CN114615403B - Access method, device and system for video files of office camera - Google Patents
Access method, device and system for video files of office camera Download PDFInfo
- Publication number
- CN114615403B CN114615403B CN202210156861.3A CN202210156861A CN114615403B CN 114615403 B CN114615403 B CN 114615403B CN 202210156861 A CN202210156861 A CN 202210156861A CN 114615403 B CN114615403 B CN 114615403B
- Authority
- CN
- China
- Prior art keywords
- check code
- visitor
- access
- memory
- image file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000004891 communication Methods 0.000 claims abstract description 57
- 238000005070 sampling Methods 0.000 claims description 17
- 238000010586 diagram Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/239—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
- H04N21/2393—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
- H04N21/2396—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests characterized by admission policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The invention discloses a method, a device and a system for accessing video files of an office camera, wherein the method comprises the following steps: dividing a video file obtained by an office camera into a first image file and a second image file and storing the first image file and the second image file in a first memory and a second memory respectively; obtaining an access request of a visitor and a first check code, and checking the validity of the first check code; when the first check code is legal, an independent communication channel is used for requesting the visitor to provide access rights; and obtaining the access authority provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access authority. The access method of the video file of the office camera furthest protects the security of the video file obtained by the office camera and avoids illegal access by carrying out multiple restrictions on visitors. The method is mainly used in the technical field of the Internet of things.
Description
Technical Field
The invention relates to the technical field of the Internet of things, in particular to a method, a device and a system for accessing video files of an office camera.
Background
The existing offices are generally provided with cameras, so that the conditions of the offices are conveniently monitored, the cameras in the offices can be generally accessed through remote APP, and then information on the cameras is obtained. However, since offices have certain privacy requirements. Therefore, how to avoid the illegal access of the image of the office becomes a technical problem that needs to be focused in the industry.
Disclosure of Invention
The invention provides a method, a device and a system for accessing video files of an office camera, which are used for solving one or more technical problems in the prior art and at least providing a beneficial selection or creation condition.
In a first aspect, a method for accessing an office camera video file is provided, including:
step 1, dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in a first memory, and storing the second image file in a second memory, wherein the average sampling time of the first image file is later than that of the second image file;
step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code;
step 3, checking the validity of the first check code;
step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel;
and 5, obtaining access rights provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file.
Further, in step 1, dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory.
Further, in step 3, checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
Further, in step 4, establishing an independent communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
In a second aspect, there is provided an access device for an office camera video file, including:
a processor;
a memory for storing a computer readable program;
the computer readable program, when executed by the processor, causes the processor to implement the method for accessing an office camera video file according to any of the above technical solutions.
In a third aspect, an access system for an office camera video file is provided, including:
the classification storage module is used for dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in the first memory and storing the second image file in the second memory, wherein the average sampling time of the first image file is later than that of the second image file;
the acquisition module is used for acquiring an access request of a visitor and requesting the visitor to provide a first check code;
the checking module is used for checking the validity of the first check code;
the communication establishing module is used for establishing an independent communication channel for contacting with the visitor based on the first check code when the first check code is legal, and requesting the visitor to provide access rights through the independent communication channel;
the access determining module is used for obtaining the access right provided by the visitor and sending the access address of the first memory or the access address of the second memory to the visitor according to the access right, wherein the access right of the first image file is higher than that of the second image file.
Further, in the classification storage module, dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory.
Further, in the checking module, the checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
Further, in the communication establishment module, establishing an independent communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
The invention has at least the following beneficial effects: in a first aspect, there is provided a method for accessing an office camera video file, including: step 1, dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in a first memory, and storing the second image file in a second memory, wherein the average sampling time of the first image file is later than that of the second image file; step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code; step 3, checking the validity of the first check code; step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel; and 5, obtaining access rights provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file. The access method of the video file of the office camera furthest protects the security of the video file obtained by the office camera and avoids illegal access by carrying out multiple restrictions on visitors. Meanwhile, the device and the system for executing the method for accessing the video file of the office camera are provided, and the description is not repeated here because the beneficial effects of the device and the system are similar to those of the method for accessing the video file of the office camera.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate and do not limit the invention.
FIG. 1 is a flow chart of the steps of a method of accessing an office camera video file;
fig. 2 is a system configuration diagram of an access system for an office camera video file.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It should be noted that although functional block diagrams are depicted as block diagrams, and logical sequences are shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than the block diagrams in the system. The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
In a first aspect, referring to fig. 1, fig. 1 is a flow chart of steps of a method for accessing an office camera video file.
The method for accessing the video file of the office camera comprises the following steps:
step 1, dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in a first memory, and storing the second image file in a second memory, wherein the average sampling time of the first image file is later than that of the second image file;
step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code;
step 3, checking the validity of the first check code;
step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel;
and 5, obtaining access rights provided by the visitor, and sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file.
The office camera video file access method aims at reasonably limiting the access of the video file obtained by the office camera so as to avoid the video file from leaking.
For this purpose, the video file access method of the office camera divides the video file obtained by the office camera into a first image file and a second image file. The image reflected by the first image file is closer to the current situation than the image reflected by the second image file. The concrete steps are as follows: the average sampling time of the first image file is later than the average sampling time of the second image file. The average sampling time of the first image file refers to the average time of the office camera when sampling the content reflected by the first image file. The average sampling time of the second image file refers to the average time of the office camera when sampling the content reflected by the second image file. The average sampling time of the first image file is later than the average sampling time of the second image file, which means that the average sampling time of the first image file is relatively close to the current time, and the average sampling time of the second image file is relatively long from the current time. The purpose of step 1 is to divide and store the first image file and the second image file in the first memory and the second memory respectively by dividing the first image file and the second image file.
After the first image file and the second image file are stored separately, an access request of a visitor can be responded. The access request of the visitor can be obtained, for example, a request instruction which is sent by the visitor and indicates that the visitor needs to access is obtained. After the access request is obtained, in order to verify the identity legitimacy of the visitor, the visitor is required to be requested to provide a first check code.
When the visitor provides the first check code, a validity check may be performed on the first check code to check the identity of the visitor. Avoiding illegal visitors from accessing. In some preferred embodiments, checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
The first check code can be used for carrying out early screening on the visitor, so that illegal visitors are prevented from accessing.
When the first check code is legal, an independent communication channel for contacting the visitor can be established based on the first check code, and after the independent communication channel is established, the visitor can be requested to provide access rights based on the independent communication channel. The access authority is preset and refers to the authority capable of accessing the first image file and the second image file.
By establishing the independent communication channel, the visitor can be ensured to carry out data transmission in the independent communication channel, the data transmission rate can be improved, the independence of the communication channel is ensured, and the interference of other factors can be avoided.
After the access right of the visitor is obtained, whether the visitor can access the first image file or the second image file can be known according to the access right, wherein the access right of the first image file is higher than that of the second image file. After determining the access authority of the visitor, the access address of the first memory or the access address of the second memory can be sent to the visitor so that the visitor can access the first image file or the second image file, and therefore the video file wanted by the visitor is obtained.
The access rights are set to further classify the visitors and limit the visitors to access, so that the security of the video files of the office camera is protected to the greatest extent.
The access method of the video file of the office camera furthest protects the security of the video file obtained by the office camera and avoids illegal access by carrying out multiple restrictions on visitors.
In some preferred embodiments, in step 1, dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory. By the distribution mode, the video file can be well divided into the first image file and the second image file, and the first image file and the second image file are correspondingly stored.
In some preferred embodiments, in step 4, establishing a separate communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel. The first check code is used as an authentication identifier for entering the communication channel, so that a visitor can conveniently enter the communication channel, and other illegal persons are prevented from intruding, and the independence of the communication channel is realized.
In a second aspect, there is provided an access device for an office camera video file, including: a processor and a memory. Wherein the memory is for storing a computer readable program; the computer readable program, when executed by the processor, causes the processor to implement the method for accessing an office camera video file according to any of the above technical solutions.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory module technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
In a third aspect, referring to fig. 2, fig. 2 is a system architecture diagram of an access system for office camera video files;
provided is an access system for an office camera video file, comprising: the system comprises a classified storage module, an acquisition module, a checking module, a communication establishment module and an access determination module.
The classification storage module is used for dividing a video file obtained by an office camera into a first image file and a second image file, storing the first image file in the first memory and storing the second image file in the second memory, wherein the average sampling time of the first image file is later than that of the second image file; the acquisition module is used for acquiring an access request of a visitor and requesting the visitor to provide a first check code; the checking module is used for checking the validity of the first check code; the communication establishing module is used for establishing an independent communication channel for contacting with the visitor based on the first check code when the first check code is legal, and requesting the visitor to provide access rights through the independent communication channel; the access determining module is used for obtaining the access right provided by the visitor and sending the access address of the first memory or the access address of the second memory to the visitor according to the access right, wherein the access right of the first image file is higher than that of the second image file.
In some preferred embodiments, in the classification storage module, the dividing the video file obtained by the office camera into a first image file and a second image file, storing the first image file in the first memory, and storing the second image file in the second memory specifically includes: the method comprises the steps that a buffer is arranged, the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory is full, all the video files stored in the first memory are cut into a second memory, and the storage capacity of the second memory is larger than that of the first memory.
In some preferred embodiments, in the checking module, checking the validity of the first check code specifically includes: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
In some preferred embodiments, in the communication establishment module, establishing an independent communication channel with the visitor specifically includes: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
While the preferred embodiment of the present invention has been described in detail, the present invention is not limited to the above embodiment, and various equivalent modifications and substitutions can be made by those skilled in the art without departing from the spirit of the present invention, and these equivalent modifications and substitutions are intended to be included in the scope of the present invention as defined in the appended claims.
Claims (7)
1. An access method for an office camera video file is characterized by comprising the following steps:
step 1, setting a buffer, wherein the buffer is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer exceed a set capacity, the video streams stored in the buffer are formed into video files, the video files are cut into a first memory as first image files, the first memory is used for storing the first image files with the set capacity, when the first memory capacity is full, all the video files stored in the first memory are cut into a second memory as second image files, wherein the storage capacity of the second memory is larger than that of the first memory, and the average sampling time of the first image files is later than that of the second image files;
step 2, obtaining an access request of a visitor, and requesting the visitor to provide a first check code;
step 3, checking the validity of the first check code;
step 4, when the first check code is legal, establishing an independent communication channel for contacting the visitor based on the first check code, and requesting the visitor to provide access rights through the independent communication channel;
and 5, obtaining the access rights provided by the visitor, and after obtaining the access rights of the visitor, obtaining whether the visitor can access the first image file or the second image file according to the access rights, and after determining the access rights of the visitor, sending the access address of the first memory or the access address of the second memory to the visitor according to the access rights, wherein the access rights of the first image file are higher than those of the second image file.
2. The method for accessing video files of an office camera according to claim 1, wherein in step 3, checking the validity of the first check code specifically comprises: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
3. The method for accessing video files of an office camera according to claim 1, wherein in step 4, establishing an independent communication channel with the visitor specifically comprises: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
4. An access device for an office camera video file, comprising:
a processor;
a memory for storing a computer readable program;
the computer readable program, when executed by the processor, causes the processor to implement the method of accessing an office camera video file as recited in any of claims 1-3.
5. An access system for an office camera video file, comprising:
the system comprises a classified storage module, a buffer memory, a first storage module and a second storage module, wherein the buffer memory is used for storing video streams transmitted by an office camera in real time, when the video streams stored in the buffer memory exceed a set capacity, the video streams stored in the buffer memory are formed into video files, the video files are cut into a first storage as first image files, the first storage is used for storing the first image files with the set capacity, when the first storage capacity is full, all the video files stored in the first storage are cut into a second storage as second image files, the storage capacity of the second storage is larger than that of the first storage, and the average sampling time of the first image files is later than that of the second image files;
the acquisition module is used for acquiring an access request of a visitor and requesting the visitor to provide a first check code;
the checking module is used for checking the validity of the first check code;
the communication establishing module is used for establishing an independent communication channel for contacting with the visitor based on the first check code when the first check code is legal, and requesting the visitor to provide access rights through the independent communication channel;
the access determining module is used for obtaining the access right provided by the visitor, after obtaining the access right of the visitor, the access determining module can know whether the visitor can access the first image file or the second image file according to the access right, and after determining the access right of the visitor, the access address of the first memory or the access address of the second memory is sent to the visitor according to the access right, wherein the access right of the first image file is higher than the access right of the second image file.
6. The system for accessing video files of an office camera according to claim 5, wherein in the checking module, checking the validity of the first check code specifically comprises: and acquiring a first check code, wherein the first check code is encrypted in advance by an encryption server, the first check code is sent to a decryption server for decryption, a second check code is obtained, the second check code is locally matched, and when the matching is successful, the first check code is considered legal.
