CN104486503B - A kind of method of mobile terminal and voice encryption thereof - Google Patents

A kind of method of mobile terminal and voice encryption thereof Download PDF

Info

Publication number
CN104486503B
CN104486503B CN201410779624.8A CN201410779624A CN104486503B CN 104486503 B CN104486503 B CN 104486503B CN 201410779624 A CN201410779624 A CN 201410779624A CN 104486503 B CN104486503 B CN 104486503B
Authority
CN
China
Prior art keywords
mobile terminal
audio signal
voice
extraction
data channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410779624.8A
Other languages
Chinese (zh)
Other versions
CN104486503A (en
Inventor
杜国伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201410779624.8A priority Critical patent/CN104486503B/en
Publication of CN104486503A publication Critical patent/CN104486503A/en
Application granted granted Critical
Publication of CN104486503B publication Critical patent/CN104486503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method of mobile terminal and voice encryption thereof, belong to technical field of mobile terminals.The method is applied to the first mobile terminal and the second mobile terminal, and the method comprises: the first mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random; The audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal by data channel by the first mobile terminal, and remaining audio signal after extraction is sent to the second mobile terminal by voice channel; Second mobile terminal receives the audio signal that the first mobile terminal sends respectively by data channel and voice channel and the character field storing extracting position; According to character field, the audio signal restructuring from data channel and voice channel received is exported afterwards.The invention enables the voice of call to protect audio signal itself, the voice messaging fundamentally stopping to converse is ravesdropping.

Description

A kind of method of mobile terminal and voice encryption thereof
Technical field
The present invention relates to technical field of mobile terminals, be specifically related to a kind of method of mobile terminal and voice encryption thereof.
Background technology
Due to the life of people and the variation of work, in different occasions, the privacy content of user to need to be keep secret is also different, particularly relate to important phone, when there being important phone incoming call, if had a mind to by other people or by mistake hear or stolen by third party software, immeasurable loss may be caused.
In prior art; in order to overcome above-mentioned defect, the method for employing opens safe mode to mobile terminal or to important contact person, only has startup safe mode; the phone of incoming call just can normally be answered, and this mode can protect the privacy of user's communication to a certain extent.
But the method still existing defects of existing protection user's communication.Existing method is all limit the user answered or the current residing environment (safe mode or non-security mode) of mobile terminal after voice signal exports mostly, and do not relate to voice signal itself is encrypted and decrypted, if be only limit to the user answered or to the current residing environment of mobile terminal, after third party application forges current environment or the 3rd people gets the information such as user itself or default password, still can steal the important phone of user, the voice messaging can not fundamentally stopping to converse is ravesdropping.
Summary of the invention
The invention provides a kind of method of mobile terminal and voice encryption thereof, to reach the object be encrypted voice messaging itself, overcome the defect that is ravesdropping of voice messaging that above-mentioned existing method can not fundamentally be stopped to converse.
The technical scheme that the present invention solves the problems of the technologies described above is as follows.
According to an aspect of the present invention, the method for a kind of voice encryption provided, the method is applied to the first mobile terminal and the second mobile terminal, and the method comprises:
First mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal by data channel by the first mobile terminal, and remaining audio signal after extraction is sent to the second mobile terminal by voice channel;
Second mobile terminal receives the audio signal that the first mobile terminal sends respectively by data channel and voice channel and the character field storing extracting position;
According to character field, the audio signal restructuring from data channel and voice channel received is exported afterwards.
Preferably, for the audio signal after above-mentioned output restructuring, the method for this voice encryption also comprises:
Judge whether as people's ear is being answered a call, if so, then export the described audio signal after restructuring, otherwise, the audio signal that shielding exports.
Preferably, for above-mentioned output audio signal, the method for this voice encryption also comprises:
Exported after the audio signal from data channel and voice channel received restructuring by deciphering earphone.
Preferably, above-mentioned first mobile terminal from the audio signal received according to the step of the rule preset or Extraction parts section audio signal at random before, the method for this voice encryption also comprises:
Security schema is opened in operation according to user.
Preferably, the first mobile terminal is preset with for the first display interface conversed in the private mode and the second display interface conversed in the normal mode, and the method for this voice encryption also comprises:
When detecting that the first mobile terminal opens security schema, the first mobile terminal shows call under the first display interface, otherwise the first mobile terminal shows call under the second display interface.
Preferably, the second mobile terminal is preset with for the 3rd display interface conversed in the private mode and the 4th common display interface of conversing in the normal mode, and the method for this voice encryption also comprises:
When detecting that the second mobile terminal opens security schema, the second mobile terminal shows call under the 3rd display interface, otherwise the second mobile terminal shows call under the 4th display interface.
According to another aspect of the present invention, the method for a kind of voice encryption provided, the method is applied to the first mobile terminal sending audio signal, and the method comprises:
First mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal for received audio signal by data channel by the first mobile terminal, and remaining audio signal after extraction is sent to the second mobile terminal by voice channel.
According to a further aspect of the invention, a kind of mobile terminal for sending audio signal provided, this mobile terminal comprises:
Extraction module, for from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
Sending module, for the audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal for received audio signal by data channel, sends to the second mobile terminal by remaining audio signal after extraction by voice channel.
According to a further aspect of the invention, the method for a kind of voice encryption provided, the method is applied to the second mobile terminal of received audio signal, and the method comprises:
Second mobile terminal receives the audio signal that the first mobile terminal for sending audio signal sends respectively by data channel and voice channel and the character field storing extracting position;
According to character field, the audio signal restructuring from data channel and voice channel received is exported afterwards.
According to a further aspect of the invention, a kind of mobile terminal for received audio signal provided, this mobile terminal comprises:
Receiver module, for receiving the audio signal that the mobile terminal that sends audio signal sends respectively by data channel and voice channel and the character field storing extracting position;
Restructuring output module, for according to character field, by exporting from after the audio signal restructuring of data channel and voice channel of receiving.
The invention provides the method for mobile terminal and voice encryption thereof, by will send audio signal in extracting section out through data channel transmission to call the opposing party mobile terminal, and the position of extraction is stored the mobile terminal also issuing call the opposing party in the lump, export after the deciphering of this audio signal according to the character field storing extracting position after the mobile terminal of call the opposing party receives this audio signal, the voice conversed are protected audio signal itself, and protected in the process of transmission always, the voice messaging fundamentally stopping to converse is ravesdropping.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for voice encryption according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for voice encryption according to another embodiment of the present invention;
Fig. 3 is the flow chart of the method for voice encryption according to another embodiment of the present invention;
Fig. 4 is the exemplary block diagram of mobile terminal according to an embodiment of the invention;
Fig. 5 is the exemplary block diagram of the second mobile terminal according to an embodiment of the invention.
Embodiment
Be described principle of the present invention and feature below in conjunction with accompanying drawing, example, only for explaining the present invention, is not intended to limit scope of the present invention.
Embodiment one
Fig. 1 is the flow chart of the method for voice encryption according to an embodiment of the invention, the method of voice encryption according to an embodiment of the invention is described below in conjunction with Fig. 1, the method is applied to the first mobile terminal and the second mobile terminal that carry out voice call each other, this mobile terminal such as mobile phone, panel computer etc. may be used for the portable electric appts of voice call, as shown in Figure 1, the method for this voice encryption according to an embodiment of the invention comprises the following steps:
S10, the first mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal by data channel by S20, the first mobile terminal, and remaining audio signal after extraction is sent to the second mobile terminal by voice channel;
S30, the second mobile terminal receive the audio signal that the first mobile terminal sends respectively by data channel and voice channel and the character field storing extracting position;
S40, according to character field, to export after the audio signal from data channel and voice channel received restructuring.
In order to allow user have better operation and Perceived control, optionally, above-mentioned first mobile terminal from the audio signal received according to the step of the rule preset or Extraction parts section audio signal at random before, the method for this voice encryption also comprises:
Security schema is opened in operation according to user.
Wherein, security schema first mobile terminal is opened in the above-mentioned operation according to user and the second mobile terminal all opens security schema, the operation below only just carrying out when opening security schema.
Whether have people tapping, for this call in the private mode, the method for this voice encryption also comprises if noticing around phone to allow user:
In this audio signal, add DTMF (dual-tone multifrequency: DualToneMultiFrequency), sound or such as shake or send default voice prompt, noticing for reminding user whether has people eavesdropping at one's side.
Know to allow user which kind of state current call is in, whether enter secret telephony, this first mobile terminal is preset with for the first display interface conversed in the private mode and the second display interface conversed in the normal mode, and the method for this voice encryption also comprises:
When detecting that the first mobile terminal opens security schema, the first mobile terminal shows call under the first display interface, otherwise the first mobile terminal shows call under the second display interface.
This second mobile terminal is preset with for the 3rd display interface conversed in the private mode and the 4th common display interface of conversing in the normal mode, and the method for this voice encryption also comprises:
When detecting that the second mobile terminal opens security schema, the second mobile terminal shows call under the 3rd display interface, otherwise the second mobile terminal shows call under the 4th display interface.
In order to make the content (audio signal) conversed do not stolen by third-party application or intercept, the method for this voice encryption also comprises:
When detecting that third-party application obtains the instruction of the talking state of described first mobile terminal or described second mobile terminal, abandon this instruction.
Embodiment two
Fig. 2 is the flow chart of the method for voice encryption according to another embodiment of the present invention, and as shown in Figure 2, the method for this voice encryption is on the basis comprising above-mentioned steps S10, S20, S30, and above-mentioned S40 specifically comprises:
S41, according to character field, by the restructuring of the audio signal from data channel and voice channel received;
S42, judge whether as people's ear is being answered a call, if so, then export the described audio signal after restructuring, otherwise, the audio signal that shielding exports.
Wherein, judge whether as people's ear is being answered a call and can judged by infrared detection, whether the temperature that also can detect contact medium by temperature sensor is that the body temperature of people judges.
The object of the present embodiment is that call being only limitted to people's ear answers, to realize the object that other people cannot use earphone to cause dialog context exposure or cause dialog context to expose by the outer playing function of mobile terminal.
Embodiment three
Fig. 3 is the flow chart of the method for voice encryption according to another embodiment of the present invention, and as shown in Figure 3, the method for this voice encryption is on the basis comprising above-mentioned steps S10, S20, S30, and above-mentioned S40 is specially:
S43, according to character field, to be exported after the audio signal from data channel and voice channel received restructuring by deciphering earphone.
According to an example of the present embodiment, optionally, the method for this voice encryption also comprises:
Forbid the outer playing function of the second mobile terminal.
The object of the present embodiment is that the confidentiality making the content conversed is better, only has and just can hear important phone by specifically deciphering earphone.
Embodiment four
A method for voice encryption, the method is applied to the first mobile terminal sending audio signal, and the method comprises:
First mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal for received audio signal by data channel by the first mobile terminal, and remaining audio signal after extraction is sent to the second mobile terminal by voice channel.
Wherein, know to allow user which kind of state current call is in, whether enter secret telephony, this first mobile terminal is preset with for the first display interface conversed in the private mode and the second display interface conversed in the normal mode, and the method for this voice encryption also comprises:
When detecting that the first mobile terminal opens security schema, the first mobile terminal shows call under the first display interface, otherwise the first mobile terminal shows call under the second display interface.
In order to make the content (audio signal) conversed do not stolen by third-party application or intercept, the method for this voice encryption also comprises:
When detecting that third-party application obtains the instruction of the talking state of this first mobile terminal, abandon this instruction.
Embodiment five
A method for voice encryption, the method is applied to the second mobile terminal of received audio signal, and the method comprises:
Second mobile terminal receives the audio signal that the first mobile terminal for sending audio signal sends respectively by data channel and voice channel and the character field storing extracting position;
According to character field, the audio signal restructuring from data channel and voice channel received is exported afterwards.
Wherein, know to allow user which kind of state current call is in, whether enter secret telephony, this second mobile terminal is preset with for the 3rd display interface conversed in the private mode and the 4th common display interface of conversing in the normal mode, and the method for this voice encryption also comprises:
When detecting that the second mobile terminal opens security schema, the second mobile terminal shows call under the 3rd display interface, otherwise the second mobile terminal shows call under the 4th display interface.
In order to make the content (audio signal) conversed do not stolen by third-party application or intercept, the method for this voice encryption also comprises:
When detecting that third-party application obtains the instruction of the talking state of this second mobile terminal described, abandon this instruction.
Wherein, whether notice around phone to allow the user of use second mobile terminal and have people tapping, the method for this voice encryption if also comprising:
In this audio signal, add DTMF (dual-tone multifrequency: DualToneMultiFrequency), sound or such as shake or send default voice prompt, noticing for reminding user whether has people eavesdropping at one's side.
Embodiment six
Fig. 4 is the exemplary block diagram of mobile terminal according to an embodiment of the invention, describes the first mobile terminal for sending audio signal according to an embodiment of the invention and the second mobile terminal for received audio signal below in conjunction with Fig. 4.
As shown in Figure 4, this first mobile terminal 11 being used for sending audio signal comprises:
Extraction module 10, for from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
Sending module 20, for the audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal for received audio signal by data channel, remaining audio signal after extraction is sent to the second mobile terminal by voice channel.
Optionally, this first mobile terminal is preset with for the first display interface conversed in the private mode and the second display interface conversed in the normal mode, and this first mobile terminal also comprises:
First detection module, during for detecting that the first mobile terminal opens security schema, the first mobile terminal shows call under the first display interface, otherwise the first mobile terminal shows call under the second display interface.
This second mobile terminal 22 being used for received audio signal comprises:
Receiver module 30, for receiving the audio signal that the mobile terminal that sends audio signal sends respectively by data channel and voice channel and the character field storing extracting position;
Restructuring output module 40, for according to character field, by exporting from after the audio signal restructuring of data channel and voice channel of receiving.
Optionally, this second mobile terminal is preset with for the 3rd display interface conversed in the private mode and the 4th common display interface of conversing in the normal mode, and this second mobile terminal also comprises:
Second detection module, during for detecting that the second mobile terminal opens security schema, the second mobile terminal shows call under the 3rd display interface, otherwise the second mobile terminal shows call under the 4th display interface.
Embodiment seven
Fig. 5 is the exemplary block diagram of the second mobile terminal according to an embodiment of the invention, and this second mobile terminal 22 for received audio signal is on the basis comprising above-mentioned receiver module 30, and above-mentioned restructuring output module 40 specifically comprises:
Recomposition unit 41, for according to character field, recombinates the audio signal from data channel and voice channel received;
Judging unit 42, for judging whether as people's ear is being answered a call, if so, then exports the described audio signal after restructuring by output unit 43, otherwise, the audio signal that shielding exports.
Output unit 43, for exporting the described audio signal after restructuring.
Optionally, this second mobile terminal also comprises:
Handset module, for exporting after the audio signal from data channel and voice channel received restructuring by deciphering earphone.
The present invention by will send audio signal in extracting section out through data channel transmission to call the opposing party mobile terminal; and the position of extraction is stored the mobile terminal also issuing call the opposing party in the lump; export after the deciphering of this audio signal according to the character field storing extracting position after the mobile terminal of call the opposing party receives this audio signal; the voice conversed are protected audio signal itself; and protected in the process of transmission, the voice messaging fundamentally stopping to converse is ravesdropping. always
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a method for voice encryption, described method is applied to the first mobile terminal and the second mobile terminal, it is characterized in that, described method comprises:
Described first mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The described audio signal of the character field and extraction that store extracting position is sent to described second mobile terminal by data channel by described first mobile terminal, and remaining described audio signal after extraction is sent to described second mobile terminal by voice channel;
Described second mobile terminal receives the audio signal that described first mobile terminal sends respectively by data channel and voice channel and the described character field storing extracting position;
According to described character field, the described audio signal restructuring from data channel and voice channel received is exported afterwards.
2. the method for voice encryption according to claim 1, is characterized in that, for the described audio signal exported after restructuring, described method also comprises:
Judge whether as people's ear is being answered a call, if so, then export the described audio signal after restructuring, otherwise, the audio signal that shielding exports.
3. the method for voice encryption according to claim 1, is characterized in that, for the described audio signal of output, described method also comprises:
By deciphering earphone by exporting from after the described audio signal restructuring of data channel and voice channel of receiving.
4. the method for voice encryption according to claim 1, is characterized in that, described first mobile terminal from the audio signal received according to the step of the rule preset or Extraction parts section audio signal at random before, described method also comprises:
Security schema is opened in operation according to user.
5. the method for voice encryption according to claim 4, is characterized in that, described first mobile terminal is preset with for the first display interface conversed in the private mode and the second display interface conversed in the normal mode, and described method also comprises:
When detecting that described first mobile terminal opens security schema, described first mobile terminal shows call under described first display interface, otherwise described first mobile terminal shows call under described second display interface.
6. the method for voice encryption according to claim 4, is characterized in that, described second mobile terminal is preset with for the 3rd display interface conversed in the private mode and the 4th common display interface of conversing in the normal mode, and described method also comprises:
When detecting that described second mobile terminal opens security schema, described second mobile terminal shows call under described 3rd display interface, otherwise described second mobile terminal shows call under described 4th display interface.
7. a method for voice encryption, described method is applied to the first mobile terminal sending audio signal, and it is characterized in that, described method comprises:
Described first mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The described audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal for received audio signal by data channel by described first mobile terminal, and remaining described audio signal after extraction is sent to described second mobile terminal by voice channel.
8. for sending a mobile terminal for audio signal, it is characterized in that, described mobile terminal comprises:
Extraction module, for from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
Sending module, for the described audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal for received audio signal by data channel, remaining described audio signal after extraction is sent to described second mobile terminal by voice channel.
9. a method for voice encryption, described method is applied to the second mobile terminal of received audio signal, it is characterized in that, described method comprises:
Described second mobile terminal receives the audio signal that the first mobile terminal for sending audio signal sends respectively by data channel and voice channel and the character field storing extracting position;
According to described character field, the described audio signal restructuring from data channel and voice channel received is exported afterwards;
The audio signal that described first mobile terminal sends respectively by data channel and voice channel and the character field storing extracting position comprise:
Described first mobile terminal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The described audio signal of the character field and extraction that store extracting position is sent to the second mobile terminal by data channel by described first mobile terminal, and remaining described audio signal after extraction is sent to described second mobile terminal by voice channel.
10. for a mobile terminal for received audio signal, it is characterized in that, described mobile terminal comprises:
Receiver module, for receiving the audio signal that the mobile terminal that sends audio signal sends respectively by data channel and voice channel and the character field storing extracting position;
Restructuring output module, for according to described character field, by exporting from after the described audio signal restructuring of data channel and voice channel of receiving;
The audio signal that the mobile terminal of described transmission audio signal sends respectively by data channel and voice channel and the character field storing extracting position comprise:
The mobile terminal of described transmission audio signal from the audio signal received according to the rule preset or Extraction parts section audio signal at random;
The described audio signal of the character field and extraction that store extracting position is sent to described mobile terminal by data channel by the mobile terminal of described transmission audio signal, and remaining described audio signal after extraction is sent to described mobile terminal by voice channel.
CN201410779624.8A 2014-12-16 2014-12-16 A kind of method of mobile terminal and voice encryption thereof Active CN104486503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410779624.8A CN104486503B (en) 2014-12-16 2014-12-16 A kind of method of mobile terminal and voice encryption thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410779624.8A CN104486503B (en) 2014-12-16 2014-12-16 A kind of method of mobile terminal and voice encryption thereof

