CN111510551A - Call privacy protection method, device and computer readable storage medium - Google Patents
Call privacy protection method, device and computer readable storage medium Download PDFInfo
- Publication number
- CN111510551A CN111510551A CN202010257126.2A CN202010257126A CN111510551A CN 111510551 A CN111510551 A CN 111510551A CN 202010257126 A CN202010257126 A CN 202010257126A CN 111510551 A CN111510551 A CN 111510551A
- Authority
- CN
- China
- Prior art keywords
- call
- privacy
- shielding
- earphone
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000006870 function Effects 0.000 claims description 74
- 238000004891 communication Methods 0.000 claims description 49
- 230000008569 process Effects 0.000 description 13
- 230000001960 triggered effect Effects 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000873 masking effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/60—Substation equipment, e.g. for use by subscribers including speech amplifiers
- H04M1/6033—Substation equipment, e.g. for use by subscribers including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
- H04M1/6041—Portable telephones adapted for handsfree use
- H04M1/6058—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone
- H04M1/6066—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone including a wireless connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R1/00—Details of transducers, loudspeakers or microphones
- H04R1/10—Earpieces; Attachments therefor ; Earphones; Monophonic headphones
- H04R1/1041—Mechanical or electronic switches, or control elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a conversation privacy protection method, equipment and a computer readable storage medium. When a terminal connected with an earphone receives a call request in an audio sharing state, judging whether a privacy call mode of the earphone is started or not; if the privacy calling mode is started, determining a target receiver corresponding to the privacy calling mode in the earphone, and determining a shielding receiver in the earphone; keeping the conversation function of the target receiver open, and shielding the conversation function of the shielding receiver so as to carry out privacy protection on the terminal conversation based on the target receiver. The invention ensures the safety of conversation privacy and facilitates the sharing and use of the earphone while avoiding the frequent taking-off and taking-on operation of the shielding receiver.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for protecting call privacy, and a computer-readable storage medium.
Background
With the development of science and technology, people pursue higher and higher living quality. In order to meet the requirements of people on sound signals, earphones which are matched with the intelligent terminal to play sound are also rapidly developed. From wired headsets, which were originally used to play sound, to portable wireless bluetooth headsets, to TWS headsets, which have no loss of sound quality.
The TWS earphone is popular among people due to good sound quality and convenient carrying. The left and right earphones are completely separated, and two different users can respectively use the left earphone and the right earphone to listen in audio sharing within a certain distance range. Therefore, if different users receive an incoming call when using the TWS headset connected to the same terminal to perform audio sharing listening, the users unrelated to the incoming call need to take off the TWS headset and take on the TWS headset after the call is finished, so as to ensure the call privacy of the users related to the incoming call. However, frequent operations of removing and putting on increase the complexity of user operations, which is inconvenient for sharing and using the TWS headset. Meanwhile, a user irrelevant to the incoming call does not know whether the call is ended, and the TWS earphone is worn in the call process, so that the call privacy is easily leaked.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a conversation privacy protection method, equipment and a computer readable storage medium, and aims to solve the technical problems that the operation complexity is increased due to frequent removal and taking of a TWS earphone during conversation during audio sharing, and the conversation privacy is easy to leak.
In order to achieve the above object, the present invention provides a call privacy protection method, including the following steps:
when a terminal connected with an earphone receives a call request in an audio sharing state, judging whether a privacy call mode of the earphone is started or not;
if the privacy calling mode is started, determining a target receiver corresponding to the privacy calling mode in the earphone, and determining a shielding receiver in the earphone;
keeping the conversation function of the target receiver open, and shielding the conversation function of the shielding receiver so as to carry out privacy protection on the terminal conversation based on the target receiver.
Preferably, the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises:
keeping the audio input and audio output functions of the target receiver open;
and switching the audio input and audio output functions of the shielding receiver to a preset mode so as to shield the call function of the shielding receiver.
Preferably, the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises the following steps:
and after the terminal based on the target receiver is detected to be in a call, starting the audio input and audio output functions of the shielding receiver so as to recover the audio sharing state of the earphone.
Preferably, the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises the following steps:
when a call mode switching instruction is received, switching the privacy call mode into a sharing call mode;
and starting a call function of the shielding receiver to carry out terminal call together based on the target receiver and the shielding receiver.
Preferably, the step of determining whether the privacy phone mode of the headset is turned on includes:
detecting whether a trigger instruction for triggering the privacy communication mode is received, and if the trigger instruction is received, judging whether the trigger instruction is effective;
if the trigger instruction is valid, judging that the privacy conversation mode of the earphone is started;
and if the trigger instruction is not received or the received trigger instruction is invalid, judging that the privacy conversation mode of the earphone is not started.
Preferably, the step of judging whether the trigger instruction is valid includes:
acquiring a trigger fingerprint corresponding to the trigger instruction, comparing the trigger fingerprint with a preset fingerprint, and judging whether the trigger fingerprint is consistent with the preset fingerprint;
if the trigger fingerprint is consistent with a preset fingerprint, judging that the trigger instruction is valid;
and if the trigger fingerprint is not consistent with the preset fingerprint, judging that the trigger instruction is invalid.
Preferably, the step of judging whether the privacy phone mode of the headset is turned on includes:
and if the privacy communication mode is not started, carrying out terminal communication based on the audio sharing state of the earphone.
Preferably, the headset is a true wireless stereo TWS headset.
In order to achieve the above object, the present invention further provides a call privacy protecting apparatus, which includes a memory, a processor, and a call privacy protecting program stored in the memory and executable on the processor, and when executed by the processor, the call privacy protecting program implements the steps of the call privacy protecting method as described above.
In addition, to achieve the above object, the present invention further provides a computer-readable storage medium having a call privacy protecting program stored thereon, where the call privacy protecting program, when executed by a processor, implements the steps of the call privacy protecting method described above.
According to the conversation privacy protection method, the equipment and the computer readable storage medium provided by the embodiment of the invention, once the terminal connected with the earphone receives a conversation request in an audio sharing state, whether a privacy conversation mode of the earphone is started or not is judged, and if the privacy conversation mode is started, the requirement for protecting conversation privacy is met; therefore, a target receiver corresponding to the privacy communication mode in the earphone, namely a receiver needing communication, is determined, and a shielding receiver needing communication shielding, namely a receiver not needing communication, is determined at the same time; and then the call function of the target receiver is kept open, and the call function of the shielding receiver is shielded, so that the call of the target receiver is realized, and the call of the shielding receiver is prevented. Therefore, when the shielding receiver is prevented from being frequently taken down and carried for operation, the safety of conversation privacy is ensured, and the sharing use of the earphone is facilitated.
Drawings
Fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a call privacy protection method according to a first embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a call privacy protection device, as shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the call privacy protection device of the invention.
As shown in fig. 1, the call privacy protecting apparatus may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the hardware configuration of the call privacy protection apparatus shown in fig. 1 does not constitute a limitation of the call privacy protection apparatus, and may include more or fewer components than those shown, or combine some components, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a call privacy protecting program.
In the hardware structure of the call privacy protection device shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call the call privacy protection program stored in the memory 1005, and perform the following operations:
when a terminal connected with an earphone receives a call request in an audio sharing state, judging whether a privacy call mode of the earphone is started or not;
if the privacy calling mode is started, determining a target receiver corresponding to the privacy calling mode in the earphone, and determining a shielding receiver in the earphone;
keeping the conversation function of the target receiver open, and shielding the conversation function of the shielding receiver so as to carry out privacy protection on the terminal conversation based on the target receiver.
Further, the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises:
keeping the audio input and audio output functions of the target receiver open;
and switching the audio input and audio output functions of the shielding receiver to a preset mode so as to shield the call function of the shielding receiver.
Further, after the step of keeping the call function of the target handset on and masking the call function of the target handset, the processor 1001 may be configured to call the call privacy protection program stored in the memory 1005, and perform the following operations:
and after the terminal based on the target receiver is detected to be in a call, starting the audio input and audio output functions of the shielding receiver so as to recover the audio sharing state of the earphone.
Further, after the step of keeping the call function of the target handset on and masking the call function of the target handset, the processor 1001 may be configured to call the call privacy protection program stored in the memory 1005, and perform the following operations:
when a call mode switching instruction is received, switching the privacy call mode into a sharing call mode;
and starting a call function of the shielding receiver to carry out terminal call together based on the target receiver and the shielding receiver.
Further, the step of determining whether the privacy phone mode of the headset is turned on includes:
detecting whether a trigger instruction for triggering the privacy communication mode is received, and if the trigger instruction is received, judging whether the trigger instruction is effective;
if the trigger instruction is valid, judging that the privacy conversation mode of the earphone is started;
and if the trigger instruction is not received or the received trigger instruction is invalid, judging that the privacy conversation mode of the earphone is not started.
Further, the step of determining whether the trigger instruction is valid includes:
acquiring a trigger fingerprint corresponding to the trigger instruction, comparing the trigger fingerprint with a preset fingerprint, and judging whether the trigger fingerprint is consistent with the preset fingerprint;
if the trigger fingerprint is consistent with a preset fingerprint, judging that the trigger instruction is valid;
and if the trigger fingerprint is not consistent with the preset fingerprint, judging that the trigger instruction is invalid.
Further, the step of judging whether the privacy call mode of the headset is turned on includes:
and if the privacy communication mode is not started, carrying out terminal communication based on the audio sharing state of the earphone.
Further, the headset is a true wireless stereo TWS headset.
The specific implementation of the call privacy protection device of the present invention is substantially the same as the embodiments of the call privacy protection method described below, and is not described herein again.
For a better understanding of the above technical solutions, exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
Referring to fig. 2, a first embodiment of a call privacy protection method according to the present invention provides a call privacy protection method, where the call privacy protection method includes:
step S10, when the terminal connected with the earphone receives the call request in the audio sharing state, judging whether the privacy call mode of the earphone is opened;
the call privacy protection method in the embodiment is applied to a control center of an earphone or a control center of an intelligent terminal connected with the earphone, and is suitable for receiving a call request in the process of sharing the earphone with other people to play audio and carrying out privacy protection on call contents. The intelligent terminal is a mobile phone, a tablet computer, a notebook computer and the like with an audio playing function. The earphone may be a non-bluetooth earphone or a bluetooth earphone, and the present embodiment is preferably a TWS (true wireless Stereo) earphone in the bluetooth earphone.
Further, the terminal user of the terminal to which the earphone is connected shares the earphone with others, and shares audio such as music, movies, live broadcasts, games, etc. in the terminal to which the earphone is connected. In the process, if the control center detects that the terminal receives a call request, the call request can be an incoming call request, or a video request or an audio request, and the control center determines the call mode of the earphone. The call modes supported by the earphone at least comprise a privacy call mode in which only the terminal user can answer the call content and a sharing call mode in which both the terminal user and the sharer can answer the call content. The two modes are triggered in different ways, such as both triggered by different physical keys, or both triggered by different virtual keys, or one mode triggered by physical keys, the other mode triggered by virtual keys, etc. After checking the call request information displayed by the terminal display device, the terminal user selects a call model required by the terminal user to carry out call. And if the private conversation is needed, triggering the private conversation mode, and if the private conversation is not needed, triggering the sharing conversation mode. The triggered communication mode is transmitted to the control center in a triggering instruction mode, and the control center judges whether the privacy communication mode of the earphone is started or not according to the received triggering instruction. If the triggering instruction is used for triggering the privacy communication mode, judging that the privacy communication mode of the earphone is started; and if the triggering instruction is used for triggering the sharing conversation mode, judging that the privacy conversation mode of the earphone is not started.
Step S20, if the privacy communication mode is started, determining a target earphone in the earphone corresponding to the privacy communication mode, and determining a shielding earphone in the earphone;
understandably, no matter the Bluetooth headset or the non-Bluetooth headset, a left earphone used for the left ear of the human body to listen to the audio and a right earphone used for the bait of the human body to listen to the audio are connected. In the sharing process of the earphone, different earphones are held by different people, and when a terminal user needs to carry out privacy communication, a privacy communication mode needs to be triggered on the held earphones. The trigger instruction for selecting the privacy communication mode carries an identifier for representing a source receiver or a selected receiver of the source receiver, and if the identifier represents that the trigger instruction is from a left receiver or selects the left receiver, the fact that the privacy communication needs to be carried out by the left receiver is indicated; and if the identification representation triggering instruction comes from the right receiver or the right receiver is selected, the fact that the right receiver needs to be used for carrying out privacy conversation is indicated. After the control center determines that the privacy communication mode is started, the control center can determine a target receiver corresponding to the privacy communication mode in the earphone according to the identifier in the trigger instruction, wherein the target receiver is the receiver for performing the privacy communication. Meanwhile, the other earphone except the target earphone in the earphone is determined as a shielding earphone in the earphone, namely, the earphone which needs shielding in the call process of the terminal user and cannot answer the call is determined.
Further, if it is determined that the privacy call mode is not turned on, it indicates that the terminal user does not need to perform privacy call, the left receiver and the right receiver of the earphone are both in an on state, the terminal call is performed when the earphone is in an audio sharing state, and both the terminal user and the sharer can answer the call content.
And step S30, keeping the call function of the target receiver open, and shielding the call function of the shielding receiver to protect the privacy of the terminal call based on the target receiver.
Furthermore, under the privacy conversation mode, keeping the conversation function of the target receiver open to transmit conversation audio; and meanwhile, the call function of the shielding receiver is shielded to avoid transmitting call audio. Therefore, when the target receiver is used for calling, only the holder of the target receiver can answer the content of the call audio, and privacy protection of terminal call is realized.
According to the conversation privacy protection method provided by the embodiment of the invention, once the terminal connected with the earphone receives a conversation request in an audio sharing state, whether a privacy conversation mode of the earphone is started or not is judged, and if the privacy conversation mode is started, the requirement for protecting conversation privacy is met; therefore, a target receiver corresponding to the privacy communication mode in the earphone, namely a receiver needing communication, is determined, and a shielding receiver needing communication shielding, namely a receiver not needing communication, is determined at the same time; and then the call function of the target receiver is kept open, and the call function of the shielding receiver is shielded, so that the call of the target receiver is realized, and the call of the shielding receiver is prevented. Therefore, when the shielding receiver is prevented from being frequently taken down and carried for operation, the safety of conversation privacy is ensured, and the sharing use of the earphone is facilitated.
Further, based on the first embodiment of the call privacy protection method of the present invention, a second embodiment of the call privacy protection method of the present invention is proposed, and in the second embodiment, the step of keeping the call function of the target handset on and shielding the call function of the target handset includes:
step S31, keeping the audio input and output functions of the target receiver open;
step S32, the audio input and output functions of the shielding handset are switched to a preset mode to shield the call function of the shielding handset.
Understandably, before the terminal receives the call request, the connected earphones share the audio played by the terminal, and the audio input and audio output functions of the two earphones in the earphones are both in an open state. Therefore, after the privacy conversation mode is ensured, the conversation function of the selected target receiver is kept open, namely the audio input and output functions of the target receiver are kept in the original open state. The shielding of the call function of the shielding receiver is to switch the audio input and audio output functions of the shielding receiver to a preset mode, where the preset mode is a preset mode in which transmission of call audio is prohibited, and may be a silent mode or a waiting mode in which a specific sound is played. The shielding of the conversation function of the shielding earphone is realized by switching the shielding earphone to a preset mode, and the transmission of conversation audio is avoided.
It should be noted that shielding of the shielding earpiece may also be achieved by a physical structure in which an electronic switch is provided in the headset. If the earphone is in the audio sharing state, the electronic switches of the target earphone and the shielding earphone are both in the opening state, so that the audio is simultaneously transmitted through the target earphone and the shielding earphone, and the audio sharing is realized. And if the earphone enters the privacy conversation mode, the electronic switch in the target earphone is turned on, and the electronic switch in the shielding earphone is turned off. At the moment, the conversation audio is transmitted only through the target receiver, so that the privacy protection of terminal conversation is realized.
Further, in order to facilitate the terminal user to continue to share the terminal audio with another person after the call is completed, the embodiment is provided with a mechanism for recovering the shielding state of the shielding receiver after the privacy call is completed. Specifically, the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises the following steps:
step a, after the terminal based on the target receiver is detected to be in a call, the audio input and audio output functions of the shielding receiver are started to recover the audio sharing state of the earphone.
Further, after the call is completed, the end user or the opposite party of the call with the end user sends a hang-up instruction to hang up the call so as to end the privacy call of the target receiver. After detecting that the terminal call of the target receiver is finished, the control center restores the audio input and audio output functions of the shielding receiver from the preset mode to the function opening state, namely, the audio input and audio output functions are opened, so that the audio sharing state of the earphone before the privacy call is restored. If the audio shared by the earphones before the privacy conversation is music, recovering the sharing of the music; if the audio shared by the earphones before the privacy conversation is live, the live sharing is recovered.
Understandably, the end user may need to share the call audio during the privacy call. Therefore, in order to implement sharing of the private call, the embodiment is further provided with a sharing switching mechanism of the private call. Specifically, the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises the following steps:
b, when a call mode switching instruction is received, switching the privacy call mode into a sharing call mode;
and c, starting the call function of the shielding receiver to carry out terminal call together based on the target receiver and the shielding receiver.
Further, a physical key or a virtual key for switching the privacy call mode to the shared call mode is arranged on the terminal or the earphone, and if a terminal user has a switching requirement in the privacy call process, a call mode switching instruction can be sent by triggering the physical key or the virtual key. When receiving a call mode switching instruction, the control center switches the privacy call mode into a sharing call mode, starts the audio input and audio output functions of the shielding receiver to start the call function of the shielding receiver, and performs terminal call based on the target receiver and the shielding receiver, so that a terminal user and a sharer can receive call audio at the same time.
In the embodiment, the starting of the communication function of the target receiver is started by keeping the audio input and audio output functions of the target receiver started; and the audio input and output functions of the shielding receiver are switched to a preset mode to shield the function of shielding the receiver, so that privacy protection of terminal conversation through the target receiver is realized. Meanwhile, the automatic recovery after the privacy conversation is finished is beneficial to the continuous sharing of the audio, and the sharing and the use of the earphone are facilitated. In addition, through setting up the switching mechanism in the privacy conversation process, compromise sharing when realizing privacy protection, be favorable to satisfying different conversation demands.
Further, based on the first embodiment and the second embodiment of the call privacy protection method of the present invention, a third embodiment of the call privacy protection method of the present invention is proposed, where in the third embodiment, the step of determining whether the privacy call mode of the headset is turned on includes:
step S11, detecting whether a trigger instruction for triggering the privacy communication mode is received, and if the trigger instruction is received, judging whether the trigger instruction is effective;
in the embodiment, in the process of determining whether the privacy phone mode of the headset is turned on based on the trigger instruction sent by the terminal user, in order to ensure the security of turning on the privacy phone mode, a mechanism for verifying the validity of the trigger instruction is provided. After receiving a trigger instruction for selecting a call mode, the control center detects whether the trigger instruction for triggering the privacy call mode is received or not by identifying whether the trigger instruction carries a mode identifier for representing triggering of the privacy call mode, namely, whether the received trigger instruction is used for triggering the privacy call mode or not. And if the trigger instruction carries a mode identifier for representing triggering the privacy communication mode, indicating that the trigger instruction for triggering the privacy communication mode is received. Further judging the validity of the trigger instruction, wherein the validity is used for representing the authority of starting the privacy communication mode; if the triggering instruction is initiated by the personnel with the permission of starting the privacy communication mode, the triggering instruction is judged to be valid, otherwise, if the triggering instruction is initiated by the personnel without the permission of starting the privacy communication mode, the triggering instruction is judged to be invalid. The authority can be represented by fingerprint information, the fingerprint of a person with the authority is pre-recorded as a preset fingerprint, and whether the trigger instruction is effective or not is determined by judging whether the fingerprint corresponding to the trigger instruction is matched with the preset fingerprint or not. Specifically, the step of determining whether the trigger instruction is valid includes:
step S111, collecting a trigger fingerprint corresponding to the trigger instruction, comparing the trigger fingerprint with a preset fingerprint, and judging whether the trigger fingerprint is consistent with the preset fingerprint;
step S112, if the trigger fingerprint is consistent with a preset fingerprint, judging that the trigger instruction is valid;
step S113, if the trigger fingerprint is not consistent with a preset fingerprint, determining that the trigger instruction is invalid.
Further, fingerprint information of the terminal user in the process of initiating the trigger instruction is collected to serve as a trigger fingerprint corresponding to the trigger instruction, the trigger fingerprint is compared with the preset fingerprint, and whether the trigger fingerprint is consistent with any one of the preset fingerprints is judged. The consistency can be represented by a numerical range, for example, 95%, if the similarity between the trigger fingerprint and any one of the preset fingerprints reaches more than 95%, the consistency can be judged, and if not, the consistency is not judged.
Furthermore, if the comparison result shows that the trigger fingerprint is consistent with the preset fingerprint, the sender of the trigger instruction has the authority to start the private call mode, and the trigger instruction is determined to be valid. Otherwise, if the trigger instruction is inconsistent with the preset instruction, it indicates that the sender of the trigger instruction does not have the authority to start the privacy communication mode, and the trigger instruction is judged to be invalid.
Step S12, if the trigger instruction is valid, the privacy conversation mode of the earphone is judged to be started;
step S13, if the trigger instruction is not received or the received trigger instruction is invalid, determining that the privacy call mode of the headset is not turned on.
Further, after the trigger instruction is determined to be valid, the trigger instruction can start the privacy call mode of the earphone, so that the privacy call mode of the earphone is judged to be started, and the target earphone is determined to carry out privacy call. Otherwise, if it is determined that the trigger instruction is invalid, or the received trigger instruction does not trigger the privacy call mode, that is, the trigger instruction triggering the privacy call mode is not received, it is determined that the trigger instruction cannot be used for starting the privacy call mode of the headset, so that it is determined that the privacy call mode of the headset is not started, and then the two earpieces of the headset perform shared call.
According to the embodiment, the validity verification mechanism is set for the trigger instruction for starting the privacy communication mode, so that the privacy communication mode can be started only by the personnel with the privacy communication authority, and the security of the privacy communication is further ensured.
In addition, the present invention also provides a computer-readable storage medium, on which a call privacy protection program is stored, where the call privacy protection program, when executed by a processor, implements the steps of the embodiments of the call privacy protection method described above.
In the embodiment of the storage medium of the present invention, all technical features of the embodiments of the call privacy protection method are included, and the description and the explanation are substantially the same as those of the embodiments of the image optimization method, and will not be described in detail herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A conversation privacy protection method is characterized by comprising the following steps:
when a terminal connected with an earphone receives a call request in an audio sharing state, judging whether a privacy call mode of the earphone is started or not;
if the privacy calling mode is started, determining a target receiver corresponding to the privacy calling mode in the earphone, and determining a shielding receiver in the earphone;
keeping the conversation function of the target receiver open, and shielding the conversation function of the shielding receiver so as to carry out privacy protection on the terminal conversation based on the target receiver.
2. The call privacy protection method according to claim 1, wherein the step of keeping the call function of the target handset on and shielding the call function of the shielding handset comprises:
keeping the audio input and audio output functions of the target receiver open;
and switching the audio input and audio output functions of the shielding receiver to a preset mode so as to shield the call function of the shielding receiver.
3. The call privacy protection method according to claim 2, wherein the step of keeping the call function of the target handset on and shielding the call function of the target handset is followed by:
and after the terminal based on the target receiver is detected to be in a call, starting the audio input and audio output functions of the shielding receiver so as to recover the audio sharing state of the earphone.
4. The call privacy protection method according to claim 1, wherein the step of keeping the call function of the target handset on and shielding the call function of the target handset is followed by:
when a call mode switching instruction is received, switching the privacy call mode into a sharing call mode;
and starting a call function of the shielding receiver to carry out terminal call together based on the target receiver and the shielding receiver.
5. The call privacy protection method according to any one of claims 1 to 4, wherein the step of determining whether the privacy call mode of the headset is on includes:
detecting whether a trigger instruction for triggering the privacy communication mode is received, and if the trigger instruction is received, judging whether the trigger instruction is effective;
if the trigger instruction is valid, judging that the privacy conversation mode of the earphone is started;
and if the trigger instruction is not received or the received trigger instruction is invalid, judging that the privacy conversation mode of the earphone is not started.
6. The call privacy protection method according to claim 5, wherein the step of determining whether the trigger instruction is valid comprises:
acquiring a trigger fingerprint corresponding to the trigger instruction, comparing the trigger fingerprint with a preset fingerprint, and judging whether the trigger fingerprint is consistent with the preset fingerprint;
if the trigger fingerprint is consistent with a preset fingerprint, judging that the trigger instruction is valid;
and if the trigger fingerprint is not consistent with the preset fingerprint, judging that the trigger instruction is invalid.
7. The call privacy protection method according to any one of claims 1 to 4, wherein the step of determining whether the privacy call mode of the headset is on is followed by:
and if the privacy communication mode is not started, carrying out terminal communication based on the audio sharing state of the earphone.
8. A method of protecting privacy in a call as claimed in any one of claims 1 to 4 wherein the headset is a true wireless stereo TWS headset.
9. A call privacy protection apparatus comprising a memory, a processor and a call privacy protection program stored on the memory and executable on the processor, the call privacy protection program when executed by the processor implementing the steps of the call privacy protection method according to any one of claims 1 to 8.
10. A computer-readable storage medium, having a call privacy protection program stored thereon, which when executed by a processor implements the steps of the call privacy protection method according to any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010257126.2A CN111510551A (en) | 2020-04-02 | 2020-04-02 | Call privacy protection method, device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010257126.2A CN111510551A (en) | 2020-04-02 | 2020-04-02 | Call privacy protection method, device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111510551A true CN111510551A (en) | 2020-08-07 |
Family
ID=71872683
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010257126.2A Pending CN111510551A (en) | 2020-04-02 | 2020-04-02 | Call privacy protection method, device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111510551A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143653A (en) * | 2021-11-30 | 2022-03-04 | 深圳市科奈信科技有限公司 | Earphone reception mode switching method and earphone |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105101058A (en) * | 2015-07-13 | 2015-11-25 | 惠州Tcl移动通信有限公司 | Method and equipment for realizing cooperative works of multiple Bluetooth headsets |
WO2018032455A1 (en) * | 2016-08-18 | 2018-02-22 | 华为技术有限公司 | Bluetooth communication method and terminal |
-
2020
- 2020-04-02 CN CN202010257126.2A patent/CN111510551A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105101058A (en) * | 2015-07-13 | 2015-11-25 | 惠州Tcl移动通信有限公司 | Method and equipment for realizing cooperative works of multiple Bluetooth headsets |
WO2018032455A1 (en) * | 2016-08-18 | 2018-02-22 | 华为技术有限公司 | Bluetooth communication method and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143653A (en) * | 2021-11-30 | 2022-03-04 | 深圳市科奈信科技有限公司 | Earphone reception mode switching method and earphone |
CN114143653B (en) * | 2021-11-30 | 2024-05-28 | 深圳市科奈信科技有限公司 | Earphone radio mode switching method and earphone |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10785361B2 (en) | Method for call processing and electronic device | |
CN109033801B (en) | Method for verifying user identity by application program, mobile terminal and storage medium | |
CN108521505B (en) | Incoming call processing method and mobile terminal | |
CN113411793A (en) | Bluetooth communication method and terminal | |
CN102034060A (en) | Method and system for controlling operation access, and mobile terminal | |
KR20150032963A (en) | Apparatus and method for protecting privacy in terminal | |
CN109157841B (en) | Game team forming method, terminal, server and computer readable storage medium | |
CN106657528A (en) | Incoming call management method and device | |
CN107220132B (en) | Method, equipment and storage medium for monitoring file creation information | |
CN109788423B (en) | Voice receiving method, device and computer readable storage medium | |
CN115580677B (en) | Method for controlling equipment, electronic equipment and storage medium | |
CN108769410B (en) | Information sending method and mobile terminal | |
CN108012270B (en) | Information processing method, equipment and computer readable storage medium | |
CN110619199A (en) | Private information protection method and device for private contact person and readable storage medium | |
CN107786739B (en) | Information acquisition method and mobile terminal | |
CN112612598A (en) | Anti-addiction method, mobile terminal and computer-readable storage medium | |
CN113727318A (en) | Headset communication method, headset device, and computer-readable storage medium | |
WO2020173283A1 (en) | Reminding task processing method, terminal, and computer readable storage medium | |
CN111510551A (en) | Call privacy protection method, device and computer readable storage medium | |
CN107135498B (en) | File sharing method and equipment | |
CN114500730A (en) | Popup window function control method, device and computer readable storage medium | |
CN108040186B (en) | DTMF signal sending method and mobile terminal | |
CN114756849A (en) | Method and device for verifying Personal Identification Number (PIN) code | |
CN109451143B (en) | Call method and mobile terminal | |
CN114222302B (en) | Calling method and device for abnormal call, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200807 |
|
RJ01 | Rejection of invention patent application after publication |