modes under the condition that users of the first terminal and the second terminal intentionally hang up the call.
Further, the present application also provides a flow 600 of yet another embodiment of the call method. The process 600 of the communication method includes the following steps:
step 601, responding to that the call between the first terminal and the second terminal is in an answering state, and locking the call.
In this embodiment, the locking setting comprises a hidden setting. If the first terminal and the second terminal are in a call with each other, the execution body of the call method (for example, the terminal shown in fig. 1) may lock the call. The call may be a voice call or other call such as a video call. The terminal is in the answering state, namely the two terminals are in the connection state of the call.
Step 602, in response to detecting the hang-up unlocking operation, hanging up the call.
In this embodiment, the execution subject may hang up the call when a hang-up unlocking operation is detected. Specifically, the hang-up unlocking operation refers to an operation that can release the lock setting and hang up the call, for example, the hang-up unlocking operation may include an operation of a hang-up button, for example, a long press of the hang-up button. In some cases, the hangup unlock operation may include more than two operations.
The first terminal in this embodiment can accurately hang up the call through hang up unlocking operation.
In some optional implementations of this embodiment, step 602 may include: displaying a keyboard for receiving password input in response to detecting the hang-up operation; and in response to detecting the fingerprint unlocking operation or detecting the password input operation on the keyboard, hanging up the call.
In these alternative implementations, the hang-up unlock operation may include a hang-up operation, and one of: fingerprint unlocking operation and password input operation. If the execution main body detects hang-up operation, a keyboard for receiving password input can be displayed. Thus, the user can then enter a password into the keyboard. The user can input a password into the displayed keyboard or perform fingerprint unlocking operation on the first terminal, so that the call is hung up.
The realization modes can realize hang-up by inputting passwords or fingerprints, and ensure smooth call under the condition that two parties of the call do not want to hang up, thereby avoiding other users from directly hanging up the call without permission of the users.
In some optional application scenarios of these implementations, before hanging up the call in step 602, the method may further include: sending a hang-up request to the second terminal, wherein the hang-up request is used for requesting to hang up the call; and receiving hang-up consent information fed back by the second terminal aiming at the hang-up request.
In these optional application scenarios, the execution subject may send a hang-up request to the second terminal. If the execution main body receives hang-up agreement information fed back by the second terminal aiming at the hang-up request, the conversation can be hung up. The hang-up agreement information indicates that the second terminal agrees that the first terminal hangs up the call. The user of the second terminal may perform an operation of indicating agreement to hang up the call of the first terminal at the second terminal, thereby generating hang up agreement information.
As shown in fig. 6, the first terminal sends a hang-up request to the second terminal if detecting a hang-up operation of the user after the user of the second terminal agrees to perform the lock setting of the first terminal, and hangs up the call after receiving hang-up agreement information fed back by the second terminal.
In the application scenes, the second terminal can participate in controlling the ending of the call by sending a hang-up request to the second terminal, so that the situation that other users directly end the call without permission on the first terminal side is avoided.
In some optional cases of these application scenarios, the hanging up of the call in step 602 may include: displaying hang-up confirmation options; in response to detecting a confirmation hang-up operation for the hang-up confirmation option, the call is hung up.
In these alternative cases, the execution main body may display a hang-up confirmation option to the user in a case where hang-up agreement information is received. The user can confirm the hang-up operation on the hang-up confirmation option, and if the execution main body detects the hang-up confirmation operation, the call can be hung up.
Under the conditions, the user can confirm whether to hang up again, and the problem that the user sends a hang up request by misoperation to directly end the call is avoided.
In some optional implementations of the foregoing embodiments, the method may further include: awakening the voice monitoring function of the first terminal through the awakening word; any step in the foregoing embodiments may include: any step is performed in response to monitoring speech that triggers the performance of any step.
In these alternative implementations, the execution subject may wake up the local voice monitoring function upon receiving the wake-up word. The wake-up word here may be speech. The user can send out voice for triggering the execution of any step, and the execution main body executes any step. In this case, the user does not need to manually operate the terminal device, and the first terminal can implement the above steps only through voice. For example, the voice content that the user of the first terminal triggers the first terminal to perform "send hang-up request to the second terminal" may be "please send hang-up request to the second terminal".
The implementation modes can realize each step in the application in a voice mode, enrich the forms of controlling the conversation by the user, and can also control the equipment through the voice under the condition that the user is inconvenient to carry out manual operation, thereby improving the convenience of controlling the equipment by the user.
Further, the present application also provides a flow 700 of another embodiment of the call method. The process 700 of the call method is applied to the second terminal, and includes the following steps:
step 701, receiving a locking request sent by a first terminal when a call between the first terminal and a second terminal is in an answering state, where the locking request is used for requesting to lock the call.
In this embodiment, if the first terminal and the second terminal are in a call with each other, the execution body of the call method (for example, the terminal 102 shown in fig. 1) may receive the lock request sent by the first terminal.
And step 702, in response to reaching the preset condition, feeding back locking agreement information to the first terminal, and/or performing locking setting on the call.
In this embodiment, if the execution subject determines that the device meets the preset condition, the execution subject may feed back lock agreement information to the first terminal, or may perform lock setting on the device. The lock setting may be a disable setting or a hide setting. In practice, the preset condition may be various preset conditions, for example, the preset condition may be a preset time period from the receipt of the lock request.
The embodiment can accurately hang up the call through hang up unlocking operation.
In some optional implementations of the present embodiment, an approval operation for the lock request is detected; or the second terminal has preset information indicating agreement to the lock setting.
In these optional implementations, the preset condition may be that the execution subject detects an approval operation made by the user to approve the lock request, or that preset information exists in the second terminal, where the preset information indicates that the first terminal is approved to perform lock setting, and/or that the device, that is, the second terminal is approved to perform lock setting.
The implementation manners can enable the user to determine whether to approve the locking setting or not, and can also store the preset information, thereby directly approving the locking request of the first terminal and improving the efficiency of the locking setting.
In some optional application scenarios of these implementations, the method may further include: displaying a hang-up confirmation option in response to receiving a hang-up request sent by a first terminal, wherein the hang-up request is used for requesting to hang up a call; and feeding back hang-up consent information to the first terminal in response to detecting the hang-up confirmation operation on the hang-up confirmation option.
In these optional application scenarios, the execution subject may receive a hang-up request sent by the first terminal, and feed back hang-up agreement information to the first terminal when detecting a hang-up confirmation operation of the user.
The application scenes can enable the user of the second terminal to participate in the process of hanging up the call, so that the call can be prevented from being directly hung up by other users without permission, and the operation of hanging up the call can better accord with the intention of the user of the second terminal.
In some optional application scenarios of these implementations, the method may further include: and hanging up the call in response to detecting the hanging up unlocking operation.
Optionally, the method in these application scenarios may include: displaying a keyboard for receiving password input in response to detecting the hang-up operation; and in response to detecting the fingerprint unlocking operation or detecting the password input operation on the keyboard, hanging up the call.
The second terminal in this embodiment can accurately hang up the call through hang up unlocking operation.
With further reference to fig. 8, as an implementation of the method shown in the above figures, the present application provides an embodiment of a communication device, which corresponds to the embodiment of the method shown in fig. 2, and which may include the same or corresponding features or effects as the embodiment of the method shown in fig. 2, in addition to the features described below. The device can be applied to various electronic equipment.
As shown in fig. 8, the communication device 800 of the present embodiment includes: a locking unit 801 and an unlocking unit 802. The locking unit 801 is configured to lock a call in response to the call between the first terminal and the second terminal being in an answering state; an unlocking unit 802 configured to release the lock setting in response to detection of a preset operation.
The embodiment can avoid other users from directly hanging up the call without permission of the user in the call process of the user, thereby ensuring smooth call.
The embodiment of the present application provides a communication device corresponding to the communication method in the process 700, which can be applied to a second terminal, and the device includes: a receiving unit configured to receive a lock request sent by a first terminal when a call between the first terminal and a second terminal is in an answering state, wherein the lock request is used for requesting to lock the call; a feedback unit configured to feed back lock agreement information to the first terminal and/or perform lock setting on the call in response to reaching a preset condition.
As shown in fig. 9, the electronic device 900 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 901 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage means 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are also stored. The processing apparatus 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
Generally, the following devices may be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 907 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; a storage device 908; and a communication device 909. The communication device 909 may allow the electronic apparatus 900 to perform wireless or wired communication with other apparatuses to exchange data. While fig. 9 illustrates an electronic device 900 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 9 may represent one device or may represent multiple devices as desired.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication device 909, or installed from the storage device 908, or installed from the ROM 902. The computer program, when executed by the processing apparatus 901, performs the above-described functions defined in the methods of the embodiments of the present disclosure. It should be noted that the computer readable medium of the embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In embodiments of the present disclosure, however, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a locking unit and an unlocking unit. The names of the units do not form a limitation on the units themselves in some cases, and for example, the locking unit may also be described as "lock setting a call in response to a call of a first terminal and a second terminal being in an answering state".
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be present separately and not assembled into the device. The computer readable medium carries one or more programs which, when executed by the apparatus, cause the apparatus to: responding to the condition that the conversation between the first terminal and the second terminal is in an answering state, and locking and setting the conversation; in response to detecting the preset operation, the lock setting is released.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (16)