Publications (2)

Publication Number Publication Date
CN104486503A CN104486503A (en) 2015-04-01
CN104486503B true CN104486503B (en) 2016-04-13

Family

ID=52761005

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410779624.8A Active CN104486503B (en) 2014-12-16 2014-12-16 A kind of method of mobile terminal and voice encryption thereof

Country Status (1)

Country Link
CN (1) CN104486503B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577634B (en) * 2015-07-31 2019-11-12 宇龙计算机通信科技(深圳)有限公司 A kind of processing method and user terminal of the failure of encrypted word connection setup

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7280700B2 (en) * 2002-07-05 2007-10-09 Microsoft Corporation Optimization techniques for data compression
DE102005017393A1 (en) * 2005-04-14 2006-10-19 T-Mobile International Ag & Co. Kg Method and apparatus for synchronizing voice and data via location-based service location information
US20080220810A1 (en) * 2007-03-07 2008-09-11 Agere Systems, Inc. Communications server for handling parallel voice and data connections and method of using the same
CN101287274B (en) * 2007-04-11 2012-07-04 深圳市维信联合科技有限公司 Voice encryption system for mobile communication and encryption method thereof
US8824684B2 (en) * 2007-12-08 2014-09-02 International Business Machines Corporation Dynamic, selective obfuscation of information for multi-party transmission
CN101790011A (en) * 2009-01-23 2010-07-28 华为技术有限公司 Method and device for bearing VoIP voice

Also Published As

Publication number Publication date
CN104486503A (en) 2015-04-01

Similar Documents

Publication Publication Date Title
CN105472126B (en) Call privacy control method and device and mobile terminal
CN104202734A (en) Notification processing method, notification processing device and terminal
CN104158657A (en) Information processing method and device, as well as encryption equipment
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
CN105120047A (en) Display method of caller ID display information and terminal
CN104333662A (en) Mobile terminal and encrypting method and device for telephone answering of mobile terminal
CN104660809A (en) Answer management method and device for incoming call of private contact person
CN104506711A (en) Communication information processing method and device for terminal
CN105025146A (en) Incoming call answering control method, system and mobile terminal
CN106453052A (en) Message interaction method and apparatus thereof
CN104468988B (en) A kind of mobile terminal and the telephone receiving method and apparatus under non-security mode thereof
CN104601818A (en) Method and device for switching operating systems in communication process
CN104463025A (en) System switching method, system switching device and terminal
CN104038613A (en) Method and apparatus for information security management
CN104065648B (en) A kind of data processing method of voice call
CN105187672A (en) Incoming call answering method and mobile terminal
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN104580652A (en) Mobile terminal and session authentication method based on DTMF (dual-tone multifrequency) for mobile terminal
CN102186166A (en) Method for preventing environmental monitoring and environmental sound-recording based on Bluetooth technology
CN104486503B (en) A kind of method of mobile terminal and voice encryption thereof
CN104796885A (en) Method and system for realizing private conversation in conversation process
WO2017020598A1 (en) Contact information management method, apparatus and terminal
CN106559575A (en) Information privacy protection method
CN106357868A (en) Private contact person communication method and user terminal
TW201424332A (en) User information protecting system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant