WO2012151853A1 - Visual communication processing method and device - Google Patents

Visual communication processing method and device Download PDF

Info

Publication number
WO2012151853A1
WO2012151853A1 PCT/CN2011/081125 CN2011081125W WO2012151853A1 WO 2012151853 A1 WO2012151853 A1 WO 2012151853A1 CN 2011081125 W CN2011081125 W CN 2011081125W WO 2012151853 A1 WO2012151853 A1 WO 2012151853A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
authentication
authentication information
peer
visual communication
Prior art date
Application number
PCT/CN2011/081125
Other languages
French (fr)
Chinese (zh)
Inventor
华蓓蕾
廖珺
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012151853A1 publication Critical patent/WO2012151853A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment

Definitions

  • the present invention relates to the field of communications, and in particular to a visual communication processing method and apparatus.
  • a visual communication technology for example, a 3G videophone
  • a phone book can be associated with a file video source and a camera video source, and when the user answers the video call,
  • the video source type corresponding to the other party's information is selected and sent to the peer's video source.
  • the solution in the prior art is to exaggerate the original video image, so that the image or video of the other party received by the two parties is an exaggerated image or video, thereby ensuring the other party.
  • the image video received by the terminal is different from the user's portrait, which achieves the effect of protecting personal privacy to a certain extent.
  • the two parties communicating do not need to hide personal privacy, but need to directly perform video communication
  • the original image of the user is deformed in this way.
  • the latter image is masked so that both parties to the communication are not intuitive enough to receive the video or image of the other party.
  • the copyright information can be transmitted after the original video image is added, and the peer end displays the received data through the copyright object.
  • the implementation of this method requires more complicated algorithms for copyright information to process, which makes software implementation more difficult. In view of the problems in the related art, no effective solution has been proposed yet.
  • the present invention provides a visual communication processing method and apparatus, to at least solve the problems caused by the prior art that the prior art uses the modified video or the original video image to add copyright information to perform privacy protection of both sides of the visual communication. .
  • a visual communication processing method comprising the steps of: initiating a call request for establishing visual communication with the opposite end to a peer end, and transmitting the authentication to the opposite end
  • the information where the authentication information includes: information that the peer end uses to authenticate the initiator of the call request, and/or information that the initiator uses to request authentication of the peer end; And the feedback information of the peer end to the authentication information; determining, according to the feedback information, whether the visual communication is performed with the peer end.
  • the authentication information sent to the peer end includes information for identifying the identity of the sender, and the feedback information includes information for identifying the identity of the peer.
  • the information for identifying the identity comprises at least one of the following: text, picture, video, audio.
  • the authentication information sent to the peer end includes a question that requires the peer to answer, and the feedback information includes an answer to the question answered by the peer end.
  • a visual communication processing method comprising the steps of: receiving authentication information sent by an initiator of a call request for visual communication, wherein the authentication information is used to request a recipient to The sender performs authentication; and when the authentication information passes the authentication, generates and sends feedback information to the sender, wherein the feedback information is used to cause the sender to determine whether to perform the visual communication.
  • the received authentication information includes information for identifying the identity of the sender, and the feedback information includes information for identifying the identity of the recipient.
  • the received authentication information includes a question that needs to be answered by the recipient, and the feedback information includes an answer to the question answered by the recipient.
  • a visual communication processing apparatus including: a first sending module, configured to initiate a call request for establishing visual communication with the opposite end to a peer end, and The peer end sends the authentication information, where the authentication information includes: information that the peer end uses to authenticate the initiator of the call request, and/or the initiator uses to request to perform the peer end.
  • the first receiving module is configured to receive feedback information of the peer end to the authentication information
  • the determining module is configured to determine, according to the feedback information, whether to perform the visual communication with the peer end.
  • the authentication information sent to the peer end includes information for identifying the identity of the sender
  • the feedback information includes information for identifying the identity of the peer end
  • sending to the peer end The authentication information includes a question that requires the peer to answer, and the feedback information includes an answer to the question answered by the peer.
  • a visual communication processing apparatus including: a second receiving module, configured to receive authentication information sent by an initiator of a call request for visual communication, wherein the authentication information is used by And requesting to authenticate the sender; the second sending module is configured to: when the authentication information passes the authentication, generate and send feedback information to the sender, where the feedback information is used to enable the The sender determines whether to perform the visual communication.
  • a call request for establishing visual communication with the opposite end is initiated to the opposite end, and the authentication information is sent to the opposite end, where the authentication information includes: information used by the opposite end to authenticate the initiator of the call request. , And/or information used by the initiator to request authentication of the peer end; receiving feedback information of the peer end on the authentication information; determining whether to perform visual communication with the peer end according to the feedback information, and solving the prior art adopting the deformed video or the original The problem of adding copyright information to the video image to protect the privacy of both sides of the visual communication, thereby achieving the effect of ensuring the security of both parties and ensuring the privacy of both users of the communication.
  • FIG. 1 is a flowchart of a visual communication processing method applied to an initiator according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a visual communication processing method applied to a receiver according to an embodiment of the present invention
  • 3 is a structural block diagram of a visual communication processing device located at a transmitting end according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram of a visual communication processing device at a receiving end according to an embodiment of the present invention
  • FIG. 6 is a block diagram showing a structure of a videophone privacy protection system according to a preferred embodiment of the present invention
  • FIG. 7 is a videophone protection privacy according to an embodiment of the present invention.
  • FIG. 8 is a flowchart of a method for implementing videophone privacy protection according to another preferred embodiment of the present invention
  • FIG. 9 is a videophone privacy protection system according to another preferred embodiment of the present invention. Block diagram of the structure. BEST MODE FOR CARRYING OUT THE INVENTION
  • the present invention will be described in detail with reference to the accompanying drawings.
  • Step S102 Initiate a call request for establishing visual communication with a peer end, and send the authentication information to the peer end, where the authentication information includes: Information for authenticating the originator of the call request, and/or information for the initiator to request authentication of the peer.
  • Step S104 Receive feedback information of the peer end on the authentication information.
  • Step S106 determining whether to perform visual communication with the opposite end according to the feedback information.
  • the method of transmitting the authentication information is performed, and the original video image does not need to be deformed, and the real audio, video, and/or picture can be transmitted.
  • the implementation is simpler than on the video image.
  • the method of adding copyright information is easier to implement, thereby achieving the effect of visually communicating visually and intuitively.
  • 2 is a flow chart of a visual communication processing method applied to a recipient, which may also be referred to as a peer or called terminal, in accordance with an embodiment of the present invention. As shown in FIG.
  • Step S202 Receive authentication information sent by an initiator of a call request for visual communication, where the authentication information is used to request authentication of a sender.
  • Step S204 When the authentication information passes the authentication, generate and send feedback information to the sender, where the feedback information is used to enable the sender to determine whether to perform visual communication.
  • the authentication information sent to the peer end includes information for identifying the identity of the sender, for example, may be an identity photo, a video clip, a text, or an audio, etc.
  • the feedback information includes Information identifying the identity of the peer, for example, may be the identity photo, video clip, text, or audio of the peer.
  • both parties can be authenticated, and any one of them can stop the process as long as they believe that the other party's authentication information is unreliable.
  • the two parties can agree on the problem (the problem mentioned here includes the password), and the feedback information sent to the peer end includes the question that needs to be answered by the opposite party, and feedback The information includes the answer to the question answered by the peer.
  • the above two may be used alone or in combination.
  • a visual communication processing device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments thereof, and has not been described again, and the following is related to the code device. Each module is described.
  • FIG. 3 is a structural block diagram of a visual communication processing apparatus located at a transmitting side according to an embodiment of the present invention. As shown in FIG. 3, the apparatus includes a first transmitting module 30, a first receiving module 32, and a determining module 33. The various modules of the device and their functions are described below.
  • the first sending module 30 is configured to initiate a call request for establishing visual communication with the peer end, and send the authentication information to the peer end, where the authentication information includes: the peer end is used to initiate the call request Information for authentication, and/or information used by the initiator to request authentication of the peer.
  • the first receiving module 32 is connected to the first sending module 30, and the module is configured to receive the feedback information of the authentication information to the peer end, where the authentication information sent to the peer end includes information for identifying the identity of the sender, and the feedback information includes Information used to identify the identity of the peer. For example, the authentication information sent to the peer end includes a question that needs to be answered by the peer end, and the feedback information includes an answer to the question answered by the peer end.
  • FIG. 4 is a structural block diagram of a visual communication processing apparatus at a receiving end according to an embodiment of the present invention. As shown in FIG. 4, the structure includes a second receiving module 40 and a second transmitting module 42. The various modules of the device and their functions are described below.
  • the second receiving module 40 is configured to receive the authentication information sent by the initiator of the call request for visual communication, where the authentication information is used to request authentication of the sender, and the second sending module 42 is connected to the second receiving module 40.
  • FIG. 5 is a flowchart of a method for protecting privacy of a videophone according to a preferred embodiment of the present invention. As shown in FIG. 5, the method includes the following steps: Step S502: A calling terminal initiates a call to a called terminal, and a call bearer is established. Step S504, the calling terminal sends the authentication information. This information is used by the called terminal to authenticate the calling terminal, thereby ensuring privacy.
  • the first frame content of the picture sent by the calling terminal to the called terminal is user personal identity authentication information, such as verification content, identity photo, and the like.
  • the called terminal receives the authentication information, and generates and sends the feedback information according to the authentication information. It should be noted that after receiving the authentication information, the called terminal displays on the screen of the called terminal, and the called user verifies the credibility of the information, confirms the current call, and sends its own authentication information to the calling terminal.
  • the calling terminal receives the feedback information of the called terminal, and confirms the current call according to the feedback information. In this step, the calling terminal receives the authentication information, which is displayed on the terminal screen, and the calling user checks the identity of the other party and confirms the current call.
  • the real image here may be the original image sent by the sender. It may also be an image obtained by performing a certain processing (for example, encoding, compression, etc.) on the original image, and performing an inverse processing (for example, decoding, decompression, etc.) after receiving the image, and the image may exist with the original image.
  • a certain processing for example, encoding, compression, etc.
  • an inverse processing for example, decoding, decompression, etc.
  • the original image can be identified by the image, that is, the information of the other party of the communication can be identified.
  • a videophone privacy protection system is also provided. FIG.
  • the system includes The authentication information generating unit 60, the transmitting unit 62, the determining unit 64, and the processing unit 66.
  • the various modules in the system and their functions are described below.
  • the authentication information generating unit 60 is configured to generate authentication information transmitted to the counterpart terminal. For example, it can be a picture, a video, or the like.
  • the transmitting unit 62 is connected to the authentication information generating unit 60 for transmitting the authentication information to the counterpart terminal.
  • the authentication information generating unit 60 and the transmitting unit 62 implement functions similar to those of the first transmitting module 30.
  • the judging unit 64 is connected to the sending unit 62, and the unit is used for judging the authentication information fed back by the end user.
  • the processing unit 66 is connected to the judging unit 64 for performing corresponding processing according to the judgment result.
  • the determining unit 64 and the processing unit 66 implement functions similar to those of the determining module 34.
  • Step S701 Terminal A turns on (or sets) a video call identity authentication function. And edit the authentication information to generate a certified picture or video.
  • the editable authentication information can contain some prompt statements, for example, "I am ****, please confirm” and so on. It is also possible to preset or save the authentication picture directly on the terminal A without requiring the user to edit, for example, an identity photo or a short video, etc., which can be selectively configured by the user.
  • Step S702 the terminal A initiates a video call to the terminal B to establish a video call bearer.
  • Step S703 the terminal A determines whether the identity authentication function is enabled. If the identity authentication function is enabled, step S704 is performed. If the identity authentication function is not enabled, step S708 is performed to perform a regular video call. Step S704, sending identity authentication information to the peer mobile phone. For example, pictures or videos, etc.
  • Step S705 The terminal B receives the authentication information, and the terminal B user determines whether the calling user passes the authentication by using the authentication information. The terminal B receives the authentication information, decodes the authentication information (for example, a picture or video), and displays it on the screen of the terminal B to prompt the user. If the user passes the authentication, ⁇ , the user views the information content and accepts the authentication information, step S706 is performed.
  • step S709 is performed to hang up the visual call link, and the entire process ends.
  • step S706 the terminal B sets the authentication information, and sends the authentication information to the terminal A after the setting is completed.
  • the setting process is the same as that of terminal A step S701, and can be edited by the user himself or by setting default authentication information.
  • Step S707 The terminal A determines that the authentication information sent by the terminal B is received, and the terminal A user determines whether the called user passes the authentication by using the authentication information. The terminal A user confirms whether the authentication is passed.
  • step S708 is performed to perform a video call process between the user of the terminal A and the user of the terminal B. If the authentication is not passed, that is, if the terminal A receives the authentication information, but the user rejects the authentication information after viewing the information content, step S709 is performed to hang up the video call link, and the entire process ends.
  • the user confirmation mode of the terminal A or the terminal B may be, but not limited to, sending a specific key value or a designated character to the other party by pressing the confirmation key, and determining whether the content is satisfied by the other end.
  • FIG. 8 is a flowchart of a method for implementing privacy of videophone protection according to another preferred embodiment of the present invention. As shown in FIG.
  • Step S801 A user of terminal A sets video call authentication information. For example, an editing interface can be given, and the user can preset the questions and answers by himself; the questions and answers can be preset by the system, and the user can perform selective configuration.
  • the authentication content can be a password inquiry, or a question agreed by both parties (for example, do you know ***?), or a randomly generated authentication code or authentication character.
  • Step S802 the terminal A initiates a video call to the terminal B to establish a video call bearer.
  • step S803 the terminal A determines whether the identity authentication function is enabled. If the identity authentication function is enabled, step S804 is performed. If the identity authentication function is not enabled, step S808 is performed to perform a regular video call.
  • Step S804 if the terminal A turns on the identity authentication function, sends the set authentication information (for example, a password or a question query) to the terminal B.
  • Step S805 the terminal B receives the authentication information, decodes the authentication information and displays the prompting user on the screen, and the terminal B user decides whether to accept the current call. If the user accepts the call, the local user enters the password or If the answer to the question or the authentication character is completed, step S806 is performed. If the user rejects the input, step S809 is performed to hang up the visual call link.
  • Step S806 if the terminal B user inputs the authentication information result, the terminal B performs the encoding process on the input content, and sends the input content to the terminal A, and performs step S807.
  • Step S807 the terminal A receives the result of the authentication information sent by the terminal B, and compares the content preset in step S801. If the comparison is consistent and the information is correct, step S808 is performed to perform a video call process between the user of the terminal A and the user of the terminal B. If the comparison is inconsistent, indicating that the authentication information is incorrect, execute S809 to hang up the video call link.
  • 9 is a structural block diagram of a system for protecting privacy of a videophone according to another preferred embodiment of the present invention. As shown in FIG. 9, the system includes: an authentication information generating unit 90, a transmitting unit 92, a determining unit 94, and a processing unit 96. These units can be implemented in software, hardware, or a combination of hardware and software.
  • the system is not only suitable for mobile terminals, but also for wired network terminals.
  • the authentication information generating unit 90 is mainly configured to generate an authentication information picture or video, or to configure a password inquiry, a question inquiry, or a randomly generated authentication character.
  • the sending unit 92 is connected to the authentication information generating unit 90, and is mainly configured to send the authentication information to the video call peer device.
  • the determining unit 94 is connected to the sending unit 92, and is mainly configured to determine the authentication information sent by the peer user, and the specific determining manner can determine the signaling content, and can also determine the key value, and can also perform the algorithm on the peer input information content according to an algorithm. Calculate and judge whether the calculation result meets the requirements.
  • the processing unit 96 is connected to the judging unit 94, and is mainly arranged to perform corresponding processing according to the judgment result of the judging unit 94. For example, you can hang up the video call or switch to the normal video call process.
  • a visual communication processing software is provided, which is used to execute the technical solutions described in the foregoing embodiments and the preferred embodiments.
  • a storage medium is also provided. The above-described software is stored in the storage medium, and includes, but is not limited to, an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device so that They are stored in a storage device by a computing device, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Abstract