1. A call method is applied to a first terminal, and comprises the following steps:
responding to the condition that the conversation between the first terminal and the second terminal is in an answering state, and locking and setting the conversation;
in response to detecting a preset operation, releasing the lock setting;
before the lock setting is performed on the call, the method further includes:
sending a locking request to the second terminal, wherein the locking request is used for requesting to lock the call;
receiving locking consent information fed back by the second terminal aiming at the locking request;
displaying a locking confirmation option, and receiving an operation of a user of the first terminal on the locking confirmation option, so that the user of the first terminal loses the authority of finishing the call, and the user of the second terminal has a unique authority of finishing the call;
the preset operation is a hang-up operation, and the unlocking of the locking setting in response to the detection of the preset operation includes: hanging up the call in response to detecting a hang-up unlocking operation;
before hanging up the call, the method further comprises:
sending a hang-up request to the second terminal, wherein the hang-up request is used for requesting to hang up the call;
and receiving hang-up consent information fed back by the second terminal aiming at the hang-up request so as to hang up the call.
2. The method of claim 1, wherein the responding to the call of the first terminal and the second terminal being in a listening state, performing lock setting on the call comprises:
responding to that the conversation between the first terminal and the second terminal is in an answering state, and if the locking operation of a user on the conversation is detected, performing locking setting on the conversation; alternatively, the first and second electrodes may be,
and if the first terminal is preset with setting information, responding to the condition that the call between the first terminal and the second terminal is in an answering state, and performing locking setting on the call, wherein the setting information is used for indicating that the first terminal performs locking setting on the call when the call is connected.
3. The method of claim 1, wherein the lock setting the call comprises:
and locking and setting a hang-up button of the call, wherein the locking and setting comprises a forbidden setting or a hidden setting.
4. The method of claim 3, wherein the lock setting comprises the disable setting, the preset operation is a disable release operation; and
the releasing the lock setting in response to detecting a preset operation includes:
displaying a keyboard for receiving password input in response to detecting the disablement release operation of the hang-up button;
in response to detecting a fingerprint unlock operation, or detecting a password input operation at the keyboard, releasing the disable setting of the hang-up button.
5. The method of claim 3, wherein the locking setting comprises the hidden setting, the hidden setting makes the hang-up button invisible in a call interface of the call, and the preset operation is a hidden release operation; and
the releasing the lock setting in response to detecting a preset operation includes:
in response to detecting a hide release operation, releasing the hidden setting of the hang-up button, such that the hang-up button is displayed in a call interface of the call.
6. The method of claim 5, wherein,
the hiding release operation comprises a shaking operation, or a clicking operation or a sliding operation on a call interface of the call.
7. The method of claim 1, wherein the hangup unlock operation comprises a hangup operation, and a fingerprint unlock operation or a password input operation;
the responding to the detected hang-up unlocking operation, hanging up the call comprises the following steps:
displaying a keyboard for receiving password input in response to detecting the hang-up operation;
and responding to the detected fingerprint unlocking operation or the detected password input operation on the keyboard, and hanging up the call.
8. The method of claim 1, wherein the hanging up the call comprises:
displaying hang-up confirmation options;
hanging up the call in response to detecting a confirmation hang up operation for a hang up confirmation option.
9. The method of claim 1, wherein the method further comprises:
and receiving a hang-up request sent by the second terminal, wherein the hang-up request is used for requesting to hang up the call.
10. The method of claim 9, wherein the method further comprises:
and in response to the detection of the hang-up agreement operation, feeding back hang-up agreement information to the second terminal, and/or hanging up the call.
11. The method according to one of claims 1-10, wherein the method further comprises:
responding to the received awakening words, and awakening the voice monitoring function of the first terminal;
performing any step of the method of one of claims 1-10 in response to monitoring speech that triggers the performance of the step.
12. A call method is applied to a second terminal, and comprises the following steps:
receiving a locking request sent by a first terminal when a call between the first terminal and a second terminal is in an answering state, wherein the locking request is used for requesting to lock the call;
in response to a preset condition, feeding back locking agreement information to the first terminal, and/or performing locking setting on the call, so that a user of the first terminal loses a right of finishing the call, and a user of the second terminal has a unique right of finishing the call;
the method further comprises the following steps:
responding to a hang-up request sent by the first terminal, and displaying a hang-up confirmation option, wherein the hang-up request is used for requesting to hang up the call;
and feeding back hang-up agreement information to the first terminal to hang up the call in response to the detection of the hang-up confirmation operation on the hang-up confirmation option.
13. The method of claim 12, wherein the preset conditions include:
detecting an approval operation for the lock request;
or
The second terminal has preset information indicating agreement to lock settings.
14. The method of claim 12 or 13, wherein the method further comprises:
and hanging up the call in response to detecting the hanging up unlocking operation.
15. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-14.
16. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1-14.
CN201911095073.2A 2019-11-11 2019-11-11 Call method and device Active CN110830655B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911095073.2A CN110830655B (en) 2019-11-11 2019-11-11 Call method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911095073.2A CN110830655B (en) 2019-11-11 2019-11-11 Call method and device

Publications (2)

Publication Number Publication Date
CN110830655A CN110830655A (en) 2020-02-21
CN110830655B true CN110830655B (en) 2022-04-29

Family

ID=69553827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911095073.2A Active CN110830655B (en) 2019-11-11 2019-11-11 Call method and device

Country Status (1)

Country Link
CN (1) CN110830655B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361469A (en) * 2022-08-15 2022-11-18 中国联合网络通信集团有限公司 Method, terminal, electronic device and storage medium for preventing call from being hung up by mistake

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635494A (en) * 2015-12-28 2016-06-01 Tcl集团股份有限公司 Method for realizing state exchange of both conversation sides based on DTMF, terminals and system thereof
WO2016131305A1 (en) * 2015-08-18 2016-08-25 中兴通讯股份有限公司 Call processing method and apparatus
CN108495310A (en) * 2018-02-26 2018-09-04 上海爱优威软件开发有限公司 A kind of certification call method and terminal
CN109032447A (en) * 2018-07-26 2018-12-18 维沃移动通信有限公司 A kind of icon processing method and mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9225850B2 (en) * 2012-12-18 2015-12-29 Acer Incorporated Handheld electronic apparatus and incoming call processing method thereof
CN105611044A (en) * 2015-11-25 2016-05-25 东莞酷派软件技术有限公司 Conversation control method and device and terminal
CN109087643A (en) * 2018-09-28 2018-12-25 联想(北京)有限公司 Sound control method, device and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016131305A1 (en) * 2015-08-18 2016-08-25 中兴通讯股份有限公司 Call processing method and apparatus
CN105635494A (en) * 2015-12-28 2016-06-01 Tcl集团股份有限公司 Method for realizing state exchange of both conversation sides based on DTMF, terminals and system thereof
CN108495310A (en) * 2018-02-26 2018-09-04 上海爱优威软件开发有限公司 A kind of certification call method and terminal
CN109032447A (en) * 2018-07-26 2018-12-18 维沃移动通信有限公司 A kind of icon processing method and mobile terminal

Also Published As

Publication number Publication date
CN110830655A (en) 2020-02-21

Similar Documents

Publication Publication Date Title
US20170272695A1 (en) Seamless call transitions with pre-escalation participation confirmation
CN104601529B (en) Terminal account management method and device
US9350847B2 (en) Differentiated access for mobile device
US9888210B2 (en) Seamless call transitions with pinpoint call escalation
WO2017004099A1 (en) Privileged identity management
CN112311841B (en) Information pushing method and device, electronic equipment and computer readable medium
US20150049164A1 (en) Seamless call transitions with escalation-aware notifications
CN111247520B (en) Method and apparatus for managing hardware resource access in an electronic device
CN107077436A (en) Target device resource is lent to host device computing environment
CN110069919B (en) Information acquisition method and device
US20190068734A1 (en) Notification api for external identification
US11411758B2 (en) Generating contextual compliance policies
CN110249355A (en) The exposure of Do-Not Disturb state and being arranged using behavior based on it
CN114008596A (en) Extended domain platform for non-member user account management
CN110830655B (en) Call method and device
CN113010238A (en) Permission determination method, device and system for micro application call interface
US11558257B1 (en) Managing session meshes
CN112969147B (en) Call method and device
US20190068771A1 (en) External device for communicating with conferencing client using notification api
US8955070B2 (en) Controlled password modification method and apparatus
CN112651012A (en) Information processing method and device
CN111147470A (en) Account authorization method and device and electronic equipment
US20230061821A1 (en) Method and system for content management for a virtual meeting
CN116545966A (en) Information processing method and device and electronic equipment
CN106126985B (en) Information security processing method and system based on intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant