User identity authentication method and device for multi-party video, and computer equipment

A technology of user identity and verification method, which is applied to the user identity verification method of multi-party video, computer equipment and storage media, and the field of devices. question

Pending Publication Date: 2020-05-08
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention provides a multi-party video user identity verification method, device, computer equipment, and storage medium, aiming at solving the problem that the identity authenticity of each participant cannot be verified when performing multi-party video in the prior art, and it is impossible to ensure It is the participant himself who participates in the multi-party video conference, which leads to the problem of low video security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device for multi-party video, and computer equipment
  • User identity authentication method and device for multi-party video, and computer equipment
  • User identity authentication method and device for multi-party video, and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0035] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity authentication method and a device for multi-party video, computer equipment and a storage medium. The method comprises the following steps: establishing connection with a request end corresponding to a video connection agreement request; performing face recognition according to the current image sent by the request end to obtain corresponding user identityrecognition information; if at least one assisting end corresponding to the request end does not establish connection with the server, obtaining video information corresponding to the request end at the current moment, forming a video feature sequence according to values corresponding to information in the video information, and inputting the video feature sequence into a convolutional neural network to obtain a corresponding video scene classification result; and acquiring a background music library corresponding to the background music library, randomly selecting audio data of one piece of music, and sending the audio data to the request end or the assistance end. According to the method, the identity authenticity of the participant is verified in real time during multi-party video playing, music in the waiting period can be correspondingly and randomly played according to the video scene classification result in the video waiting period, and the data security of the video is improved.

Description

technical field [0001] The present invention relates to the technical field of image recognition, in particular to a multi-party video user authentication method, device, computer equipment and storage medium. Background technique [0002] At present, in the process of multi-party video, usually multiple people participate in the video at the same time. When one party initiates a video request to invite multiple participants to participate in the video, when the invited participants receive the video request at the operating terminal, they can receive the video request by themselves , or someone else can receive the video request instead of the person, which results in that when one party initiates the video request, it cannot be ensured that the invited participants are themselves participating in the video. That is, it is impossible to verify the authenticity of the identity of each participant during multi-party video, and it is impossible to ensure that the participant h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/172G06V20/49G06V20/41
Inventor 齐燕
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products