Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method during video sharing and handheld equipment

A video sharing and handheld device technology, applied in the field of mobile communication, can solve problems such as low security, incapable of video security authentication, incapable of video real-time authentication, etc., to achieve the effect of enhancing security and reliability, and enhancing security

Active Publication Date: 2015-03-11
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, adding a watermark to a video can only indicate its source, and the video cannot be authenticated in real time, and its watermark is added by software and can be modified later, so its security is very low
[0010] It can be seen that the existing technology cannot perform security authentication on the shared video when the handheld device is used for recording video sharing or real-time video sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method during video sharing and handheld equipment
  • Security authentication method during video sharing and handheld equipment
  • Security authentication method during video sharing and handheld equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Figure 4 It is a schematic flowchart of performing security authentication during video sharing in Embodiment 1 of the present application.

[0077] Figure 4 The flow 400 shown is a communication flow for security authentication by using the technical solution of the present application when video sharing is performed between the calling party and the called party using the rich communication suite.

[0078] Step 401: The calling party requests video sharing, initiates a video sharing request, and requests to establish a video sharing session.

[0079] Step 402: After receiving the video sharing request from the calling party, the called party chooses to accept the video sharing invitation.

[0080] Step 403: The called party generates a request for the security identification according to its own needs, and attaches the request to the video sharing response sent to the calling party.

[0081] Step 404: After receiving the video sharing response from the called par...

Embodiment 2

[0087] Currently online shopping is very popular, but compared with traditional physical store shopping, the biggest disadvantage of online shopping is that consumers cannot be sure of the real appearance of the purchased goods. Utilizing the technical solution of this application, the safety and real-time characteristics of video communication can be guaranteed. Consumers can conduct video communication with sellers in advance when shopping, and judge the security verification results of the video provided by the seller. Credibility, and then confirm whether the product is the product you want through reliable video information.

Embodiment 3

[0089] When an emergency occurs to a child or an elderly person, the child or the elderly or others can use a handheld device to choose to contact their family members through a video call. At this time, the technical solution of this application can be used to authenticate the reliability and safety of the video. At the same time, As the called party, the family members can choose to use the geographic location information in the security ID to locate the calling party. The calling party does not need to use complicated third-party applications to perform geographical location sharing and other operations. Able to inform family members of their precise geographic location information. In this embodiment, the technical solution of the present application embodies good humanization, and is safe and reliable.

[0090] It can be seen from the above specific embodiments that the technical solution of the present application enhances the security of handheld devices for video shari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method during video sharing. The method comprises the following steps that: a calling party initiates a video sharing request to a called party; the called party returns a video sharing response to the calling party, wherein the video sharing response carries information which is used for requesting the calling party to add a security identifier into a video to be shared; the calling party adds the corresponding security identifier into the video to be shared according to the request, and transmits the video which is added with the security identifier to the called party; and the called party authenticates the security identifier in the video which is received from the calling party. The invention also discloses three kinds of handheld equipment. By the technical scheme, when the handheld equipment shares a recorded video or a real-time video, security authentication can be performed on the video to be shared.

Description

technical field [0001] The application relates to the technical field of mobile communication, in particular to a security authentication method and a handheld device during video sharing. Background technique [0002] With the development of technology, the functions of handheld devices are becoming more and more powerful. For example, based on rich communication suites, video sharing using handheld devices has been integrated into people's daily life. Rich Communication Suite (Rich Communication Suite, abbreviated as RCS) is a solution proposed by the GSM Association, which provides users with a complete set of online communication applications based on address book presentation, instant messaging, group chat, and file transfer. [0003] Since real-time video sharing involves personal privacy, the reliability of its source and the authentication of video have become technical problems to be solved urgently. However, the existing related technologies cannot well solve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/2347H04N21/435H04N21/436H04N21/4405H04N21/8358H04L29/06
Inventor 朱博樊巍韩扬朱振华
Owner BEIJING SAMSUNG TELECOM R&D CENT