CN114615403B - Access method, device and system for video files of office camera - Google Patents

Access method, device and system for video files of office camera Download PDF

Info

Publication number
CN114615403B
CN114615403B CN202210156861.3A CN202210156861A CN114615403B CN 114615403 B CN114615403 B CN 114615403B CN 202210156861 A CN202210156861 A CN 202210156861A CN 114615403 B CN114615403 B CN 114615403B
Authority
CN
China
Prior art keywords
check code
visitor
access
memory
image file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210156861.3A
Other languages
Chinese (zh)
Other versions
CN114615403A (en
Inventor
李伟
杨琼莹
劳碧文
叶原源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Vocational and Technical College
Original Assignee
Guangdong Vocational and Technical College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Vocational and Technical College filed Critical Guangdong Vocational and Technical College
Priority to CN202210156861.3A priority Critical patent/CN114615403B/en
Publication of CN114615403A publication Critical patent/CN114615403A/en
Application granted granted Critical
Publication of CN114615403B publication Critical patent/CN114615403B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • H04N21/2396Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests characterized by admission policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses a method, a device and a system for accessing video files of an office camera, wherein the method comprises the following steps: dividing a video file obtained by an office camera into a first image file and a second image file and storing the first image file and the second image file in a first memory and a second memory respectively; obtaining an access request of a visitor and a first check code, and checking the validity of the first check code; when the first check code is legal, an independent communication channel is used for requesting the visitor to provide access rights; and obtaining the access authority provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access authority. The access method of the video file of the office camera furthest protects the security of the video file obtained by the office camera and avoids illegal access by carrying out multiple restrictions on visitors. The method is mainly used in the technical field of the Internet of things.

Description

Access method, device and system for video files of office camera
Technical Field
The invention relates to the technical field of the Internet of things, in particular to a method, a device and a system for accessing video files of an office camera.
Background
The existing offices are generally provided with cameras, so that the conditions of the offices are conveniently monitored, the cameras in the offices can be generally accessed through remote APP, and then information on the cameras is obtained. However, since offices have certain privacy requirements. Therefore, how to avoid the illegal access of the image of the office becomes a technical problem that needs to be focused in the industry.
Disclosure of Invention
The invention provides a method, a device and a system for accessing video files of an office camera, which are used for solving one or more technical problems in the prior art and at least providing a beneficial selection or creation condition.
In a first aspect, a method for accessing an office camera video file is provided, including:
step 1, dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in a first memory, and storing the second image file in a second memory, wherein the average sampling time of the first image file is later than that of the second image file;
step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code;
step 3, checking the validity of the first check code;
step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel;
and 5, obtaining access rights provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file.
Further, in step 1, dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory.
Further, in step 3, checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
Further, in step 4, establishing an independent communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
In a second aspect, there is provided an access device for an office camera video file, including:
a processor;
a memory for storing a computer readable program;
the computer readable program, when executed by the processor, causes the processor to implement the method for accessing an office camera video file according to any of the above technical solutions.
In a third aspect, an access system for an office camera video file is provided, including:
the classification storage module is used for dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in the first memory and storing the second image file in the second memory, wherein the average sampling time of the first image file is later than that of the second image file;
the acquisition module is used for acquiring an access request of a visitor and requesting the visitor to provide a first check code;
the checking module is used for checking the validity of the first check code;
the communication establishing module is used for establishing an independent communication channel for contacting with the visitor based on the first check code when the first check code is legal, and requesting the visitor to provide access rights through the independent communication channel;
the access determining module is used for obtaining the access right provided by the visitor and sending the access address of the first memory or the access address of the second memory to the visitor according to the access right, wherein the access right of the first image file is higher than that of the second image file.
Further, in the classification storage module, dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory.
Further, in the checking module, the checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
Further, in the communication establishment module, establishing an independent communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
The invention has at least the following beneficial effects: in a first aspect, there is provided a method for accessing an office camera video file, including: step 1, dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in a first memory, and storing the second image file in a second memory, wherein the average sampling time of the first image file is later than that of the second image file; step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code; step 3, checking the validity of the first check code; step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel; and 5, obtaining access rights provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file. The access method of the video file of the office camera furthest protects the security of the video file obtained by the office camera and avoids illegal access by carrying out multiple restrictions on visitors. Meanwhile, the device and the system for executing the method for accessing the video file of the office camera are provided, and the description is not repeated here because the beneficial effects of the device and the system are similar to those of the method for accessing the video file of the office camera.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate and do not limit the invention.
FIG. 1 is a flow chart of the steps of a method of accessing an office camera video file;
fig. 2 is a system configuration diagram of an access system for an office camera video file.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It should be noted that although functional block diagrams are depicted as block diagrams, and logical sequences are shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than the block diagrams in the system. The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
In a first aspect, referring to fig. 1, fig. 1 is a flow chart of steps of a method for accessing an office camera video file.
The method for accessing the video file of the office camera comprises the following steps:
step 1, dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in a first memory, and storing the second image file in a second memory, wherein the average sampling time of the first image file is later than that of the second image file;
step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code;
step 3, checking the validity of the first check code;
step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel;
and 5, obtaining access rights provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file.
The office camera video file access method aims at reasonably limiting the access of the video file obtained by the office camera so as to avoid the video file from leaking.
For this purpose, the video file access method of the office camera divides the video file obtained by the office camera into a first image file and a second image file. The image reflected by the first image file is closer to the current situation than the image reflected by the second image file. The concrete steps are as follows: the average sampling time of the first image file is later than the average sampling time of the second image file. The average sampling time of the first image file refers to the average time of the office camera when sampling the content reflected by the first image file. The average sampling time of the second image file refers to the average time of the office camera when sampling the content reflected by the second image file. The average sampling time of the first image file is later than the average sampling time of the second image file, which means that the average sampling time of the first image file is relatively close to the current time, and the average sampling time of the second image file is relatively long from the current time. The purpose of step 1 is to divide and store the first image file and the second image file in the first memory and the second memory respectively by dividing the first image file and the second image file.
After the first image file and the second image file are stored separately, an access request of a visitor can be responded. The access request of the visitor can be obtained, for example, a request instruction which is sent by the visitor and indicates that the visitor needs to access is obtained. After the access request is obtained, in order to verify the identity legitimacy of the visitor, the visitor is required to be requested to provide a first check code.
When the visitor provides the first check code, a validity check may be performed on the first check code to check the identity of the visitor. Avoiding illegal visitors from accessing. In some preferred embodiments, checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
The first check code can be used for carrying out early screening on the visitor, so that illegal visitors are prevented from accessing.
When the first check code is legal, an independent communication channel for contacting the visitor can be established based on the first check code, and after the independent communication channel is established, the visitor can be requested to provide access rights based on the independent communication channel. The access authority is preset and refers to the authority capable of accessing the first image file and the second image file.
By establishing the independent communication channel, the visitor can be ensured to carry out data transmission in the independent communication channel, the data transmission rate can be improved, the independence of the communication channel is ensured, and the interference of other factors can be avoided.
After the access right of the visitor is obtained, whether the visitor can access the first image file or the second image file can be known according to the access right, wherein the access right of the first image file is higher than that of the second image file. After determining the access authority of the visitor, the access address of the first memory or the access address of the second memory can be sent to the visitor so that the visitor can access the first image file or the second image file, and therefore the video file wanted by the visitor is obtained.
The access rights are set to further classify the visitors and limit the visitors to access, so that the security of the video files of the office camera is protected to the greatest extent.
The access method of the video file of the office camera furthest protects the security of the video file obtained by the office camera and avoids illegal access by carrying out multiple restrictions on visitors.
In some preferred embodiments, in step 1, dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory. By the distribution mode, the video file can be well divided into the first image file and the second image file, and the first image file and the second image file are correspondingly stored.
In some preferred embodiments, in step 4, establishing a separate communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel. The first check code is used as an authentication identifier for entering the communication channel, so that a visitor can conveniently enter the communication channel, and other illegal persons are prevented from intruding, and the independence of the communication channel is realized.
In a second aspect, there is provided an access device for an office camera video file, including: a processor and a memory. Wherein the memory is for storing a computer readable program; the computer readable program, when executed by the processor, causes the processor to implement the method for accessing an office camera video file according to any of the above technical solutions.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory module technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
In a third aspect, referring to fig. 2, fig. 2 is a system architecture diagram of an access system for office camera video files;
provided is an access system for an office camera video file, comprising: the system comprises a classified storage module, an acquisition module, a checking module, a communication establishment module and an access determination module.
The classification storage module is used for dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in the first memory and storing the second image file in the second memory, wherein the average sampling time of the first image file is later than that of the second image file; the acquisition module is used for acquiring an access request of a visitor and requesting the visitor to provide a first check code; the checking module is used for checking the validity of the first check code; the communication establishing module is used for establishing an independent communication channel for contacting with the visitor based on the first check code when the first check code is legal, and requesting the visitor to provide access rights through the independent communication channel; the access determining module is used for obtaining the access right provided by the visitor and sending the access address of the first memory or the access address of the second memory to the visitor according to the access right, wherein the access right of the first image file is higher than that of the second image file.
In some preferred embodiments, in the classification storage module, the dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory.
In some preferred embodiments, in the checking module, checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
In some preferred embodiments, in the communication establishment module, establishing an independent communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
While the preferred embodiment of the present invention has been described in detail, the present invention is not limited to the above embodiment, and various equivalent modifications and substitutions can be made by those skilled in the art without departing from the spirit of the present invention, and these equivalent modifications and substitutions are intended to be included in the scope of the present invention as defined in the appended claims.

Claims (7)

1. An access method for an office camera video file is characterized by comprising the following steps:
step 1, setting a buffer, wherein the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory capacity is full, all the video files stored in the first memory are cut into a second memory as second image files, wherein the storage capacity of the second memory is larger than that of the first memory, and the average sampling time of the first image files is later than that of the second image files;
step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code;
step 3, checking the validity of the first check code;
step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel;
and 5, obtaining the access rights provided by the visitor, and after obtaining the access rights of the visitor, obtaining whether the visitor can access the first image file or the second image file according to the access rights, and after determining the access rights of the visitor, sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file.
2. The method for accessing video files of an office camera according to claim 1, wherein in step 3, checking the validity of the first check code specifically comprises: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
3. The method for accessing video files of an office camera according to claim 1, wherein in step 4, establishing an independent communication channel with the visitor specifically comprises: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
4. An access device for an office camera video file, comprising:
a processor;
a memory for storing a computer readable program;
the computer readable program, when executed by the processor, causes the processor to implement the method of accessing an office camera video file as recited in any of claims 1-3.
5. An access system for an office camera video file, comprising:
the system comprises a classified storage module, a buffer memory, a first storage module and a second storage module, wherein the buffer memory is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer memory exceed a set capacity, the video streams stored in the buffer memory are formed into video files, the video files are cut into a first storage as first image files, the first storage is used for storing the first image files with the set capacity, when the first storage capacity is full, all the video files stored in the first storage are cut into a second storage as second image files, the storage capacity of the second storage is larger than that of the first storage, and the average sampling time of the first image files is later than that of the second image files;
the acquisition module is used for acquiring an access request of a visitor and requesting the visitor to provide a first check code;
the checking module is used for checking the validity of the first check code;
the communication establishing module is used for establishing an independent communication channel for contacting with the visitor based on the first check code when the first check code is legal, and requesting the visitor to provide access rights through the independent communication channel;
the access determining module is used for obtaining the access right provided by the visitor, after obtaining the access right of the visitor, the access determining module can know whether the visitor can access the first image file or the second image file according to the access right, and after determining the access right of the visitor, the access address of the first memory or the access address of the second memory is sent to the visitor according to the access right, wherein the access right of the first image file is higher than the access right of the second image file.
6. The system for accessing video files of an office camera according to claim 5, wherein in the checking module, checking the validity of the first check code specifically comprises: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
7. The system for accessing video files of an office camera according to claim 5, wherein in the communication establishment module, establishing an independent communication channel with the visitor comprises: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
CN202210156861.3A 2022-02-21 2022-02-21 Access method, device and system for video files of office camera Active CN114615403B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210156861.3A CN114615403B (en) 2022-02-21 2022-02-21 Access method, device and system for video files of office camera

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210156861.3A CN114615403B (en) 2022-02-21 2022-02-21 Access method, device and system for video files of office camera

Publications (2)

Publication Number Publication Date
CN114615403A CN114615403A (en) 2022-06-10
CN114615403B true CN114615403B (en) 2023-10-24

Family

ID=81859131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210156861.3A Active CN114615403B (en) 2022-02-21 2022-02-21 Access method, device and system for video files of office camera

Country Status (1)

Country Link
CN (1) CN114615403B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06217107A (en) * 1993-01-14 1994-08-05 Ricoh Co Ltd Composing machine
JP2004070674A (en) * 2002-08-07 2004-03-04 Mitsubishi Electric Corp Data protecting device, data protecting method and program in electronic data interchange system
WO2005106672A2 (en) * 2004-04-21 2005-11-10 Storcard, Inc. Hierarchical storage management of encrypted data files
JP2012118833A (en) * 2010-12-02 2012-06-21 Hitachi Ltd Access control method
CN110083551A (en) * 2019-04-26 2019-08-02 北京智芯微电子科技有限公司 Safe close coupling memory and its access method and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080303903A1 (en) * 2003-12-02 2008-12-11 Connexed Technologies Inc. Networked video surveillance system
US20070132773A1 (en) * 2005-12-08 2007-06-14 Smartdrive Systems Inc Multi-stage memory buffer and automatic transfers in vehicle event recording systems
US9274950B2 (en) * 2009-08-26 2016-03-01 Hewlett Packard Enterprise Development Lp Data restructuring in multi-level memory hierarchies

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06217107A (en) * 1993-01-14 1994-08-05 Ricoh Co Ltd Composing machine
JP2004070674A (en) * 2002-08-07 2004-03-04 Mitsubishi Electric Corp Data protecting device, data protecting method and program in electronic data interchange system
WO2005106672A2 (en) * 2004-04-21 2005-11-10 Storcard, Inc. Hierarchical storage management of encrypted data files
JP2012118833A (en) * 2010-12-02 2012-06-21 Hitachi Ltd Access control method
CN110083551A (en) * 2019-04-26 2019-08-02 北京智芯微电子科技有限公司 Safe close coupling memory and its access method and storage medium

Also Published As

Publication number Publication date
CN114615403A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
US10681028B2 (en) Controlling access to resources on a network
US10095877B2 (en) Systems and methods for authenticating photographic image data
US8713646B2 (en) Controlling access to resources on a network
US10341367B1 (en) System and method for inquiring IOC information by P2P protocol
US10638422B2 (en) Data asset transfers via energy efficient communications
US9003553B2 (en) Viewing content under enterprise digital rights management without a client side access component
US20200278948A1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN105518697A (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
US20150020167A1 (en) System and method for managing files
US20220058373A1 (en) Application execution based on object recognition
CN114615403B (en) Access method, device and system for video files of office camera
US10700877B2 (en) Authentication of a new device by a trusted device
CN111147430A (en) Encryption method and device applied to intelligent home gateway
CN114040223A (en) Image processing method and system
CN112685778A (en) Data storage method and device
CN116389258A (en) System and method for determining target allocation parameters for initiating target communications in a complex computing network
CN110769065A (en) Remote management method, system, terminal equipment and server
KR20170082882A (en) Network video recorder and method for blocking video data using the same
CN110661777A (en) Data transmission method and system
US11825166B2 (en) Video playback system based on approval of playback approver
KR101971632B1 (en) Method and apparatus for storing and restoring distributed data
US20060026186A1 (en) Device and method for management of content data
CN107770095B (en) Method and equipment for controlling virtual machine metadata access
US10298550B2 (en) Packet flow in an overlay network
CN116781295A (en) Data encryption method, data access method, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant