CN112399174A - Network camera fault recovery method and device, storage medium and electronic device - Google Patents

Network camera fault recovery method and device, storage medium and electronic device Download PDF

Info

Publication number
CN112399174A
CN112399174A CN202011210229.XA CN202011210229A CN112399174A CN 112399174 A CN112399174 A CN 112399174A CN 202011210229 A CN202011210229 A CN 202011210229A CN 112399174 A CN112399174 A CN 112399174A
Authority
CN
China
Prior art keywords
network camera
abnormal state
normal state
abnormal
camera
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011210229.XA
Other languages
Chinese (zh)
Inventor
叶盛世
李茹
陈彦宇
马雅奇
余意君
汪立富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011210229.XA priority Critical patent/CN112399174A/en
Publication of CN112399174A publication Critical patent/CN112399174A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details
    • H04N17/002Diagnosis, testing or measuring for television systems or their details for television cameras

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Studio Devices (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The application discloses a fault recovery method and device of a network camera, a storage medium and an electronic device. Wherein, the method comprises the following steps: executing encryption verification operation between a background server and the network camera under the condition that the network camera is abnormal; and restoring the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation. The method and the device solve the technical problem that the fault camera cannot be recovered in the related technology.

Description

Network camera fault recovery method and device, storage medium and electronic device
Technical Field
The application relates to the field of intelligent equipment, in particular to a fault recovery method and device of a network camera, a storage medium and an electronic device.
Background
Along with the development of science and technology, the application of the network camera is more and more extensive, and the network camera can provide a chance for lawbreakers while improving the safety coefficient of residents. Once a webcam is hijacked by a lawbreaker, it may invade the residents' personal, property, privacy security, etc. At this time, it is very important to research a method for judging and recovering the abnormality of the network camera.
In the related art (for example, patent CN105471912A), by providing a security defense method and system for monitoring a network, it is possible to effectively defend against abnormal behavior of blocking attackers on monitoring devices, protect security of the monitoring network, and perform security defense on the monitoring network.
However, in the related art, it mainly aims at security defense of the monitoring network, belongs to defense of enhanced monitoring network, and cannot recover the compromised monitoring network.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a method and a device for recovering a fault of a network camera, a storage medium and an electronic device, so as to at least solve the technical problem that the fault camera cannot be recovered in the related technology.
According to an aspect of the embodiments of the present application, there is provided a method for recovering a failure of a network camera, including: executing encryption verification operation between a background server and the network camera under the condition that the network camera is abnormal; and restoring the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
Optionally, when the network camera is restored from the abnormal state to the normal state according to the operation result of the encryption verification operation, under the condition that the encryption verification operation is successfully executed, the network camera is restored from the abnormal state to the normal state in a manner corresponding to the successful execution; and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
Optionally, when the network camera is restored from the abnormal state to the normal state in a manner corresponding to the execution failure, the network camera is automatically restarted under the condition that the network camera cannot complete the encryption verification operation with the background server according to the appointed time, and after the restart, the physical address is changed into a preset physical address, the internet protocol address is changed into a preset protocol address, and the verification key is changed into a preset verification key.
Optionally, after the network camera is restored from the abnormal state to the normal state in a manner corresponding to the execution failure, the background server reestablishes a connection with the network camera by using a preset physical address, a preset protocol address, and a preset verification key.
Optionally, when the network camera is restored from the abnormal state to the normal state in a manner corresponding to successful execution, a control instruction is sent to the network camera to control the network camera to restart, and a physical address, an internet protocol address and a verification key are changed after the network camera is restarted.
Optionally, after the webcam is restored from the abnormal state to the normal state, recording a log of the webcam; and sending the log of the network camera to maintenance after-sales personnel and users.
Optionally, after the network camera is restored from the abnormal state to the normal state, detecting whether the network camera is in the abnormal state; and under the condition that the network camera is in an abnormal state, closing the network camera and informing maintenance after-sales personnel and a user to carry out local checking.
According to another aspect of the embodiments of the present application, there is also provided a failure recovery apparatus for a network camera, including: the verification unit is used for executing encryption verification operation between the background server and the network camera under the condition that the network camera is abnormal; and the recovery unit is used for recovering the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
Optionally, the recovery unit is further configured to, when the network camera is recovered from the abnormal state to the normal state according to the operation result of the encryption verification operation, recover the network camera from the abnormal state to the normal state in a manner corresponding to successful execution under the condition that the encryption verification operation is successfully executed; and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
Optionally, the recovery unit is further configured to, when the network camera is recovered from the abnormal state to the normal state in a manner corresponding to the execution failure, instruct the network camera to automatically restart the network camera under a condition that the network camera cannot complete the encryption verification operation with the background server according to an appointed time, and change the physical address to a preset physical address, the internet protocol address to a preset protocol address, and the verification key to a preset verification key after the restart.
Optionally, the recovery unit is further configured to, after the network camera is recovered from the abnormal state to the normal state in a manner corresponding to the execution failure, reestablish, by the background server, a connection with the network camera by using a preset physical address, a preset protocol address, and a preset verification key.
Optionally, the recovery unit is further configured to send a control instruction to the network camera when the network camera is recovered from the abnormal state to the normal state in a manner corresponding to successful execution, so as to control the network camera to restart, and change the physical address, the internet protocol address, and the verification key after the restart.
Optionally, the recovery unit is further configured to record a log of the webcam after the webcam is recovered from the abnormal state to the normal state; and sending the log of the network camera to maintenance after-sales personnel and users.
Optionally, the recovery unit is further configured to detect whether the network camera is in an abnormal state after the network camera is recovered from the abnormal state to the normal state; and under the condition that the network camera is in an abnormal state, closing the network camera and informing maintenance after-sales personnel and a user to carry out local checking.
According to another aspect of the embodiments of the present application, there is also provided a storage medium including a stored program which, when executed, performs the above-described method.
According to another aspect of the embodiments of the present application, there is also provided an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the above method through the computer program.
In the embodiment of the application, a scheme for the online recovery of the network camera when hijacked is provided; whether the camera is in an abnormal state can also be distinguished. By adopting the scheme, when the network camera is hijacked by a lawbreaker, the abnormal condition can be detected and the normal work can be recovered through an intelligent detection algorithm, an encryption program and an emergency processing algorithm, and the technical problem that the fault camera cannot be recovered in the related technology is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of an alternative method for recovering from a failure of a network camera according to an embodiment of the present application;
fig. 2 is a schematic diagram of an alternative failure recovery scheme for a network camera according to an embodiment of the present application;
fig. 3 is a schematic diagram of an alternative failure recovery apparatus for a network camera according to an embodiment of the present application; and the number of the first and second groups,
fig. 4 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the related technology, security defense is mainly performed on a monitoring network, the defense of the monitoring network is enhanced, and the damaged monitoring network cannot be recovered. The scheme is a method for judging the abnormality of the network camera and recovering the network camera on line when the abnormality occurs.
According to an aspect of the embodiments of the present application, an embodiment of a method for recovering a failure of a network camera is provided. Fig. 1 is a flowchart of an alternative method for recovering from a failure of a network camera according to an embodiment of the present application, and as shown in fig. 1, the method may include the following steps:
and step S1, executing encryption verification operation between the background server and the network camera under the condition that the network camera is abnormal.
The above-mentioned abnormalities occur, such as the situation that a light supplement lamp of the network camera is in an illegal on state for a long time, the network camera is disconnected, the network camera has a large-flow data uploading situation when not used, the network camera stops working without a reason, and the like.
And step S2, restoring the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
Optionally, when the network camera is restored from the abnormal state to the normal state according to the operation result of the encryption verification operation, under the condition that the encryption verification operation is successfully executed, the network camera is restored from the abnormal state to the normal state in a manner corresponding to the successful execution; and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
Optionally, when the network camera is restored from the abnormal state to the normal state in a manner corresponding to the execution failure, the network camera is automatically restarted under the condition that the network camera cannot complete the encryption verification operation with the background server according to the appointed time, and after the restart, the physical address is changed into a preset physical address, the internet protocol address is changed into a preset protocol address, and the verification key is changed into a preset verification key.
Optionally, after the network camera is restored from the abnormal state to the normal state in a manner corresponding to the execution failure, the background server reestablishes a connection with the network camera by using a preset physical address, a preset protocol address, and a preset verification key.
Optionally, when the network camera is restored from the abnormal state to the normal state in a manner corresponding to successful execution, a control instruction is sent to the network camera to control the network camera to restart, and a physical address, an internet protocol address and a verification key are changed after the network camera is restarted.
Optionally, after the webcam is restored from the abnormal state to the normal state, recording a log of the webcam; and sending the log of the network camera to maintenance after-sales personnel and users.
Optionally, after the network camera is restored from the abnormal state to the normal state, detecting whether the network camera is in the abnormal state; and under the condition that the network camera is in an abnormal state, closing the network camera and informing maintenance after-sales personnel and a user to carry out local checking.
In the scheme, a scheme capable of enabling the network camera to recover online when being hijacked is provided; whether the camera is in an abnormal state can also be distinguished. By adopting the scheme, when the network camera is hijacked by a lawbreaker, the abnormal condition can be detected and the normal work can be recovered through an intelligent detection algorithm, an encryption program and an emergency processing algorithm, and the technical problem that the fault camera cannot be recovered in the related technology is solved.
By adopting the technical scheme of the invention, when the network camera is hijacked, the server can detect the abnormity of the camera through an intelligent detection algorithm, the encryption program, emergency treatment and algorithm are utilized to interrupt hijacking and recover the normal state of the network camera, logs are recorded afterwards and are pushed to after-sales maintenance personnel and users of the server, and thus the safety of the users is ensured. As an alternative example, as shown in fig. 2, the following further details the technical solution of the present application with reference to specific embodiments.
With the development of science and technology, the application of the network camera is more and more extensive, and the network camera can improve the safety coefficient of residents and also provide a chance for lawbreakers to take advantage of the safety coefficient. Once the network camera is hijacked by a lawbreaker, the personal safety, privacy and the like of residents can be invaded.
By adopting the scheme, the puzzles can be solved by adding the encryption program in the network camera and the background server and adding the intelligent detection algorithm and the emergency processing algorithm in the background server.
When the background server detects that the network camera is in an abnormal state, if a light supplement lamp of the network camera is in an illegal on state for a long time, the network camera is disconnected, the network camera has a large-flow data uploading condition when not used, the network camera stops working without any reason, and the like, the emergency processing algorithm can firstly judge whether the background server and the network camera can complete regular encryption verification.
If the regular encryption verification between the background server and the network camera can be completed, the network camera is in an online state, the server sends an instruction to restart the camera, changes the MAC (media access control), IP (Internet protocol) address and verification key of the camera, records an abnormal log and pushes the abnormal log to maintenance after-sales personnel and users.
And after waiting for a period of time, continuously detecting whether the network camera is in an abnormal state, if the network camera is still in the abnormal state, sending emergency information to inform after-sales personnel and a user to locally check whether the camera has a fault, and remotely closing the camera.
If the regular encryption verification between the background server and the network camera cannot be completed, after a period of time, the network camera cannot complete the regular encryption verification with the background server, and can be automatically and forcibly restarted and changed into the preset camera MAC, IP address and verification key.
The background server can reestablish connection with the camera through presetting MAC and IP addresses of the camera and a verification key, record abnormal logs and push the abnormal logs to maintenance after-sales personnel and users; after waiting for a period of time, whether the network camera is in an abnormal state or not is also judged, if the network camera is still in the abnormal state, emergency information is sent to inform relevant personnel of handling the fault locally, and the camera is closed. Therefore, the abnormity judgment of the network camera and the online self-recovery function are realized.
The detection of the abnormal state of the camera is determined according to the functions of the camera, and part of high-grade cameras have multiple functions, such as up-down rotation, left-right rotation, and when the intelligent detection algorithm finds that the monitoring picture of the camera deviates from the picture to be monitored for a long time, the camera is also judged to be in the abnormal state. For example, the sound pickup function is turned on when the sound pickup function of the camera is found to be not needed by the intelligent detection algorithm, and the camera is also judged to be in an abnormal state.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
According to another aspect of the embodiment of the present application, there is also provided a failure recovery apparatus for a network camera, which is used for implementing the failure recovery method for a network camera. Fig. 3 is a schematic diagram of an alternative failure recovery apparatus for a network camera according to an embodiment of the present application, and as shown in fig. 3, the apparatus may include:
the verification unit 31 is configured to execute an encryption verification operation between the background server and the network camera when the network camera is abnormal; and a recovery unit 33, configured to recover the network camera from an abnormal state to a normal state according to the operation result of the encryption verification operation.
It should be noted that the verification unit 31 in this embodiment may be configured to execute step S1 in this embodiment, and the recovery unit 33 in this embodiment may be configured to execute step S2 in this embodiment.
Optionally, the recovery unit is further configured to, when the network camera is recovered from the abnormal state to the normal state according to the operation result of the encryption verification operation, recover the network camera from the abnormal state to the normal state in a manner corresponding to successful execution under the condition that the encryption verification operation is successfully executed; and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
Optionally, the recovery unit is further configured to, when the network camera is recovered from the abnormal state to the normal state in a manner corresponding to the execution failure, instruct the network camera to automatically restart the network camera under a condition that the network camera cannot complete the encryption verification operation with the background server according to an appointed time, and change the physical address to a preset physical address, the internet protocol address to a preset protocol address, and the verification key to a preset verification key after the restart.
Optionally, the recovery unit is further configured to, after the network camera is recovered from the abnormal state to the normal state in a manner corresponding to the execution failure, reestablish, by the background server, a connection with the network camera by using a preset physical address, a preset protocol address, and a preset verification key.
Optionally, the recovery unit is further configured to send a control instruction to the network camera when the network camera is recovered from the abnormal state to the normal state in a manner corresponding to successful execution, so as to control the network camera to restart, and change the physical address, the internet protocol address, and the verification key after the restart.
Optionally, the recovery unit is further configured to record a log of the webcam after the webcam is recovered from the abnormal state to the normal state; and sending the log of the network camera to maintenance after-sales personnel and users.
Optionally, the recovery unit is further configured to detect whether the network camera is in an abnormal state after the network camera is recovered from the abnormal state to the normal state; and under the condition that the network camera is in an abnormal state, closing the network camera and informing maintenance after-sales personnel and a user to carry out local checking.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules as a part of the apparatus may run in a corresponding hardware environment, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to another aspect of the embodiment of the application, a server or a terminal for implementing the fault recovery method of the network camera is also provided.
Fig. 4 is a block diagram of a terminal according to an embodiment of the present application, and as shown in fig. 4, the terminal may include: one or more processors 201 (only one shown), memory 203, and transmission means 205, as shown in fig. 4, the terminal may further comprise an input-output device 207.
The memory 203 may be configured to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for recovering from a failure of a network camera in the embodiment of the present application, and the processor 201 executes various functional applications and data processing by running the software programs and modules stored in the memory 203, that is, implements the method for recovering from a failure of a network camera. The memory 203 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 203 may further include memory located remotely from the processor 201, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 205 is used for receiving or sending data via a network, and can also be used for data transmission between a processor and a memory. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 205 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices to communicate with the internet or a local area Network. In one example, the transmission device 205 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Wherein the memory 203 is specifically used for storing application programs.
The processor 201 may call the application stored in the memory 203 via the transmission means 205 to perform the following steps:
executing encryption verification operation between a background server and the network camera under the condition that the network camera is abnormal;
and restoring the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
The processor 201 is further configured to perform the following steps:
under the condition that the encryption verification operation is successfully executed, restoring the network camera from the abnormal state to the normal state in a mode corresponding to the successful execution;
and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
By adopting the embodiment of the application, a scheme for the online recovery of the network camera when being hijacked is provided; whether the camera is in an abnormal state can also be distinguished. By adopting the scheme, when the network camera is hijacked by a lawbreaker, the abnormal condition can be detected and the normal work can be recovered through an intelligent detection algorithm, an encryption program and an emergency processing algorithm, and the technical problem that the fault camera cannot be recovered in the related technology is solved.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
It can be understood by those skilled in the art that the structure shown in fig. 4 is only an illustration, and the terminal may be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, etc. Fig. 4 is a diagram illustrating the structure of the electronic device. For example, the terminal may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 4, or have a different configuration than shown in FIG. 4.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Embodiments of the present application also provide a storage medium. Alternatively, in this embodiment, the storage medium may be a program code for executing a failure recovery method for a network camera.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
executing encryption verification operation between a background server and the network camera under the condition that the network camera is abnormal;
and restoring the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
under the condition that the encryption verification operation is successfully executed, restoring the network camera from the abnormal state to the normal state in a mode corresponding to the successful execution;
and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. A fault recovery method for a network camera is characterized by comprising the following steps:
executing encryption verification operation between a background server and the network camera under the condition that the network camera is abnormal;
and restoring the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
2. The method according to claim 1, wherein the restoring the webcam from the abnormal state to the normal state according to the operation result of the encryption check operation comprises:
under the condition that the encryption verification operation is successfully executed, restoring the network camera from the abnormal state to the normal state in a mode corresponding to the successful execution;
and under the condition that the execution of the encryption verification operation fails, recovering the network camera from the abnormal state to the normal state in a mode corresponding to the execution failure.
3. The method of claim 2, wherein restoring the webcam from the abnormal state to the normal state in a manner corresponding to the execution failure comprises:
and under the condition that the network camera cannot finish the encryption verification operation with the background server according to the appointed time, the network camera is automatically restarted, and after the restart, the physical address is changed into a preset physical address, the internet protocol address is changed into a preset protocol address, and the verification key is changed into a preset verification key.
4. The method according to claim 2, wherein after the network camera is restored from an abnormal state to a normal state in a manner corresponding to the execution failure, the method further comprises:
and the background server adopts a preset physical address, a preset protocol address and a preset verification key to reestablish connection with the network camera.
5. The method of claim 2, wherein restoring the webcam from the abnormal state to the normal state in a manner corresponding to successful execution comprises:
and sending a control instruction to the network camera to control the network camera to restart, and changing a physical address, an internet protocol address and a verification key after restarting.
6. The method according to any one of claims 1 to 5, wherein after the network camera is restored from an abnormal state to a normal state, the method further comprises:
recording the log of the network camera;
and sending the log of the network camera to maintenance after-sales personnel and users.
7. The method according to any one of claims 1 to 5, wherein after the network camera is restored from an abnormal state to a normal state, the method further comprises:
detecting whether the network camera is in an abnormal state or not;
and under the condition that the network camera is in an abnormal state, closing the network camera and informing maintenance after-sales personnel and a user to carry out local checking.
8. A failure recovery device of a network camera is characterized by comprising:
the verification unit is used for executing encryption verification operation between the background server and the network camera under the condition that the network camera is abnormal;
and the recovery unit is used for recovering the network camera from the abnormal state to the normal state according to the operation result of the encryption verification operation.
9. A storage medium, characterized in that the storage medium comprises a stored program, wherein the program when executed performs the method of any of the preceding claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the method of any of the preceding claims 1 to 7 by means of the computer program.
CN202011210229.XA 2020-11-03 2020-11-03 Network camera fault recovery method and device, storage medium and electronic device Pending CN112399174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011210229.XA CN112399174A (en) 2020-11-03 2020-11-03 Network camera fault recovery method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011210229.XA CN112399174A (en) 2020-11-03 2020-11-03 Network camera fault recovery method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN112399174A true CN112399174A (en) 2021-02-23

Family

ID=74598098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011210229.XA Pending CN112399174A (en) 2020-11-03 2020-11-03 Network camera fault recovery method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN112399174A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100248707A1 (en) * 2009-03-31 2010-09-30 Cello Partnership D/B/A Verizon Wireless Wireless device remote recovery
CN107786350A (en) * 2016-08-24 2018-03-09 华为技术有限公司 A kind of method, apparatus and the network equipment of the configuration of dispatching from the factory for recovering the network equipment
CN109982065A (en) * 2017-12-27 2019-07-05 浙江宇视科技有限公司 The method, apparatus and storage medium that equipment fault restores in video surveillance network
CN110138628A (en) * 2018-02-02 2019-08-16 浙江宇视科技有限公司 A kind of camera network fault real-time diagnosis and restoration methods, device and video camera
CN111147740A (en) * 2019-12-27 2020-05-12 青岛海信智慧家居系统股份有限公司 Method and device for controlling intelligent camera

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100248707A1 (en) * 2009-03-31 2010-09-30 Cello Partnership D/B/A Verizon Wireless Wireless device remote recovery
CN107786350A (en) * 2016-08-24 2018-03-09 华为技术有限公司 A kind of method, apparatus and the network equipment of the configuration of dispatching from the factory for recovering the network equipment
CN109982065A (en) * 2017-12-27 2019-07-05 浙江宇视科技有限公司 The method, apparatus and storage medium that equipment fault restores in video surveillance network
CN110138628A (en) * 2018-02-02 2019-08-16 浙江宇视科技有限公司 A kind of camera network fault real-time diagnosis and restoration methods, device and video camera
CN111147740A (en) * 2019-12-27 2020-05-12 青岛海信智慧家居系统股份有限公司 Method and device for controlling intelligent camera

Similar Documents

Publication Publication Date Title
KR101977731B1 (en) Apparatus and method for detecting anomaly in a controller system
US10348755B1 (en) Systems and methods for detecting network security deficiencies on endpoint devices
CN101809540B (en) Network context triggers for activating virtualized computer applications
EP3486824A1 (en) Determine malware using firmware
US9571800B2 (en) Self-healing video surveillance system
JP2011175639A (en) Method and system for security maintenance in network
CN108293044A (en) System and method for detecting malware infection via domain name service flow analysis
WO2020107446A1 (en) Method and apparatus for obtaining attacker information, device, and storage medium
CN106713061B (en) Method, system and device for monitoring attack message
CN101136044A (en) Software watchdog system and method
US8281058B1 (en) Systems and methods for using USB device descriptors to identify computing environments
KR20130093775A (en) Apparatus, method, terminal and system for recovery protection of system files
CN110688653A (en) Client security protection method and device and terminal equipment
EP2980697B1 (en) System and method for altering a functionality of an application
WO2015033049A1 (en) Means of protection for industrial computerized systems
CN105786648A (en) Data processing method and device
CN113132412B (en) Computer network security test and inspection method
CN112399174A (en) Network camera fault recovery method and device, storage medium and electronic device
JP6873032B2 (en) Communication monitoring system, communication monitoring device and communication monitoring method
WO2015131607A1 (en) Method and device for creating trusted environment, and method and device for restoration after base station fault
KR101483859B1 (en) A method of stopping malicious code using a management system monitering the status of the vaccine
CN112396733A (en) Alarm processing method and device, storage medium and electronic device
CN112214763A (en) Data monitoring method and device
CN113806792A (en) File cloud storage method and device, readable storage medium and electronic equipment
CN111949980A (en) Target client monitoring method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223

RJ01 Rejection of invention patent application after publication