7. The system for accessing video files of an office camera according to claim 5, wherein in the communication establishment module, establishing an independent communication channel with the visitor comprises: and allocating a communication channel, taking the first check code as an authentication identifier for entering the communication channel, and allowing only a visitor with the first check code to enter the communication channel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210156861.3A CN114615403B (en) | 2022-02-21 | 2022-02-21 | Access method, device and system for video files of office camera |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210156861.3A CN114615403B (en) | 2022-02-21 | 2022-02-21 | Access method, device and system for video files of office camera |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114615403A CN114615403A (en) | 2022-06-10 |
CN114615403B true CN114615403B (en) | 2023-10-24 |
Family
ID=81859131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210156861.3A Active CN114615403B (en) | 2022-02-21 | 2022-02-21 | Access method, device and system for video files of office camera |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114615403B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06217107A (en) * | 1993-01-14 | 1994-08-05 | Ricoh Co Ltd | Composing machine |
JP2004070674A (en) * | 2002-08-07 | 2004-03-04 | Mitsubishi Electric Corp | Data protecting device, data protecting method and program in electronic data interchange system |
WO2005106672A2 (en) * | 2004-04-21 | 2005-11-10 | Storcard, Inc. | Hierarchical storage management of encrypted data files |
JP2012118833A (en) * | 2010-12-02 | 2012-06-21 | Hitachi Ltd | Access control method |
CN110083551A (en) * | 2019-04-26 | 2019-08-02 | 北京智芯微电子科技有限公司 | Safe close coupling memory and its access method and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080303903A1 (en) * | 2003-12-02 | 2008-12-11 | Connexed Technologies Inc. | Networked video surveillance system |
US20070132773A1 (en) * | 2005-12-08 | 2007-06-14 | Smartdrive Systems Inc | Multi-stage memory buffer and automatic transfers in vehicle event recording systems |
US9274950B2 (en) * | 2009-08-26 | 2016-03-01 | Hewlett Packard Enterprise Development Lp | Data restructuring in multi-level memory hierarchies |
-
2022
- 2022-02-21 CN CN202210156861.3A patent/CN114615403B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06217107A (en) * | 1993-01-14 | 1994-08-05 | Ricoh Co Ltd | Composing machine |
JP2004070674A (en) * | 2002-08-07 | 2004-03-04 | Mitsubishi Electric Corp | Data protecting device, data protecting method and program in electronic data interchange system |
WO2005106672A2 (en) * | 2004-04-21 | 2005-11-10 | Storcard, Inc. | Hierarchical storage management of encrypted data files |
JP2012118833A (en) * | 2010-12-02 | 2012-06-21 | Hitachi Ltd | Access control method |
CN110083551A (en) * | 2019-04-26 | 2019-08-02 | 北京智芯微电子科技有限公司 | Safe close coupling memory and its access method and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114615403A (en) | 2022-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10681028B2 (en) | Controlling access to resources on a network | |
US10095877B2 (en) | Systems and methods for authenticating photographic image data | |
US8713646B2 (en) | Controlling access to resources on a network | |
US10341367B1 (en) | System and method for inquiring IOC information by P2P protocol | |
US10638422B2 (en) | Data asset transfers via energy efficient communications | |
US9003553B2 (en) | Viewing content under enterprise digital rights management without a client side access component | |
US20200278948A1 (en) | Method, apparatus and system for managing electronic fingerprint of electronic file | |
CN105518697A (en) | Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program | |
US20150020167A1 (en) | System and method for managing files | |
US20220058373A1 (en) | Application execution based on object recognition | |
CN114615403B (en) | Access method, device and system for video files of office camera | |
US10700877B2 (en) | Authentication of a new device by a trusted device | |
CN111147430A (en) | Encryption method and device applied to intelligent home gateway | |
CN114040223A (en) | Image processing method and system | |
CN112685778A (en) | Data storage method and device | |
CN116389258A (en) | System and method for determining target allocation parameters for initiating target communications in a complex computing network | |
CN110769065A (en) | Remote management method, system, terminal equipment and server | |
KR20170082882A (en) | Network video recorder and method for blocking video data using the same | |
CN110661777A (en) | Data transmission method and system | |
US11825166B2 (en) | Video playback system based on approval of playback approver | |
KR101971632B1 (en) | Method and apparatus for storing and restoring distributed data | |
US20060026186A1 (en) | Device and method for management of content data | |
CN107770095B (en) | Method and equipment for controlling virtual machine metadata access | |
US10298550B2 (en) | Packet flow in an overlay network | |
CN116781295A (en) | Data encryption method, data access method, system, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |