WO2021109786A1 - Terminal desktop content monitoring method, platform, terminal, system and storage medium - Google Patents

Terminal desktop content monitoring method, platform, terminal, system and storage medium Download PDF

Info

Publication number
WO2021109786A1
WO2021109786A1 PCT/CN2020/126588 CN2020126588W WO2021109786A1 WO 2021109786 A1 WO2021109786 A1 WO 2021109786A1 CN 2020126588 W CN2020126588 W CN 2020126588W WO 2021109786 A1 WO2021109786 A1 WO 2021109786A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
recording
password
desktop content
recording strategy
Prior art date
Application number
PCT/CN2020/126588
Other languages
French (fr)
Chinese (zh)
Inventor
范贤友
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2021109786A1 publication Critical patent/WO2021109786A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/27Server based end-user applications
    • H04N21/274Storing end-user multimedia data in response to end-user request, e.g. network recorder
    • H04N21/2743Video hosting of uploaded data from client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording

Definitions

  • the embodiments of the present application relate to the field of video surveillance, and in particular, to a technology for monitoring terminal desktop content.
  • the video surveillance system is mainly composed of video acquisition, video management, video storage and other equipment. In recent years, video surveillance technology has been rapidly developed and widely used.
  • the collection equipment in the video surveillance system is mainly various cameras, but in real life, it is not only the video collected by the camera, but also other video content that needs to be managed.
  • law enforcement instruments used in urban management generally only store and offline management of the captured content, and lack monitoring of the operation process of the law enforcement instruments. If the operation records of the equipment have full-process video recordings that can be checked, it can be further prevented. Data has been tampered with to enhance credibility. For example, for specific positions such as online car-hailing drivers, if they provide full-process telephone calls, text messages, WeChat, and APP operations for providing driving services, they are more credible than simple screenshots and more difficult to forge.
  • the embodiments of the present application provide a method, platform, terminal, system, and storage medium for monitoring terminal desktop content.
  • the embodiment of the present application provides a method for monitoring terminal desktop content, including: receiving a recording strategy set for the terminal for the terminal desktop content; sending the recording strategy and the address of the streaming media server to the terminal for the terminal to check according to the recording strategy
  • the terminal desktop content is recorded in real time, and the obtained recording data of the terminal desktop content is uploaded to the streaming media server.
  • the embodiment of the present application also provides a method for monitoring terminal desktop content, including: receiving a video recording strategy for terminal desktop content and an address of a streaming media server sent by a network monitoring platform; real-time video recording of terminal desktop content according to the videoing strategy; Upload the video data of the terminal desktop content obtained from the video to the streaming media server for the streaming media server to respond to the client's request for access to the video data.
  • the embodiment of the present application also provides a network monitoring platform, including: at least one processor; and a memory communicatively connected with the at least one processor; wherein the memory stores instructions that can be executed by the at least one processor, and the instructions are The at least one processor executes, so that the at least one processor can execute the method for monitoring terminal desktop content.
  • the embodiment of the present application also provides a terminal, including: at least one processor; and a memory communicatively connected with the at least one processor; wherein the memory stores instructions that can be executed by at least one processor, and the instructions are executed by at least one processor.
  • the processor executes, so that at least one processor can execute the method for monitoring the desktop content of the terminal.
  • the embodiment of the present application also provides a terminal desktop content monitoring system, including: a client terminal, a network monitoring platform communicatively connected with the client, at least one terminal communicatively connected with the network monitoring platform, and communication with the client and the terminal Connected streaming media server; among them, the streaming media server is used to store the recording data uploaded by the terminal; the client is used to set the recording strategy for the terminal desktop content in the network monitoring platform for the terminal, and access the recording stored in the streaming media server data.
  • the embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, a method for monitoring terminal desktop content is implemented.
  • FIG. 1 is a flowchart of a method for monitoring terminal desktop content in the first embodiment of the present application
  • FIG. 2 is a schematic diagram of the terminal and the network monitoring platform in the first embodiment of the present application performing login verification
  • FIG. 3 is a flowchart of a method for monitoring terminal desktop content in the second embodiment of the present application.
  • FIG. 4 is a schematic diagram of the terminal and the network monitoring platform in the second embodiment of the present application performing login verification
  • FIG. 5 is a flowchart of a method for monitoring terminal desktop content in the third embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a network monitoring platform in the fourth embodiment of the present application.
  • FIG. 7 is a schematic diagram of the device composition of the terminal desktop content monitoring system in the sixth embodiment of the present application.
  • the method for monitoring terminal desktop content can be applied to a network monitoring platform or a terminal device.
  • application on a network monitoring platform is taken as an example for description.
  • the first embodiment of the present application relates to a method for monitoring terminal desktop content.
  • a recording strategy for terminal desktop content set for the terminal is received; the recording strategy and the address of the streaming media server are sent to the terminal for The terminal performs real-time recording of the terminal desktop content according to the recording strategy, and uploads the obtained recording data of the terminal desktop content to the streaming media server.
  • the recording strategy can be issued to the terminal through the network monitoring platform.
  • the recording specifically refers to the action of the terminal to record according to the recording strategy; the data recorded by the terminal during the recording process is the recording data.
  • the terminal receives the recording strategy for the terminal desktop content set by the client from the network monitoring platform. The terminal uses this recording strategy to record.
  • Uploading the obtained video data to the streaming media server avoids offline management of the data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
  • FIG. 1 A specific flowchart of a method for monitoring terminal desktop content in this embodiment is shown in FIG. 1, and specifically includes the following steps:
  • Step 101 Receive a video recording strategy set for the terminal.
  • the basic information of the terminal has been pre-configured in the network monitoring platform, such as the unique number of the terminal such as IMEI, the mobile phone number that can receive short messages, and the mobile phone number can carry this
  • the mobile phone number, login password, and user id of the terminal's personnel are the client id of the administrator who manages the terminal.
  • the recording strategy set for the terminal including timing recording strategy and application trigger recording strategy.
  • the timing recording strategy includes: the recording period and its periodicity (one-time or periodic, such as one-time recording from 10 o'clock to 12 o'clock or periodic 2 o'clock to 3 o'clock every Monday), using the law enforcement instrument of urban management as For example, it can be set to automatically start recording during the patrol period;
  • the application trigger recording strategy includes at least the application name, and the corresponding recording action is the attribute such as on or off. Take WeChat as an example. When the terminal opens WeChat, it starts recording, and when it closes WeChat, it stops recording.
  • the application name can also be phone call, camera, etc., and the corresponding recording action can also be turned off. I will not list them one by one here.
  • the recording strategy set for the terminal may include one or more timing recording strategies, or one or more application triggering recording strategies.
  • the timing recording strategy and the application trigger recording strategy can understand the passive mode recording strategy. In actual applications, you can also set the active mode recording strategy, which is controlled by the end user and is similar to the shortcut keys for screenshots, such as button screenshots. Three-finger swipe screen capture, etc., once the active recording event signal is detected, the screen recording is started.
  • the video recording strategy can be configured directly on the network monitoring platform by the management personnel of the terminal, or configured on the network monitoring platform by the management personnel of the terminal through the client.
  • each recording strategy can also correspond to a priority.
  • the attributes of each application triggering the recording strategy include not only the application name, but also whether the corresponding recording action is on or off, but also the priority.
  • the recording strategy corresponding to the higher priority is executed.
  • the recording action corresponding to an application triggering a recording strategy is pause recording.
  • the terminal is currently recording according to a certain timing recording strategy. If the application triggering a recording strategy has a higher priority than the timing recording The priority of the strategy is to pause the recording; if the priority of the application triggering the recording strategy is lower than the priority of the timing recording strategy, the recording will continue.
  • the recording strategies are linked together.
  • the recording strategy with higher priority can cover the recording strategy with lower priority and improve the user experience.
  • Step 102 Determine whether the terminal has passed the authentication.
  • the method for judging whether the terminal authentication is passed specifically includes: receiving the login request of the terminal; where the login request includes the unique number and the login password of the terminal; detecting whether the terminal is a registered terminal according to the unique number and the login password of the terminal; After the terminal has been registered, the temporary password is sent to the client; the verification request sent by the terminal is received, and the verification request carries the verification password; according to the matching result of the verification password and the temporary password, it is judged whether the terminal is authenticated.
  • FIG. 2 a schematic diagram of login verification between the terminal 604 and the network monitoring platform 601, including the terminal 604, the network monitoring platform 601 and the client 602.
  • the terminal in this embodiment takes an Android smart phone as an example. It has a smart operating system, a display screen and screen recording capabilities, an International Mobile Equipment Identity (IMEI, International Mobile Equipment Identity), and an international mobile client SIM card.
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identification Number
  • IMSI International Mobile Subscriber Identification Number
  • the information of the terminal 604 has been pre-configured on the network monitoring platform 601: including the unique number of the terminal 604 such as IMEI, the user equipment bound to the terminal, the login password, and the client corresponding to the terminal; it is assumed that the terminal 604 has been pre-configured Good access address of the network monitoring platform 601, such as IP address and port.
  • step S201 the terminal 604 sends a login request to the network monitoring platform 601.
  • the login request specifically includes the unique number and the login password of the terminal.
  • the terminal 604 sends the unique number login password of the terminal 604 to the network monitoring platform 601 through the pre-configured access address of the network monitoring platform 601.
  • the unique number of the terminal 604 includes the IMEI of the terminal 604, and the login password is the password set when the terminal 604 completes registration on the network monitoring platform 601.
  • step S202 the network monitoring platform 601 determines whether the terminal 604 is a registered terminal.
  • the network monitoring platform 601 After the network monitoring platform 601 receives the login request sent by the terminal 604, it first determines whether the terminal 604 is a user registered in the network monitoring platform 601 according to the unique number of the terminal 604.
  • the terminal 604 If it is a registered user, it is determined whether the unique number of the terminal 604 in the login request corresponds to the password. If the unique number of the terminal 604 corresponds to the password, the terminal 604 will be fed back to the terminal 604 "login is successful, waiting for the next step of verification" information and execute step S203; if If the unique number of the terminal 604 does not correspond to the password, the terminal 604 will be fed back to the terminal 604 that "the login password is incorrect.”
  • the terminal 604 is fed back to the terminal 604 that "the device is not registered".
  • step S203 the network monitoring platform 601 sends a temporary password to the client 602.
  • the network monitoring platform 601 sends the temporary password to the client 602 through the information of the client 602 reserved when the terminal 604 registers.
  • the temporary password is a randomly generated 6-digit number.
  • the way in which the network monitoring platform 601 sends the random password to the client 602 can be done by means of SMS or voice call.
  • step S204 the client 602 sends a temporary password to the terminal 604.
  • the temporary password is sent by the network monitoring platform 601 to the client 602, the temporary password sent by the network monitoring platform 601 is actually sent to the administrator of the terminal 604, and the user using the terminal 604 passes through the terminal 604.
  • the administrator can get a temporary password.
  • step S205 the terminal 604 sends a verification request to the network monitoring platform 601, and the verification request includes a verification password.
  • the temporary password After the user of the terminal 604 obtains the temporary password by asking the administrator of the terminal 604, the temporary password is used as the verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
  • Step S206 The network monitoring platform 601 detects whether the received verification password matches the issued temporary password.
  • the network monitoring platform 601 After the network monitoring platform 601 receives the verification request sent by the terminal 604, it determines whether the verification password matches the temporary password. If the verification password matches the temporary password, it will feed back to the terminal 604 "login successful" information; if the password is verified If it does not match the temporary password, the terminal 604 will be fed back a message "verification failed, please re-verify".
  • the network monitoring platform 601 may also be preset with a temporary password verification time and verification timeout times. After the network monitoring platform 601 sends the temporary password to the client 602, the network monitoring platform 601 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time exceeds the preset temporary password verification time.
  • step S206 is executed; if the waiting time is greater than The preset temporary password verification time will be fed back to the terminal 604 "Waiting timeout, please re-verify” information and record the number of verification timeouts; if the number of verification timeouts exceeds the preset number of verification timeouts, it will be fed back to the terminal 604 "Login failed" , Please log in again” information.
  • this terminal authentication method through a temporary password mechanism, it is ensured that only the consent of the client 602 corresponding to the terminal 604 can make the terminal go online successfully, and prevent the recording function from being maliciously turned on and abused.
  • Step 103 Send the video recording strategy and the streaming media server address to the terminal.
  • the terminal 604 performs recording according to the recording strategy, and according to the obtained address of the streaming media server. Upload the recording data to the streaming server.
  • the purpose of sending the recording strategy to the terminal 604 is to enable the terminal 604 to record according to the received recording strategy, and it is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving the user experience; and
  • the received streaming server address uploads the video data, and the client 602 can view the video content through the streaming server, avoiding offline management of video data, preventing video data from being tampered with, enhancing the credibility of video data, and having security .
  • the recording strategy sent by the network monitoring platform 601 to the terminal 604 may be slightly different from the recording strategy set in step 101.
  • the timing recording strategy sent by the network monitoring platform 601 to the terminal 604 may not include a period.
  • the recording strategy is sent to the terminal. Due to the update of the recording strategy, the network monitoring platform 601 sends the recording strategy to the terminal 604 in advance for the terminal 604 to use the corresponding recording strategy for recording.
  • a preset threshold for example, a time period such as 10 minutes or 5 minutes
  • the network monitoring platform updates the recording strategy set by the client for the terminal in real time, so that the corresponding terminal can use the updated recording strategy to record; when the difference between the current recording time and the recording time included in the recording strategy is less than the preset threshold, it will be sent to the terminal
  • the recording strategy enables the terminal to obtain the recording strategy in time.
  • the updated recording strategy may be sent to the terminal.
  • the desktop of the mobile terminal is used as a video source to access the video surveillance platform, and the advantages of the video surveillance technology are used, so that the screen recording data can be managed efficiently and securely.
  • the terminal receives the recording strategy for the terminal desktop content set by the client from the network monitoring platform.
  • the terminal uses this recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving users Experience. Uploading the obtained video data to the streaming media server avoids offline management of the video data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
  • the second embodiment of the present application relates to a method for monitoring terminal desktop content.
  • the second embodiment is roughly the same as the first embodiment.
  • it after determining that the terminal is a registered terminal, before sending a temporary password to the client, it also includes: sending a random password to the user equipment bound to the terminal.
  • Password Receive the verification request sent by the terminal, the verification request carries the verification password; if the verification password matches the random password, then the temporary password is sent to the client.
  • FIG. 3 A specific flowchart of a method for monitoring terminal desktop content in this embodiment is shown in FIG. 3, and specifically includes the following steps:
  • Step 401 Receive a video recording strategy set for the terminal. This step is similar to step 101 of the first embodiment, and will not be repeated here.
  • Step 402 Determine whether the terminal has passed the authentication.
  • the method of judging whether the terminal verification is passed specifically includes: receiving the login request of the terminal; where the login request includes the unique number and the login password of the terminal; detecting whether the terminal is a registered terminal according to the unique number and the login password of the terminal; After the terminal is registered, a temporary password is sent to the client; the verification request sent by the terminal is received, and the verification request carries the verification password; according to the matching result of the verification password and the temporary password, it is determined whether the terminal is authenticated.
  • the terminal After determining that the terminal is a registered terminal, before sending the temporary password to the client, it also includes: sending a random password to the user device bound to the terminal; receiving a verification request sent by the terminal, the verification request carrying the verification password; checking and verifying Whether the password matches the random password; if the verification password matches the random password, then send a temporary password to the client.
  • FIG. 4 a schematic diagram of information verification between the terminal 604 and the network monitoring platform 601, including the terminal 604, the network monitoring platform 601, the client 602, and the user equipment 614 bound to the terminal.
  • the information of the terminal 604 has been pre-configured on the network monitoring platform 601: including the unique number of the terminal 604 such as IMEI, the user equipment bound to the terminal, the login password, and the client information corresponding to the terminal; it is assumed that the terminal 604 has been pre-configured Configure the access address of the network monitoring platform 601, such as IP address and port.
  • step S201 the terminal 604 sends a login request to the network monitoring platform 601.
  • the login request specifically includes the unique number and the login password of the terminal.
  • the terminal 604 sends the unique number login password of the terminal 604 to the network monitoring platform 601 through the pre-configured access address of the network monitoring platform 601.
  • the unique number of the terminal 604 includes the IMEI of the terminal 604, and the login password is the password set when the terminal 604 completes registration on the network monitoring platform 601.
  • step S202 the network monitoring platform 601 determines whether the terminal 604 is a registered terminal.
  • the network monitoring platform 601 After the network monitoring platform 601 receives the login request sent by the terminal 604, it first determines whether the terminal 604 is a user registered in the network monitoring platform 601 according to the unique number of the terminal 604.
  • the terminal 604 determines whether the unique number of the terminal 604 corresponds to the password in the login request. If the unique number of the terminal 604 corresponds to the password, the terminal 604 will be fed back to the terminal 604 "login is successful, waiting for the next step of verification" information and perform step S301; if If the unique number of the terminal 604 does not correspond to the password, the terminal 604 will be fed back to the terminal 604 that "the login password is incorrect.”
  • the terminal 604 is fed back to the terminal 604 that "the device is not registered".
  • step S301 the network monitoring platform 601 sends a random password to the user equipment 614 bound to the terminal.
  • the network monitoring platform 601 sends a random password to the bound user equipment 614 of the terminal according to the information of the user equipment 614 bound to the terminal reserved by the terminal 604 on the platform.
  • the random password is a randomly generated 6-digit number.
  • the method for the network monitoring platform 601 to send the random password to the user equipment 614 bound to the terminal may be a short message or a voice call.
  • step S302 the user equipment 614 bound to the terminal sends a random password to the terminal 604.
  • the random password sent by the network monitoring platform 601 is actually sent to the holder of the terminal 604, and the terminal 204 can pass The user equipment of the holder of the terminal 604 obtains a random password.
  • step S303 the terminal 604 sends a verification request to the network monitoring platform 601, and the verification request includes a verification password.
  • the random password After obtaining the random password through the user equipment of the holder of the terminal 604, the random password is used as the verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
  • step S304 the network monitoring platform 601 detects whether the verification password matches the random password.
  • the network monitoring platform 601 After the network monitoring platform 601 receives the verification request sent by the terminal 604, it determines whether the verification password matches the random password. If the verification password matches the random password, it will feed back to the terminal 604 "verification successful, please proceed to the next step. And execute step S203; if the verification password does not match the random password, the terminal 604 is fed back to the terminal 604 with a message of “verification failed, please re-verify”.
  • the network monitoring platform 601 is also preset with a random password verification time and verification timeout times. After the network monitoring platform 601 sends a random password to the user equipment 614 bound to the terminal, the network monitoring platform 614 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time exceeds the preset random password verification time.
  • step S304 is executed; if the waiting time is long If the verification time is greater than the preset random password verification time, it will be fed back to the terminal 604 "Waiting timeout, please re-verify” information and record the verification timeout times; if the verification timeout times exceed the preset verification timeout times, it will be fed back to the terminal 604 "Login” Failed, please log in again” message.
  • step S203 the network monitoring platform 601 sends a temporary password to the client 602.
  • the network monitoring platform 601 sends the temporary password to the client 602 through the information of the client 602 registered by the terminal 604 that is reserved.
  • the temporary password is a randomly generated 6-digit number.
  • the way in which the network monitoring platform 601 sends the random password to the client 602 can be done by means of SMS or voice call.
  • step S204 the client 602 sends a temporary password to the terminal 604.
  • the temporary password is sent by the network monitoring platform 601 to the client 602, the temporary password sent by the network monitoring platform 601 is actually sent to the administrator of the terminal 604, and the user using the terminal 604 passes through the terminal 604.
  • the administrator can get a temporary password.
  • step S205 the terminal 604 sends a verification request to the network monitoring platform 601, and the verification request includes a verification password.
  • the temporary password After the user of the terminal 604 obtains the temporary password by asking the administrator of the terminal 604, the temporary password is used as the verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
  • Step S206 The network monitoring platform 601 detects whether the received verification password matches the issued temporary password.
  • the network monitoring platform 601 After the network monitoring platform 601 receives the verification request sent by the terminal 604, it determines whether the verification password matches the temporary password. If the verification password matches the temporary password, it will feed back to the terminal 604 "login successful" information; if the password is verified If it does not match the temporary password, the terminal 604 will be fed back a message "verification failed, please re-verify".
  • the network monitoring platform 601 is also preset with a temporary password verification time and verification timeout times. After the network monitoring platform 601 sends the temporary password to the client 602, the network monitoring platform 601 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time exceeds the preset temporary password verification time.
  • step S206 is executed; if the waiting time is greater than The preset temporary password verification time will be fed back to the terminal 604 "Waiting timeout, please re-verify” information and record the number of verification timeouts; if the number of verification timeouts exceeds the preset number of verification timeouts, it will be fed back to the terminal 604 "Login failed" , Please log in again” information.
  • Step 403 Deliver the recording strategy and the streaming media server address to the terminal. This step is similar to step 103 of the first embodiment, and will not be repeated here.
  • This embodiment adopts a double terminal authentication method, through the mechanism of random password, to ensure that even if an attacker learns the unique number and login password of the terminal, he will fail because he cannot receive the random password to avoid the terminal being forged; through the mechanism of temporary password , To ensure that only the consent of the client 602 can make the terminal go online successfully, and prevent the recording function from being maliciously turned on and abused.
  • the third embodiment of the present application relates to a method for monitoring terminal desktop content.
  • the method for monitoring terminal desktop content is applied to the terminal.
  • the recording strategy for the terminal desktop content and the address of the streaming media server sent by the network monitoring platform are received; the terminal desktop content is recorded in real time according to the recording strategy; the recording data of the terminal desktop content obtained by the recording is uploaded to the stream
  • the media server is used for the streaming media server to respond to the client's request for access to video data.
  • the terminal receives the recording strategy for the terminal desktop content set by the client from the network monitoring platform.
  • the terminal uses this recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving users Experience. Uploading the obtained video data to the streaming media server avoids offline management of the video data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
  • FIG. 5 The specific flowchart of a method for monitoring terminal desktop content in this embodiment is shown in FIG. 5, which specifically includes the following steps:
  • Step 501 whether the right verification is passed.
  • the sent random password is generated; a verification request is sent to the network monitoring platform, and the verification request carries a verification password for the network monitoring platform to authenticate according to the verification password; wherein the verification password is generated based on the temporary password sent by the client.
  • Step 502 Receive the recording strategy and the streaming media server address sent by the network monitoring platform.
  • the terminal receives the recording strategy and the streaming media server address sent by the network monitoring platform, the terminal uses the received recording strategy to record, and uploads the recording data obtained by the recording to the streaming media server.
  • Step 503 Perform real-time recording of the desktop content according to the recording strategy.
  • Step 504 Upload the recording data to the streaming media server.
  • the terminal uses the recording strategy sent by the streaming server to the terminal to record, and uploads the recorded data obtained from the recording to the streaming server.
  • the recording strategy includes timing recording strategy and application trigger recording strategy.
  • uploading the video data obtained by recording to the streaming media server can be done either through scheduled upload or real-time upload; using scheduled upload can effectively save the cost of recording, and the cost of using clear real-time upload is higher, but due to Video data is first-hand data, and its video content is more reliable.
  • the recording strategy includes: timing recording strategy and application trigger recording strategy; each recording strategy corresponds to a priority; if the current state of the terminal meets multiple recording strategies, the recording strategy with the highest priority is executed.
  • the terminal in addition to adopting the corresponding recording strategy for recording, the terminal also includes an active mode.
  • Active mode If an active recording event signal is detected, the terminal desktop content is recorded in real time, and the obtained recording data is uploaded to the streaming media server.
  • the active video event signal is generated according to the preset operation on the screen.
  • users can also perform manual operations to perform recording, and perform manual recording when the user needs it, without missing any important information that needs to be recorded.
  • the user of the terminal 604 controls the active recording event signal to start the active mode.
  • the active recording event signal is similar to the shortcut keys for screenshots, such as key-press screenshots, three-finger sliding screenshots, etc.
  • the terminal 604 detects the active recording event signal, it starts screen recording, and sends the recording data to the streaming media server allocated by the network monitoring platform 601 when the terminal 604 goes online through the RTSP stream.
  • the streaming media server After the terminal uploads the video data obtained from the video recording to the streaming media server, the streaming media server splices the video data and the video stream for the client to access. After the streaming media server splices the video data and the video stream sent by the terminal, the client no longer needs the user to search and find each video when viewing and accessing the video, which improves the efficiency of the user to view the corresponding video.
  • the desktop of the mobile terminal is used as a video source to access the video surveillance platform, and the advantages of the video surveillance technology are used, so that the screen recording data can be managed efficiently and securely.
  • the terminal receives a recording strategy for the terminal’s desktop content set by the client from the network monitoring platform, and the terminal uses the recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, so that Video recording is more convenient and improves user experience. Uploading the obtained video data to the streaming media server avoids offline management of the video data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
  • the dual terminal verification method is adopted, and the password verification mechanism ensures that even if the attacker learns the unique terminal number and login password, he will fail because he cannot receive the verification password, preventing the terminal from being forged; through the verification password mechanism , To ensure that only the client's consent can the terminal be successfully launched, and to avoid malicious activation and abuse of the recording function.
  • Ordinary smart law enforcement instruments generally have operating systems such as Android system, display screen, storage, camera, network communication, GPS positioning and other functions.
  • this embodiment will exist in the form of an application, which is called a screen recording APP; and the application of law enforcement recording is called a law enforcement APP.
  • Step 1 Initial setup of the law enforcement device: the administrator of the law enforcement device enters the unique number of the law enforcement device on the network monitoring platform, as well as the phone number of the law enforcement device, and the ID of the administrator of the law enforcement device to approve the law enforcement device Whether to enable the ID of the administrator of the screen recording, and the address of the network monitoring platform.
  • Step 2 The administrator of the law enforcement device sets a periodical recording strategy for the law enforcement device on the network monitoring platform. For example, start recording from 10 am to 11 am on weekdays; when it is detected that the law enforcement APP is opened, start recording immediately.
  • Step 3 the user of the law enforcement instrument, that is, law enforcement personnel, open the screen recording app before starting to perform the task and log in and go online for verification. After successful verification, the recording strategy and streaming media server address are obtained; the specific login verification process is as shown in specific embodiment 1. That is not repeated here.
  • Step 4 After the terminal is logged in and online, the network monitoring platform will periodically check whether the law enforcement instrument has periodic recordings to be executed, and send it to the law enforcement instrument in advance; if the configuration in the above 2 is configured, the law enforcement and the law enforcement will receive the recording before 10 o’clock According to the strategy, when the time reaches 10 o'clock, the screen recording APP will record the screen and send it to the streaming server.
  • Step 5 In other periods, law enforcement officers have temporary tasks to deal with. Open the law enforcement app according to the process, that is, when the law enforcement app is displayed on the law enforcement instrument desktop, the recording app will start to record the screen and send it to the streaming media server.
  • Step 6 When the law enforcement officer starts to record and collect evidence, there will be two or even multiple video streams. One of them is the video content captured by the camera of the law enforcement instrument. If multiple cameras are turned on, there may be a stream; One way is the content displayed on the screen of the law enforcement instrument.
  • the recording APP will first push the screen recording content to the streaming media server, and optionally push the video stream of the camera to the streaming media server according to the configuration.
  • the video stream generated by the screen recording and the video stream generated by the camera will have the same prefix, that is, the naming rule of the unique number of the law enforcement instrument, so that the streaming server can splice the two or even multiple streams into one screen display.
  • the law enforcement agency can not delete and modify the unfavorable video of one party at will, ensuring the authenticity and integrity of the video taken by the law enforcement instrument.
  • online car-hailing companies require online car-hailing drivers to use a specific terminal and install the screen recording APP described in this application on the terminal to conduct a comprehensive service throughout the entire service process. recording.
  • Step 1 The configuration and online procedures are similar to the law enforcement instrument, so I won’t repeat them here;
  • Step 2 The online car-hailing company uniformly sets application-based recording strategies for the terminal used by the driver. For example, when the taxi application, WeChat, phone, SMS and other applications are activated, they will actively turn on the recording; and when the online banking APP is activated, If you are currently recording, you should stop recording and resume recording after the online banking APP exits.
  • the specific recording strategy can be described as:
  • the agreement 1 means that the priority of the application is higher than the active recording, the agreement 2 is higher than the periodic recording, and the 3 is higher than the active and periodic recording.
  • the fourth embodiment of the present application relates to a network monitoring platform, as shown in FIG. 6, including: at least one processor 701; and a memory 702 communicatively connected with the at least one processor 701; wherein the memory 702 stores at least An instruction executed by one processor 701 is executed by at least one processor 701, so that the at least one processor 701 can execute the method for monitoring terminal desktop content of the first or second embodiment.
  • the memory 702 and the processor 701 are connected in a bus manner.
  • the bus may include any number of interconnected buses and bridges.
  • the bus connects one or more various circuits of the processor 701 and the memory 702 together.
  • the bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all well-known in the art, and therefore, no further description will be given herein.
  • the bus interface provides an interface between the bus and the transceiver.
  • the transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium.
  • the data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 701.
  • the processor 701 is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions.
  • the memory can be used to store data used by the processor when performing operations.
  • the communication component 703 is used to send a temporary password to the terminal or a random password to the user equipment bound to the terminal; it is also used to receive a verification request or a verification request sent by the terminal.
  • this embodiment is an example of equipment corresponding to the first embodiment or the second embodiment, and this embodiment can be implemented in cooperation with the first embodiment or the second embodiment.
  • the related technical details mentioned in the first embodiment or the second embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied to the first embodiment or the second embodiment.
  • this embodiment does not introduce units that are not too closely related to solving the technical problems raised by this application, but this does not mean that there are no other units in this embodiment.
  • the fifth embodiment of the present application relates to a terminal, including: at least one processor; and, a memory communicatively connected with the at least one processor; wherein the memory stores instructions that can be executed by the at least one processor The instruction is executed by the at least one processor, so that the at least one processor can execute the method for monitoring terminal desktop content of the third embodiment.
  • the memory and the processor are connected in a bus mode
  • the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors and various circuits of the memory together.
  • the bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all well-known in the art, and therefore, no further description will be given herein.
  • the bus interface provides an interface between the bus and the transceiver.
  • the transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium.
  • the data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor.
  • the processor is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions.
  • the memory can be used to store data used by the processor when performing operations.
  • the terminal may be a typical or ordinary Android smart phone.
  • this embodiment is a device example corresponding to the third embodiment, and this embodiment can be implemented in cooperation with the third embodiment.
  • the related technical details mentioned in the third embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the third embodiment.
  • this embodiment does not introduce units that are not too closely related to solving the technical problems raised by this application, but this does not mean that there are no other units in this embodiment.
  • the sixth embodiment of the present application relates to a desktop content monitoring system, as shown in FIG. 7, including:
  • Client 602 a network monitoring platform 601 communicatively connected to the client 602, at least one terminal 604 communicatively connected to the network monitoring platform 601, and a streaming media server 603 communicatively connected to the client 602 and the terminal 604; among them, the streaming media server 603 is used to store the recording data uploaded by the terminal 604; the client 602 is used to set a recording strategy for the terminal desktop content in the network monitoring platform 601 for the terminal 604, and to access the recording data stored in the streaming media server 603.
  • the terminal 604 refers to an intelligent terminal with a display screen, screen recording capabilities, and network communication capabilities.
  • a typical or ordinary Android smart phone can be used.
  • the terminal 604 uses the screen content as a video source to access the network monitoring platform 601.
  • the client 602 is software used by the user to perform monitoring operations. There are multiple types of clients 602 in the terminal desktop content monitoring system, including C/S mode clients, B/S mode clients, and mobile clients.
  • Streaming media server 604 receives and stores the video data generated by the terminal, and provides it to the client 602 for access, and responds to the request of the client 602 to play screen recording video.
  • Network monitoring platform 601 The core of the entire terminal desktop content monitoring system, managing all terminals 604, clients 602, streaming media servers 603, and user information when the terminal 604 is registered.
  • this embodiment is a system example corresponding to the first embodiment or the third embodiment, and this embodiment can be implemented in cooperation with the first embodiment or the third embodiment.
  • the related technical details mentioned in the first embodiment or the third embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
  • the related technical details mentioned in this embodiment can also be applied in the first embodiment or the third embodiment.
  • this embodiment does not introduce equipment that is not too closely related to solving the technical problems proposed by this application, but this does not indicate that there are no other equipment in this embodiment.
  • the seventh embodiment of the present application relates to a computer-readable storage medium storing a computer program.
  • the computer program is executed by the processor, the above method embodiment is realized.
  • the program is stored in a storage medium and includes several instructions to enable a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Graphics (AREA)
  • Computer Security & Cryptography (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiments of the present application relate to the field of video monitoring, and disclose a terminal desktop content monitoring method, a platform, a terminal, a system and a storage medium. In the present application, a terminal desktop content monitoring method comprises: receiving a video recording policy set for a terminal with regard to terminal desktop content; and sending, to the terminal, the video recording policy and the address of a streaming media server for the terminal to perform real-time video recording on the terminal desktop content according to the video recording policy, and uploading the obtained video recording data of the terminal desktop content onto the streaming media server.

Description

终端桌面内容的监控方法、平台、终端、系统及存储介质Monitoring method, platform, terminal, system and storage medium of terminal desktop content
相关申请的交叉引用Cross-references to related applications
本申请基于申请号为201911214072.5、申请日为2019年12月2日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。This application is filed based on a Chinese patent application with an application number of 201911214072.5 and an application date of December 2, 2019, and claims the priority of the Chinese patent application. The entire content of the Chinese patent application is hereby incorporated into this application by way of introduction.
技术领域Technical field
本申请实施例涉及视频监控领域,特别涉及一种终端桌面内容的监控技术。The embodiments of the present application relate to the field of video surveillance, and in particular, to a technology for monitoring terminal desktop content.
背景技术Background technique
视频监控系统主要由视频采集、视频管理、视频存储等设备构成,近年来视频监控技术得到了飞速发展和广泛应用。The video surveillance system is mainly composed of video acquisition, video management, video storage and other equipment. In recent years, video surveillance technology has been rapidly developed and widely used.
目前视频监控系统里的采集设备主要是各式各样的摄像头,但在实际生活中,需要进行管理的其实不仅仅是摄像头采集的视频,还可能是其他视频内容。例如,城管的执法仪,现在一般都只是对所拍摄内容的存储和离线管理,缺乏对执法仪设备操作过程的监控,如果对设备的操作记录有全程录像,有据可查,则可进一步防止数据被篡改,增强可信度。例如,网约车司机等特定岗位,若对其提供驾驶服务的全过程电话、短信、微信、APP操作等进行全方位记录,比单纯的截图等更具可信度,更难伪造。At present, the collection equipment in the video surveillance system is mainly various cameras, but in real life, it is not only the video collected by the camera, but also other video content that needs to be managed. For example, law enforcement instruments used in urban management generally only store and offline management of the captured content, and lack monitoring of the operation process of the law enforcement instruments. If the operation records of the equipment have full-process video recordings that can be checked, it can be further prevented. Data has been tampered with to enhance credibility. For example, for specific positions such as online car-hailing drivers, if they provide full-process telephone calls, text messages, WeChat, and APP operations for providing driving services, they are more credible than simple screenshots and more difficult to forge.
然而,发明人发现相关技术中至少存在如下问题:在智能终端如Android手机上进行屏幕录制已是成熟的技术,但目前的视频监控方法主要是依赖人工操作屏幕录像动作,对屏幕录像的生成的视频采用离线管理的方式,效率不高且安全性不强。However, the inventor found that there are at least the following problems in related technologies: Screen recording on smart terminals such as Android phones is a mature technology, but current video surveillance methods mainly rely on manual operation of screen recording actions to generate screen recordings. The video is managed offline, which is not efficient and safe.
发明内容Summary of the invention
本申请实施方式提供一种终端桌面内容的监控方法、平台、终端、系统及存储介质。The embodiments of the present application provide a method, platform, terminal, system, and storage medium for monitoring terminal desktop content.
本申请的实施方式提供了一种终端桌面内容的监控方法,包括:接收为终端设置的针对终端桌面内容的录像策略;将录像策略以及流媒体服务器的地址发送给终端,供终端根据录像策略对终端桌面内容进行实时录像,并将得到的终端桌面内容的录像数据上传至流媒体服务器。The embodiment of the present application provides a method for monitoring terminal desktop content, including: receiving a recording strategy set for the terminal for the terminal desktop content; sending the recording strategy and the address of the streaming media server to the terminal for the terminal to check according to the recording strategy The terminal desktop content is recorded in real time, and the obtained recording data of the terminal desktop content is uploaded to the streaming media server.
本申请的实施方式还提供了一种终端桌面内容的监控方法,包括:接收网络监控平台发送的针对终端桌面内容的录像策略以及流媒体服务器的地址;根据录像策略对终端桌面内容进行实时录像;将录像得到的终端桌面内容的录像数据上传至流媒体服务器,供流媒体服务 器响应客户端针对录像数据的访问请求。The embodiment of the present application also provides a method for monitoring terminal desktop content, including: receiving a video recording strategy for terminal desktop content and an address of a streaming media server sent by a network monitoring platform; real-time video recording of terminal desktop content according to the videoing strategy; Upload the video data of the terminal desktop content obtained from the video to the streaming media server for the streaming media server to respond to the client's request for access to the video data.
本申请的实施方式还提供了一种网络监控平台,包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行终端桌面内容的监控方法。The embodiment of the present application also provides a network monitoring platform, including: at least one processor; and a memory communicatively connected with the at least one processor; wherein the memory stores instructions that can be executed by the at least one processor, and the instructions are The at least one processor executes, so that the at least one processor can execute the method for monitoring terminal desktop content.
本申请的实施方式还提供了一种终端,包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行终端桌面内容的监控方法。The embodiment of the present application also provides a terminal, including: at least one processor; and a memory communicatively connected with the at least one processor; wherein the memory stores instructions that can be executed by at least one processor, and the instructions are executed by at least one processor. The processor executes, so that at least one processor can execute the method for monitoring the desktop content of the terminal.
本申请的实施方式还提供了一种终端桌面内容的监控系统,包括:客户端、与客户端通信连接的网络监控平台、与网络监控平台通信连接的至少一个终端、以及与客户端和终端通信连接的流媒体服务器;其中,流媒体服务器用于存储终端上传的录像数据;客户端用于在网络监控平台中为终端设置的针对终端桌面内容的录像策略,并访问流媒体服务器中存储的录像数据。The embodiment of the present application also provides a terminal desktop content monitoring system, including: a client terminal, a network monitoring platform communicatively connected with the client, at least one terminal communicatively connected with the network monitoring platform, and communication with the client and the terminal Connected streaming media server; among them, the streaming media server is used to store the recording data uploaded by the terminal; the client is used to set the recording strategy for the terminal desktop content in the network monitoring platform for the terminal, and access the recording stored in the streaming media server data.
本申请实施方式还提供了一种计算机可读存储介质,存储有计算机程序,计算机程序被处理器执行时实现终端桌面内容的监控方法。The embodiment of the present application also provides a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, a method for monitoring terminal desktop content is implemented.
附图说明Description of the drawings
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。One or more embodiments are exemplified by the pictures in the corresponding drawings. These exemplified descriptions do not constitute a limitation on the embodiments. The elements with the same reference numerals in the drawings are denoted as similar elements. Unless otherwise stated, the figures in the attached drawings do not constitute a scale limitation.
图1是本申请第一实施方式中的终端桌面内容的监控方法的流程图;FIG. 1 is a flowchart of a method for monitoring terminal desktop content in the first embodiment of the present application;
图2是本申请第一实施方式中的终端与网络监控平台进行登录验证的示意图;FIG. 2 is a schematic diagram of the terminal and the network monitoring platform in the first embodiment of the present application performing login verification;
图3是本申请第二实施方式中的终端桌面内容的监控方法的流程图;FIG. 3 is a flowchart of a method for monitoring terminal desktop content in the second embodiment of the present application;
图4是本申请第二实施方式中的终端与网络监控平台进行登录验证的示意图;FIG. 4 is a schematic diagram of the terminal and the network monitoring platform in the second embodiment of the present application performing login verification;
图5是本申请第三实施方式中的终端桌面内容的监控方法的流程图;FIG. 5 is a flowchart of a method for monitoring terminal desktop content in the third embodiment of the present application;
图6是本申请第四实施方式中的网络监控平台的结构示意图;FIG. 6 is a schematic structural diagram of a network monitoring platform in the fourth embodiment of the present application;
图7是本申请第六实施方式中的终端桌面内容的监控系统的设备组成示意图。FIG. 7 is a schematic diagram of the device composition of the terminal desktop content monitoring system in the sixth embodiment of the present application.
具体实施方式Detailed ways
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的各实施方式进行详细的阐述。然而,本领域的普通技术人员可以理解,在本申请各实施方式中,为了使读者更好地理解本申请而提出了许多技术细节。但是,即使没有这些技术细节和基于以下各实施方式的种种变化和修改,也可以实现本申请所要求保护的技术方案。以下各个实 施例的划分是为了描述方便,不应对本申请的具体实现方式构成任何限定,各个实施例在不矛盾的前提下可以相互结合,相互引用。In order to make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the various embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art can understand that in each embodiment of the present application, many technical details are proposed in order to enable readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solution claimed in this application can be realized. The following embodiments are divided for convenience of description, and should not constitute any limitation on the specific implementation of the present application. The various embodiments can be combined with each other without contradiction.
终端桌面内容的监控方法可以应用于网络监控平台或者终端设备上,本实施方式中以应用在网络监控平台为例进行说明。The method for monitoring terminal desktop content can be applied to a network monitoring platform or a terminal device. In this embodiment, application on a network monitoring platform is taken as an example for description.
本申请的第一实施方式涉及一种终端桌面内容的监控方法,在本实施方式中,接收为终端设置的针对终端桌面内容的录像策略;将录像策略以及流媒体服务器的地址发送给终端,供终端根据录像策略对终端桌面内容进行实时录像,并将得到的终端桌面内容的录像数据上传至流媒体服务器。其中,录像策略可通过网络监控平台下发给终端,录像具体指终端按照录像策略进行录像这一动作;终端在录像过程中所记录的数据即为录像数据。终端接收网络监控平台发送的客户端为终端设置的针对终端桌面内容的录像策略,终端采用该录像策略进行录像,不再需要人工操作屏幕录像动作即可开启录像功能,使得录像更加方便,提高用户的使用体验。将得到的录像数据上传至流媒体服务器,避免了数据的离线管理,可防止视频数据被篡改,增强视频数据的可信度,具有安全性。The first embodiment of the present application relates to a method for monitoring terminal desktop content. In this embodiment, a recording strategy for terminal desktop content set for the terminal is received; the recording strategy and the address of the streaming media server are sent to the terminal for The terminal performs real-time recording of the terminal desktop content according to the recording strategy, and uploads the obtained recording data of the terminal desktop content to the streaming media server. Among them, the recording strategy can be issued to the terminal through the network monitoring platform. The recording specifically refers to the action of the terminal to record according to the recording strategy; the data recorded by the terminal during the recording process is the recording data. The terminal receives the recording strategy for the terminal desktop content set by the client from the network monitoring platform. The terminal uses this recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving users Experience. Uploading the obtained video data to the streaming media server avoids offline management of the data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
下面对本实施方式的终端桌面内容的监控方法的实现细节进行具体的说明,以下内容仅为方便理解的实现细节,并非本实施方案的必须。The implementation details of the method for monitoring terminal desktop content in this embodiment will be specifically described below. The following content is only implementation details for easy understanding, and is not necessary for this embodiment.
本实施方式的一种终端桌面内容的监控方法的具体的流程图如图1所示,具体包括以下步骤:A specific flowchart of a method for monitoring terminal desktop content in this embodiment is shown in FIG. 1, and specifically includes the following steps:
步骤101,接收为终端设置的录像策略。Step 101: Receive a video recording strategy set for the terminal.
具体地说,在接收为终端设置的录像策略之前,在网络监控平台中已预先配置完成终端的基本信息,如终端的唯一编号比如IMEI,能接收短信的手机号码,该手机号码可以是携带该终端的人员的手机号码,登陆密码,以及其归属的用户id,即管理该终端的管理员的客户端id。Specifically, before receiving the recording strategy set for the terminal, the basic information of the terminal has been pre-configured in the network monitoring platform, such as the unique number of the terminal such as IMEI, the mobile phone number that can receive short messages, and the mobile phone number can carry this The mobile phone number, login password, and user id of the terminal's personnel are the client id of the administrator who manages the terminal.
在本步骤中,为终端设置的录像策略:包括定时录像策略和应用触发录像策略。其中,定时录像策略包括:录像时段及其周期性(一次性或周期性,比如一次性的录像10点到12点或周期性的每周一的2点到3点),以城管的执法仪为例,可设置为巡逻时段时,自动开启录像;应用触发录像策略至少包括应用名称,对应的录像动作为开启或是关闭等属性。以微信为例,当终端开启微信时开启录像,当关闭微信时,停止录像。类似的,也可以将应用名称也可以是打电话,摄像头等,对应的录像动作也可以为关闭,在此不一一例举。为终端设置的录像策略,可以包括一个或多个定时录像策略,也可以包括一个或多个应用触发录像策略。In this step, the recording strategy set for the terminal: including timing recording strategy and application trigger recording strategy. Among them, the timing recording strategy includes: the recording period and its periodicity (one-time or periodic, such as one-time recording from 10 o'clock to 12 o'clock or periodic 2 o'clock to 3 o'clock every Monday), using the law enforcement instrument of urban management as For example, it can be set to automatically start recording during the patrol period; the application trigger recording strategy includes at least the application name, and the corresponding recording action is the attribute such as on or off. Take WeChat as an example. When the terminal opens WeChat, it starts recording, and when it closes WeChat, it stops recording. Similarly, the application name can also be phone call, camera, etc., and the corresponding recording action can also be turned off. I will not list them one by one here. The recording strategy set for the terminal may include one or more timing recording strategies, or one or more application triggering recording strategies.
定时录像策略和应用触发录像策略可以理解被动模式的录像策略,而在实际应用中,还 可以设置主动模式的录像策略,即由终端使用者控制,类似于屏幕截图的快捷键,如按键截屏,三指滑动截屏等,一旦检测到主动录像事件信号,则开启屏幕录像。The timing recording strategy and the application trigger recording strategy can understand the passive mode recording strategy. In actual applications, you can also set the active mode recording strategy, which is controlled by the end user and is similar to the shortcut keys for screenshots, such as button screenshots. Three-finger swipe screen capture, etc., once the active recording event signal is detected, the screen recording is started.
具体地,录像策略可由终端的管理人员直接在在网络监控平台上进行配置,也可以由终端的管理人员通过客户端在网络监控平台上进行配置。Specifically, the video recording strategy can be configured directly on the network monitoring platform by the management personnel of the terminal, or configured on the network monitoring platform by the management personnel of the terminal through the client.
在实际应用中,各录像策略还可以分别对应一个优先级,例如,各个应用触发录像策略的属性,不仅包括应用名称,对应的录像动作为开启或是关闭,还可以包括优先级,优先级用于在同一时间段录像策略发生冲突时,执行更高优先级所对应的录像策略。例如,某个应用触发录像策略对应的录像动作为暂停录像,当该应用被启动的时候,终端当前正在根据某个定时录像策略进行录像,如果该应用触发录像策略的优先级高于该定时录像策略的优先级,则暂停录像;如果该应用触发录像策略的优先级低于该定时录像策略的优先级,则继续录像。In practical applications, each recording strategy can also correspond to a priority. For example, the attributes of each application triggering the recording strategy include not only the application name, but also whether the corresponding recording action is on or off, but also the priority. When the recording strategy conflicts in the same time period, the recording strategy corresponding to the higher priority is executed. For example, the recording action corresponding to an application triggering a recording strategy is pause recording. When the application is started, the terminal is currently recording according to a certain timing recording strategy. If the application triggering a recording strategy has a higher priority than the timing recording The priority of the strategy is to pause the recording; if the priority of the application triggering the recording strategy is lower than the priority of the timing recording strategy, the recording will continue.
通过设置不同的录像策略并给相应的录像策略进行优先级的设置,使录像策略环环相扣,优先级高的录像策略能覆盖优先级低的录像策略,提高用户的使用体验。By setting different recording strategies and prioritizing the corresponding recording strategies, the recording strategies are linked together. The recording strategy with higher priority can cover the recording strategy with lower priority and improve the user experience.
步骤102,判断终端是否鉴权通过。Step 102: Determine whether the terminal has passed the authentication.
判断终端鉴权是否通过的方法具体包括:接收终端的登录请求;其中,登录请求包括终端的唯一编号和登陆密码;根据终端的唯一编号和登陆密码检测终端是否为已注册终端;在判定终端为已注册终端后,向客户端发送临时密码;接收终端发送的验证请求,验证请求携带验证密码;根据验证密码与临时密码的匹配结果,判断终端是否鉴权通过。The method for judging whether the terminal authentication is passed specifically includes: receiving the login request of the terminal; where the login request includes the unique number and the login password of the terminal; detecting whether the terminal is a registered terminal according to the unique number and the login password of the terminal; After the terminal has been registered, the temporary password is sent to the client; the verification request sent by the terminal is received, and the verification request carries the verification password; according to the matching result of the verification password and the temporary password, it is judged whether the terminal is authenticated.
通过这种方式,保证使用该终端进行视频录制的人,一定是得到客户端的相应管理员的批准,提高了该终端桌面内容的监控方法的安全性。In this way, it is ensured that the person who uses the terminal for video recording must be approved by the corresponding administrator of the client terminal, which improves the security of the monitoring method of the terminal desktop content.
具体地,参考图2,终端604与网络监控平台601之间进行登录验证的示意图,包括终端604、网络监控平台601和客户端602。Specifically, referring to FIG. 2, a schematic diagram of login verification between the terminal 604 and the network monitoring platform 601, including the terminal 604, the network monitoring platform 601 and the client 602.
本实施例中终端以Android智能手机为例,其具备智能操作系统,具备显示屏幕以及屏幕录像能力,具备国际移动设备识别码(简称IMEI,International Mobile Equipment Identity)、移动客户端SIM卡的国际移动用户识别码(简称IMSI,International Mobile Subscriber Identification Number),具备接收短信的能力,访问互联网的能力。The terminal in this embodiment takes an Android smart phone as an example. It has a smart operating system, a display screen and screen recording capabilities, an International Mobile Equipment Identity (IMEI, International Mobile Equipment Identity), and an international mobile client SIM card. The user identification code (IMSI for short, International Mobile Subscriber Identification Number) has the ability to receive short messages and access the Internet.
假定在网络监控平台601已预先配置完成终端604的信息:包括终端604的唯一编号比如IMEI,终端绑定的用户设备,登陆密码,以及其终端对应的客户端;假定在终端604上已经预先配置好网络监控平台601的访问地址,比如IP地址和端口。It is assumed that the information of the terminal 604 has been pre-configured on the network monitoring platform 601: including the unique number of the terminal 604 such as IMEI, the user equipment bound to the terminal, the login password, and the client corresponding to the terminal; it is assumed that the terminal 604 has been pre-configured Good access address of the network monitoring platform 601, such as IP address and port.
步骤S201,终端604向网络监控平台601发送登录请求,登录请求具体包括终端的唯一编号和登录密码。In step S201, the terminal 604 sends a login request to the network monitoring platform 601. The login request specifically includes the unique number and the login password of the terminal.
具体地,终端604通过预先配置好的网络监控平台601的访问地址向网络监控平台601 发送终端604的唯一编号的登录密码。终端604的唯一编号包括终端604的IMEI,登录密码为该终端604在网络监控平台601完成注册时所设定的密码。Specifically, the terminal 604 sends the unique number login password of the terminal 604 to the network monitoring platform 601 through the pre-configured access address of the network monitoring platform 601. The unique number of the terminal 604 includes the IMEI of the terminal 604, and the login password is the password set when the terminal 604 completes registration on the network monitoring platform 601.
步骤S202,网络监控平台601判断终端604是否为已注册终端。In step S202, the network monitoring platform 601 determines whether the terminal 604 is a registered terminal.
具体地,网络监控平台601在接收到终端604发送的登录请求后,首先根据终端604的唯一编号判断终端604是否是已经在网络监控平台601中注册的用户。Specifically, after the network monitoring platform 601 receives the login request sent by the terminal 604, it first determines whether the terminal 604 is a user registered in the network monitoring platform 601 according to the unique number of the terminal 604.
若是注册用户,则判断登录请求中终端604的唯一编号和密码是否对应,若终端604的唯一编号和密码对应,反馈给终端604“登录成功,等待下一步验证”的信息并执行步骤S203;若终端604的唯一编号和密码不对应,则反馈给终端604“登录密码错误”的信息。If it is a registered user, it is determined whether the unique number of the terminal 604 in the login request corresponds to the password. If the unique number of the terminal 604 corresponds to the password, the terminal 604 will be fed back to the terminal 604 "login is successful, waiting for the next step of verification" information and execute step S203; if If the unique number of the terminal 604 does not correspond to the password, the terminal 604 will be fed back to the terminal 604 that "the login password is incorrect."
若不是注册用户,则反馈给终端604“该设备并未注册”的信息。If it is not a registered user, the terminal 604 is fed back to the terminal 604 that "the device is not registered".
步骤S203,网络监控平台601向客户端602发送临时密码。In step S203, the network monitoring platform 601 sends a temporary password to the client 602.
具体地,网络监控平台601通过终端604注册时预留的客户端602的信息向客户端602发送临时密码。在一个具体的例子中,临时密码为随机生成的6位数。Specifically, the network monitoring platform 601 sends the temporary password to the client 602 through the information of the client 602 reserved when the terminal 604 registers. In a specific example, the temporary password is a randomly generated 6-digit number.
需要说明的是,网络监控平台601向客户端602发送随机密码的方式可以通过短信或语音电话等方式进行。It should be noted that the way in which the network monitoring platform 601 sends the random password to the client 602 can be done by means of SMS or voice call.
步骤S204,客户端602向终端604发送临时密码。In step S204, the client 602 sends a temporary password to the terminal 604.
具体地,由于临时密码是网络监控平台601向客户端602所发送的,此时网络监控平台601发送的临时密码实际是发送给该终端604的管理员,使用该终端604的用户通过该终端604的管理员可得到临时密码。Specifically, since the temporary password is sent by the network monitoring platform 601 to the client 602, the temporary password sent by the network monitoring platform 601 is actually sent to the administrator of the terminal 604, and the user using the terminal 604 passes through the terminal 604. The administrator can get a temporary password.
步骤S205,终端604向网络监控平台601发送验证请求,验证请求包括验证密码。In step S205, the terminal 604 sends a verification request to the network monitoring platform 601, and the verification request includes a verification password.
终端604的使用者通过询问终端604的管理员获取临时密码后,将该临时密码作为验证密码,通过终端604将验证密码发送给网络监控平台601。After the user of the terminal 604 obtains the temporary password by asking the administrator of the terminal 604, the temporary password is used as the verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
步骤S206,网络监控平台601检测收到的验证密码与下发的临时密码是否匹配。Step S206: The network monitoring platform 601 detects whether the received verification password matches the issued temporary password.
具体地,网络监控平台601在接收到终端604发送的验证请求后,判断验证密码与临时密码是否匹配,若验证密码与临时密码匹配,则反馈给终端604“登录成功”的信息;若验证密码与临时密码不匹配,则反馈给终端604“验证失败,请重新进行验证”的信息。Specifically, after the network monitoring platform 601 receives the verification request sent by the terminal 604, it determines whether the verification password matches the temporary password. If the verification password matches the temporary password, it will feed back to the terminal 604 "login successful" information; if the password is verified If it does not match the temporary password, the terminal 604 will be fed back a message "verification failed, please re-verify".
通过这种方式,保证使用该终端进行视频录制的人,一定是得到终端绑定的用户设备的相应人员的批准,避免了终端被伪造的情况,而进一步提高了该终端桌面内容的监控方法的安全性。In this way, it is ensured that the person who uses the terminal for video recording must be approved by the corresponding person of the user device bound to the terminal, which prevents the terminal from being forged, and further improves the monitoring method of the terminal desktop content safety.
需要说明的是,在其他实施例中,网络监控平台601还可预先设置有临时密码验证时间和验证超时次数。网络监控平台601在向客户端602发送临时密码后,网络监控平台601开始计算等待时长。在网络监控平台601接收到终端604发送的验证请求时,首先判断等待时 长是否超过预设的临时密码验证时间,若等待时长小于预设的临时密码验证时间,则执行步骤S206;若等待时长大于预设的临时密码验证时间,则反馈给终端604“等待超时,请重新进行验证”的信息并记录验证超时次数;若验证超时次数超过预设的验证超时次数,则反馈给终端604“登录失败,请重新登录”的信息。It should be noted that, in other embodiments, the network monitoring platform 601 may also be preset with a temporary password verification time and verification timeout times. After the network monitoring platform 601 sends the temporary password to the client 602, the network monitoring platform 601 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time exceeds the preset temporary password verification time. If the waiting time is less than the preset temporary password verification time, step S206 is executed; if the waiting time is greater than The preset temporary password verification time will be fed back to the terminal 604 "Waiting timeout, please re-verify" information and record the number of verification timeouts; if the number of verification timeouts exceeds the preset number of verification timeouts, it will be fed back to the terminal 604 "Login failed" , Please log in again" information.
采用这种终端验证方法,通过临时密码的机制,确保只有终端604对应的客户端602的同意,才能使终端才能成功上线,避免该录像功能被恶意开启和滥用。Using this terminal authentication method, through a temporary password mechanism, it is ensured that only the consent of the client 602 corresponding to the terminal 604 can make the terminal go online successfully, and prevent the recording function from being maliciously turned on and abused.
步骤103,将录像策略和流媒体服务器地址下发给终端。Step 103: Send the video recording strategy and the streaming media server address to the terminal.
终端604根据录像策略进行录像,并根据得到的流媒体服务器的地址。将录像数据上传到流媒体服务器。The terminal 604 performs recording according to the recording strategy, and according to the obtained address of the streaming media server. Upload the recording data to the streaming server.
将录像策略发送给终端604的目的是,使终端604按照所接收的录像策略进行录像,不再需要人工操作屏幕录像动作即可开启录像功能,使得录像更加方便,提高用户的使用体验;并通过接收的流媒体服务器地址将录像数据上传,客户端602通过流媒体服务器可进行查看录像内容,避免了视频数据的离线管理,可防止视频数据被篡改,增强视频数据的可信度,具有安全性。The purpose of sending the recording strategy to the terminal 604 is to enable the terminal 604 to record according to the received recording strategy, and it is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving the user experience; and The received streaming server address uploads the video data, and the client 602 can view the video content through the streaming server, avoiding offline management of video data, preventing video data from being tampered with, enhancing the credibility of video data, and having security .
在一个具体的例子中,网络监控平台601向终端604发送的录像策略,可以与步骤101中设置的录像策略稍有差异,例如,网络监控平台601向终端604发送的定时录像策略可以不包含周期信息,在临近录像时间点时,发送定时录像策略。也就是说,录像策略的下发,可以在对终端鉴权通过后及时下发,也可以在检测到当前时间与录像策略包含的录制时间的差值,小于预设门限,向终端发送录像策略。In a specific example, the recording strategy sent by the network monitoring platform 601 to the terminal 604 may be slightly different from the recording strategy set in step 101. For example, the timing recording strategy sent by the network monitoring platform 601 to the terminal 604 may not include a period. Information, when the recording time is approaching, the timing recording strategy is sent. That is to say, the issuance of the recording strategy can be issued in time after the terminal is authenticated, or it can be sent to the terminal when the difference between the current time and the recording time included in the recording strategy is less than the preset threshold. .
具体地,在当前录制时间与录像策略包含的录制时间的差值,小于预设门限(比如10分钟或5分钟等时间段)时,向终端发送录像策略。由于录像策略的更新,网络监控平台601提前将录像策略发送给终端604,供终端604采用相应的录像策略进行录像。Specifically, when the difference between the current recording time and the recording time included in the recording strategy is less than a preset threshold (for example, a time period such as 10 minutes or 5 minutes), the recording strategy is sent to the terminal. Due to the update of the recording strategy, the network monitoring platform 601 sends the recording strategy to the terminal 604 in advance for the terminal 604 to use the corresponding recording strategy for recording.
网络监控平台实时更新客户端为终端设置的录像策略,使相应终端能使用更新后的录像策略进行录像;在当前录制时间与录像策略包含的录制时间的差值小于预设门限时,向终端发送录像策略,使得终端可以及时的获取到录像策略。The network monitoring platform updates the recording strategy set by the client for the terminal in real time, so that the corresponding terminal can use the updated recording strategy to record; when the difference between the current recording time and the recording time included in the recording strategy is less than the preset threshold, it will be sent to the terminal The recording strategy enables the terminal to obtain the recording strategy in time.
需要说明的是,在其他实施例中,也可以在客户端为终端更新录像策略时,向终端发送更新的录像策略。It should be noted that, in other embodiments, when the client updates the recording strategy for the terminal, the updated recording strategy may be sent to the terminal.
本实施方式将移动终端桌面作为视频源接入视频监控平台,利用了视频监控技术的优点,使得屏幕录像数据可以被进行高效且安全的管理。终端接收网络监控平台发送的客户端为终端设置的针对终端桌面内容的录像策略,终端采用该录像策略进行录像,不再需要人工操作屏幕录像动作即可开启录像功能,使得录像更加方便,提高用户的使用体验。将得到的录像 数据上传至流媒体服务器,避免了视频数据的离线管理,可防止视频数据被篡改,增强视频数据的可信度,具有安全性。In this embodiment, the desktop of the mobile terminal is used as a video source to access the video surveillance platform, and the advantages of the video surveillance technology are used, so that the screen recording data can be managed efficiently and securely. The terminal receives the recording strategy for the terminal desktop content set by the client from the network monitoring platform. The terminal uses this recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving users Experience. Uploading the obtained video data to the streaming media server avoids offline management of the video data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
上面各种方法的步骤划分,只是为了描述清楚,实现时可以合并为一个步骤或者对某些步骤进行拆分,分解为多个步骤,只要包括相同的逻辑关系,都在本专利的保护范围内;对流程中添加无关紧要的修改或者引入无关紧要的设计,但不改变其流程的核心设计都在该专利的保护范围内。The division of the steps of the various methods above is just for clarity of description. When implemented, it can be combined into one step or some steps can be split and decomposed into multiple steps. As long as they include the same logical relationship, they are all within the scope of protection of this patent. ; Adding insignificant modifications to the process or introducing insignificant designs without changing the core design of the process are within the scope of protection of the patent.
本申请第二实施方式涉及一种终端桌面内容的监控方法。第二实施方式与第一实施方式大致相同,在本申请第二实施方式中,在判定终端为已注册终端后,向客户端发送临时密码前,还包括:向终端绑定的用户设备发送随机密码;接收终端发送的校验请求,校验请求携带校验密码;若校验密码与随机密码匹配,则再向客户端发送临时密码。The second embodiment of the present application relates to a method for monitoring terminal desktop content. The second embodiment is roughly the same as the first embodiment. In the second embodiment of this application, after determining that the terminal is a registered terminal, before sending a temporary password to the client, it also includes: sending a random password to the user equipment bound to the terminal. Password: Receive the verification request sent by the terminal, the verification request carries the verification password; if the verification password matches the random password, then the temporary password is sent to the client.
本实施方式的一种终端桌面内容的监控方法的具体的流程图如图3所示,具体包括以下步骤;A specific flowchart of a method for monitoring terminal desktop content in this embodiment is shown in FIG. 3, and specifically includes the following steps:
步骤401,接收为终端设置的录像策略,本步骤与第一实施方式的步骤101类似,在此不再进行赘述。Step 401: Receive a video recording strategy set for the terminal. This step is similar to step 101 of the first embodiment, and will not be repeated here.
步骤402,判断终端是否鉴权通过。Step 402: Determine whether the terminal has passed the authentication.
判断终端验证是否通过的方法具体包括:接收终端的登录请求;其中,登录请求包括终端的唯一编号和登陆密码;根据终端的唯一编号和登陆密码检测终端是否为已注册终端;在判定终端为已注册终端后,向客户端发送临时密码;接收终端发送的验证请求,验证请求携带验证密码;根据验证密码与临时密码的匹配结果,判断终端是否鉴权通过。The method of judging whether the terminal verification is passed specifically includes: receiving the login request of the terminal; where the login request includes the unique number and the login password of the terminal; detecting whether the terminal is a registered terminal according to the unique number and the login password of the terminal; After the terminal is registered, a temporary password is sent to the client; the verification request sent by the terminal is received, and the verification request carries the verification password; according to the matching result of the verification password and the temporary password, it is determined whether the terminal is authenticated.
在判定终端为已注册终端后,向客户端发送临时密码前,还包括:向终端绑定的用户设备发送随机密码;接收终端发送的校验请求,校验请求携带校验密码;检测校验密码与随机密码是否匹配;若校验密码与随机密码匹配,则再执行向客户端发送临时密码。After determining that the terminal is a registered terminal, before sending the temporary password to the client, it also includes: sending a random password to the user device bound to the terminal; receiving a verification request sent by the terminal, the verification request carrying the verification password; checking and verifying Whether the password matches the random password; if the verification password matches the random password, then send a temporary password to the client.
具体地,参考图4,终端604与网络监控平台之间601之间进行信息验证的示意图,包括终端604、网络监控平台601、客户端602和终端绑定的用户设备614。Specifically, referring to FIG. 4, a schematic diagram of information verification between the terminal 604 and the network monitoring platform 601, including the terminal 604, the network monitoring platform 601, the client 602, and the user equipment 614 bound to the terminal.
假定在网络监控平台601已预先配置完成终端604的信息:包括终端604的唯一编号比如IMEI,终端绑定的用户设备,登陆密码,以及其终端对应的客户端信息;假定在终端604上已经预先配置好网络监控平台601的访问地址,比如IP地址和端口。It is assumed that the information of the terminal 604 has been pre-configured on the network monitoring platform 601: including the unique number of the terminal 604 such as IMEI, the user equipment bound to the terminal, the login password, and the client information corresponding to the terminal; it is assumed that the terminal 604 has been pre-configured Configure the access address of the network monitoring platform 601, such as IP address and port.
步骤S201,终端604向网络监控平台601发送登录请求,登录请求具体包括终端的唯一编号和登录密码。In step S201, the terminal 604 sends a login request to the network monitoring platform 601. The login request specifically includes the unique number and the login password of the terminal.
具体地,终端604通过预先配置好的网络监控平台601的访问地址向网络监控平台601 发送终端604的唯一编号的登录密码。终端604的唯一编号包括终端604的IMEI,登录密码为该终端604在网络监控平台601完成注册时所设定的密码。Specifically, the terminal 604 sends the unique number login password of the terminal 604 to the network monitoring platform 601 through the pre-configured access address of the network monitoring platform 601. The unique number of the terminal 604 includes the IMEI of the terminal 604, and the login password is the password set when the terminal 604 completes registration on the network monitoring platform 601.
步骤S202,网络监控平台601判断终端604是否为已注册终端。In step S202, the network monitoring platform 601 determines whether the terminal 604 is a registered terminal.
具体地,网络监控平台601在接收到终端604发送的登录请求后,首先根据终端604的唯一编号判断终端604是否是已经在网络监控平台601中注册的用户。Specifically, after the network monitoring platform 601 receives the login request sent by the terminal 604, it first determines whether the terminal 604 is a user registered in the network monitoring platform 601 according to the unique number of the terminal 604.
若是注册用户,则判断登录请求中终端604的唯一编号和密码是否对应,若终端604的唯一编号和密码对应,反馈给终端604“登录成功,等待下一步验证”的信息并执行步骤S301;若终端604的唯一编号和密码不对应,则反馈给终端604“登录密码错误”的信息。If it is a registered user, determine whether the unique number of the terminal 604 corresponds to the password in the login request. If the unique number of the terminal 604 corresponds to the password, the terminal 604 will be fed back to the terminal 604 "login is successful, waiting for the next step of verification" information and perform step S301; if If the unique number of the terminal 604 does not correspond to the password, the terminal 604 will be fed back to the terminal 604 that "the login password is incorrect."
若不是注册用户,则反馈给终端604“该设备并未注册”的信息。If it is not a registered user, the terminal 604 is fed back to the terminal 604 that "the device is not registered".
步骤S301,网络监控平台601向终端绑定的用户设备614发送随机密码。In step S301, the network monitoring platform 601 sends a random password to the user equipment 614 bound to the terminal.
具体地,网络监控平台601根据终端604在平台预留的终端绑定的用户设备614的信息,向终端的绑定用户设备614发送随机密码。在一个具体的例子中,随机密码为随机生成的6位数。Specifically, the network monitoring platform 601 sends a random password to the bound user equipment 614 of the terminal according to the information of the user equipment 614 bound to the terminal reserved by the terminal 604 on the platform. In a specific example, the random password is a randomly generated 6-digit number.
需要说明的是,网络监控平台601向终端绑定的用户设备614发送随机密码的方式可以是短信或语音电话等方式。It should be noted that the method for the network monitoring platform 601 to send the random password to the user equipment 614 bound to the terminal may be a short message or a voice call.
步骤S302,终端绑定的用户设备614向终端604发送随机密码。In step S302, the user equipment 614 bound to the terminal sends a random password to the terminal 604.
具体地,由于随机密码是网络监控平台601向终端绑定的用户设备614所发送的,此时网络监控平台601发送的随机密码实际是发送给该终端604的持有者,该终端204可通过该终端604的持有者的用户设备得到随机密码。Specifically, since the random password is sent by the network monitoring platform 601 to the user equipment 614 bound to the terminal, the random password sent by the network monitoring platform 601 is actually sent to the holder of the terminal 604, and the terminal 204 can pass The user equipment of the holder of the terminal 604 obtains a random password.
步骤S303,终端604向网络监控平台601发送校验请求,校验请求包括校验密码。In step S303, the terminal 604 sends a verification request to the network monitoring platform 601, and the verification request includes a verification password.
在通过终端604的持有者的用户设备获取随机密码后,将该随机密码作为校验密码,通过终端604将校验密码发送给网络监控平台601。After obtaining the random password through the user equipment of the holder of the terminal 604, the random password is used as the verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
步骤S304,网络监控平台601检测校验密码与随机密码是否匹配。In step S304, the network monitoring platform 601 detects whether the verification password matches the random password.
具体地,网络监控平台601在接收到终端604发送的校验请求后,判断检验密码与随机密码是否匹配,若校验密码与随机密码匹配,则反馈给终端604“验证成功,请进行下一步验证”的信息并执行步骤S203;若校验密码与随机密码不匹配,则反馈给终端604“验证失败,请重新进行验证”的信息。Specifically, after the network monitoring platform 601 receives the verification request sent by the terminal 604, it determines whether the verification password matches the random password. If the verification password matches the random password, it will feed back to the terminal 604 "verification successful, please proceed to the next step. And execute step S203; if the verification password does not match the random password, the terminal 604 is fed back to the terminal 604 with a message of “verification failed, please re-verify”.
需要说明的是,在其他实施例中,网络监控平台601还预先设置有随机密码验证时间和验证超时次数。网络监控平台601在向终端绑定的用户设备614发送随机密码后,网络监控平台614开始计算等待时长。在网络监控平台601接收到终端604发送的校验请求时,首先判断等待时长是否超过预设的随机密码验证时间,若等待时长小于预设的随机密码验证时间, 则执行步骤S304;若等待时长大于预设的随机密码验证时间,则反馈给终端604“等待超时,请重新进行验证”的信息并记录验证超时次数;若验证超时次数超过预设的验证超时次数,则反馈给终端604“登录失败,请重新登录”的信息。It should be noted that, in other embodiments, the network monitoring platform 601 is also preset with a random password verification time and verification timeout times. After the network monitoring platform 601 sends a random password to the user equipment 614 bound to the terminal, the network monitoring platform 614 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time exceeds the preset random password verification time. If the waiting time is less than the preset random password verification time, step S304 is executed; if the waiting time is long If the verification time is greater than the preset random password verification time, it will be fed back to the terminal 604 "Waiting timeout, please re-verify" information and record the verification timeout times; if the verification timeout times exceed the preset verification timeout times, it will be fed back to the terminal 604 "Login" Failed, please log in again" message.
步骤S203,网络监控平台601向客户端602发送临时密码。In step S203, the network monitoring platform 601 sends a temporary password to the client 602.
具体地,网络监控平台601通过终端604注册是预留的客户端602的信息向客户端602发送临时密码。在一个具体的例子中,临时密码为随机生成的6位数。Specifically, the network monitoring platform 601 sends the temporary password to the client 602 through the information of the client 602 registered by the terminal 604 that is reserved. In a specific example, the temporary password is a randomly generated 6-digit number.
需要说明的是,网络监控平台601向客户端602发送随机密码的方式可以通过短信或语音电话等方式进行。It should be noted that the way in which the network monitoring platform 601 sends the random password to the client 602 can be done by means of SMS or voice call.
步骤S204,客户端602向终端604发送临时密码。In step S204, the client 602 sends a temporary password to the terminal 604.
具体地,由于临时密码是网络监控平台601向客户端602所发送的,此时网络监控平台601发送的临时密码实际是发送给该终端604的管理员,使用该终端604的用户通过该终端604的管理员可得到临时密码。Specifically, since the temporary password is sent by the network monitoring platform 601 to the client 602, the temporary password sent by the network monitoring platform 601 is actually sent to the administrator of the terminal 604, and the user using the terminal 604 passes through the terminal 604. The administrator can get a temporary password.
步骤S205,终端604向网络监控平台601发送验证请求,验证请求包括验证密码。In step S205, the terminal 604 sends a verification request to the network monitoring platform 601, and the verification request includes a verification password.
终端604的使用者通过询问终端604的管理员获取临时密码后,将该临时密码作为验证密码,通过终端604将验证密码发送给网络监控平台601。After the user of the terminal 604 obtains the temporary password by asking the administrator of the terminal 604, the temporary password is used as the verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
步骤S206,网络监控平台601检测收到的验证密码与下发的临时密码是否匹配。Step S206: The network monitoring platform 601 detects whether the received verification password matches the issued temporary password.
具体地,网络监控平台601在接收到终端604发送的验证请求后,判断验证密码与临时密码是否匹配,若验证密码与临时密码匹配,则反馈给终端604“登录成功”的信息;若验证密码与临时密码不匹配,则反馈给终端604“验证失败,请重新进行验证”的信息。Specifically, after the network monitoring platform 601 receives the verification request sent by the terminal 604, it determines whether the verification password matches the temporary password. If the verification password matches the temporary password, it will feed back to the terminal 604 "login successful" information; if the password is verified If it does not match the temporary password, the terminal 604 will be fed back a message "verification failed, please re-verify".
需要说明的是,在其他实施例中,网络监控平台601还预先设置有临时密码验证时间和验证超时次数。网络监控平台601在向客户端602发送临时密码后,网络监控平台601开始计算等待时长。在网络监控平台601接收到终端604发送的验证请求时,首先判断等待时长是否超过预设的临时密码验证时间,若等待时长小于预设的临时密码验证时间,则执行步骤S206;若等待时长大于预设的临时密码验证时间,则反馈给终端604“等待超时,请重新进行验证”的信息并记录验证超时次数;若验证超时次数超过预设的验证超时次数,则反馈给终端604“登录失败,请重新登录”的信息。It should be noted that, in other embodiments, the network monitoring platform 601 is also preset with a temporary password verification time and verification timeout times. After the network monitoring platform 601 sends the temporary password to the client 602, the network monitoring platform 601 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time exceeds the preset temporary password verification time. If the waiting time is less than the preset temporary password verification time, step S206 is executed; if the waiting time is greater than The preset temporary password verification time will be fed back to the terminal 604 "Waiting timeout, please re-verify" information and record the number of verification timeouts; if the number of verification timeouts exceeds the preset number of verification timeouts, it will be fed back to the terminal 604 "Login failed" , Please log in again" information.
步骤403,将录像策略和流媒体服务器地址下发给终端。本步骤与第一实施方式的步骤103类似,在此不再进行赘述。Step 403: Deliver the recording strategy and the streaming media server address to the terminal. This step is similar to step 103 of the first embodiment, and will not be repeated here.
本实施方式采用双重终端验证方法,通过随机密码的机制,确保了即使攻击者获悉了终端唯一编号和登陆密码,也会因无法收到随机密码而失败,避免终端被伪造;通过临时密码的机制,确保只有客户端602的同意,才能使终端才能成功上线,避免该录像功能被恶意开 启和滥用。This embodiment adopts a double terminal authentication method, through the mechanism of random password, to ensure that even if an attacker learns the unique number and login password of the terminal, he will fail because he cannot receive the random password to avoid the terminal being forged; through the mechanism of temporary password , To ensure that only the consent of the client 602 can make the terminal go online successfully, and prevent the recording function from being maliciously turned on and abused.
上面各种方法的步骤划分,只是为了描述清楚,实现时可以合并为一个步骤或者对某些步骤进行拆分,分解为多个步骤,只要包括相同的逻辑关系,都在本专利的保护范围内;对流程中添加无关紧要的修改或者引入无关紧要的设计,但不改变其流程的核心设计都在该专利的保护范围内。The division of the steps of the various methods above is just for clarity of description. When implemented, it can be combined into one step or some steps can be split and decomposed into multiple steps. As long as they include the same logical relationship, they are all within the scope of protection of this patent. ; Adding insignificant modifications to the process or introducing insignificant designs without changing the core design of the process are within the scope of protection of the patent.
本申请的第三实施方式涉及一种终端桌面内容的监控方法。在本申请第三实施方式中,终端桌面内容的监控方法应用于终端。The third embodiment of the present application relates to a method for monitoring terminal desktop content. In the third embodiment of the present application, the method for monitoring terminal desktop content is applied to the terminal.
在本实施方式中,接收网络监控平台发送的针对终端桌面内容的录像策略以及流媒体服务器的地址;根据录像策略对终端桌面内容进行实时录像;将录像得到的终端桌面内容的录像数据上传至流媒体服务器,供流媒体服务器响应客户端针对录像数据的访问请求。终端接收网络监控平台发送的客户端为终端设置的针对终端桌面内容的录像策略,终端采用该录像策略进行录像,不再需要人工操作屏幕录像动作即可开启录像功能,使得录像更加方便,提高用户的使用体验。将得到的录像数据上传至流媒体服务器,避免了视频数据的离线管理,可防止视频数据被篡改,增强视频数据的可信度,具有安全性。In this embodiment, the recording strategy for the terminal desktop content and the address of the streaming media server sent by the network monitoring platform are received; the terminal desktop content is recorded in real time according to the recording strategy; the recording data of the terminal desktop content obtained by the recording is uploaded to the stream The media server is used for the streaming media server to respond to the client's request for access to video data. The terminal receives the recording strategy for the terminal desktop content set by the client from the network monitoring platform. The terminal uses this recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, making recording more convenient and improving users Experience. Uploading the obtained video data to the streaming media server avoids offline management of the video data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
下面对本实施方式的终端桌面内容的监控方法的实现细节进行具体的说明,以下内容仅为方便理解的实现细节,并非本实施方案的必须。The implementation details of the method for monitoring terminal desktop content in this embodiment will be specifically described below. The following content is only implementation details for easy understanding, and is not necessary for this embodiment.
本实施方式的一种终端桌面内容的监控方法的具体流程图如图5所示,具体包括以下步骤:The specific flowchart of a method for monitoring terminal desktop content in this embodiment is shown in FIG. 5, which specifically includes the following steps:
步骤501,是否验权通过。 Step 501, whether the right verification is passed.
向网络监控平台发送登录请求;其中,登录请求包括终端的唯一编号和登陆密码;向网络监控平台发送校验请求,校验请求携带校验密码;其中,校验密码根据终端绑定的用户设备发送的随机密码生成得到;向网络监控平台发送验证请求,验证请求携带验证密码,供网络监控平台根据验证密码进行鉴权;其中,验证密码根据客户端发送的临时密码生成得到。Send a login request to the network monitoring platform; where the login request includes the unique number of the terminal and the login password; send a verification request to the network monitoring platform, the verification request carries a verification password; where the verification password is based on the user equipment bound to the terminal The sent random password is generated; a verification request is sent to the network monitoring platform, and the verification request carries a verification password for the network monitoring platform to authenticate according to the verification password; wherein the verification password is generated based on the temporary password sent by the client.
具体验证过程参见具体实施例二的内容,具体实施例二中已有详细描述,在此不再赘述。For the specific verification process, refer to the content of the specific embodiment 2, which has been described in detail in the specific embodiment 2, and will not be repeated here.
步骤502,接收网络监控平台发送的录像策略和流媒体服务器地址。Step 502: Receive the recording strategy and the streaming media server address sent by the network monitoring platform.
具体地,终端在验证通过后,接收网络监控平台发送的录像策略和流媒体服务器地址,终端采用接收到的录像策略进行录像,并将录像得到的录像数据上传给流媒体服务器。Specifically, after the verification is passed, the terminal receives the recording strategy and the streaming media server address sent by the network monitoring platform, the terminal uses the received recording strategy to record, and uploads the recording data obtained by the recording to the streaming media server.
步骤503,根据录像策略对桌面内容进行实时录像。Step 503: Perform real-time recording of the desktop content according to the recording strategy.
步骤504,将录像数据上传流媒体服务器。Step 504: Upload the recording data to the streaming media server.
终端采用流媒体服务器发送到终端的录像策略进行录像,并将录像得到的录像数据上传 给流媒体服务器。The terminal uses the recording strategy sent by the streaming server to the terminal to record, and uploads the recorded data obtained from the recording to the streaming server.
录像策略包括定时录像策略和应用触发录像策略。The recording strategy includes timing recording strategy and application trigger recording strategy.
需要说明的是,将录像得到的录像数据上传给流媒体服务器可以通过定时上传或实时上传的方式;采用定时上传的方式可以有效的节省录像成本,采用明实时上传的方式成本较高,但是由于录像数据是第一手数据,其录像内容更具可靠性。It should be noted that uploading the video data obtained by recording to the streaming media server can be done either through scheduled upload or real-time upload; using scheduled upload can effectively save the cost of recording, and the cost of using clear real-time upload is higher, but due to Video data is first-hand data, and its video content is more reliable.
录像策略包括:定时录像策略和应用触发录像策略;其中各录像策略分别对应一个优先级;若终端当前状态满足多个录像策略,则执行优先级最高的录像策略。The recording strategy includes: timing recording strategy and application trigger recording strategy; each recording strategy corresponds to a priority; if the current state of the terminal meets multiple recording strategies, the recording strategy with the highest priority is executed.
需要说明的是,终端除了采用相应的录像策略进行录像外,还包括主动模式。It should be noted that, in addition to adopting the corresponding recording strategy for recording, the terminal also includes an active mode.
主动模式:若检测到主动录像事件信号,则对终端桌面内容进行实时录像,并将得到的录像数据上传至所述流媒体服务器。主动录像事件信号根据对屏幕的预设操作生成得到。Active mode: If an active recording event signal is detected, the terminal desktop content is recorded in real time, and the obtained recording data is uploaded to the streaming media server. The active video event signal is generated according to the preset operation on the screen.
除了在相应的录像策略下进行录像外,用户还可以进行手动操作来进行录像,在用户需要时进行手动录像,不会遗漏任何需要记录的重要情况。In addition to recording under the corresponding recording strategy, users can also perform manual operations to perform recording, and perform manual recording when the user needs it, without missing any important information that needs to be recorded.
具体地,当终端604验证成功上线后,由终端604的使用者控制,采用主动录像事件信号开启主动模式。主动录像事件信号类似于屏幕截图的快捷键,如按键截屏,三指滑动截屏等。终端604一旦检测到主动录像事件信号,则开启屏幕录像,并将录像数据通过RTSP流发送到终端604上线时网络监控平台601所分配的流媒体服务器中。Specifically, after the terminal 604 is successfully verified to go online, the user of the terminal 604 controls the active recording event signal to start the active mode. The active recording event signal is similar to the shortcut keys for screenshots, such as key-press screenshots, three-finger sliding screenshots, etc. Once the terminal 604 detects the active recording event signal, it starts screen recording, and sends the recording data to the streaming media server allocated by the network monitoring platform 601 when the terminal 604 goes online through the RTSP stream.
终端将录像得到的录像数据上传给流媒体服务器后,流媒体服务器将录像数据和视频流进行拼接,供客户端进行访问。流媒体服务器将终端发送的录像数据和视频流进行拼接后,客户端在进行视频的查看和访问时,不再需要用户一个个视频去搜索和查找,提升了用户查看相应视频的高效性。After the terminal uploads the video data obtained from the video recording to the streaming media server, the streaming media server splices the video data and the video stream for the client to access. After the streaming media server splices the video data and the video stream sent by the terminal, the client no longer needs the user to search and find each video when viewing and accessing the video, which improves the efficiency of the user to view the corresponding video.
本实施方式将移动终端桌面作为视频源接入视频监控平台,利用了视频监控技术的优点,使得屏幕录像数据可以被进行高效且安全的管理。In this embodiment, the desktop of the mobile terminal is used as a video source to access the video surveillance platform, and the advantages of the video surveillance technology are used, so that the screen recording data can be managed efficiently and securely.
在本实施方式中,终端接收网络监控平台发送的客户端为终端设置的针对终端桌面内容的录像策略,终端采用该录像策略进行录像,不再需要人工操作屏幕录像动作即可开启录像功能,使得录像更加方便,提高用户的使用体验。将得到的录像数据上传至流媒体服务器,避免了视频数据的离线管理,可防止视频数据被篡改,增强视频数据的可信度,具有安全性。In this embodiment, the terminal receives a recording strategy for the terminal’s desktop content set by the client from the network monitoring platform, and the terminal uses the recording strategy to record. It is no longer necessary to manually operate the screen recording action to enable the recording function, so that Video recording is more convenient and improves user experience. Uploading the obtained video data to the streaming media server avoids offline management of the video data, prevents the video data from being tampered with, enhances the credibility of the video data, and has security.
另外,采用双重终端验证方法,通过验证密码的机制,确保了即使攻击者获悉了终端唯一编号和登陆密码,也会因无法收到验证密码而失败,避免终端被伪造;通过校验密码的机制,确保只有客户端的同意,才能使终端才能成功上线,避免该录像功能被恶意开启和滥用。In addition, the dual terminal verification method is adopted, and the password verification mechanism ensures that even if the attacker learns the unique terminal number and login password, he will fail because he cannot receive the verification password, preventing the terminal from being forged; through the verification password mechanism , To ensure that only the client's consent can the terminal be successfully launched, and to avoid malicious activation and abuse of the recording function.
下面将以终端为执法仪或网约车司机使用时进行具体介绍:The following will give a specific introduction when using the terminal as a law enforcement instrument or an online car-hailing driver:
当终端具体为执法仪时:When the terminal is specifically a law enforcement instrument:
普通智能执法仪一般具备操作系统比如Android系统,显示屏幕,存储,摄像头,网络通讯,GPS定位等功能。在执法仪中,本实施方式将以一个应用的形式存在,称之为屏幕录像APP;而执法录像的应用称之为执法APP。Ordinary smart law enforcement instruments generally have operating systems such as Android system, display screen, storage, camera, network communication, GPS positioning and other functions. In the law enforcement instrument, this embodiment will exist in the form of an application, which is called a screen recording APP; and the application of law enforcement recording is called a law enforcement APP.
具体包括以下步骤:It includes the following steps:
步骤1,对执法仪初始设置:由执法仪的管理人员在网络监控平台,录入执法仪的唯一编号,以及该执法仪的电话号码,和该执法仪的管理员的ID,即审批该执法仪是否能否开启屏幕录像的管理员的ID,以及网络监控平台的地址。Step 1. Initial setup of the law enforcement device: the administrator of the law enforcement device enters the unique number of the law enforcement device on the network monitoring platform, as well as the phone number of the law enforcement device, and the ID of the administrator of the law enforcement device to approve the law enforcement device Whether to enable the ID of the administrator of the screen recording, and the address of the network monitoring platform.
步骤2,录像策略配置:执法仪的管理人员在网络监控平台对该执法仪设置周期性录像策略。比如,工作日的早上10点到11点开启录像;当检测到执法APP被打开时,立即开启录像。Step 2. Recording strategy configuration: The administrator of the law enforcement device sets a periodical recording strategy for the law enforcement device on the network monitoring platform. For example, start recording from 10 am to 11 am on weekdays; when it is detected that the law enforcement APP is opened, start recording immediately.
步骤3,登陆流程:执法仪使用者,即执法人员,出发执行任务前打开屏幕录像APP并登陆上线进行验证成功后,得到录像策略和流媒体服务器地址;具体的登陆验证流程如具体实施例一所述,在此不赘述。Step 3. Login process: the user of the law enforcement instrument, that is, law enforcement personnel, open the screen recording app before starting to perform the task and log in and go online for verification. After successful verification, the recording strategy and streaming media server address are obtained; the specific login verification process is as shown in specific embodiment 1. That is not repeated here.
步骤4,终端登陆上线后,网络监控平台将定时检测该执法仪是否有周期录像将要执行,并提前下发至执法仪;如上述2中的配置,则执法与将在10点之前收到录像策略,当时间到达10点时,屏幕录像APP将会录制屏幕并发送到流媒体服务器。Step 4. After the terminal is logged in and online, the network monitoring platform will periodically check whether the law enforcement instrument has periodic recordings to be executed, and send it to the law enforcement instrument in advance; if the configuration in the above 2 is configured, the law enforcement and the law enforcement will receive the recording before 10 o’clock According to the strategy, when the time reaches 10 o'clock, the screen recording APP will record the screen and send it to the streaming server.
步骤5,在其他时段,执法者有临时任务需要处理,按流程打开执法APP,即执法APP在执法仪桌面显示时,录像APP将开始录制屏幕,并发送到流媒体服务器。Step 5. In other periods, law enforcement officers have temporary tasks to deal with. Open the law enforcement app according to the process, that is, when the law enforcement app is displayed on the law enforcement instrument desktop, the recording app will start to record the screen and send it to the streaming media server.
步骤6,当执法者开始进行录像取证时,这时将存在两路甚至多路视频流存在,其中一路是执法仪的摄像头所拍摄视频内容,有多个摄像头开启则可能会有路流;另一路即为执法仪屏幕所显示的内容。录像APP将首先将屏幕录像内容推送至流媒体服务器,同时根据配置可选的将摄像头的视频流推送至流媒体服务器。屏幕录像产生的视频流和摄像头产生的视频流,将会具备同样的前缀,即执法仪的唯一编号的命名规则,这样流媒体服务器可以将这两路甚至多路流拼接成一个画面展示。通过这样的处理,使得执法者不能随意的删除修改对某一方不利的视频,保证了执法仪拍摄的视频的真实性和完整性。Step 6. When the law enforcement officer starts to record and collect evidence, there will be two or even multiple video streams. One of them is the video content captured by the camera of the law enforcement instrument. If multiple cameras are turned on, there may be a stream; One way is the content displayed on the screen of the law enforcement instrument. The recording APP will first push the screen recording content to the streaming media server, and optionally push the video stream of the camera to the streaming media server according to the configuration. The video stream generated by the screen recording and the video stream generated by the camera will have the same prefix, that is, the naming rule of the unique number of the law enforcement instrument, so that the streaming server can splice the two or even multiple streams into one screen display. Through this kind of processing, the law enforcement agency can not delete and modify the unfavorable video of one party at will, ensuring the authenticity and integrity of the video taken by the law enforcement instrument.
当终端为网约车司机所使用时:When the terminal is used by the ride-hailing driver:
为了对网约车司机的服务质量进行更全面的管理,网约车公司要求网约车驾驶员使用特定的终端,在该终端上安装本申请描述的屏幕录像APP,对服务全过程进行全面的记录。In order to more comprehensively manage the service quality of online car-hailing drivers, online car-hailing companies require online car-hailing drivers to use a specific terminal and install the screen recording APP described in this application on the terminal to conduct a comprehensive service throughout the entire service process. recording.
步骤1,配置和上线等流程与执法仪类似,在此不赘述;Step 1. The configuration and online procedures are similar to the law enforcement instrument, so I won’t repeat them here;
步骤2,网约车公司统一对驾驶员所用终端设定基于应用的录像策略,比如当打车应用、微信、电话、短信等应用被激活时,主动开启录像;而当网络银行APP被激活时,如果当前 正在进行录像,则应停止录像,待网络银行APP退出后,再恢复录像。Step 2. The online car-hailing company uniformly sets application-based recording strategies for the terminal used by the driver. For example, when the taxi application, WeChat, phone, SMS and other applications are activated, they will actively turn on the recording; and when the online banking APP is activated, If you are currently recording, you should stop recording and resume recording after the online banking APP exits.
具体的录像策略可描述为:The specific recording strategy can be described as:
{“APPName”:“打车应用”,“action”:“on”,“priority”:“1”};{"APPName":"Taxi Application", "action": "on", "priority": "1"};
{“APPName”:“网上银行”,“action”:“off”,“priority”:“3”};{"APPName": "Internet Banking", "action": "off", "priority": "3"};
其中priority为仅在action为对应的on或off有意义。约定1即表示该应用的优先级高于主动录像,约定为2为高于周期性录像,为3则高于主动和周期性录像。Among them, priority is meaningful only when the action is the corresponding on or off. The agreement 1 means that the priority of the application is higher than the active recording, the agreement 2 is higher than the periodic recording, and the 3 is higher than the active and periodic recording.
即采用该方式,驾驶员在打开“打车应用”时,主动开启录像;此时再打开“网上银行”由于“网上银行”的优先级高于“打车应用”的优先级,此时执行“网上银行”对应的操作,关闭录像,带“网上银行”关闭后再回复录像。That is to say, in this way, when the driver opens the "Taxi Application", the driver will actively turn on the video; at this time, turn on the "Internet Banking". Since the priority of "Online Banking" is higher than the priority of the "Taxi Application", the "Online" is executed at this time. For the operation corresponding to "Bank", turn off the video, and then reply to the video after closing "Online Banking".
上面各种方法的步骤划分,只是为了描述清楚,实现时可以合并为一个步骤或者对某些步骤进行拆分,分解为多个步骤,只要包括相同的逻辑关系,都在本专利的保护范围内;对流程中添加无关紧要的修改或者引入无关紧要的设计,但不改变其流程的核心设计都在该专利的保护范围内。The division of the steps of the various methods above is just for clarity of description. When implemented, it can be combined into one step or some steps can be split and decomposed into multiple steps. As long as they include the same logical relationship, they are all within the scope of protection of this patent. ; Adding insignificant modifications to the process or introducing insignificant designs without changing the core design of the process are within the scope of protection of the patent.
本申请第四实施方式涉及一种网络监控平台,如图6所示,包括:至少一个处理器701;以及,与至少一个处理器701通信连接的存储器702;其中,存储器702存储有可被至少一个处理器701执行的指令,指令被至少一个处理器701执行,以使至少一个处理器701能够执行第一或第二实施方式的终端桌面内容的监控方法。The fourth embodiment of the present application relates to a network monitoring platform, as shown in FIG. 6, including: at least one processor 701; and a memory 702 communicatively connected with the at least one processor 701; wherein the memory 702 stores at least An instruction executed by one processor 701 is executed by at least one processor 701, so that the at least one processor 701 can execute the method for monitoring terminal desktop content of the first or second embodiment.
其中,存储器702和处理器701采用总线方式连接,总线可以包括任意数量的互联的总线和桥,总线将一个或多个处理器701和存储器702的各种电路连接在一起。总线还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路连接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口在总线和收发机之间提供接口。收发机可以是一个元件,也可以是多个元件,比如多个接收器和发送器,提供用于在传输介质上与各种其他装置通信的单元。经处理器处理的数据通过天线在无线介质上进行传输,进一步,天线还接收数据并将数据传送给处理器701。The memory 702 and the processor 701 are connected in a bus manner. The bus may include any number of interconnected buses and bridges. The bus connects one or more various circuits of the processor 701 and the memory 702 together. The bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all well-known in the art, and therefore, no further description will be given herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium. The data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 701.
处理器701负责管理总线和通常的处理,还可以提供各种功能,包括定时,外围接口,电压调节、电源管理以及其他控制功能。而存储器可以被用于存储处理器在执行操作时所使用的数据。The processor 701 is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions. The memory can be used to store data used by the processor when performing operations.
通信组件703,用于向终端发送临时密码或向终端绑定的用户设备发送随机密码;还用于接收终端发送的验证请求或校验请求。The communication component 703 is used to send a temporary password to the terminal or a random password to the user equipment bound to the terminal; it is also used to receive a verification request or a verification request sent by the terminal.
不难发现,本实施方式为与第一实施方式或第二实施方式相对应的设备实施例,本实施 方式可与第一实施方式或第二实施方式互相配合实施。第一实施方式或第二实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第一实施方式或第二实施方式中。为了突出本申请的创新部分,本实施方式中并没有将与解决本申请所提出的技术问题关系不太密切的单元引入,但这并不表明本实施方式中不存在其它的单元。It is not difficult to find that this embodiment is an example of equipment corresponding to the first embodiment or the second embodiment, and this embodiment can be implemented in cooperation with the first embodiment or the second embodiment. The related technical details mentioned in the first embodiment or the second embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied to the first embodiment or the second embodiment. In order to highlight the innovative part of this application, this embodiment does not introduce units that are not too closely related to solving the technical problems raised by this application, but this does not mean that there are no other units in this embodiment.
本申请第五实施方式涉及一种终端,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行第三实施方式的终端桌面内容的监控方法。The fifth embodiment of the present application relates to a terminal, including: at least one processor; and, a memory communicatively connected with the at least one processor; wherein the memory stores instructions that can be executed by the at least one processor The instruction is executed by the at least one processor, so that the at least one processor can execute the method for monitoring terminal desktop content of the third embodiment.
其中,存储器和处理器采用总线方式连接,总线可以包括任意数量的互联的总线和桥,总线将一个或多个处理器和存储器的各种电路连接在一起。总线还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路连接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口在总线和收发机之间提供接口。收发机可以是一个元件,也可以是多个元件,比如多个接收器和发送器,提供用于在传输介质上与各种其他装置通信的单元。经处理器处理的数据通过天线在无线介质上进行传输,进一步,天线还接收数据并将数据传送给处理器。Among them, the memory and the processor are connected in a bus mode, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors and various circuits of the memory together. The bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all well-known in the art, and therefore, no further description will be given herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium. The data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor.
处理器负责管理总线和通常的处理,还可以提供各种功能,包括定时,外围接口,电压调节、电源管理以及其他控制功能。而存储器可以被用于存储处理器在执行操作时所使用的数据。The processor is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions. The memory can be used to store data used by the processor when performing operations.
在一个具体的例子中,终端可采用典型的即普通的Android智能手机。In a specific example, the terminal may be a typical or ordinary Android smart phone.
不难发现,本实施方式为与第三实施方式相对应的设备实施例,本实施方式可与第三实施方式互相配合实施。第三实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第三实施方式中。为了突出本申请的创新部分,本实施方式中并没有将与解决本申请所提出的技术问题关系不太密切的单元引入,但这并不表明本实施方式中不存在其它的单元。It is not difficult to find that this embodiment is a device example corresponding to the third embodiment, and this embodiment can be implemented in cooperation with the third embodiment. The related technical details mentioned in the third embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the third embodiment. In order to highlight the innovative part of this application, this embodiment does not introduce units that are not too closely related to solving the technical problems raised by this application, but this does not mean that there are no other units in this embodiment.
本申请第六实施方式涉及一种桌面内容的监控系统,如图7所示,包括:The sixth embodiment of the present application relates to a desktop content monitoring system, as shown in FIG. 7, including:
客户端602、与客户端602通信连接的网络监控平台601、与网络监控平台601通信连接的至少一个终端604、以及与客户端602和终端604通信连接的流媒体服务器603;其中,流媒体服务器603用于存储终端604上传的录像数据;客户端602用于在网络监控平台601中 为终端604设置的针对终端桌面内容的录像策略,并访问流媒体服务器603中存储的录像数据。 Client 602, a network monitoring platform 601 communicatively connected to the client 602, at least one terminal 604 communicatively connected to the network monitoring platform 601, and a streaming media server 603 communicatively connected to the client 602 and the terminal 604; among them, the streaming media server 603 is used to store the recording data uploaded by the terminal 604; the client 602 is used to set a recording strategy for the terminal desktop content in the network monitoring platform 601 for the terminal 604, and to access the recording data stored in the streaming media server 603.
具体地,终端604是指具备显示屏幕,具备屏幕录像能力,网络通讯能力的智能终端。在一个具体的例子中,可采用典型的即普通的Android智能手机。终端604将屏幕内容作为视频源接入网络监控平台601。Specifically, the terminal 604 refers to an intelligent terminal with a display screen, screen recording capabilities, and network communication capabilities. In a specific example, a typical or ordinary Android smart phone can be used. The terminal 604 uses the screen content as a video source to access the network monitoring platform 601.
客户端602是用户用来执行监控操作的软件。终端桌面内容的监控系统中有多种类型的客户端602,包括C/S模式的客户端、B/S模式的客户端以及移动客户端。The client 602 is software used by the user to perform monitoring operations. There are multiple types of clients 602 in the terminal desktop content monitoring system, including C/S mode clients, B/S mode clients, and mobile clients.
流媒体服务器604:接收并存储终端产生的视频数据,并提供给客户端602访问,响应客户端602的播放屏幕录像视频请求。Streaming media server 604: receives and stores the video data generated by the terminal, and provides it to the client 602 for access, and responds to the request of the client 602 to play screen recording video.
网络监控平台601:整个终端桌面内容的监控系统的核心,管理所有的终端604、客户端602、流媒体服务器603以及终端604注册时的用户信息等。Network monitoring platform 601: The core of the entire terminal desktop content monitoring system, managing all terminals 604, clients 602, streaming media servers 603, and user information when the terminal 604 is registered.
不难发现,本实施方式为与第一实施方式或第三实施方式相对应的系统实施例,本实施方式可与第一实施方式或第三实施方式互相配合实施。第一实施方式或第三实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第一实施方式或第三实施方式中。为了突出本申请的创新部分,本实施方式中并没有将与解决本申请所提出的技术问题关系不太密切的设备引入,但这并不表明本实施方式中不存在其它的设备。It is not difficult to find that this embodiment is a system example corresponding to the first embodiment or the third embodiment, and this embodiment can be implemented in cooperation with the first embodiment or the third embodiment. The related technical details mentioned in the first embodiment or the third embodiment are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied in the first embodiment or the third embodiment. In order to highlight the innovative part of this application, this embodiment does not introduce equipment that is not too closely related to solving the technical problems proposed by this application, but this does not indicate that there are no other equipment in this embodiment.
本申请第七实施方式涉及一种计算机可读存储介质,存储有计算机程序。计算机程序被处理器执行时实现上述方法实施例。The seventh embodiment of the present application relates to a computer-readable storage medium storing a computer program. When the computer program is executed by the processor, the above method embodiment is realized.
即,本领域技术人员可以理解,实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。That is, those skilled in the art can understand that all or part of the steps in the method of the foregoing embodiments can be implemented by instructing relevant hardware through a program. The program is stored in a storage medium and includes several instructions to enable a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .
本领域的普通技术人员可以理解,上述各实施方式是实现本申请的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本申请的精神和范围。Those of ordinary skill in the art can understand that the above-mentioned embodiments are specific examples for realizing the present application, and in actual applications, various changes can be made in form and details without departing from the spirit and spirit of the present application. range.

Claims (16)

  1. 一种终端桌面内容的监控方法,包括:A method for monitoring terminal desktop content, including:
    接收为终端设置的针对终端桌面内容的录像策略;Receive the video recording strategy for the terminal's desktop content set for the terminal;
    将所述录像策略以及流媒体服务器的地址发送给所述终端,供所述终端根据所述录像策略对终端桌面内容进行实时录像,并将得到的所述终端桌面内容的录像数据上传至所述流媒体服务器。The recording strategy and the address of the streaming media server are sent to the terminal, so that the terminal can perform real-time recording of the terminal desktop content according to the recording strategy, and upload the obtained recording data of the terminal desktop content to the terminal flow media services.
  2. 根据权利要求1所述的终端桌面内容的监控方法,其中,在所述将所述录像策略以及流媒体服务器的地址发送给所述终端前,还包括:The method for monitoring the desktop content of a terminal according to claim 1, wherein before said sending the recording strategy and the address of the streaming media server to the terminal, the method further comprises:
    接收所述终端的登录请求;其中,所述登录请求包括所述终端的唯一编号和登陆密码;Receiving a login request of the terminal; wherein the login request includes a unique number and a login password of the terminal;
    根据所述终端的唯一编号和登陆密码检测所述终端是否为已注册终端;Detecting whether the terminal is a registered terminal according to the unique number and login password of the terminal;
    在判定所述终端为已注册终端后,向所述客户端发送临时密码;After determining that the terminal is a registered terminal, send a temporary password to the client;
    接收所述终端发送的验证请求,所述验证请求携带验证密码;Receiving a verification request sent by the terminal, where the verification request carries a verification password;
    根据所述验证密码与所述临时密码的匹配结果,判断所述终端是否鉴权通过。According to the matching result of the verification password and the temporary password, it is determined whether the terminal is authenticated.
  3. 根据权利要求2所述的终端桌面内容的监控方法,其中,所述在判定所述终端为已注册终端后,向所述客户端发送临时密码前,还包括:The method for monitoring terminal desktop content according to claim 2, wherein, after determining that the terminal is a registered terminal, before sending a temporary password to the client terminal, the method further comprises:
    向所述终端绑定的用户设备发送随机密码;Sending a random password to the user equipment bound to the terminal;
    接收所述终端发送的校验请求,所述校验请求携带校验密码;Receiving a verification request sent by the terminal, where the verification request carries a verification password;
    若所述校验密码与所述随机密码匹配,则再执行所述向所述客户端发送临时密码。If the verification password matches the random password, the sending of the temporary password to the client is performed again.
  4. 根据权利要求1所述的终端桌面内容的监控方法,其中,所述录像策略包括:定时录像策略和应用触发录像策略;其中,各录像策略分别对应一个优先级。The method for monitoring terminal desktop content according to claim 1, wherein the recording strategy includes: a timing recording strategy and an application-triggered recording strategy; wherein each recording strategy corresponds to a priority.
  5. 根据权利要求1至4中任一项所述的终端桌面内容的监控方法,其中,还包括:The method for monitoring terminal desktop content according to any one of claims 1 to 4, further comprising:
    当所述客户端为所述终端更新所述录像策略,向所述终端发送更新的录像策略;When the client updates the recording strategy for the terminal, sending the updated recording strategy to the terminal;
    或者,在当前时间与所述录像策略包含的录制时间的差值,小于预设门限时,向所述终端发送所述录像策略。Or, when the difference between the current time and the recording time included in the recording strategy is less than a preset threshold, the recording strategy is sent to the terminal.
  6. 一种终端桌面内容的监控方法,包括:A method for monitoring terminal desktop content, including:
    接收网络监控平台发送的针对终端桌面内容的录像策略以及流媒体服务器的地址;Receive the recording strategy for the terminal desktop content and the address of the streaming media server sent by the network monitoring platform;
    根据所述录像策略对终端桌面内容进行实时录像;Perform real-time recording of the terminal desktop content according to the recording strategy;
    将录像得到的所述终端桌面内容的录像数据上传至所述流媒体服务器,供所述流媒体服务器响应客户端针对所述录像数据的访问请求。Uploading the video data of the terminal desktop content obtained by video to the streaming media server for the streaming media server to respond to the client's request for access to the video data.
  7. 根据权利要求6所述的终端桌面内容的监控方法,其中,在所述接收网络监控平台发 送的针对终端桌面内容的录像策略以及流媒体服务器的地址后,还包括:The method for monitoring terminal desktop content according to claim 6, wherein after receiving the recording strategy for terminal desktop content and the address of the streaming media server sent by the network monitoring platform, the method further comprises:
    当接收到主动录像事件信号,对终端桌面内容进行实时录像,并将得到的录像数据上传至所述流媒体服务器。When an active recording event signal is received, the terminal desktop content is recorded in real time, and the obtained recording data is uploaded to the streaming media server.
  8. 根据权利要求7所述的终端桌面内容的监控方法,其中,所述主动录像事件信号根据对屏幕的预设操作生成得到。8. The method for monitoring terminal desktop content according to claim 7, wherein the active recording event signal is generated according to a preset operation on the screen.
  9. 根据权利要求6所述的终端桌面内容的监控方法,其中,在所述接收网络监控平台发送的针对终端桌面内容的录像策略以及流媒体服务器的地址前,还包括:The method for monitoring terminal desktop content according to claim 6, wherein before said receiving the recording strategy for terminal desktop content and the address of the streaming media server sent by the network monitoring platform, the method further comprises:
    向所述网络监控平台发送登录请求;其中,所述登录请求包括所述终端的唯一编号和登陆密码;Sending a login request to the network monitoring platform; wherein the login request includes the unique number and login password of the terminal;
    向所述网络监控平台发送验证请求,所述验证请求携带验证密码,供所述网络监控平台根据所述验证密码进行鉴权;其中,所述验证密码根据客户端通知的临时密码生成得到。Sending a verification request to the network monitoring platform, the verification request carrying a verification password, for the network monitoring platform to perform authentication according to the verification password; wherein the verification password is generated according to the temporary password notified by the client.
  10. 根据权利要求9所述的终端桌面内容的监控方法,其中,在所述向所述网络监控平台发送登录请求后,向所述网络监控平台发送验证请求前,还包括:The method for monitoring terminal desktop content according to claim 9, wherein after said sending a login request to the network monitoring platform, before sending a verification request to the network monitoring platform, the method further comprises:
    向所述网络监控平台发送校验请求,所述校验请求携带校验密码;其中,所述校验密码根据绑定的用户设备通知的随机密码生成得到。Sending a verification request to the network monitoring platform, the verification request carrying a verification password; wherein the verification password is generated according to a random password notified by the bound user equipment.
  11. 根据权利要求6至10中任一项所述的终端桌面内容的监控方法,其中,所述根据所述录像策略对终端桌面内容进行实时录像,包括:The method for monitoring terminal desktop content according to any one of claims 6 to 10, wherein said performing real-time recording of terminal desktop content according to said recording strategy comprises:
    若当前状态满足多个录像策略,则根据各录像策略的优先级执行优先级最高的录像策略;If the current state satisfies multiple recording strategies, the recording strategy with the highest priority will be executed according to the priority of each recording strategy;
    其中,所述录像策略包括:定时录像策略和应用触发录像策略,且各录像策略的优先级预先设定。Wherein, the recording strategy includes: a timing recording strategy and an application triggering recording strategy, and the priority of each recording strategy is preset.
  12. 根据权利要求6至10中任一项所述的终端桌面内容的监控方法,其中,所述将录像得到的所述终端桌面内容的录像数据上传至所述流媒体服务器后,还包括:The method for monitoring terminal desktop content according to any one of claims 6 to 10, wherein after uploading the video recording data of the terminal desktop content obtained by recording to the streaming media server, the method further comprises:
    将摄像头拍摄得到的视频流上传至所述流媒体服务器,供所述流媒体服务器将所述录像数据和所述视频流进行拼接,以供所述客户端访问。The video stream captured by the camera is uploaded to the streaming media server for the streaming media server to splice the video recording data and the video stream for the client to access.
  13. 一种网络监控平台,包括:A network monitoring platform, including:
    至少一个处理器;以及,At least one processor; and,
    与所述至少一个处理器通信连接的存储器;其中,A memory communicatively connected with the at least one processor; wherein,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求1至5中任一项所述的终端桌面内容的监控方法。The memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute any one of claims 1 to 5 The monitoring method of the terminal desktop content described above.
  14. 一种终端,包括:A terminal, including:
    至少一个处理器;以及,At least one processor; and,
    与所述至少一个处理器通信连接的存储器;其中,A memory communicatively connected with the at least one processor; wherein,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求6至12中任一项所述的终端桌面内容的监控方法。The memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute any one of claims 6 to 12 The monitoring method of the terminal desktop content described above.
  15. 一种终端桌面内容的监控系统,其中,包括:客户端、与所述客户端通信连接的如权利要求13所述的网络监控平台、与所述网络监控平台通信连接的至少一个如权利要求14所述的终端、以及与所述客户端和所述终端通信连接的流媒体服务器;A monitoring system for terminal desktop content, comprising: a client terminal, a network monitoring platform according to claim 13 that is communicatively connected with the client, and at least one of a communication connection with the network monitoring platform according to claim 14 The terminal, and a streaming media server communicatively connected with the client and the terminal;
    其中,所述流媒体服务器用于存储所述终端上传的录像数据;Wherein, the streaming media server is used to store the video data uploaded by the terminal;
    所述客户端用于在所述网络监控平台中为所述终端设置的针对终端桌面内容的录像策略,并访问所述流媒体服务器中存储的录像数据。The client is used to set a video recording strategy for the terminal desktop content in the network monitoring platform for the terminal, and access the video data stored in the streaming media server.
  16. 一种计算机可读存储介质,存储有计算机程序,其中,所述计算机程序被处理器执行时实现权利要求1至5中任一项所述的终端桌面内容的监控方法,或者,实现权利要求6至12中任一项所述的终端桌面内容的监控方法。A computer-readable storage medium storing a computer program, wherein when the computer program is executed by a processor, the method for monitoring the contents of a terminal desktop according to any one of claims 1 to 5 is implemented, or, claim 6 is implemented. The method for monitoring terminal desktop content described in any one of to 12.
PCT/CN2020/126588 2019-12-02 2020-11-04 Terminal desktop content monitoring method, platform, terminal, system and storage medium WO2021109786A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911214072.5A CN112995577A (en) 2019-12-02 2019-12-02 Method, platform, terminal, system and storage medium for monitoring terminal desktop content
CN201911214072.5 2019-12-02

Publications (1)

Publication Number Publication Date
WO2021109786A1 true WO2021109786A1 (en) 2021-06-10

Family

ID=76222080

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/126588 WO2021109786A1 (en) 2019-12-02 2020-11-04 Terminal desktop content monitoring method, platform, terminal, system and storage medium

Country Status (2)

Country Link
CN (1) CN112995577A (en)
WO (1) WO2021109786A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040155910A1 (en) * 2003-02-11 2004-08-12 Academia Sinica Real-time screen recording system
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN108509232A (en) * 2018-03-29 2018-09-07 北京小米移动软件有限公司 Screen recording method, device and computer readable storage medium
CN108600824A (en) * 2018-04-28 2018-09-28 维沃移动通信有限公司 A kind of record screen method and terminal device
CN109783328A (en) * 2017-11-13 2019-05-21 国网山东省电力公司烟台供电公司 A method of user's operation screen is recorded and played based on application filtering piecemeal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040155910A1 (en) * 2003-02-11 2004-08-12 Academia Sinica Real-time screen recording system
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN109783328A (en) * 2017-11-13 2019-05-21 国网山东省电力公司烟台供电公司 A method of user's operation screen is recorded and played based on application filtering piecemeal
CN108509232A (en) * 2018-03-29 2018-09-07 北京小米移动软件有限公司 Screen recording method, device and computer readable storage medium
CN108600824A (en) * 2018-04-28 2018-09-28 维沃移动通信有限公司 A kind of record screen method and terminal device

Also Published As

Publication number Publication date
CN112995577A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
US11122433B2 (en) Methods and systems for enhancing electronic device security by intercepting and analyzing a communication
US9135465B2 (en) System and method to provide server control for access to mobile client data
EP3691215A1 (en) Access token management method, terminal and server
EP2733909A1 (en) Terminal control method and device, and terminal
US8842810B2 (en) Emergency communications management
CN107241336B (en) Identity verification method and device
US10638422B2 (en) Data asset transfers via energy efficient communications
WO2018225642A1 (en) Face authentication system, face authentication method, biometric authentication system, biometric authentication method, and recording medium
CN107872440B (en) Identity authentication method, device and system
US20170164176A1 (en) Emergency Communications Management
CN111490981A (en) Access management method and device, bastion machine and readable storage medium
CN108123961A (en) Information processing method, apparatus and system
US20150020167A1 (en) System and method for managing files
CN114268461B (en) User identity authentication method, device, server, terminal and storage medium
AU2020200067A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
CN106992973A (en) The method and system of rights management are carried out to user terminal function
WO2021109786A1 (en) Terminal desktop content monitoring method, platform, terminal, system and storage medium
US20170091712A1 (en) Apparatus and Method for Employee Time Entry and Accounting
KR101331575B1 (en) Method and system blocking for detour hacking of telephone certification
CN113596600A (en) Security management method, device, equipment and storage medium for live broadcast embedded program
KR101370407B1 (en) System and method for driving security application
WO2018014555A1 (en) Data transmission control method and apparatus
WO2014040495A1 (en) Call processing method and device
US9094439B2 (en) End network decider
CN112953885B (en) Virtual private network login method and device and computer equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20895517

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20895517

Country of ref document: EP

Kind code of ref document: A1