CN112929598A - Visual intercom method, equipment and computer storage medium - Google Patents

Visual intercom method, equipment and computer storage medium Download PDF

Info

Publication number
CN112929598A
CN112929598A CN202011224165.9A CN202011224165A CN112929598A CN 112929598 A CN112929598 A CN 112929598A CN 202011224165 A CN202011224165 A CN 202011224165A CN 112929598 A CN112929598 A CN 112929598A
Authority
CN
China
Prior art keywords
call request
client
call
address
matched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011224165.9A
Other languages
Chinese (zh)
Inventor
张兴明
杨剑峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Jingxi Information Technology Co ltd
Original Assignee
Nantong Jingxi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong Jingxi Information Technology Co ltd filed Critical Nantong Jingxi Information Technology Co ltd
Priority to CN202011224165.9A priority Critical patent/CN112929598A/en
Publication of CN112929598A publication Critical patent/CN112929598A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q5/00Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange
    • H04Q5/24Selecting arrangements wherein two or more subscriber stations are connected by the same line to the exchange for two-party-line systems

Abstract

The application discloses a visual talkback method, a device and a computer storage medium, wherein the visual talkback method comprises the following steps: when a call request is received, the call request is analyzed to obtain a shared identifier; judging whether the shared identification obtained by analysis is matched with the locally stored shared identification; if the two are matched, accessing the call request; otherwise, the call request is rejected. The visual intercom method can solve the communication problem that two communication parties are far away.

Description

Visual intercom method, equipment and computer storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a communication method, a video intercom device, and a computer storage medium.
Background
The visual intercom product has become the standard of modern communities, thereby greatly facilitating the access management of owners and visitors and simultaneously improving the safety of the communities.
The inventor of the application finds that although the types of the current visible intercom products are more, no product can be suitable for application scenes of large-area residences or businesses.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a visual intercom method, equipment and a computer storage medium, which can solve the communication problem of two communication parties at a long distance.
In order to solve the technical problem, the application adopts a technical scheme that: there is provided a visual intercom method, said method comprising: when a call request is received, analyzing the call request to obtain a shared identifier; judging whether the shared identification obtained by analysis is matched with a locally stored shared identification; if the call request is matched with the call request, accessing the call request; otherwise, the call request is rejected.
In order to solve the above technical problem, another technical solution adopted by the present application is: the visual intercom device comprises a processor, a memory and a communication circuit, wherein the processor is respectively coupled with the memory and the communication circuit, and the processor controls the processor, the memory and the communication circuit to realize the steps of the method when in work.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided a computer storage medium having stored thereon a computer program executable by a processor to perform the steps of the above method.
The beneficial effect of this application is: compared with the prior art, the method has the advantages that before the calling is requested, the calling party and the called party do not need to be authenticated, the threshold of communication requirements is low, and therefore the problem of communication of the two communication parties at a far distance can be solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts. Wherein:
FIG. 1 is a schematic flow chart diagram of one embodiment of a visual intercom method of the present application;
FIG. 2 is a schematic structural diagram of an embodiment of a video intercom device according to the present application;
FIG. 3 is a schematic structural diagram of an embodiment of a computer storage medium according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Before introducing the method in the application, a system applied in the application is introduced, the system applied in the application is a visual intercom system and comprises a plurality of client sides, each client side is provided with corresponding client side software, visual communication can be carried out between any two client sides under the condition that a calling condition is met, and the client sides can be any one of mobile phones, tablet computers, access control equipment, desktop computers and the like.
Referring to fig. 1, fig. 1 is a schematic flow chart of an embodiment of a visual speaking method of the present application, the method including:
s110: when receiving the call request, the call request is analyzed to obtain the shared identifier.
Specifically, the calling party sends a call request to the called party to request communication (such as a voice call or a video call) through client software installed by both parties.
The call request carries an encrypted shared identifier (the shared identifier is a shared identifier locally stored by a sender and can be set by a user or carried by a client in a factory) and a secret key, and is used for authenticating the validity of the client.
S120: and judging whether the shared identification obtained by analysis is matched with the locally stored shared identification.
If the determination result is a match, the process proceeds to step S130, and if the determination result is a mismatch, the process proceeds to step S140.
Specifically, a sharing identifier is also locally stored, when the shared identifier obtained through parsing matches with the locally stored sharing identifier, it is determined that the client sending the call request is a valid client and a call is allowed to be made with the valid client, that is, step S130 is performed, when the shared identifier obtained through parsing does not match with the locally stored sharing identifier, it is determined that the client sending the call request is an illegal client, and for network security, a call is not allowed to be made with the illegal client, that is, step S140 is performed.
The step of determining whether the shared identifier obtained through the analysis matches the locally stored shared identifier may be determining whether the shared identifier obtained through the analysis is the same as the locally stored shared identifier, or determining whether the shared identifier obtained through the analysis and the locally stored shared identifier satisfy a preset corresponding relationship.
S130: and accessing the call request.
Specifically, the incoming call request is a precondition for the calling party and the called party to speak.
S140: the call request is rejected.
Specifically, after the call request is rejected, the calling party and the called party cannot communicate.
In the embodiment, the called party determines whether the calling party is a legal calling party by judging whether the shared identifier carried by the calling request is matched with the locally stored shared identifier, and accesses the calling request after determining that the calling party is the legal calling party to realize the communication between the calling party and the called party.
In this embodiment, the called party may be set to the unattended mode in advance, and when the called party accesses the call request, it automatically connects the call request without any operation by the user.
The called party is set to be in an unattended mode, and the method is suitable for checking a baby room or checking a real-time scene of the solitary old person. Specifically, the client in the baby room or the client in the room for the elderly people is set to be in an unattended mode in advance, and after the client in the baby room or the client in the room for the elderly people receives a call request and judges that a calling party is a legal client, the client in the baby room or the client in the room for the elderly people automatically connects the call without user operation, so that the calling party can monitor or check the conditions in the baby room or the room for the elderly people in real time.
Meanwhile, in order to avoid disturbing babies or old people, the client in the baby room or the client in the room of the old people can not remind but directly connect the call after accessing the call request, and certainly, the call can be connected after the short-time reminding.
It is understood that after the call request is accessed, if the current mode is the normal mode, the user is prompted by means of vibration, ringing or light, and then the user can choose to connect the call or refuse to connect the call.
In this embodiment, the visual intercom method further includes: storing the IP address of the client with the sharing identification matched with the locally stored sharing identification in a call list; and when the IP address in the call list is selected, sending a call request to the client of the selected IP address, wherein the call request carries the encrypted sharing identification.
Specifically, the client having the sharing identifier matched with the locally stored sharing identifier is a valid client, and the valid client is stored in a call list, so that the user can select to call, that is, the user can only call the valid client.
When the legal client is stored in the call list, only the IP address of the legal client may be stored, or the IP address of the legal client and the name of the client may be stored in a one-to-one correspondence manner, where the name of the client may be a name defined by a user for the client or a name carried by the client when the client leaves a factory.
In an application scenario, the step of saving the IP address of the client having a match with the locally saved shared identifier in a call list includes: receiving broadcast messages sent by other clients in a UDP (user Datagram protocol) data packet mode, and analyzing the broadcast messages to obtain shared identifiers of the other clients; judging whether the shared identification of other clients is matched with the locally stored shared identification; and if the IP addresses of the matched clients are matched, storing the IP addresses of the matched clients in a call list.
Specifically, in the application scenario, after the client is connected to the network, the client packages the locally stored shared identifier and the key into a UDP (User Datagram Protocol) data packet, broadcasts the UDP data packet to the local network, and after receiving the broadcast message, the other clients analyze the broadcast message to obtain a shared identifier, then determines whether the analyzed shared identifier matches the locally stored shared identifier, and if the analyzed shared identifier matches the locally stored shared identifier, it indicates that the client sending the broadcast message is a valid client, and then stores the IP address of the valid client in a call list, so as to allow the User to select the corresponding client to call through the call list.
Meanwhile, in the application scenario, a call request carrying the encrypted shared identifier can be directly sent between the two clients, that is, the calling party directly sends the call request carrying the encrypted shared identifier to the called party, and the call request is not forwarded through the intermediate terminal.
In another application scenario, the step of saving in the call list the IP address of the client owning the match with the locally saved shared identity comprises: receiving an IP address sent by a server; the IP address is saved in the call list.
In the application scenario, two clients cannot communicate directly and need to relay through a server, specifically, when the client logs in the server, the server stores an IP address and a sharing identifier of the client, then the server sends the IP address of the logged-in client to other clients with matching sharing identifiers, and then the client stores the received IP address in a call list so as to allow a user to select a corresponding client to call through the call list.
Meanwhile, in the application scenario, when a client wants to call another client, the client sends a call request to the server, the call request carries the encrypted shared identifier, and then the server forwards the call request to the called party.
Referring to fig. 2, fig. 2 is a schematic structural diagram of an embodiment of the video intercom device of the present application. The video intercom device 200 includes a processor 210, a memory 220, and a communication circuit 230, wherein the processor 210 is coupled to the memory 220 and the communication circuit 230, respectively, and the processor 210 controls itself, the memory 220, and the communication circuit 230 to implement the steps of any of the above-mentioned implementation methods during operation.
The video intercom device 200 may be any one of a mobile phone, a tablet computer, an access control device, a desktop computer, and the like, which is not limited herein.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an embodiment of a storage medium according to the present application. The computer storage medium 300 stores a computer program 310, the computer program 310 being executable by a processor to implement the steps of any of the methods described above.
The computer storage medium 300 may be a device that can store the computer program 310, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, or may be a server that stores the computer program 310, and the server may send the stored computer program 310 to another device for operation, or may self-operate the stored computer program 310.
In summary, in the visual intercom method of the present application, the called party determines whether the calling party is a legal calling party by determining whether the shared identifier carried by the calling request matches the locally stored shared identifier, and accesses the calling request after determining that the calling party is a legal calling party, so as to implement communication between the calling party and the called party.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A method of visual intercom, said method comprising:
when a call request is received, analyzing the call request to obtain a shared identifier;
judging whether the shared identification obtained by analysis is matched with a locally stored shared identification;
if the call request is matched with the call request, accessing the call request;
otherwise, the call request is rejected.
2. The method of claim 1, further comprising, after accessing the call request:
and if the current mode is the unattended mode, automatically connecting the call request.
3. The method of claim 1, further comprising:
storing the IP address of the client having the sharing identification matched with the locally stored sharing identification in a call list;
and when the IP address in the call list is selected, sending a call request to a client of the selected IP address, wherein the call request carries the encrypted sharing identification.
4. The method of claim 3, further comprising:
and correspondingly storing the IP address of the client and the name of the client in the call list.
5. The method of claim 3, wherein the step of storing in the call list the IP address of the client having a match with the locally stored shared identity comprises:
receiving broadcast messages sent by other clients in a UDP (user Datagram protocol) data packet mode, and analyzing the broadcast messages to obtain sharing identifications of the other clients;
judging whether the sharing identification of the other clients is matched with the locally stored sharing identification;
and if the IP addresses of the other matched clients are matched, storing the matched IP addresses of the other clients in the call list.
6. The method of claim 5, further comprising:
and receiving the call request directly sent by the other client, wherein the call request carries the encrypted sharing identifier.
7. The method of claim 3, wherein the step of storing in the call list the IP address of the client having a match with the locally stored shared identity comprises:
receiving an IP address sent by a server;
and saving the IP address in the call list.
8. The method of claim 7, further comprising:
and receiving the call request forwarded by the server, wherein the call request carries the encrypted sharing identification.
9. Visual intercom unit, comprising a processor, a memory and a communication circuit, said processor being coupled to said memory and to said communication circuit, respectively, said processor controlling itself and said memory and said communication circuit in operation to implement the steps of the method according to any one of claims 1 to 8.
10. A computer storage medium, characterized in that the computer storage medium stores a computer program executable by a processor to implement the steps in the method according to any one of claims 1-8.
CN202011224165.9A 2020-11-05 2020-11-05 Visual intercom method, equipment and computer storage medium Pending CN112929598A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011224165.9A CN112929598A (en) 2020-11-05 2020-11-05 Visual intercom method, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011224165.9A CN112929598A (en) 2020-11-05 2020-11-05 Visual intercom method, equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN112929598A true CN112929598A (en) 2021-06-08

Family

ID=76163575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011224165.9A Pending CN112929598A (en) 2020-11-05 2020-11-05 Visual intercom method, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN112929598A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102453A (en) * 2007-06-28 2008-01-09 中兴通讯股份有限公司 A method for wireless remote monitoring via two mobile video phones
CN103685711A (en) * 2012-09-21 2014-03-26 崔玉珩 Call control and processing method based on automatic connection of mobile phone
CN105635091A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Remote calling method and system
CN107547818A (en) * 2016-06-29 2018-01-05 福建星网锐捷通讯股份有限公司 The building equipment means of communication and system based on cloud call center
CN107770356A (en) * 2017-10-30 2018-03-06 努比亚技术有限公司 A kind of communication establishing method, equipment and computer-readable recording medium
CN108234948A (en) * 2017-12-19 2018-06-29 安恩达科技(深圳)有限公司 Video intercom digital visual intercommunication method, indoor unit and system in every family
US20180295243A1 (en) * 2016-01-27 2018-10-11 Aiphone Co., Ltd. Multiple dwelling house interphone system
CN109981762A (en) * 2019-03-14 2019-07-05 西安艾润物联网技术服务有限责任公司 Intelligent management and mobile management terminal based on building
CN111193900A (en) * 2018-11-15 2020-05-22 深圳技威时代科技有限公司 Monitoring video sharing method and device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101102453A (en) * 2007-06-28 2008-01-09 中兴通讯股份有限公司 A method for wireless remote monitoring via two mobile video phones
CN103685711A (en) * 2012-09-21 2014-03-26 崔玉珩 Call control and processing method based on automatic connection of mobile phone
CN105635091A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Remote calling method and system
US20180295243A1 (en) * 2016-01-27 2018-10-11 Aiphone Co., Ltd. Multiple dwelling house interphone system
CN107547818A (en) * 2016-06-29 2018-01-05 福建星网锐捷通讯股份有限公司 The building equipment means of communication and system based on cloud call center
CN107770356A (en) * 2017-10-30 2018-03-06 努比亚技术有限公司 A kind of communication establishing method, equipment and computer-readable recording medium
CN108234948A (en) * 2017-12-19 2018-06-29 安恩达科技(深圳)有限公司 Video intercom digital visual intercommunication method, indoor unit and system in every family
CN111193900A (en) * 2018-11-15 2020-05-22 深圳技威时代科技有限公司 Monitoring video sharing method and device and storage medium
CN109981762A (en) * 2019-03-14 2019-07-05 西安艾润物联网技术服务有限责任公司 Intelligent management and mobile management terminal based on building

Similar Documents

Publication Publication Date Title
US6145084A (en) Adaptive communication system enabling dissimilar devices to exchange information over a network
EP3008935A1 (en) Mobile device authentication in heterogeneous communication networks scenario
US10542433B2 (en) Connection establishment method, device, and system
CN105682093A (en) Wireless network access method and access device, and client
EP2924944B1 (en) Network authentication
CN105635084A (en) Apparatus and method for authenticating terminal
KR20070110652A (en) Internet connecting method for mobile communication terminal
US7917941B2 (en) System and method for providing physical web security using IP addresses
US20160197921A1 (en) Secure Data Transmission System
CN107294910B (en) Login method and server
CN105430169B (en) The control method and system of mobile terminal
US20110274259A1 (en) Method and system for improved communication security
US9628490B2 (en) Trusted contact name validation
CN112911207A (en) Calling method and intelligent talkback system
CN102624724B (en) Security gateway and method for securely logging in server by gateway
CN117220904A (en) Service protection method, device, electronic equipment and storage medium
CN115296866B (en) Access method and device for edge node
CN112929598A (en) Visual intercom method, equipment and computer storage medium
CN112333088B (en) Compatible instant messaging transmission method
CN114615329A (en) Method and system for realizing SDP architecture without client
CN109743329B (en) Account processing method and device
CN107995587B (en) Authentication method, authentication platform, authentication system and service provider platform
US9094439B2 (en) End network decider
CN113691545B (en) Routing control method and device, electronic equipment and computer readable medium
CN114155683B (en) Disaster early warning system and method based on gateway equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210608

RJ01 Rejection of invention patent application after publication