Security authentication method during video sharing and handheld equipment
A video sharing and handheld device technology, applied in the field of mobile communication, can solve problems such as low security, incapable of video security authentication, incapable of video real-time authentication, etc., to achieve the effect of enhancing security and reliability, and enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] Figure 4 It is a schematic flowchart of performing security authentication during video sharing in Embodiment 1 of the present application.
[0077] Figure 4 The flow 400 shown is a communication flow for security authentication by using the technical solution of the present application when video sharing is performed between the calling party and the called party using the rich communication suite.
[0078] Step 401: The calling party requests video sharing, initiates a video sharing request, and requests to establish a video sharing session.
[0079] Step 402: After receiving the video sharing request from the calling party, the called party chooses to accept the video sharing invitation.
[0080] Step 403: The called party generates a request for the security identification according to its own needs, and attaches the request to the video sharing response sent to the calling party.
[0081] Step 404: After receiving the video sharing response from the called par...
Embodiment 2
[0087] Currently online shopping is very popular, but compared with traditional physical store shopping, the biggest disadvantage of online shopping is that consumers cannot be sure of the real appearance of the purchased goods. Utilizing the technical solution of this application, the safety and real-time characteristics of video communication can be guaranteed. Consumers can conduct video communication with sellers in advance when shopping, and judge the security verification results of the video provided by the seller. Credibility, and then confirm whether the product is the product you want through reliable video information.
Embodiment 3
[0089] When an emergency occurs to a child or an elderly person, the child or the elderly or others can use a handheld device to choose to contact their family members through a video call. At this time, the technical solution of this application can be used to authenticate the reliability and safety of the video. At the same time, As the called party, the family members can choose to use the geographic location information in the security ID to locate the calling party. The calling party does not need to use complicated third-party applications to perform geographical location sharing and other operations. Able to inform family members of their precise geographic location information. In this embodiment, the technical solution of the present application embodies good humanization, and is safe and reliable.
[0090] It can be seen from the above specific embodiments that the technical solution of the present application enhances the security of handheld devices for video shari...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 