Disclosed are a visual communication processing method and device. The method comprises the following steps: initiating to a peer end a call request for establishing visual communication with the peer end, and sending to the peer end authentication information, the authentication information comprising information that the peer end performs authentication on an initiator of the call request, and/or information that the initiator requests to perform authentication on the peer end; receiving feedback information from the peer end to the authentication information; and determining, according to the feedback information, whether to perform visual communication with the peer end. The present invention improves the security of visual communication.

Description

可视通信处理方法及装置 技术领域 本发明涉及通信领域, 具体而言, 涉及可视通信处理方法及装置。 背景技术 随着可视通信技术(例如, 3G可视电话) 的发展, 在进行视频通信时, 可以将电 话本与文件视频源和摄像头视频源进行对应, 当用户在接听视频电话时, 可根据对方 信息对应的视频源类型选择发送给对端的视频源。 为了保护通信双方的个人隐私, 现有技术中的解决办法是对原始视频图像采用夸 张变形,这样,通信的双方接收到的对方的图像或视频是经过夸张变形的图像或视频, 从而保证了对方终端收到的图像视频不同于用户的肖像, 在一定程度上达到了保护个 人隐私的效果。但是, 当进行通信的双方在进行通信的过程中, 不需要隐藏个人隐私, 而是需要直接地进行视频通信, 双方可以直接地看到对方的视频时, 使用这种方式用 户的原始图像被变形后的图像掩盖, 这样, 通信的双方在接收到对方的视频或图像时 不够直观。 解决这一问题可以采用在原始视频图像上增加版权信息后传输, 对端通过 版权对象来显示收到的数据。 但是, 这种方法的实现需要较为复杂的版权信息的算法 来处理, 导致软件实现较为困难。 针对相关技术中存在的问题, 目前尚未提出有效的解决方案。 发明内容 本发明提供了可视通信处理方法及装置, 以至少解决上述相关技术中存在现有技 术中采用变形视频或原始视频图像上增加版权信息进行可视通信双方的隐私保护所带 来的问题。 根据本发明的一个方面, 提供了一种可视通信处理方法, 该方法包括如下步骤: 向对端发起用于与所述对端建立可视通信的呼叫请求, 并向所述对端发送认证信息, 其中, 所述认证信息包括: 所述对端用于对所述呼叫请求的发起方进行认证的信息, 和 /或所述发起方用于请求对所述对端的进行认证的信息; 接收所述对端对所述认证信 息的反馈信息; 根据所述反馈信息确定是否与所述对端进行所述可视通信。 优选地, 向所述对端发送的认证信息包括用于标识所述发送方身份的信息, 所述 反馈信息包括用于标识所述对端身份的信息。 优选地, 用于标识身份的信息包括以下至少之一: 文字、 图片、 视频、 音频。 优选地, 向所述对端发送的认证信息包括需要所述对端回答的问题, 所述反馈信 息包括对端回答的所述问题的答案。 根据本发明的另一个方面, 提供了一种可视通信处理方法, 包括如下步骤: 接收 可视通信的呼叫请求的发起方发送的认证信息, 其中, 所述认证信息用于请求接收方 对所述发送方进行认证; 在所述认证信息通过认证的情况下, 生成并向所述发送方发 送反馈信息, 其中, 所述反馈信息用于使所述发送方确定是否进行所述可视通信。 优选地, 接收到的所述认证信息包括用于标识所述发送方身份的信息, 所述反馈 信息包括用于标识接收方身份的信息。 优选地, 接收的所所述认证信息包括需要所述接收方回答的问题, 所述反馈信息 包括所述接收方回答的所述问题的答案。 根据本发明的再一个方面, 还提供了一种可视通信处理装置, 包括: 第一发送模 块, 设置为向对端发起用于与所述对端建立可视通信的呼叫请求, 并向所述对端发送 认证信息, 其中, 所述认证信息包括: 所述对端用于对所述呼叫请求的发起方进行认 证的信息, 和 /或所述发起方用于请求对所述对端的进行认证的信息; 第一接收模块, 设置为接收所述对端对所述认证信息的反馈信息; 确定模块, 设置为根据所述反馈信 息确定是否与所述对端进行所述可视通信。 优选地, 向所述对端发送的认证信息包括用于标识所述发送方身份的信息, 所述 反馈信息包括用于标识所述对端身份的信息; 和 /或, 向所述对端发送的认证信息包括 需要所述对端回答的问题, 所述反馈信息包括对端回答的所述问题的答案。 根据本发明的又一个方面, 还提供了一种可视通信处理装置, 包括: 第二接收模 块, 设置为接收可视通信的呼叫请求的发起方发送的认证信息, 其中, 所述认证信息 用于请求对所述发送方进行认证; 第二发送模块, 设置为在所述认证信息通过认证的 情况下, 生成并向所述发送方发送反馈信息, 其中, 所述反馈信息用于使所述发送方 确定是否进行所述可视通信。 通过本发明, 采用向对端发起用于与对端建立可视通信的呼叫请求, 并向对端发 送认证信息, 其中, 认证信息包括: 对端用于对呼叫请求的发起方进行认证的信息, 和 /或发起方用于请求对对端的进行认证的信息; 接收对端对认证信息的反馈信息; 根 据反馈信息确定是否与对端进行可视通信, 解决了现有技术中采用变形视频或原始视 频图像上增加版权信息进行可视通信双方的隐私保护所带来的问题, 进而达到了确保 通信双方的安全性和保证通信双方用户隐私的效果。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据本发明实施例的应用于发起方的可视通信处理方法的流程图; 图 2是根据本发明实施例的应用于接收方的可视通信处理方法的流程图; 图 3是根据本发明实施例的位于发送方的可视通信处理装置的结构框图; 图 4是根据本发明实施例的位于接收端的可视通信处理装置的结构框图; 图 5是根据本发明优选实施例的可视电话保护隐私的方法的流程图; 图 6是根据本发明优选实施例的可视电话保护隐私的系统的结构框图; 图 7是根据本发明实施例的可视电话保护隐私的实现方法的流程图; 图 8是根据本发明另一个优选实施例的可视电话保护隐私的实现方法的流程图; 图 9是根据本发明另一个优选实施例的可视电话保护隐私的系统的结构框图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 图 1是根据本发明实施例的应用于发起方的可视通信处理方法的流程图, 发起方 也称为发送方或主叫终端。 如图 1所示, 该流程包括如下步骤: 步骤 S102, 向对端发起用于与对端建立可视通信的呼叫请求, 并向对端发送认证 信息, 其中, 认证信息包括: 对端用于对呼叫请求的发起方进行认证的信息, 和 /或发 起方用于请求对对端的进行认证的信息。 步骤 S104, 接收对端对认证信息的反馈信息。 步骤 S106, 根据反馈信息确定是否与对端进行可视通信。 通过上述步骤, 采用发送认证信息的方式来进行, 不需要对原始的视频图像进行 变形处理, 可以传输真实的音频、 视频、 和 /或图片, 另外, 实施起来也比较简单, 比 在视频图像上增加版权信息的方式更容易实施, 从而达到了安全直观地进行可视通信 的效果。 图 2是根据本发明实施例的应用于接收方的可视通信处理方法的流程图, 该接收 方也可以称为对端或者被叫终端。 如图 2所示, 该流程包括如下步骤: 步骤 S202, 接收可视通信的呼叫请求的发起方发送的认证信息, 其中, 该认证信 息用于请求对发送方进行认证。 步骤 S204,在认证信息通过认证的情况下,生成并向发送方发送反馈信息,其中, 该反馈信息用于使发送方确定是否进行可视通信。 作为一个比较优的实施方式, 向对端发送的认证信息包括用于标识发送方身份的 信息, 例如, 可以是身份照片、 视频片段、 文字、 或者音频等等; 此时, 反馈信息包 括用于标识对端身份的信息, 例如, 可以是对端的身份照片、 视频片段、 文字、 或者 音频等等。 通过这样的方式可以实现双方的认证, 只要其中的任何一方认为对方的认 证信息不可靠, 均可以停止流程。 如果不希望暴露个人的身份信息, 在另外一个优选实施方式中, 可以双方来约定 问题(这里所说的问题包括密码),在向对端发送的认证信息包括需要对端回答的问题 时, 反馈信息包括对端回答的问题的答案。 当然, 上述的两个可以单独使用也可以组 合使用。 在本实施例中, 还提供了一种可视通信处理装置, 该装置用于实现上述实施例及 其优选的实施方式, 已经进行过说明的不再赘述, 下面对该对码装置涉及的各个模块 进行说明。 如以下所使用的, 术语"模块"可以实现预定功能的软件和 /或硬件的组合。 尽管以下实施例所描述的系统和方法较佳地以软件来实现, 但是硬件, 或者软件和硬 件的组合的实现也是可能并被构想的。 图 3是根据本发明实施例的位于发送方的可视通信处理装置的结构框图, 如图 3 所示, 该装置包括第一发送模块 30, 第一接收模块 32和确定模块 33。 下面对该装置 的各个模块及其功能进行说明。 第一发送模块 30, 设置为向对端发起用于与对端建立可视通信的呼叫请求, 并向 对端发送认证信息, 其中, 该认证信息包括: 对端用于对呼叫请求的发起方进行认证 的信息, 和 /或发起方用于请求对对端的进行认证的信息。 第一接收模块 32连接至第 一发送模块 30, 该模块设置为接收对端对认证信息的反馈信息, 其中, 向对端发送的 认证信息包括用于标识发送方身份的信息,该反馈信息包括用于标识对端身份的信息。 例如, 向对端发送的认证信息包括需要对端回答的问题, 反馈信息包括对端回答的问 题的答案。 确定模块 34连接至第一接收模块 32, 该模块设置为根据反馈信息确定是 否与对端进行可视通信。 图 4是根据本发明实施例的位于接收端的可视通信处理装置的结构框图, 如图 4 所示, 该结构包括第二接收模块 40和第二发送模块 42。 下面对该装置的各个模块及 其功能进行说明。 第二接收模块 40, 设置为接收可视通信的呼叫请求的发起方发送的认证信息, 其 中, 该认证信息用于请求对发送方进行认证; 第二发送模块 42 连接至第二接收模块 40, 设置为在认证信息通过认证的情况下, 生成并向发送方发送反馈信息, 其中, 反 馈信息用于使发送方确定是否进行可视通信。 下面结合优选实施例进行说明,该优选实施例结合了上述实施例及优选实施方式。 图 5是根据本发明优选实施例的可视电话保护隐私的方法的流程图,如图 5所示, 该方法包括以下步骤: 步骤 S502, 主叫终端向被叫终端发起呼叫, 呼叫承载建立。 步骤 S504, 主叫终端发送认证信息。 该信息用于被叫终端对主叫终端进行认证, 从而使得保证隐私。 例如, 可以是主叫终端向被叫终端发送图片的第一帧内容为用户 个人身份认证信息, 如验证内容、 身份照片等。 步骤 S506, 被叫终端接收认证信息, 根据认证信息生成并发送反馈信息。 需要说 明的是, 被叫终端在收到认证信息后, 显示在被叫终端屏幕, 被叫用户验证信息可信 度, 确认本次呼叫, 同时向主叫终端发送自己的认证信息。 步骤 S508,主叫终端接收被叫终端的反馈信息,并根据该反馈信息确认本次呼叫。 在该步骤中, 主叫终端收到认证信息, 显示在终端屏幕, 由主叫用户核实对方身份, 并确认本次呼叫。 此时, 呼叫链路完全建立, 之后可以进行主叫端和被叫端真实图像 和语音信息的传输, 需要说明的是, 此处的真实图像可以是发送方发送的原始图像, 也可以是将原始图像进行一定的处理 (例如, 编码, 压缩等) 后进行发送, 接收方接 收后进行反处理 (例如, 解码, 解压缩等) 的图像, 该图像可能与原始的图像存在一 定的差别, 但是, 通过该图像可以识别出原始的图像, 即可以识别出通信的另一方的 信息。 在本优选实施例中, 还提供了一种可视电话保护隐私的系统, 图 6是根据本发明 优选实施例的可视电话保护隐私的系统的结构框图, 如图 6所示, 该系统包括认证信 息生成单元 60, 发送单元 62, 判断单元 64和处理单元 66。 下面对该系统中的各个模 块及其功能进行说明。 认证信息生成单元 60,用于生成向对方终端发送的认证信息。例如,可以是图片, 也可以为视频等。 发送单元 62连接至认证信息生成单元 60, 该单元用于向对方终端 发送认证信息。 其中, 认证信息生成单元 60和发送单元 62实现与第一发送模块 30 类似的功能。 判断单元 64连接至发送单元 62, 该单元用于对端用户反馈的认证信息 进行判断。 处理单元 66连接至判断单元 64, 该单元用于根据判断结果, 进行相应的 处理。 其中, 判断单元 64和处理单元 66实现与确定模块 34类似的功能。 通过本优选实施例及其实施方式, 通过呼叫双方进行身份认证, 确保可视通话的 安全性, 保障了通话双方用户的隐私, 从而保护了用户肖像不被任意获取及散布。 下面结合附图和优选实施例及其优选实施方式进行进一步地说明。 图 7是根据本发明优选实施例的可视电话保护隐私的实现方法的流程图, 如图 7 所示, 该流程包括以下步骤: 步骤 S701 , 终端 A开启 (或设置)可视通话身份认证功能, 并编辑认证信息, 生 成认证图片或者视频。 可编辑认证信息可以包含一些提示性语句, 例如, "我是 ****, 请确认"等等。 也可以不需要用户进行编辑, 直接在终端 A上预置或保存认证图片, 例如, 身份照片或者是短视频等, 可以由用户进行选择性配置。 步骤 S702, 终端 A向终端 B发起可视通话呼叫, 建立可视通话承载。 步骤 S703 , 终端 A判断是否开启身份认证功能, 如果开启该身份认证功能, 执行 步骤 S704。 如果没有开启身份认证功能, 则执行步骤 S708进行常规可视通话。 步骤 S704, 向对端手机发送身份认证信息。 例如, 图片或者视频等等。 步骤 S705, 终端 B收到认证信息, 该终端 B用户通过该认证信息判定该主叫用 户是否通过认证。 终端 B收到认证信息, 将认证信息 (例如, 图片或者视频) 解码后 显示在终端 B的屏幕上, 提示用户。 如果通过认证, δΡ, 用户查看信息内容并接受认 证信息, 则执行步骤 S706。 如果未通过认证, SP, 如果终端 B收到认证信息, 用户查 看信息内容并拒绝, 则执行步骤 S709挂断可视通话链路, 整个过程结束。 步骤 S706, 终端 B设置认证信息, 设置完成后将认证信息向终端 A发送。 设置 过程与终端 A步骤 S701类同, 可以由用户自己编辑, 也可以设置缺省的认证信息。 步骤 S707, 终端 A判断收到终端 B发送的认证信息, 该终端 A用户通过该认证 信息判定该被叫用户是否通过认证。该终端 A用户确认是否通过认证,如果确认通过, 则执行步骤 S708, 终端 A用户与终端 B用户之间进行可视通话过程。 如果未通过认 证, 即, 如果终端 A收到认证信息, 但用户查看信息内容后拒绝认证信息, 则执行步 骤 S709挂断可视通话链路, 整个过程结束。 需要说明的是, 在上述优选实施例中, 终端 A或者终端 B的用户确认方式可以但 不限于通过按下确认键, 向对方发送特定键值或者指定字符, 由另一端进行判断是否 满足要求。 图 8是根据本发明另一个优选实施例的可视电话保护隐私的实现方法的流程图, 如图 8所示, 该流程包括以下步骤: 步骤 S801 , 终端 A用户设置可视通话认证信息。例如, 可以给出编辑界面, 由本 机用户自行进行问题和答案的预置; 也可以由系统预设问题和答案, 由用户进行选择 性配置。 认证内容可以为密码询问, 或者为双方约定的问题(例如, 你知道 ***吗? ), 或者为随机生成的认证码或认证字符。 步骤 S802, 终端 A向终端 B发起可视通话呼叫, 建立可视通话承载。 步骤 S803 , 终端 A判断是否开启身份认证功能, 如果开启身份认证功能, 执行步 骤 S804。 如果没有开启身份认证功能, 则执行步骤 S808进行常规可视通话。 步骤 S804, 如果终端 A开启身份认证功能, 向终端 B发送设置好的认证信息(例 如, 密码或问题询问)。 步骤 S805 , 终端 B收到认证信息, 解码认证信息并显示在屏幕上提示用户, 终端 B用户决定是否接受本次呼叫。 如果用户接受本次呼叫, 即, 本端用户输入密码或者 问题答案或者认证字符, 则执行步骤 S806。 如果用户拒绝输入, 则执行步骤 S809挂 断可视通话链路。 步骤 S806, 如果终端 B用户输入认证信息结果, 则终端 B将输入内容经过编码 处理, 发送给终端 A, 执行步骤 S807。 步骤 S807, 终端 A收到终端 B发送的认证信息结果, 与步骤 S801预置的内容进 行比对。 如果比对一致, 说明信息正确, 则执行步骤 S808, 终端 A用户与终端 B用 户之间进行可视通话过程。如果比对不一致, 说明认证信息错误, 则执行 S809挂断可 视通话链路。 图 9是根据本发明另一个优选实施例的可视电话保护隐私的系统的结构框图, 如 图 9所示, 该系统包括: 认证信息生成单元 90、 发送单元 92、 判断单元 94、 处理单 元 96, 这些单元可以通过软件、 硬件、 或者软硬件结合实现。 该系统不仅适用于移动 终端, 也适用于有线网络终端。 认证信息生成单元 90, 主要是设置为生成认证信息图片或者视频, 或者用于配置 密码询问、 问题询问或者随机生成认证字符。 发送单元 92连接至认证信息生成单元 90, 主要设置为将认证信息发送给可视通 话对端设备。 判断单元 94连接至发送单元 92, 主要设置为对对端用户发送的认证信息进行判 断, 具体判断方式, 可以判断信令内容, 也可以判断键值, 还可以对对端输入信息内 容按照算法进行计算, 对计算结果判断是否符合要求。 处理单元 96连接至判断单元 94, 主要设置为根据判断单元 94的判断结果, 进行 相应的处理。 例如, 可以为挂断可视通话, 也可以为切换到正常的可视通话过程。 在另外一个实施例中, 还提供了一种可视通信处理软件, 该软件用于执行上述实 施例及优选实施例中描述的技术方案 在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有上述软件, 该存储介质包括但不限于光盘、 软盘、 硬盘、 可擦写存储器等。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而可以将 它们存储在存储装置中由计算装置来执行,或者将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限 制于任何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 TECHNICAL FIELD The present invention relates to the field of communications, and in particular to a visual communication processing method and apparatus. BACKGROUND With the development of a visual communication technology (for example, a 3G videophone), when a video communication is performed, a phone book can be associated with a file video source and a camera video source, and when the user answers the video call, The video source type corresponding to the other party's information is selected and sent to the peer's video source. In order to protect the personal privacy of both parties, the solution in the prior art is to exaggerate the original video image, so that the image or video of the other party received by the two parties is an exaggerated image or video, thereby ensuring the other party. The image video received by the terminal is different from the user's portrait, which achieves the effect of protecting personal privacy to a certain extent. However, when the two parties communicating do not need to hide personal privacy, but need to directly perform video communication, when both parties can directly see the other party's video, the original image of the user is deformed in this way. The latter image is masked so that both parties to the communication are not intuitive enough to receive the video or image of the other party. To solve this problem, the copyright information can be transmitted after the original video image is added, and the peer end displays the received data through the copyright object. However, the implementation of this method requires more complicated algorithms for copyright information to process, which makes software implementation more difficult. In view of the problems in the related art, no effective solution has been proposed yet. SUMMARY OF THE INVENTION The present invention provides a visual communication processing method and apparatus, to at least solve the problems caused by the prior art that the prior art uses the modified video or the original video image to add copyright information to perform privacy protection of both sides of the visual communication. . According to an aspect of the present invention, a visual communication processing method is provided, the method comprising the steps of: initiating a call request for establishing visual communication with the opposite end to a peer end, and transmitting the authentication to the opposite end The information, where the authentication information includes: information that the peer end uses to authenticate the initiator of the call request, and/or information that the initiator uses to request authentication of the peer end; And the feedback information of the peer end to the authentication information; determining, according to the feedback information, whether the visual communication is performed with the peer end. Preferably, the authentication information sent to the peer end includes information for identifying the identity of the sender, and the feedback information includes information for identifying the identity of the peer. Preferably, the information for identifying the identity comprises at least one of the following: text, picture, video, audio. Preferably, the authentication information sent to the peer end includes a question that requires the peer to answer, and the feedback information includes an answer to the question answered by the peer end. According to another aspect of the present invention, a visual communication processing method is provided, comprising the steps of: receiving authentication information sent by an initiator of a call request for visual communication, wherein the authentication information is used to request a recipient to The sender performs authentication; and when the authentication information passes the authentication, generates and sends feedback information to the sender, wherein the feedback information is used to cause the sender to determine whether to perform the visual communication. Preferably, the received authentication information includes information for identifying the identity of the sender, and the feedback information includes information for identifying the identity of the recipient. Preferably, the received authentication information includes a question that needs to be answered by the recipient, and the feedback information includes an answer to the question answered by the recipient. According to still another aspect of the present invention, a visual communication processing apparatus is provided, including: a first sending module, configured to initiate a call request for establishing visual communication with the opposite end to a peer end, and The peer end sends the authentication information, where the authentication information includes: information that the peer end uses to authenticate the initiator of the call request, and/or the initiator uses to request to perform the peer end The first receiving module is configured to receive feedback information of the peer end to the authentication information, and the determining module is configured to determine, according to the feedback information, whether to perform the visual communication with the peer end. Preferably, the authentication information sent to the peer end includes information for identifying the identity of the sender, the feedback information includes information for identifying the identity of the peer end, and/or, sending to the peer end The authentication information includes a question that requires the peer to answer, and the feedback information includes an answer to the question answered by the peer. According to still another aspect of the present invention, a visual communication processing apparatus is provided, including: a second receiving module, configured to receive authentication information sent by an initiator of a call request for visual communication, wherein the authentication information is used by And requesting to authenticate the sender; the second sending module is configured to: when the authentication information passes the authentication, generate and send feedback information to the sender, where the feedback information is used to enable the The sender determines whether to perform the visual communication. With the present invention, a call request for establishing visual communication with the opposite end is initiated to the opposite end, and the authentication information is sent to the opposite end, where the authentication information includes: information used by the opposite end to authenticate the initiator of the call request. , And/or information used by the initiator to request authentication of the peer end; receiving feedback information of the peer end on the authentication information; determining whether to perform visual communication with the peer end according to the feedback information, and solving the prior art adopting the deformed video or the original The problem of adding copyright information to the video image to protect the privacy of both sides of the visual communication, thereby achieving the effect of ensuring the security of both parties and ensuring the privacy of both users of the communication. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, In the drawings: FIG. 1 is a flowchart of a visual communication processing method applied to an initiator according to an embodiment of the present invention; FIG. 2 is a flowchart of a visual communication processing method applied to a receiver according to an embodiment of the present invention; 3 is a structural block diagram of a visual communication processing device located at a transmitting end according to an embodiment of the present invention; FIG. 4 is a structural block diagram of a visual communication processing device at a receiving end according to an embodiment of the present invention; FIG. 6 is a block diagram showing a structure of a videophone privacy protection system according to a preferred embodiment of the present invention; FIG. 7 is a videophone protection privacy according to an embodiment of the present invention. FIG. 8 is a flowchart of a method for implementing videophone privacy protection according to another preferred embodiment of the present invention; FIG. 9 is a videophone privacy protection system according to another preferred embodiment of the present invention. Block diagram of the structure. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. 1 is a flow chart of a method of visual communication processing applied to an initiator according to an embodiment of the present invention. The initiator is also referred to as a sender or a calling terminal. As shown in FIG. 1 , the process includes the following steps: Step S102: Initiate a call request for establishing visual communication with a peer end, and send the authentication information to the peer end, where the authentication information includes: Information for authenticating the originator of the call request, and/or information for the initiator to request authentication of the peer. Step S104: Receive feedback information of the peer end on the authentication information. Step S106, determining whether to perform visual communication with the opposite end according to the feedback information. Through the above steps, the method of transmitting the authentication information is performed, and the original video image does not need to be deformed, and the real audio, video, and/or picture can be transmitted. In addition, the implementation is simpler than on the video image. The method of adding copyright information is easier to implement, thereby achieving the effect of visually communicating visually and intuitively. 2 is a flow chart of a visual communication processing method applied to a recipient, which may also be referred to as a peer or called terminal, in accordance with an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps: Step S202: Receive authentication information sent by an initiator of a call request for visual communication, where the authentication information is used to request authentication of a sender. Step S204: When the authentication information passes the authentication, generate and send feedback information to the sender, where the feedback information is used to enable the sender to determine whether to perform visual communication. As a preferred implementation manner, the authentication information sent to the peer end includes information for identifying the identity of the sender, for example, may be an identity photo, a video clip, a text, or an audio, etc. At this time, the feedback information includes Information identifying the identity of the peer, for example, may be the identity photo, video clip, text, or audio of the peer. In this way, both parties can be authenticated, and any one of them can stop the process as long as they believe that the other party's authentication information is unreliable. If it is not desired to expose the personal identity information, in another preferred embodiment, the two parties can agree on the problem (the problem mentioned here includes the password), and the feedback information sent to the peer end includes the question that needs to be answered by the opposite party, and feedback The information includes the answer to the question answered by the peer. Of course, the above two may be used alone or in combination. In this embodiment, a visual communication processing device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments thereof, and has not been described again, and the following is related to the code device. Each module is described. As used hereinafter, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the systems and methods described in the following embodiments are preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated. FIG. 3 is a structural block diagram of a visual communication processing apparatus located at a transmitting side according to an embodiment of the present invention. As shown in FIG. 3, the apparatus includes a first transmitting module 30, a first receiving module 32, and a determining module 33. The various modules of the device and their functions are described below. The first sending module 30 is configured to initiate a call request for establishing visual communication with the peer end, and send the authentication information to the peer end, where the authentication information includes: the peer end is used to initiate the call request Information for authentication, and/or information used by the initiator to request authentication of the peer. The first receiving module 32 is connected to the first sending module 30, and the module is configured to receive the feedback information of the authentication information to the peer end, where the authentication information sent to the peer end includes information for identifying the identity of the sender, and the feedback information includes Information used to identify the identity of the peer. For example, the authentication information sent to the peer end includes a question that needs to be answered by the peer end, and the feedback information includes an answer to the question answered by the peer end. The determination module 34 is coupled to the first receiving module 32, the module being arranged to determine whether to visually communicate with the opposite end based on the feedback information. FIG. 4 is a structural block diagram of a visual communication processing apparatus at a receiving end according to an embodiment of the present invention. As shown in FIG. 4, the structure includes a second receiving module 40 and a second transmitting module 42. The various modules of the device and their functions are described below. The second receiving module 40 is configured to receive the authentication information sent by the initiator of the call request for visual communication, where the authentication information is used to request authentication of the sender, and the second sending module 42 is connected to the second receiving module 40. It is configured to generate and send feedback information to the sender when the authentication information is authenticated, wherein the feedback information is used to cause the sender to determine whether to perform visual communication. The following description is made in conjunction with the preferred embodiments, which are combined with the above-described embodiments and preferred embodiments. FIG. 5 is a flowchart of a method for protecting privacy of a videophone according to a preferred embodiment of the present invention. As shown in FIG. 5, the method includes the following steps: Step S502: A calling terminal initiates a call to a called terminal, and a call bearer is established. Step S504, the calling terminal sends the authentication information. This information is used by the called terminal to authenticate the calling terminal, thereby ensuring privacy. For example, the first frame content of the picture sent by the calling terminal to the called terminal is user personal identity authentication information, such as verification content, identity photo, and the like. Step S506, the called terminal receives the authentication information, and generates and sends the feedback information according to the authentication information. It should be noted that after receiving the authentication information, the called terminal displays on the screen of the called terminal, and the called user verifies the credibility of the information, confirms the current call, and sends its own authentication information to the calling terminal. Step S508, the calling terminal receives the feedback information of the called terminal, and confirms the current call according to the feedback information. In this step, the calling terminal receives the authentication information, which is displayed on the terminal screen, and the calling user checks the identity of the other party and confirms the current call. At this time, the call link is completely established, and then the real image and voice information of the calling party and the called party can be transmitted. It should be noted that the real image here may be the original image sent by the sender. It may also be an image obtained by performing a certain processing (for example, encoding, compression, etc.) on the original image, and performing an inverse processing (for example, decoding, decompression, etc.) after receiving the image, and the image may exist with the original image. The difference, however, is that the original image can be identified by the image, that is, the information of the other party of the communication can be identified. In the preferred embodiment, a videophone privacy protection system is also provided. FIG. 6 is a structural block diagram of a videophone privacy protection system according to a preferred embodiment of the present invention. As shown in FIG. 6, the system includes The authentication information generating unit 60, the transmitting unit 62, the determining unit 64, and the processing unit 66. The various modules in the system and their functions are described below. The authentication information generating unit 60 is configured to generate authentication information transmitted to the counterpart terminal. For example, it can be a picture, a video, or the like. The transmitting unit 62 is connected to the authentication information generating unit 60 for transmitting the authentication information to the counterpart terminal. The authentication information generating unit 60 and the transmitting unit 62 implement functions similar to those of the first transmitting module 30. The judging unit 64 is connected to the sending unit 62, and the unit is used for judging the authentication information fed back by the end user. The processing unit 66 is connected to the judging unit 64 for performing corresponding processing according to the judgment result. Among them, the determining unit 64 and the processing unit 66 implement functions similar to those of the determining module 34. Through the preferred embodiment and its implementation manner, identity authentication is performed by both parties of the call to ensure the security of the video call, and the privacy of the users of the two parties is guaranteed, thereby protecting the user's portrait from being arbitrarily acquired and distributed. Further description will be made below in conjunction with the drawings and preferred embodiments and preferred embodiments thereof. FIG. 7 is a flowchart of a method for implementing videophone privacy protection according to a preferred embodiment of the present invention. As shown in FIG. 7, the process includes the following steps: Step S701: Terminal A turns on (or sets) a video call identity authentication function. And edit the authentication information to generate a certified picture or video. The editable authentication information can contain some prompt statements, for example, "I am ****, please confirm" and so on. It is also possible to preset or save the authentication picture directly on the terminal A without requiring the user to edit, for example, an identity photo or a short video, etc., which can be selectively configured by the user. Step S702, the terminal A initiates a video call to the terminal B to establish a video call bearer. Step S703, the terminal A determines whether the identity authentication function is enabled. If the identity authentication function is enabled, step S704 is performed. If the identity authentication function is not enabled, step S708 is performed to perform a regular video call. Step S704, sending identity authentication information to the peer mobile phone. For example, pictures or videos, etc. Step S705: The terminal B receives the authentication information, and the terminal B user determines whether the calling user passes the authentication by using the authentication information. The terminal B receives the authentication information, decodes the authentication information (for example, a picture or video), and displays it on the screen of the terminal B to prompt the user. If the user passes the authentication, δΡ, the user views the information content and accepts the authentication information, step S706 is performed. If the authentication fails, SP, if the terminal B receives the authentication information, and the user views the content of the information and rejects, step S709 is performed to hang up the visual call link, and the entire process ends. Step S706, the terminal B sets the authentication information, and sends the authentication information to the terminal A after the setting is completed. The setting process is the same as that of terminal A step S701, and can be edited by the user himself or by setting default authentication information. Step S707: The terminal A determines that the authentication information sent by the terminal B is received, and the terminal A user determines whether the called user passes the authentication by using the authentication information. The terminal A user confirms whether the authentication is passed. If the confirmation is passed, step S708 is performed to perform a video call process between the user of the terminal A and the user of the terminal B. If the authentication is not passed, that is, if the terminal A receives the authentication information, but the user rejects the authentication information after viewing the information content, step S709 is performed to hang up the video call link, and the entire process ends. It should be noted that, in the above preferred embodiment, the user confirmation mode of the terminal A or the terminal B may be, but not limited to, sending a specific key value or a designated character to the other party by pressing the confirmation key, and determining whether the content is satisfied by the other end. FIG. 8 is a flowchart of a method for implementing privacy of videophone protection according to another preferred embodiment of the present invention. As shown in FIG. 8, the process includes the following steps: Step S801: A user of terminal A sets video call authentication information. For example, an editing interface can be given, and the user can preset the questions and answers by himself; the questions and answers can be preset by the system, and the user can perform selective configuration. The authentication content can be a password inquiry, or a question agreed by both parties (for example, do you know ***?), or a randomly generated authentication code or authentication character. Step S802, the terminal A initiates a video call to the terminal B to establish a video call bearer. In step S803, the terminal A determines whether the identity authentication function is enabled. If the identity authentication function is enabled, step S804 is performed. If the identity authentication function is not enabled, step S808 is performed to perform a regular video call. Step S804, if the terminal A turns on the identity authentication function, sends the set authentication information (for example, a password or a question query) to the terminal B. Step S805, the terminal B receives the authentication information, decodes the authentication information and displays the prompting user on the screen, and the terminal B user decides whether to accept the current call. If the user accepts the call, the local user enters the password or If the answer to the question or the authentication character is completed, step S806 is performed. If the user rejects the input, step S809 is performed to hang up the visual call link. Step S806, if the terminal B user inputs the authentication information result, the terminal B performs the encoding process on the input content, and sends the input content to the terminal A, and performs step S807. Step S807, the terminal A receives the result of the authentication information sent by the terminal B, and compares the content preset in step S801. If the comparison is consistent and the information is correct, step S808 is performed to perform a video call process between the user of the terminal A and the user of the terminal B. If the comparison is inconsistent, indicating that the authentication information is incorrect, execute S809 to hang up the video call link. 9 is a structural block diagram of a system for protecting privacy of a videophone according to another preferred embodiment of the present invention. As shown in FIG. 9, the system includes: an authentication information generating unit 90, a transmitting unit 92, a determining unit 94, and a processing unit 96. These units can be implemented in software, hardware, or a combination of hardware and software. The system is not only suitable for mobile terminals, but also for wired network terminals. The authentication information generating unit 90 is mainly configured to generate an authentication information picture or video, or to configure a password inquiry, a question inquiry, or a randomly generated authentication character. The sending unit 92 is connected to the authentication information generating unit 90, and is mainly configured to send the authentication information to the video call peer device. The determining unit 94 is connected to the sending unit 92, and is mainly configured to determine the authentication information sent by the peer user, and the specific determining manner can determine the signaling content, and can also determine the key value, and can also perform the algorithm on the peer input information content according to an algorithm. Calculate and judge whether the calculation result meets the requirements. The processing unit 96 is connected to the judging unit 94, and is mainly arranged to perform corresponding processing according to the judgment result of the judging unit 94. For example, you can hang up the video call or switch to the normal video call process. In another embodiment, a visual communication processing software is provided, which is used to execute the technical solutions described in the foregoing embodiments and the preferred embodiments. In another embodiment, a storage medium is also provided. The above-described software is stored in the storage medium, and includes, but is not limited to, an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device so that They are stored in a storage device by a computing device, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims

1. 一种可视通信处理方法, 包括如下步骤: A visual communication processing method, comprising the following steps:
向对端发起用于与所述对端建立可视通信的呼叫请求, 并向所述对端发送 认证信息, 其中, 所述认证信息包括: 所述对端用于对所述呼叫请求的发起方 进行认证的信息, 和 /或所述发起方用于请求对所述对端的进行认证的信息; 接收所述对端对所述认证信息的反馈信息;  Initiating a call request for establishing a visual communication with the peer end, and sending the authentication information to the peer end, where the authentication information includes: the peer end is used to initiate the call request Information for authenticating, and/or information for the initiator to request authentication of the peer; receiving feedback information of the peer for the authentication information;
根据所述反馈信息确定是否与所述对端进行所述可视通信。  Determining whether to perform the visual communication with the peer according to the feedback information.
2. 根据权利要求 1所述的方法, 其中, 向所述对端发送的认证信息包括用于标识 所述发送方身份的信息, 所述反馈信息包括用于标识所述对端身份的信息。 The method according to claim 1, wherein the authentication information sent to the peer end includes information for identifying the identity of the sender, and the feedback information includes information for identifying the identity of the peer.
3. 根据权利要求 2所述的方法, 其中, 用于标识身份的信息包括以下至少之一: 文字、 图片、 视频、 音频。 3. The method according to claim 2, wherein the information for identifying the identity comprises at least one of the following: text, picture, video, audio.
4. 根据权利要求 1至 3中任一项所述的方法, 其中, 向所述对端发送的认证信息 包括需要所述对端回答的问题,所述反馈信息包括对端回答的所述问题的答案。 The method according to any one of claims 1 to 3, wherein the authentication information sent to the peer end includes a question that requires the peer to answer, and the feedback information includes the question answered by the peer end s answer.
5. 一种可视通信处理方法, 包括如下步骤: 5. A visual communication processing method comprising the following steps:
接收可视通信的呼叫请求的发起方发送的认证信息, 其中, 所述认证信息 用于请求接收方对所述发送方进行认证;  Receiving authentication information sent by an initiator of a call request for visual communication, wherein the authentication information is used to request the recipient to authenticate the sender;
在所述认证信息通过认证的情况下, 生成并向所述发送方发送反馈信息, 其中, 所述反馈信息用于使所述发送方确定是否进行所述可视通信。  And generating, in the case that the authentication information is authenticated, sending feedback information to the sender, where the feedback information is used to cause the sender to determine whether to perform the visual communication.
6. 根据权利要求 5所述的方法, 其中, 接收到的所述认证信息包括用于标识所述 发送方身份的信息, 所述反馈信息包括用于标识接收方身份的信息。 The method according to claim 5, wherein the received authentication information comprises information for identifying the identity of the sender, and the feedback information includes information for identifying a identity of the recipient.
7. 根据权利要求 5或 6所述的方法, 其中, 接收的所所述认证信息包括需要所述 接收方回答的问题, 所述反馈信息包括所述接收方回答的所述问题的答案。 The method according to claim 5 or 6, wherein the received authentication information comprises a question requiring the recipient to answer, the feedback information including an answer to the question answered by the recipient.
8. —种可视通信处理装置, 包括: 8. A visual communication processing device, comprising:
第一发送模块, 设置为向对端发起用于与所述对端建立可视通信的呼叫请 求, 并向所述对端发送认证信息, 其中, 所述认证信息包括: 所述对端用于对 所述呼叫请求的发起方进行认证的信息,和 /或所述发起方用于请求对所述对端 的进行认证的信息; The first sending module is configured to initiate a call request for establishing visual communication with the peer end, and send the authentication information to the peer end, where the authentication information includes: Correct Information that the initiator of the call request performs authentication, and/or information that the initiator uses to request authentication of the peer;
第一接收模块, 设置为接收所述对端对所述认证信息的反馈信息; 确定模块, 设置为根据所述反馈信息确定是否与所述对端进行所述可视通 信。 根据权利要求 8所述的装置, 其中, 向所述对端发送的认证信息包括用于标识所述发送方身份的信息, 所述反 馈信息包括用于标识所述对端身份的信息; 和 /或,  The first receiving module is configured to receive feedback information of the peer end to the authentication information, and the determining module is configured to determine, according to the feedback information, whether to perform the visual communication with the peer end. The device according to claim 8, wherein the authentication information sent to the opposite end includes information for identifying the identity of the sender, and the feedback information includes information for identifying the identity of the peer; and Or,
向所述对端发送的认证信息包括需要所述对端回答的问题, 所述反馈信息 包括对端回答的所述问题的答案。 一种可视通信处理装置, 包括:  The authentication information sent to the peer end includes a question that requires the peer to answer, and the feedback information includes an answer to the question answered by the peer. A visual communication processing device includes:
第二接收模块,设置为接收可视通信的呼叫请求的发起方发送的认证信息, 其中, 所述认证信息用于请求对所述发送方进行认证;  a second receiving module, configured to receive authentication information sent by an initiator of a call request for visual communication, where the authentication information is used to request authentication of the sender;
第二发送模块, 设置为在所述认证信息通过认证的情况下, 生成并向所述 发送方发送反馈信息, 其中, 所述反馈信息用于使所述发送方确定是否进行所 述可视通信。  a second sending module, configured to: when the authentication information passes the authentication, generate and send feedback information to the sender, where the feedback information is used to enable the sender to determine whether to perform the visual communication .
PCT/CN2011/081125 2011-07-25 2011-10-21 Visual communication processing method and device WO2012151853A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 201110209057 CN102263927A (en) 2011-07-25 2011-07-25 Visual communication processing method and device
CN201110209057.9 2011-07-25

