WO2024021922A1 - 视频通话方法、电子设备和存储介质 - Google Patents

视频通话方法、电子设备和存储介质 Download PDF

Info

Publication number
WO2024021922A1
WO2024021922A1 PCT/CN2023/100796 CN2023100796W WO2024021922A1 WO 2024021922 A1 WO2024021922 A1 WO 2024021922A1 CN 2023100796 W CN2023100796 W CN 2023100796W WO 2024021922 A1 WO2024021922 A1 WO 2024021922A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal
face
authentication
video
Prior art date
Application number
PCT/CN2023/100796
Other languages
English (en)
French (fr)
Inventor
杨海城
周金星
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2024021922A1 publication Critical patent/WO2024021922A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • This application relates to but is not limited to the field of communication technology, and in particular, to a video call method, electronic device and storage medium.
  • the terminal on the customer service side when a user needs to be authenticated by face during a video call, the terminal on the customer service side usually uses automatic screenshots to collect the user's face image information and save the face image to the user's face.
  • the image information is sent to the public security information system to complete the authentication. There is a risk of leakage of the user's face image information, and the security is poor.
  • Embodiments of the present application provide a video call method, electronic device, and storage medium.
  • embodiments of the present application provide a video call method, which is applied to a first terminal.
  • the method includes: establishing a video call between the first terminal and a second terminal; receiving data from the second terminal based on a preset data channel. face authentication request information; in response to the face authentication request information, obtain face image information; perform privacy protection processing on the face image information to obtain encrypted information or authentication information; based on the preset data channel , sending the encrypted information or the authentication information to the second terminal, so that the second terminal determines the face authentication result of the first terminal based on the encrypted information or the authentication information.
  • this application also provides a video call method, applied to the second terminal.
  • the method includes: obtaining face authentication request information; based on a preset data channel, sending the face authentication request information to The first terminal; based on the preset data channel, receives encrypted information or authentication information from the first terminal, wherein the encryption information or the authentication information is performed by the first terminal on the face image information. Obtained through privacy protection processing, the face image information is obtained by the first terminal in response to the face authentication request information; according to the encryption information or the authentication information, the third The face authentication result of a terminal.
  • the present application also provides an electronic device, including: a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • the processor executes the computer program, the first step is implemented as above.
  • the video calling method described in this aspect is implemented as above.
  • the present application also provides a computer-readable storage medium that stores a computer-executable program, and the computer-executable program is used to cause the computer to execute the video as described in the first aspect. call method, or video call method as described in the second aspect above.
  • Figure 1 is a flow chart of a video call method applied to a first terminal provided by an embodiment of the present application
  • Figure 2 is a flow chart of another video call method provided by another embodiment of the present application.
  • FIG. 3 is a flow chart of an authentication processing method provided by another embodiment of the present application.
  • Figure 4 is a flow chart of a method for establishing a data channel provided by another embodiment of the present application.
  • Figure 5 is a flow chart of a method for sending desensitized video information provided by another embodiment of the present application.
  • Figure 6 is a flow chart of a method for determining a human face area provided by another embodiment of the present application.
  • Figure 7 is a flow chart of another method for determining a face area provided by another embodiment of the present application.
  • Figure 8 is a flow chart of a desensitization treatment method provided by another embodiment of the present application.
  • Figure 9 is a flow chart of a video call method applied to a second terminal provided by another embodiment of the present application.
  • FIG. 10 is a schematic diagram of an IMS data channel provided by another embodiment of the present application.
  • Figure 11 is a flow chart of a method for sending video information provided by an embodiment of the present application.
  • Figure 12 is a structural diagram of an electronic device provided by another embodiment of the present application.
  • the terminal on the customer service side when a user needs to be authenticated by face during a video call, the terminal on the customer service side usually uses automatic screenshots to collect the user's face image information and save the face image to the user's face.
  • the image information is sent to the public security information system to complete the authentication. There is a risk of leakage of the user's face image information, and the security is poor.
  • this application provides a video call method, electronic device and storage medium.
  • the method is applied to the first terminal.
  • the method includes: establishing a video call between the first terminal and the second terminal; receiving face authentication request information from the second terminal based on a preset data channel; obtaining face image information in response to the face authentication request information; and processing the face image.
  • the information is processed for privacy protection to obtain encrypted information or authentication information; based on the preset data channel, the encrypted information or authentication information is sent to the second terminal, so that the second terminal determines the face of the first terminal based on the encryption information or authentication information. Certification results.
  • the first terminal receives the face authentication request information from the second terminal through the data channel, and then obtains the encrypted information or authentication information through privacy protection processing, and then sends the processed information through the data channel.
  • the second terminal realizes that the second terminal determines the face authentication result of the first terminal through encrypted information or authentication information, which can avoid leakage of the user's face image information and improve security.
  • the video call method provided by the embodiment of the present application can be applied in the first terminal or the second terminal, or can be software running in the first terminal or the second terminal.
  • Figure 1 is a flow chart of a video call method provided by an embodiment of the present application.
  • the video call method can be applied to the first terminal.
  • the video call method includes but is not limited to the following steps:
  • Step S110 Receive face authentication request information from the second terminal based on the preset data channel
  • Step S120 in response to the face authentication request information, obtain face image information
  • Step S130 perform privacy protection processing on the facial image information to obtain encrypted information or authentication information
  • Step S140 Send the encryption information or authentication information to the second terminal based on the data channel, so that the second terminal determines the face authentication result of the first terminal based on the encryption information or authentication information.
  • the first terminal needs to monitor the face authentication request information. After receiving the face authentication request information, it obtains the person's identity through the preset image collector. Face image information, then the first terminal performs privacy protection processing on the face image information, and then sends the processed result to the second terminal. The second terminal cannot obtain the original face image information, and can protect user privacy and security.
  • the information transmission of the face authentication process is completed, which can ensure the reliability and stability of the information transmission; based on this, the first terminal receives data from the face authentication process through the data channel.
  • the second terminal requests face authentication information, and then obtains encrypted information or authentication information through privacy protection processing, and then sends the processed information to the second terminal through the data channel, realizing that the second terminal uses encrypted information or authentication information. Determining the face authentication result of the first terminal can avoid leakage of the user's face image information and improve security.
  • the first terminal and the second terminal can be a personal computer (PC), a mobile phone, a smart phone, a personal digital assistant (Personal Digital Assistant, PDA), a wearable device, or a Pocket PC (Pocket PC). , tablet computers, etc., but is not limited to this; the image collector can be a monocular camera, a binocular camera, etc., but is not limited to this.
  • the first terminal is equivalent to the terminal on the user side
  • the second terminal is equivalent to the terminal on the customer service side.
  • the first terminal and the third terminal are equivalent to the terminal on the customer service side.
  • the first terminal does not need to turn on the camera and only needs to watch the video service content of the second terminal.
  • the camera of the first terminal will be turned on after the user authorizes and agrees.
  • the terminal directly sends the face image information to the second terminal to complete the face authentication. There is a risk of leakage of the user's face image information.
  • the first terminal performs privacy protection processing on the face image information collected by the camera, and sends the processing results to the second terminal, which cannot be obtained by the second terminal.
  • the original face image information can only be determined by the processing result of the first terminal's face authentication result, which can avoid the leakage of the user's face image information, improve the privacy and security of 5G video customer service, and improve the competitiveness of 5G terminals.
  • step S130 in the embodiment shown in Figure 1 includes but is not limited to any of the following steps:
  • Step S210 perform encryption processing on the facial image information to obtain encrypted information
  • Step S220 Perform authentication processing on the face image information to obtain authentication information.
  • the first terminal can encrypt the face image information according to the preset encryption rules to obtain the encrypted information, and then send the encrypted information to the second terminal, and the second terminal can encrypt the face image information according to the preset encryption rules.
  • Set up a first authentication database compare and analyze the encrypted information, and determine the face authentication result.
  • the face authentication result is a passing state, otherwise it is a failing state.
  • the first terminal can perform authentication processing on the face image information according to the preset second authentication database to obtain authentication information used to represent the face authentication result.
  • the face image information matches any one in the second authentication database
  • the face authentication result is passed, otherwise it is failed.
  • step S220 in the embodiment shown in Figure 2 includes but is not limited to the following steps:
  • Step S310 Send the facial image information to a preset authentication server, so that the authentication server performs authentication processing on the facial image information;
  • Step S320 Receive authentication information from the authentication server.
  • the first terminal can send the face image information to the authentication server.
  • the authentication server is equivalent to the public security information system.
  • the authentication server stores the public security information including the face information, and compares the face image information with each public security information. Yes, the authentication information used to characterize the face authentication result is obtained. When the face image information matches any public security information, the face authentication result is a passing state, otherwise it is a failing state.
  • step S110 in the embodiment shown in Figure 1 the following steps are also included but not limited to:
  • Step S410 receive data channel establishment information from the second terminal
  • Step S420 In response to the data channel establishment information, the preset configuration information is sent to the second terminal, so that the second terminal establishes a data channel based on the Internet Protocol Multimedia Subsystem IMS domain with the first terminal based on the configuration information.
  • the first terminal needs to monitor the data channel establishment information. After receiving the data channel establishment information, it sends the configuration information to the second terminal, thereby establishing an IMS data channel between the first terminal and the second terminal. .
  • the configuration information can be preset by the user, and the user can update the configuration information according to actual needs.
  • the data channel establishment information is the first SIP signaling.
  • the first SIP signaling it is determined whether the data channel needs to be established by parsing the dcmap field in the SDP message; the configuration information includes the first attribute identifier, which is determined according to the network According to the provisions of the protocol, the frame of the data channel is determined through the first attribute identifier.
  • the frame of the data channel is the Bootstrap frame
  • the data channel passes through the preset data server.
  • the first terminal, the data server and the second terminal communicate in sequence. Connection; when the frame of the data channel is a non-Bootstrap frame, the data channel does not pass through the data server.
  • the first terminal and the second terminal communicate directly.
  • step S120 in the embodiment shown in Figure 1 the following steps are also included but not limited to:
  • Step S510 obtain video information
  • Step S520 the video information is desensitized
  • Step S530 Send the desensitized video information to the second terminal.
  • the second terminal can obtain the user's face image information by taking screenshots of the video information, and the face image information may be abused for visual purposes. Access control brings hidden dangers to users' personal safety; in the video call method provided in this embodiment, after the first terminal and the second terminal establish a video call, when the first terminal needs to conduct real-time video with the second terminal, the first terminal Get real-time collection of image collector After receiving the video information, the first terminal desensitizes the video information, and then sends the desensitized video information to the second terminal based on the preset audio and video channel. The second terminal cannot pass the desensitized video. The information obtains the user's facial image information, which can prevent the leakage of the user's facial image information and improve security.
  • step S520 in the embodiment shown in Figure 5 the following steps are also included but not limited to:
  • Step S610 obtain face area parameters
  • Step S620 perform frame segmentation processing on the video information to determine multiple video frames
  • Step S630 Determine the face area of each video frame according to the face area parameters.
  • each video frame in the video information can be area-limited based on the face area parameters to determine the face area, because in any video frame, areas other than the face area are not There is a risk of privacy leakage. In the subsequent steps, only the face area needs to be desensitized, which can improve efficiency while protecting privacy and security.
  • the video information contains information of several video frames, and during desensitization processing, all video frames need to be processed.
  • users can pre-set face area parameters before making a video call, or set or adjust face area parameters during the video call.
  • step S520 in the embodiment shown in Figure 5 the following steps are also included but not limited to:
  • Step S710 perform frame segmentation processing on the video information to determine multiple video frames
  • Step S720 Perform face detection processing on each video frame to determine the face area of each video frame.
  • the face area of each video frame in the video information can be determined through face detection processing, because in any video frame, there is no privacy leakage in areas other than the face area. Risk, in the subsequent steps, only the face area needs to be desensitized, which can improve efficiency while protecting privacy and security.
  • step S520 in the embodiment shown in Figure 5 includes but is not limited to any of the following steps:
  • Step S810 blur the face area
  • Step S820 perform atomization processing on the face area
  • Step S830 perform mosaic superposition processing on the face area
  • Step S840 Perform virtual image replacement processing on the face area.
  • the face area is desensitized through one or more of blur processing, atomization processing, mosaic overlay processing and avatar replacement processing, so that the second terminal cannot pass the desensitization process.
  • the user's face image information is obtained from the video information, which can prevent the leakage of the user's face image information and improve security.
  • step S120 in the embodiment shown in Figure 1 includes but is not limited to the following steps:
  • face image information is obtained according to the video frame.
  • the first terminal when the first terminal receives the face authentication request information, the first terminal intercepts the current video frame in the video information, and determines the face image through the face area of the video frame Information, there is no need to repeatedly collect face images through the camera, which can improve processing efficiency.
  • Figure 9 is a flow chart of a video call method provided by another embodiment of the present application.
  • the video call method can be applied to the second terminal.
  • the video call method includes but is not limited to the following steps:
  • Step S910 obtain face authentication request information
  • Step S920 Send the face authentication request information to the first terminal based on the preset data channel
  • Step S930 Based on the preset data channel, receive encrypted information or authentication information from the first terminal, where the encryption information or authentication information is obtained by the first terminal performing privacy protection processing on the face image information, and the face image information is obtained by Obtained by the first terminal in response to the face authentication request information;
  • Step S940 Determine the face authentication result of the first terminal based on the encryption information or authentication information.
  • the embodiment of the video call method applied to the second terminal is basically the same as the above-mentioned embodiment of the video call method applied to the first terminal, and will not be described in detail here; based on this, through the first terminal through the data
  • the channel receives the face authentication request information from the second terminal, and then obtains encrypted information or authentication information through privacy protection processing, and then sends the processed information to the second terminal through the data channel, realizing that the second terminal passes the encrypted information or authentication information.
  • the authentication information is used to determine the face authentication result of the first terminal, which can avoid leakage of the user's face image information and improve security.
  • Figure 10 is a schematic diagram of an IMS data channel provided by another embodiment of the present application.
  • the IMS data channel can be a data channel of the Bootstrap framework or a data channel of a non-Bootstrap framework.
  • the framework of the IMS data channel is the Bootstrap framework
  • the data channel passes through the preset data server.
  • the first terminal, the data server and the second terminal communicate and connect in sequence; in addition, when the frame of the data channel is a non-Bootstrap frame, the data channel does not pass through the data server.
  • the first terminal and the second terminal Direct communication connection (not shown in the figure).
  • Figure 11 is a flow chart of a method for sending video information provided by an embodiment of the present application.
  • the first terminal will desensitize the video information and then desensitize the video information.
  • the final video information is sent to the second terminal; otherwise, the first terminal directly sends the video to the second terminal.
  • the first terminal makes a video call with a trusted second terminal, there is no need to desensitize the video information.
  • the user can set the first terminal to be in a non-privacy protection state, so that the call effect is better.
  • a privacy protection status setting switch is provided in the call interface of the first terminal, and the user can adjust the privacy protection status of the first terminal by triggering the switch.
  • the first terminal includes but is not limited to: a call module, a collection module, a setting module, an image processing module, a monitoring module, a data channel management module, an encryption module, a sending module and a storage module.
  • the call module is configured to establish, maintain and hang up the video call with the second terminal;
  • the collection module is configured to collect the user's image information;
  • the setting module is configured to set the face area parameters, and the third The privacy protection status of a terminal;
  • the image processing module is set to desensitize video information;
  • the monitoring module is set to monitor whether face authentication request information or data channel establishment information is received;
  • the data channel management module is set to establish, Maintain and release the IMS data channel;
  • the encryption module is set to encrypt the face image information according to the preset encryption rules;
  • the sending module is set to send the encrypted information or authentication information to the second terminal;
  • the storage module is set to save The face image information is sent locally to facilitate subsequent authentication processing of the face image information through the authentication server.
  • an embodiment of the present application also provides an electronic device.
  • the electronic device includes: one or more processors and memories.
  • Figure 12 takes one processor and memory as an example.
  • the processor and memory can be connected through a bus or other means.
  • Figure 12 takes the connection through a bus as an example.
  • the memory can be used to store non-transitory software programs and non-transitory computer executable programs, such as the video call method in the above embodiments of the present application.
  • the processor implements the video call method in the above embodiments of the present application by running non-transient software programs and programs stored in the memory.
  • the memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system and an application program required for at least one function; the storage data area may store data required to execute the video call method in the embodiment of the present application. wait.
  • the memory may include high-speed random access memory and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage device.
  • the memory may optionally include memory located remotely from the processor, and these remote memories may be connected to the electronic device via a network. Examples of the above-mentioned networks include but are not limited to the Internet, intranets, local area networks, mobile communication networks and combinations thereof.
  • the non-transient software programs and programs required to implement the video call method in the above embodiment of the present application are stored in the memory.
  • the above-mentioned method applied to the first terminal in the embodiment of the present application is executed.
  • the video call method for example, performs the above-described method steps S110 to S140 in FIG. 1, method step S210 or step S220 in FIG. 2, method steps S310 to step S320 in FIG. 3, and method step S410 in FIG. 4.
  • the terminal receives face authentication request information from the second terminal through a preset data channel; responds to the face authentication request information, obtains face image information; performs privacy protection processing on the face image information, and obtains encrypted information or authentication Information; based on the data channel, send encrypted information or authentication information to the second terminal, so that the second terminal determines the face authentication result of the first terminal based on the encryption information or authentication information.
  • the first terminal receives the face authentication request information from the second terminal through the data channel, and then obtains the encrypted information or authentication information through privacy protection processing, and then sends the processed information to the second terminal through the data channel.
  • This enables the second terminal to determine the face authentication result of the first terminal through encrypted information or authentication information, which can avoid leakage of the user's face image information and improve security.
  • an embodiment of the present application also provides a computer-readable storage medium that stores computer-executable instructions, and the computer-executable instructions are executed by a processor or controller, for example, by the above-mentioned Execution of a processor in the electronic device embodiment can cause the above-mentioned processor to execute the video call method applied to the first terminal in the above-mentioned embodiment, for example, execute the method steps S110 to S140 in Figure 1 described above, Figure 2 Method steps S210 or S220 in FIG. 3 , method steps S310 to S320 in FIG. 3 , method steps S410 to step S420 in FIG. 4 , method steps S510 to step S530 in FIG. 5 , method steps S610 to S610 in FIG.
  • Step S630 the method steps S710 to S720 in Figure 7, and the method steps S810 to S840 in Figure 8, the first terminal receives the face authentication request information from the second terminal through the preset data channel; in response to Face authentication request information to obtain face image information; perform privacy protection processing on the face image information to obtain encrypted information or authentication information; send the encrypted information or authentication information to the second terminal based on the data channel, so that the second terminal Determine the face authentication result of the first terminal according to the encryption information or authentication information; or execute the video call method applied to the second terminal in the above embodiment, for example, execute the above-described method steps S910 to S940 in Figure 9.
  • the second terminal acquires the face authentication request information; sends the face authentication request information to the first terminal based on a preset data channel; and receives encrypted information or authentication information from the first terminal based on the data channel, where the encrypted information or The authentication information is obtained by the first terminal performing privacy protection processing on the face image information, and the face image information is obtained by the first terminal in response to the face authentication request information; based on the encryption information or the authentication information, the third The face authentication result of a terminal. Based on this, the first terminal receives the face authentication request information from the second terminal through the data channel, and then undergoes privacy protection processing to obtain encryption. information or authentication information, and then sends the processed information to the second terminal through the data channel, enabling the second terminal to determine the face authentication result of the first terminal through encrypted information or authentication information, which can avoid the user's face image information leaks and improve safety.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disk (DVD) or other optical disk storage, magnetic cassettes, tapes, disk storage or other magnetic storage devices, or may Any other medium used to store the desired information and that can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本申请提供了一种视频通话方法、电子设备和存储介质,该方法包括:基于预设的数据通道,接收来自第二终端的人脸认证请求信息(S110);响应于所述人脸认证请求信息,获取人脸图像信息(S120);对所述人脸图像信息进行隐私保护处理,得到加密信息或者认证信息(S130);基于所述数据通道,将所述加密信息或者所述认证信息发送至所述第二终端,以使所述第二终端根据所述加密信息或者所述认证信息确定所述第一终端的人脸认证结果(S140)。

Description

视频通话方法、电子设备和存储介质
相关申请的交叉引用
本申请基于申请号为202210885480.9、申请日为2022年7月26日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及但不限于通信技术领域,尤其涉及一种视频通话方法、电子设备和存储介质。
背景技术
目前,在5G视频客服的业务场景中,需要在视频通话过程中对用户进行人脸认证时,通常在客服侧的终端采用自动抓拍截图的方式来采集用户的人脸图像信息,并将人脸图像信息发送至公安信息系统以完成认证,用户的人脸图像信息存在泄漏的风险,安全性差。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本申请实施例提供了一种视频通话方法、电子设备和存储介质。
第一方面,本申请实施例提供了一种视频通话方法,应用于第一终端,所述方法包括:第一终端与第二终端建立视频通话;基于预设的数据通道,接收来自第二终端的人脸认证请求信息;响应于所述人脸认证请求信息,获取人脸图像信息;对所述人脸图像信息进行隐私保护处理,得到加密信息或者认证信息;基于所述预设的数据通道,将所述加密信息或者所述认证信息发送至所述第二终端,以使所述第二终端根据所述加密信息或者所述认证信息确定所述第一终端的人脸认证结果。
第二方面,本申请还提供了一种视频通话方法,应用于第二终端,所述方法包括:获取人脸认证请求信息;基于预设的数据通道,将所述人脸认证请求信息发送至第一终端;基于所述预设的数据通道,接收来自所述第一终端的加密信息或认证信息,其中,所述加密信息或所述认证信息由所述第一终端对人脸图像信息进行隐私保护处理而得到,所述人脸图像信息由所述第一终端在响应于所述人脸认证请求信息的情况下获取而得到;根据所述加密信息或所述认证信息,确定所述第一终端的人脸认证结果。
第三方面,本申请还提供了一种电子设备,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如上第一方面所述的视频通话方法。
第四方面,本申请还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行程序,所述计算机可执行程序用于使计算机执行如上第一方面所述的视频通话方法,或者如上第二方面所述的视频通话方法。
本申请的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。
附图说明
附图用来提供对本申请技术方案的理解,并且构成说明书的一部分,与本申请的实施例一起用于解释本申请的技术方案,并不构成对本申请技术方案的限制。
图1是本申请一个实施例提供的应用于第一终端的视频通话方法的流程图;
图2是本申请另一个实施例提供的另一视频通话方法的流程图;
图3是本申请另一个实施例提供的认证处理的方法的流程图;
图4是本申请另一个实施例提供的建立数据通道的方法的流程图;
图5是本申请另一个实施例提供的发送脱敏处理后的视频信息的方法的流程图;
图6是本申请另一个实施例提供的一种确定人脸区域的方法的流程图;
图7是本申请另一个实施例提供的另一种确定人脸区域的方法的流程图;
图8是本申请另一个实施例提供的脱敏处理的方法的流程图;
图9是本申请另一个实施例提供的应用于第二终端的视频通话方法的流程图;
图10是本申请另一个实施例提供的IMS数据通道的示意图;
图11是本申请一个实施例提供的发送视频信息的方法的流程图;
图12是本申请另一个实施例提供的电子设备的结构图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。
需要说明的是,虽然在装置示意图中进行了功能模块划分,在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于装置中的模块划分,或流程图中的顺序执行所示出或描述的步骤。说明书、权利要求书或上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
目前,在5G视频客服的业务场景中,需要在视频通话过程中对用户进行人脸认证时,通常在客服侧的终端采用自动抓拍截图的方式来采集用户的人脸图像信息,并将人脸图像信息发送至公安信息系统以完成认证,用户的人脸图像信息存在泄漏的风险,安全性差。
针对在视频通话过程中进行人脸认证时,用户的人脸图像信息存在泄漏的风险的问题,本申请提供了一种视频通话方法、电子设备和存储介质,该方法应用于第一终端,方法包括:第一终端与第二终端建立视频通话;基于预设的数据通道,接收来自第二终端的人脸认证请求信息;响应于人脸认证请求信息,获取人脸图像信息;对人脸图像信息进行隐私保护处理,得到加密信息或者认证信息;基于预设的数据通道,将加密信息或者认证信息发送至第二终端,以使第二终端根据加密信息或者认证信息确定第一终端的人脸认证结果。根据本申请实施例提供的方案,第一终端通过数据通道接收来自第二终端的人脸认证请求信息,然后通过隐私保护处理,得到加密信息或者认证信息,进而将处理得到的信息通过数据通道发送至第 二终端,实现了第二终端通过加密信息或者认证信息来确定第一终端的人脸认证结果,能够避免用户的人脸图像信息泄漏,提高安全性。
下面结合附图,对本申请实施例作阐述。
本申请实施例提供的一种视频通话方法,可应用于第一终端中,也可应用于第二终端中,还可以是运行于第一终端或第二终端中的软件。
如图1所示,图1是本申请一个实施例提供的一种视频通话方法的流程图。该视频通话方法可以应用于第一终端,该视频通话方法包括但不限于如下步骤:
步骤S110,基于预设的数据通道,接收来自第二终端的人脸认证请求信息;
步骤S120,响应于人脸认证请求信息,获取人脸图像信息;
步骤S130,对人脸图像信息进行隐私保护处理,得到加密信息或者认证信息;
步骤S140,基于数据通道,将加密信息或者认证信息发送至第二终端,以使第二终端根据加密信息或者认证信息确定第一终端的人脸认证结果。
可以理解的是,在第一终端与第二终端建立视频通话后,第一终端需要对人脸认证请求信息进行监听,当接收到人脸认证请求信息后,通过预设的图像采集器获取人脸图像信息,然后第一终端对人脸图像信息进行隐私保护处理,再将处理后的结果发送至第二终端,第二终端无法得到原始的人脸图像信息,能够保护用户隐私安全,另外,通过已建立的第一终端和第二终端之间专用的数据通道,完成人脸认证过程的信息传输,能够保证信息传输的可靠性和稳定性;基于此,通过第一终端通过数据通道接收来自第二终端的人脸认证请求信息,然后通过隐私保护处理,得到加密信息或者认证信息,进而将处理得到的信息通过数据通道发送至第二终端,实现了第二终端通过加密信息或者认证信息来确定第一终端的人脸认证结果,能够避免用户的人脸图像信息泄漏,提高安全性。
需要说明的是,第一终端和第二终端可以是个人计算机(Personal Computer,PC)、手机、智能手机、个人数字助手(Personal Digital Assistant,PDA)、可穿戴设备、掌上电脑PPC(Pocket PC)、平板电脑等,但并不局限于此;图像采集器可为单目摄像头、双目摄像头等,但并不局限于此。
在实践中,在5G视频客服的业务场景中,第一终端相当于用户侧的终端,第二终端相当于客服侧的终端,目前,为了保护用户隐私安全,默认情况下,第一终端和第二终端建立视频通话后,第一终端无需开启摄像头,只需观看第二终端的视频业务内容即可,但是在人脸认证场景,用户授权同意后会打开第一终端的摄像头,相对于第一终端直接将人脸图像信息发送至第二终端,以完成人脸认证,用户的人脸图像信息存在泄漏的风险,人脸图像信息泄漏后,人脸图像信息可能被滥用于可视门禁,给用户人身安全带来了隐患;在本实施例提供的视频通话方法中,第一终端对摄像头采集的人脸图像信息进行隐私保护处理,并将处理结果发送至第二终端,第二终端无法得到原始的人脸图像信息,只能通过该处理结果确定第一终端的人脸认证结果,能够避免用户的人脸图像信息泄漏,提高5G视频客服的隐私安全,并提高了5G终端的竞争力。
另外,参照图2,在一实施例中,图1所示实施例中的步骤S130,包括但不限于如下任一步骤:
步骤S210,对人脸图像信息进行加密处理得到加密信息;
步骤S220,对人脸图像信息进行认证处理得到认证信息。
可以理解的是,在隐私保护处理中,第一终端可按照预设的加密规则,对人脸图像信息进行加密处理,得到加密信息,然后将加密信息发送至第二终端,第二终端按照预设的第一认证数据库,对加密信息进行比对分析,确定人脸认证结果,当加密信息与第一认证数据库中的任一信息匹配时,人脸认证结果为通过状态,否则为不通过状态;或者,第一终端可按照预设的第二认证数据库对人脸图像信息进行认证处理,得到用于表征人脸认证结果的认证信息,当人脸图像信息与第二认证数据库中的任一信息匹配时,人脸认证结果为通过状态,否则为不通过状态。
另外,参照图3,在一实施例中,图2所示实施例中的步骤S220,包括但不限于有以下步骤:
步骤S310,将人脸图像信息发送至预设的认证服务器,以使认证服务器对人脸图像信息进行认证处理;
步骤S320,接收来自认证服务器的认证信息。
可以理解的是,第一终端可将人脸图像信息发送至认证服务器,认证服务器相当于公安信息系统,认证服务器储存有包含人脸信息的公安信息,将人脸图像信息和各个公安信息进行比对,得到用于表征人脸认证结果的认证信息,当人脸图像信息与任一公安信息匹配时,人脸认证结果为通过状态,否则为不通过状态。
另外,参照图4,在一实施例中,图1所示实施例中的步骤S110之前,还包括但不限于有以下步骤:
步骤S410,接收来自第二终端的数据通道建立信息;
步骤S420,响应于数据通道建立信息,将预设的配置信息发送至第二终端,以使第二终端根据配置信息,建立与第一终端之间基于互联网协议多媒体子系统IMS域的数据通道。
可以理解的是,第一终端需要对数据通道建立信息进行监听,当接收到数据通道建立信息后,将配置信息发送至第二终端,进而建立第一终端和第二终端之间的IMS数据通道。
需要说明的是,配置信息可由用户预先设置,用户可根据实际需求对配置信息进行更新。
在实践中,数据通道建立信息为第一SIP信令,在第一SIP信令中,通过解析SDP消息中的dcmap字段,来判断是否需要建立数据通道;配置信息包括第一属性标识,按照网络协议的规定,通过第一属性标识确定数据通道的框架,当数据通道的框架为Bootstrap框架,数据通道经过预设的数据服务器,通过该数据通道,第一终端、数据服务器和第二终端依次通信连接;当数据通道的框架为非Bootstrap框架,数据通道不经过数据服务器,通过该数据通道,第一终端和第二终端直接通信连接。
另外,参照图5,在一实施例中,图1所示实施例中的步骤S120之前,还包括但不限于有以下步骤:
步骤S510,获取视频信息;
步骤S520,视频信息进行脱敏处理;
步骤S530,将脱敏处理后的视频信息发送至第二终端。
可以理解的是,相对于第一终端直接将视频信息发送至第二终端,第二终端能够通过对视频信息进行抓拍截图来得到用户的人脸图像信息,人脸图像信息可能被滥用于可视门禁,给用户人身安全带来了隐患;在本实施例提供的视频通话方法中,第一终端和第二终端建立视频通话后,第一终端需要与第二终端进行实时视频时,第一终端获取图像采集器实时采集 的视频信息后,第一终端对视频信息进行脱敏处理,再基于预设的音视频通道,将脱敏处理后的视频信息发送至第二终端,第二终端无法通过脱敏处理后的视频信息得到用户的人脸图像信息,能够避免用户的人脸图像信息泄漏,提高安全性。
另外,参照图6,在一实施例中,图5所示实施例中的步骤S520之前,还包括但不限于有以下步骤:
步骤S610,获取人脸区域参数;
步骤S620,对视频信息进行分帧处理,确定多个视频帧;
步骤S630,根据人脸区域参数,确定各个视频帧的人脸区域。
可以理解的是,在进行脱敏处理前,可基于人脸区域参数,对视频信息中的各个视频帧进行区域限定,确定人脸区域,由于在任一视频帧中,人脸区域以外的区域不存在隐私泄漏的风险,在后续步骤,只需对人脸区域进行脱敏处理,能够在保护隐私安全的前提下,提高效率。
需要说明的是,视频信息包含若干个视频帧的信息,在脱敏处理时,需要对所有视频帧进行处理。
值得注意的是,用户可以在进行视频通话前预先设定人脸区域参数,也可以在视频通话过程中进行设定或调整人脸区域参数。
另外,参照图7,在一实施例中,图5所示实施例中的步骤S520之前,还包括但不限于有以下步骤:
步骤S710,对视频信息进行分帧处理,确定多个视频帧;
步骤S720,对各个视频帧分别进行人脸检测处理,确定各个视频帧的人脸区域。
可以理解的是,在进行脱敏处理前,可通过人脸检测处理,确定视频信息中的各个视频帧的人脸区域,由于在任一视频帧中,人脸区域以外的区域不存在隐私泄漏的风险,在后续步骤,只需对人脸区域进行脱敏处理,能够在保护隐私安全的前提下,提高效率。
另外,参照图8,在一实施例中,图5所示实施例中的步骤S520中的脱敏处理,包括但不限于如下任一步骤:
步骤S810,对人脸区域进行虚化处理;
步骤S820,对人脸区域进行雾化处理;
步骤S830,对人脸区域进行马赛克叠加处理;
步骤S840,对人脸区域进行虚拟形象替换处理。
可以理解的是,通过虚化处理、雾化处理、马赛克叠加处理和虚拟形象替换处理中的一种或多种方式,对人脸区域进行脱敏处理,使第二终端无法通过脱敏处理后的视频信息得到用户的人脸图像信息,能够避免用户的人脸图像信息泄漏,提高安全性。
另外,在一实施例中,图1所示实施例中的步骤S120,包括但不限于有以下步骤:
响应于人脸认证请求信息,基于视频帧的人脸区域,根据视频帧得到人脸图像信息。
可以理解的是,在人脸认证过程中,当第一终端接收到人脸认证请求信息后,第一终端截取视频信息中的当前视频帧,通过该视频帧的人脸区域,确定人脸图像信息,无需通过摄像头重复采集人脸图像,能够提高处理效率。
如图9所示,图9是本申请另一个实施例提供的一种视频通话方法的流程图。该视频通话方法可以应用于第二终端,该视频通话方法包括但不限于如下步骤:
步骤S910,获取人脸认证请求信息;
步骤S920,基于预设的数据通道,将人脸认证请求信息发送至第一终端;
步骤S930,基于预设的数据通道,接收来自第一终端的加密信息或认证信息,其中,加密信息或认证信息由第一终端对人脸图像信息进行隐私保护处理而得到,人脸图像信息由第一终端在响应于人脸认证请求信息的情况下获取而得到;
步骤S940,根据加密信息或认证信息,确定第一终端的人脸认证结果。
可以理解的是,该应用于第二终端的视频通话方法的实施例与上述应用于第一终端的视频通话方法的实施例基本相同,在此不再赘述;基于此,通过第一终端通过数据通道接收来自第二终端的人脸认证请求信息,然后通过隐私保护处理,得到加密信息或者认证信息,进而将处理得到的信息通过数据通道发送至第二终端,实现了第二终端通过加密信息或者认证信息来确定第一终端的人脸认证结果,能够避免用户的人脸图像信息泄漏,提高安全性。
另外,参照图10,图10是本申请另一个实施例提供的IMS数据通道的示意图。
可以理解的是,IMS数据通道可以为Bootstrap框架的数据通道,也可以为非Bootstrap框架的数据通道,如图10所示,当IMS数据通道的框架为Bootstrap框架数据通道经过预设的数据服务器,通过该数据通道,第一终端、数据服务器和第二终端依次通信连接;另外,当数据通道的框架为非Bootstrap框架,数据通道不经过数据服务器,通过该数据通道,第一终端和第二终端直接通信连接(图中未示出)。
另外,参照图11,图11是本申请一个实施例提供的发送视频信息的方法的流程图。
可以理解的是,在视频通话过程中,需要判断第一终端是否处于隐私保护状态,当第一终端处于隐私保护状态时,第一终端才会对视频信息进行脱敏处理,进而将脱敏处理后的视频信息发送至第二终端,否则,第一终端直接将视频发送至第二终端。
需要说明的是,当第一终端与信任的第二终端进行视频通话时,无需对视频信息进行脱敏处理,用户可设置第一终端处于非隐私保护状态,通话效果更佳。
在实践中,在第一终端的通话界面中,设置有隐私保护状态的设置开关,用户可通过触发该开关来调整第一终端的隐私保护状态。
另外,在一实施例中,第一终端包括但不限于:通话模块、采集模块、设置模块、图像处理模块、监听模块、数据通道管理模块、加密模块、发送模块和存储模块。
可以理解的是,通话模块被设置为建立、维持和挂断与第二终端之间的视频通话;采集模块被设置为采集用户的图像信息;设置模块被设置为设置人脸区域参数,以及第一终端的隐私保护状态;图像处理模块被设置为对视频信息进行脱敏处理;监听模块被设置为监控是否接收到人脸认证请求信息或数据通道建立信息;数据通道管理模块被设置为建立、维持、释放IMS数据通道;加密模块被设置为对人脸图像信息按照预设的加密规则进行加密处理;发送模块被设置为将加密信息或认证信息发送至第二终端;存储模块被设置为保存人脸图像信息至本地,以方便后续通过认证服务器对人脸图像信息进行认证处理。
另外,参照图12,本申请的一个实施例还提供了一种电子设备。
在一些实施例中,该电子设备包括:一个或多个处理器和存储器,图12中以一个处理器及存储器为例。处理器和存储器可以通过总线或者其他方式连接,图12中以通过总线连接为例。
存储器作为一种非暂态计算机可读存储介质,可用于存储非暂态软件程序以及非暂态性计算机可执行程序,如上述本申请实施例中的视频通话方法。处理器通过运行存储在存储器中的非暂态软件程序以及程序,从而实现上述本申请实施例中的视频通话方法。
存储器可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储执行上述本申请实施例中的视频通话方法所需的数据等。此外,存储器可以包括高速随机存取存储器,还可以包括非暂态存储器,例如至少一个磁盘存储器件、闪存器件、或其他非暂态固态存储器件。在一些实施方式中,存储器可选包括相对于处理器远程设置的存储器,这些远程存储器可以通过网络连接至该电子设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
实现上述本申请实施例中的视频通话方法所需的非暂态软件程序以及程序存储在存储器中,当被一个或者多个处理器执行时,执行上述本申请实施例中应用于第一终端的视频通话方法,例如,执行以上描述的图1中的方法步骤S110至步骤S140、图2中的方法步骤S210或步骤S220、图3中的方法步骤S310至步骤S320、图4中的方法步骤S410至步骤S420、图5中的方法步骤S510至步骤S530、图6中的方法步骤S610至步骤S630、图7中的方法步骤S710至步骤S720、图8中的方法步骤S810至步骤S840,第一终端通过基于预设的数据通道,接收来自第二终端的人脸认证请求信息;响应于人脸认证请求信息,获取人脸图像信息;对人脸图像信息进行隐私保护处理,得到加密信息或者认证信息;基于数据通道,将加密信息或者认证信息发送至第二终端,以使第二终端根据加密信息或者认证信息确定第一终端的人脸认证结果。基于此,通过第一终端通过数据通道接收来自第二终端的人脸认证请求信息,然后通过隐私保护处理,得到加密信息或者认证信息,进而将处理得到的信息通过数据通道发送至第二终端,实现了第二终端通过加密信息或者认证信息来确定第一终端的人脸认证结果,能够避免用户的人脸图像信息泄漏,提高安全性。
此外,本申请的一个实施例还提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机可执行指令,该计算机可执行指令被一个处理器或控制器执行,例如,被上述电子设备实施例中的一个处理器执行,可使得上述处理器执行上述实施例中应用于第一终端的视频通话方法,例如,执行以上描述的图1中的方法步骤S110至步骤S140、图2中的方法步骤S210或步骤S220、图3中的方法步骤S310至步骤S320、图4中的方法步骤S410至步骤S420、图5中的方法步骤S510至步骤S530、图6中的方法步骤S610至步骤S630、图7中的方法步骤S710至步骤S720、图8中的方法步骤S810至步骤S840,第一终端通过基于预设的数据通道,接收来自第二终端的人脸认证请求信息;响应于人脸认证请求信息,获取人脸图像信息;对人脸图像信息进行隐私保护处理,得到加密信息或者认证信息;基于数据通道,将加密信息或者认证信息发送至第二终端,以使第二终端根据加密信息或者认证信息确定第一终端的人脸认证结果;或者执行上述实施例中应用于第二终端的视频通话方法,例如,执行以上描述的图9中的方法步骤S910至步骤S940,第二终端通过获取人脸认证请求信息;基于预设的数据通道,将人脸认证请求信息发送至第一终端;基于数据通道,接收来自第一终端的加密信息或认证信息,其中,加密信息或认证信息由第一终端对人脸图像信息进行隐私保护处理而得到,人脸图像信息由第一终端在响应于人脸认证请求信息的情况下获取而得到;根据加密信息或认证信息,确定第一终端的人脸认证结果。基于此,通过第一终端通过数据通道接收来自第二终端的人脸认证请求信息,然后通过隐私保护处理,得到加密 信息或者认证信息,进而将处理得到的信息通过数据通道发送至第二终端,实现了第二终端通过加密信息或者认证信息来确定第一终端的人脸认证结果,能够避免用户的人脸图像信息泄漏,提高安全性。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统可以被实施为软件、固件、硬件及其适当的组合。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。
以上是对本申请的部分实施进行了具体说明,但本申请并不局限于上述实施方式,熟悉本领域的技术人员在不违背本申请实质的前提下还可作出种种的等同变形或替换,这些等同的变形或替换均包含在本申请权利要求所限定的范围内。

Claims (12)

  1. 一种视频通话方法,应用于第一终端,所述方法包括:
    第一终端与第二终端建立视频通话;
    基于预设的数据通道,接收来自第二终端的人脸认证请求信息;
    响应于所述人脸认证请求信息,获取人脸图像信息;
    对所述人脸图像信息进行隐私保护处理,得到加密信息或者认证信息;
    基于所述预设的数据通道,将所述加密信息或者所述认证信息发送至所述第二终端,以使所述第二终端根据所述加密信息或者所述认证信息确定所述第一终端的人脸认证结果。
  2. 根据权利要求1所述的方法,其中,所述对所述人脸图像信息进行隐私保护处理,得到加密信息或者认证信息,包括:
    对所述人脸图像信息按照预设的加密规则进行加密处理而得到加密信息;或者,
    对所述人脸图像信息按照预设的认证数据库对人脸图像信息进行认证处理而得到认证信息。
  3. 根据权利要求1或2所述的方法,其中,在对所述人脸图像信息进行隐私保护处理得到认证信息的情况下,所述隐私保护处理包括:
    将所述人脸图像信息发送至预设的认证服务器,以使所述认证服务器对所述人脸图像信息进行认证处理;
    接收来自所述认证服务器的认证信息。
  4. 根据权利要求1所述的方法,其中,所述基于预设的数据通道,接收来自第二终端的人脸认证请求信息的步骤之前,还包括:
    接收来自所述第二终端的数据通道建立信息;
    响应于所述数据通道建立信息,将预设的配置信息发送至所述第二终端,以使所述第二终端根据所述配置信息,建立与所述第一终端之间基于互联网协议多媒体子系统IMS域的数据通道。
  5. 根据权利要求1所述的方法,其中,所述响应于所述人脸认证请求信息,获取人脸图像信息的步骤之前,还包括:
    获取视频信息;
    对所述视频信息进行脱敏处理;
    将脱敏处理后的所述视频信息发送至所述第二终端。
  6. 根据权利要求5所述的方法,其中,所述对所述视频信息进行脱敏处理的步骤之前,还包括:
    获取人脸区域参数;
    对所述视频信息进行分帧处理,确定多个视频帧;
    根据所述人脸区域参数,确定各个所述视频帧的人脸区域。
  7. 根据权利要求5所述的方法,其中,所述对所述视频信息进行脱敏处理的步骤之前,还包括:
    对所述视频信息进行分帧处理,确定多个视频帧;
    对各个所述视频帧分别进行人脸检测处理,确定各个所述视频帧的人脸区域。
  8. 根据权利要求6或7所述的方法,其中,所述脱敏处理包括如下任一步骤:
    对所述人脸区域进行虚化处理;或
    对所述人脸区域进行雾化处理;或
    对所述人脸区域进行马赛克叠加处理;或
    对所述人脸区域进行虚拟形象替换处理。
  9. 根据权利要求6或7所述的方法,其中,所述响应于所述人脸认证请求信息,获取人脸图像信息,包括:
    响应于所述人脸认证请求信息,基于所述视频帧的人脸区域,根据所述视频帧得到所述人脸图像信息。
  10. 一种视频通话方法,应用于第二终端,所述方法包括:
    获取人脸认证请求信息;
    基于预设的数据通道,将所述人脸认证请求信息发送至第一终端;
    基于所述预设的数据通道,接收来自所述第一终端的加密信息或认证信息,其中,所述加密信息或所述认证信息由所述第一终端对人脸图像信息进行隐私保护处理而得到,所述人脸图像信息由所述第一终端在响应于所述人脸认证请求信息的情况下获取而得到;
    根据所述加密信息或所述认证信息,确定所述第一终端的人脸认证结果。
  11. 一种电子设备,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至9中任意一项所述的视频通话方法,或者如权利要求10所述的视频通话方法。
  12. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行程序,所述计算机可执行程序用于使计算机执行如权利要求1至9中任意一项所述的视频通话方法,或者如权利要求10所述的视频通话方法。
PCT/CN2023/100796 2022-07-26 2023-06-16 视频通话方法、电子设备和存储介质 WO2024021922A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210885480.9 2022-07-26
CN202210885480.9A CN117499569A (zh) 2022-07-26 2022-07-26 视频通话方法、电子设备和存储介质

Publications (1)

Publication Number Publication Date
WO2024021922A1 true WO2024021922A1 (zh) 2024-02-01

Family

ID=89675002

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/100796 WO2024021922A1 (zh) 2022-07-26 2023-06-16 视频通话方法、电子设备和存储介质

Country Status (2)

Country Link
CN (1) CN117499569A (zh)
WO (1) WO2024021922A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009003805A (ja) * 2007-06-22 2009-01-08 Glory Ltd 正当性認証システム及び正当性認証方法
CN105046133A (zh) * 2015-07-21 2015-11-11 深圳市元征科技股份有限公司 一种图像显示方法及车载终端
CN109063442A (zh) * 2018-06-26 2018-12-21 阿里巴巴集团控股有限公司 业务实现、相机实现的方法和装置
CN110784676A (zh) * 2019-10-28 2020-02-11 深圳传音控股股份有限公司 数据处理方法、终端设备及计算机可读存储介质
CN111915306A (zh) * 2019-05-08 2020-11-10 华控清交信息科技(北京)有限公司 业务数据的验证方法和验证平台
CN112734436A (zh) * 2021-01-08 2021-04-30 支付宝(杭州)信息技术有限公司 一种支持人脸识别的终端以及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009003805A (ja) * 2007-06-22 2009-01-08 Glory Ltd 正当性認証システム及び正当性認証方法
CN105046133A (zh) * 2015-07-21 2015-11-11 深圳市元征科技股份有限公司 一种图像显示方法及车载终端
CN109063442A (zh) * 2018-06-26 2018-12-21 阿里巴巴集团控股有限公司 业务实现、相机实现的方法和装置
CN111915306A (zh) * 2019-05-08 2020-11-10 华控清交信息科技(北京)有限公司 业务数据的验证方法和验证平台
CN110784676A (zh) * 2019-10-28 2020-02-11 深圳传音控股股份有限公司 数据处理方法、终端设备及计算机可读存储介质
CN112734436A (zh) * 2021-01-08 2021-04-30 支付宝(杭州)信息技术有限公司 一种支持人脸识别的终端以及方法

Also Published As

Publication number Publication date
CN117499569A (zh) 2024-02-02

Similar Documents

Publication Publication Date Title
US10880306B2 (en) Verification information update
US10650119B2 (en) Multimedia data processing method, apparatus, system, and storage medium
US20160267290A1 (en) Information viewing method, device, system and storage medium
EP4024809A1 (en) Application access method and apparatus, and electronic device and storage medium
US10027641B2 (en) Method and apparatus of account login
WO2020019387A1 (zh) 一种视频资源文件的获取方法和管理系统
WO2019062666A1 (zh) 一种实现安全访问内部网络的系统、方法和装置
US10607035B2 (en) Method of displaying content on a screen of an electronic processing device
US20170085567A1 (en) System and method for processing task resources
US20230125139A1 (en) Account Data Sharing Method and Electronic Device
WO2017140214A1 (zh) 通讯方法及装置
TWI516972B (zh) 應用安全驗證方法、應用伺服器、應用用戶端及系統
JP2024504092A (ja) ミラーリング方法、装置、電子機器および記憶媒体
WO2018214794A1 (zh) 一种连接方法及设备
CN105577619B (zh) 一种客户端登录方法、客户端以及系统
CN113225351B (zh) 一种请求处理方法、装置、存储介质及电子设备
US20230051561A1 (en) Method for processing live broadcast information stream
WO2024021922A1 (zh) 视频通话方法、电子设备和存储介质
WO2023202214A1 (zh) 一种通信方法、装置、系统、终端及服务器
CN115604862A (zh) 视频流传输方法及系统
US11363020B2 (en) Method, device and storage medium for forwarding messages
CN114595465A (zh) 数据加密处理方法、装置及电子设备
CN114039723A (zh) 一种共享密钥的生成方法、装置、电子设备及存储介质
CN111125660B (zh) 一种隐私保护方法、移动终端和具有存储功能的装置
CN107846410B (zh) 一种入网验证的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845135

Country of ref document: EP

Kind code of ref document: A1