Publications (1)

Publication Number Publication Date
WO2012151853A1 true WO2012151853A1 (en) 2012-11-15

Family

ID=45010360

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/081125 WO2012151853A1 (en) 2011-07-25 2011-10-21 Visual communication processing method and device

Country Status (2)

Country Link
CN (1) CN102263927A (en)
WO (1) WO2012151853A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546645B (en) * 2012-01-17 2015-05-06 深圳市乐唯科技开发有限公司 System and method for realizing object matching based on audio information
CN102811369B (en) * 2012-07-17 2015-03-11 北京三星通信技术研究有限公司 Security authentication method during video sharing and handheld equipment
CN106851171A (en) * 2017-02-21 2017-06-13 福建江夏学院 Intimacy protection system and method are realized in video calling
CN112992158A (en) * 2019-12-16 2021-06-18 海能达通信股份有限公司 Identity authentication method and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010050977A1 (en) * 1997-12-31 2001-12-13 Irwin Gerszber Video phone multimedia announcement answering machine
CN101207613A (en) * 2006-12-21 2008-06-25 松下电器产业株式会社 Method, system and apparatus for authentication of striding network area information communication
CN101854509A (en) * 2010-04-09 2010-10-06 中兴通讯股份有限公司 Access method for video calls and video call device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010050977A1 (en) * 1997-12-31 2001-12-13 Irwin Gerszber Video phone multimedia announcement answering machine
CN101207613A (en) * 2006-12-21 2008-06-25 松下电器产业株式会社 Method, system and apparatus for authentication of striding network area information communication
CN101854509A (en) * 2010-04-09 2010-10-06 中兴通讯股份有限公司 Access method for video calls and video call device

Also Published As

Publication number Publication date
CN102263927A (en) 2011-11-30

Similar Documents

Publication Publication Date Title
US10958645B2 (en) Ad hoc one-time pairing of remote devices using online audio fingerprinting
US9722984B2 (en) Proximity-based authentication
US10074374B2 (en) Ad hoc one-time pairing of remote devices using online audio fingerprinting
US9819652B2 (en) Information interaction methods and devices
US20150381624A1 (en) Methods, systems, and computer readable media for combating device theft with user notarization
US9450930B2 (en) Device association via video handshake
US8948361B2 (en) Mitigating spam and identifying callers in video calls
JP2013535860A (en) Indirect device communication
CN104301107A (en) Methods and systems for verifying privacy of web real-time communications (WebRTC) media channels via corresponding WebRTC data channels
WO2017067433A1 (en) Method and device for initiating session
WO2017088548A1 (en) Communication method based on social identity, and server
CN110690969B (en) Method and system for achieving bidirectional SSL/TLS authentication through multiparty cooperation
WO2012151853A1 (en) Visual communication processing method and device
US20130202097A1 (en) Priority telephonic communications
TW201931814A (en) System and method for secure communication
CN108809807B (en) Creating communication sessions in heterogeneous systems
US8316236B2 (en) Determining security states using binary output sequences
WO2017092248A1 (en) Method and device for ending video communication
JP2012075024A (en) Terminal device for electronic conference, connection control method in terminal device for electronic conference and connection control program
CN111949959A (en) Authorization authentication method and device in Oauth protocol
WO2012122914A2 (en) Method and system for implementing ip-based vvm
JP2010109995A (en) Voice chat system having call-significance function
JP2022549671A (en) Cryptographic services for browser applications
WO2023149510A1 (en) Authentication device, authentication support method, and program
WO2017102085A1 (en) Secure transmission of local private encoding data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11864919

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11864919

Country of ref document: EP

Kind code of ref document: A1