CN102377857A - Method and device for accessing monitoring equipment - Google Patents

Method and device for accessing monitoring equipment Download PDF

Info

Publication number
CN102377857A
CN102377857A CN2010102644293A CN201010264429A CN102377857A CN 102377857 A CN102377857 A CN 102377857A CN 2010102644293 A CN2010102644293 A CN 2010102644293A CN 201010264429 A CN201010264429 A CN 201010264429A CN 102377857 A CN102377857 A CN 102377857A
Authority
CN
China
Prior art keywords
phone
module
authentication
request
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102644293A
Other languages
Chinese (zh)
Inventor
乔启盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vimicro Corp
Original Assignee
Vimicro Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vimicro Corp filed Critical Vimicro Corp
Priority to CN2010102644293A priority Critical patent/CN102377857A/en
Publication of CN102377857A publication Critical patent/CN102377857A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method and a device for accessing monitoring equipment. The device specifically comprises a telephone, a ringing detection module, an analogue off-hook module, a reception module, an acquisition module, an authentication module and a prompting module, wherein the ringing detection module is used for detecting the ringing of the telephone, and further, outputting an off-hook instruction to the analogue off-hook module when the ringing satisfies a first preset condition; the analogue off-hook module is used for carrying out telephone analogue off-hook when the off-hook instruction is received; the reception module is used for receiving telephone signaling data from a calling party after a call is connected, and further, converting the telephone signaling data into a digital form; the acquisition module is used for acquiring information of the calling party according to the telephone signaling data in the digital form; the authentication module is used for carrying out authentication on the corresponding calling party according to the information of the calling party; and the prompting module is used for converting pre-stored prompt voice data of service options into an analogue form after the authentication is authenticated, and further, outputting through the telephone. The method and the device are used for lowering the potential safety hazard in the access of the monitoring equipment.

Description

A kind of method and apparatus of access monitoring equipment
Technical field
The present invention relates to the monitoring technique field, particularly relate to a kind of method and apparatus of access monitoring equipment.
Background technology
At present along with the extensive development of digital technology, monitoring trade also by conventional analogueization to the digitlization transition.
Existing watch-dog generally comprises web camera (IP Camera, Internet ProtocolCamera), digital video recorder (DVR, Digital Video Recorder) etc.; These watch-dogs can capturing video; And main passing through based on transmission control protocol/internet interconnection protocol (TCP/IP; Transmission Control Protocol/Internet Protocol) Internet net and authorized user carry out alternately; Thereby make the authorized user can be through the Internet net in this locality or remote site is watched in real time, storage and managing video data, and, the parameter of configuration monitoring equipment etc.; Wherein, said Internet net can be networks such as local area network (LAN), Internet or wireless network.
But above-mentioned mutual based on Internet net makes third party's heterogeneous pattern interior than the route that is easier to utilize Internet, gateway node or ethernet local area network listen to said interactive information easily, thereby brings potential safety hazard to the visit of watch-dog.
In a word, need the urgent technical problem that solves of those skilled in the art to be exactly: the potential safety hazard that how can reduce the watch-dog visit.
Summary of the invention
Technical problem to be solved by this invention provides a kind of method and apparatus of access monitoring equipment, in order to reduce the potential safety hazard of watch-dog visit.
In order to address the above problem, the invention discloses a kind of device of access monitoring equipment, comprising:
Phone;
The ring detection module is used to detect phone ringing, and when it satisfies first prerequisite, to the instruction of said simulation off-hook module output off-hook;
Simulation off-hook module is used for when receiving the off-hook instruction, carries out phone simulation off-hook;
Receiver module is used for behind closing of the circuit, receives the telephone signaling data from the calling party, and is converted into digital form;
Acquisition module is used for the telephone signaling data according to digital form, obtains caller party information;
Authentication module is used for according to said caller party information the corresponding call user being carried out authentication; And
Reminding module is used for after authentication is passed through, and converts the service option prompting voice data of storing in advance into analog form, and through phone output.
On the other hand, the invention also discloses a kind of method of access monitoring equipment, comprising:
When phone ringing satisfies first prerequisite, carry out phone simulation off-hook;
Behind closing of the circuit, receive telephone signaling data, and be converted into digital form from the calling party;
According to the telephone signaling data of digital form, obtain caller party information;
According to said caller party information, the corresponding call user is carried out authentication;
After authentication is passed through, convert the prompting voice data of storing in advance into analog form, and through phone output.
Compared with prior art, the present invention has the following advantages:
The present invention adopts telephone channel to realize the visit of user to watch-dog; Because telephone channel itself has the fail safe that slightly is superior to the digital network passage; And; Said visit can be according to the caller party information of obtaining through said telephone channel; Carry out subscription authentication,, thereby further improve the fail safe that watch-dog is visited with misoperation or the malicious operation that prevents other people.
Moreover when in said caller party information, comprising the service option request, the present invention can also handle to said service option request; For example, through said telephone channel, accomplish the configuration of network password alternately with the calling party, and for example, according to the Long-distance Control request, the output control command is operated to control said watch-dog accordingly, or the like.
On the other hand, as the another kind of means of access monitoring equipment, can this telephone channel be used in combination with existing digital network passage; Suppose that current calling party through telephone channel, has sent the Video Capture request of closing, so; After this request is processed; When other users pass through Internet access monitoring equipment,, also can't see real-time video even passed through authentication; Therefore, said being used in combination can be strengthened the visit of watch-dog protection.
Description of drawings
Fig. 1 is the structure chart of the device embodiment of a kind of access monitoring equipment of the present invention;
Fig. 2 is the flow chart of the method embodiment of a kind of access monitoring equipment of the present invention.
Embodiment
For make above-mentioned purpose of the present invention, feature and advantage can be more obviously understandable, below in conjunction with accompanying drawing and embodiment the present invention done further detailed explanation.
One of core idea of the embodiment of the invention is, utilizes the telephone channel of PSTN (PSTN, Public Switched Telephone Network) to realize the visit of user to watch-dog; On the one hand, the fail safe of telephone channel slightly is superior to the digital network passage, on the other hand, as the another kind of means of access monitoring equipment, can this telephone channel be used in combination with existing digital network passage, to strengthen the visit protection to watch-dog.
With reference to Fig. 1, show the device embodiment of a kind of access monitoring equipment of the present invention, it is characterized in that, comprising:
Phone 101;
Ring detection module 102 is used to detect phone ringing, and when it satisfies first prerequisite, to said simulation off-hook module 103 output off-hook instructions;
Simulation off-hook module 103 is used for when receiving the off-hook instruction, carries out phone simulation off-hook;
Receiver module 104 is used for behind closing of the circuit, receives the telephone signaling data from the calling party, and is converted into digital form;
Acquisition module 105 is used for the telephone signaling data according to digital form, obtains caller party information;
Authentication module 106 is used for according to said caller party information the corresponding call user being carried out authentication; And
Reminding module 107 is used for after authentication is passed through, and converts the service option prompting voice data of storing in advance into analog form, and through phone output.
Respectively above-mentioned module is elaborated below.
Phone 101,
Phone 101 is mainly used in the telephone signaling data that the receipt of call user sends from far-end through telephone network (like PSTN), and, send the speech data of storage in advance through telephone network to the calling party; Wherein, can comprise caller party information such as caller ID, user's input in the said telephone signaling data, the said speech data of storage in advance is mainly used in the prompting user and how operates, and like the service option prompting voice data etc., can make things convenient for user capture.
Further, said user's input can be the information that the user passes through button or phonetic entry, imports phone password, service option request etc. like the user, and the present invention does not limit concrete user's input information.
This phone 101 has no difference with plain old telephone on function and structure, this makes present embodiment have good versatility, can satisfy the user and use home phone number or enterprise phone that watch-dog is carried out remote access needs.
Ring detection module 102,
When the calling party uses phone when the phone 101 of the described local side of present embodiment dials from far-end; If phone ringing occurs; 102 of said ring detection modules can convert bell signal to square wave; Because ring each time just produces square wave one time, can confirm ringing number according to the square wave number of continuous appearance; When said ringing number satisfies first prerequisite (for example, reaching pre-determined number), judge that then this incoming call is the access request to watch-dog, therefore, can be to said simulation off-hook module 103 output off-hook instructions.
Simulation off-hook module 103,
Said simulation off-hook module 103 is mainly used in action and realizes the simulation off-hook; A kind of implementation can for, insert suitable resistance at the telephone wire two ends, the electric current that passes through when making electric current that telephone wire passes through with off-hook is identical; Then stored-program control exchange is connected telephone line after detecting this electric current variation.
Behind closing of the circuit, receiver module 104 just can pass through the telephone signaling data that phone 101 receives from the calling party, and reminding module 107 promptly can be sent to speech data the calling party place of far-end through phone 101.
Yet, in view of the purpose of present embodiment is to reduce the potential safety hazard of watch-dog visit, be misoperation or the malicious operation that prevents other people, so being provided with authentication module 106, the present invention carries out authentication; Like this, before authentication was passed through, reminding module 107 can only send some specific speech datas in case stopping leak is close, like " welcoming access monitoring equipment etc. ", perhaps, did not send speech data; But after authentication is passed through, could normally send speech data.
Receiver module 104 and acquisition module 105,
In reality, caller party information such as caller ID, user's input can be passed through phone transmission to receiver module 104, and convert these caller party information into digital form from analog form.
For example, acquisition module 105 can obtain caller ID according to said telephone signaling data, supplies authentication module 106 to use.
And for example, after authentication was passed through, acquisition module 105 can be according to said telephone signaling data, obtained the user of user through button or phonetic entry and imported phone password, service option request etc., supplied modules such as authentication module 106, reminding module 107 to use.
Authentication module 106,
When said caller party information can also comprise caller ID, can carry out authentication according to this caller ID.
At this moment, can in said authentication module 106, design:
Judging unit A is used to judge whether the current call number satisfies second prerequisite, if then this calling party passes through authentication.
For example, can pass through the local area network computer, in current watch-dog, white list is set, like this, said second prerequisite can for, the current call number is in the white list that presets.
And for example, can pass through the local area network computer, in current watch-dog, blacklist is set, like this, said second prerequisite can for, the current call number is not in the blacklist that presets.
Be appreciated that above-mentioned just example, those skilled in the art can use white list and blacklist as required simultaneously, perhaps adopt other method for authenticating, and the present invention does not limit this.
Further, after said caller ID is through checking, second layer authentication can also be set;
Particularly, when said caller party information can also comprise that the user imports the phone password;
Said authentication module 106 can also comprise:
The first Tip element B1 is used for when the current call number satisfies second prerequisite, converting the prompting voice data of importing the phone password into analog form, exports through phone;
The first receiving element B2, the user who is used to receive from said acquisition module imports the phone password;
Authentication unit B3 is used for said user is imported the phone password verifying according to presetting the phone password, if coincide, then current calling party passes through authentication.
Reminding module 107,
In the present embodiment; Reminding module 107 mainly is the service option prompting voice data through the speech data that phone 101 transmits, and these service option prompting voice data can adopt the storage organization of tree hierarchy, after authentication is passed through; Root level menu is exported to the calling party; Like this, when calling party's answer was non-leaf level node, reminding module 107 still can be exported non-leaf level menu and give the calling party.
In a kind of preferred embodiment of the present invention, said device can also comprise:
Processing module is used for handling to the service option request of said caller party information.
The storage organization of corresponding above-mentioned tree hierarchy if calling party's answer is a leaf level node, shows that then said answer is the service option request, and at this moment, said processing module then can be to handling from the service option request of said acquisition module 105.
For example, when said service option request can comprise network password configuring request,
Said processing module specifically can comprise:
The second receiving element C1 is used to receive the network password configuring request from said acquisition module 105;
Network password dispensing unit C2 is used for according to said network password configuring request, the password of configure user during through the access to netwoks watch-dog.
Be appreciated that present embodiment can also provide public network ip the query requests of address, wherein, said public network ip visits the public network ip address of current watch-dog for the user in the address through Internet; Like this, processing module can be obtained this ip address according to this query requests, and feeds back to the calling party by reminding module 107 with voice mode.
And for example, when said service option request can comprise the Long-distance Control request,
Said processing module specifically can comprise following cellular construction:
The 3rd receiving element D1 is used to receive the Long-distance Control request from said acquisition module;
Control unit D2 is used for according to said Long-distance Control request, and the output control command is operated to control said watch-dog accordingly.
In reality, said Long-distance Control request can comprise the opening/closing Video Capture, the opening/closing mobile detection; Opening/closing is reported to the police; Opening/closing video recording etc.
Suppose that control unit D2 handles to calling party's the Video Capture request of closing, and when other users are through Internet access monitoring equipment so, even passed through authentication, also can't see real-time video.
For making those skilled in the art understand the present invention better, below pass through the course of work of the device of example description access monitoring equipment, specifically can comprise:
When ring appears in the phone 102 of step S1, local side; Said ring detection module 102 converts bell signal to square wave; And judge the square wave number that occurs continuously, if it equals 10, judge that then this incoming call is the access request to watch-dog; Therefore, simulation off-hook module 103 output off-hook instructions;
Step S2, simulation off-hook module 103 are simulated off-hook;
Step S3, behind closing of the circuit, receiver module 104 receives the telephone signaling data from the calling party;
Step S4, acquisition module 105 obtain caller ID according to said telephone signaling data;
Step S5, authentication module 106 are judged the current call number whether in the white list that presets, if, execution in step S6 then;
Step S6, the prompting voice data that will import the phone password convert analog form into, export through phone;
Step S7, receiver module 104 receive the user and import the phone password;
Step S8, said user is imported the phone password verify according to presetting the phone password, if coincide, then current calling party passes through authentication;
Step S9, reminding module 107 transmit the service option prompting voice data through phone 101;
For example, the service option prompting voice data can comprise: obtain the public network ip address of equipment, please by 1#; Close external displaying video function, please by 2#.
Step S10, if calling party's answer is the service option request, then processing module is to handling from the service option request of said acquisition module 105.
With above-mentioned service option prompting voice data is example, lets call user click in proper order 1 with the # button, processing module will be obtained local public network ip address and offer the user with voice mode; Perhaps, the user click in proper order 2 with the # button, processing module stops video with the control of video correlation module, and with the voice mode user video closed condition of prompting this moment.
Need to prove that the storage organization of above-mentioned tree hierarchy is as an example, those skilled in the art can adopt other storage organizations to preserve the service option prompting voice data as required, and the present invention does not limit this.
In addition, except voice pathway, the phone 101 of present embodiment can also have the function of digital network passage concurrently.Be connected to example with family comprehensive service digital network (ISDN, Integrated Services Digital Network) network, through a phone, the user both can connect and make a phone call, and also can visit Internet.Therefore as user during, just can utilize the telephone channel of this phone to visit/to control watch-dog at far-end.
Embodiment is corresponding with aforementioned means, and the present invention also provides a kind of method embodiment of access monitoring equipment, with reference to Fig. 2, specifically can comprise:
Step 201, when phone ringing satisfies first prerequisite, carry out phone simulation off-hook;
In reality, said first prerequisite can for, the number of times of phone ringing reaches pre-determined number.
Step 202, behind closing of the circuit, receive telephone signaling data, and be converted into digital form from the calling party;
Step 203, according to the telephone signaling data of digital form, obtain caller party information;
Step 204, the said caller party information of foundation are carried out authentication to the corresponding call user;
Be misoperation or the malicious operation that prevents other people, reduce the potential safety hazard of watch-dog visit, the present invention carries out authentication to the calling party.
In a kind of preferred embodiment of the present invention, said caller party information can comprise caller ID;
At this moment, said step 204 can comprise:
Judge whether the current call number satisfies second prerequisite, if then this calling party passes through authentication.
For example, said second prerequisite can comprise that the current call number is in the white list that presets, and/or the current call number is not in the blacklist that presets.
Further, after said caller ID is through checking, second layer authentication can also be set;
At this moment, said caller party information can also comprise that the user imports the phone password;
Said step 204 can also comprise:
When the current call number satisfies second prerequisite, convert the prompting voice data of importing the phone password into analog form, export through phone;
The user is imported the phone password verify according to presetting the phone password, if coincide, then current calling party passes through authentication.
Step 205, after authentication is passed through, convert the prompting voice data of storage in advance into analog form, and through phone output.
In a kind of preferred embodiment of the present invention, said caller party information can also comprise the service option request;
Said method can also comprise: handle to said service option request.
In reality, the calling party can send various service option requests according to various prompting voice data.
For example, when in said service option request, comprising network password configuring request, said processing specifically can comprise: according to said network password configuring request, and the password of configure user during through the access to netwoks watch-dog.
And for example, when in said service option request, comprising the Long-distance Control request, said processing can comprise: according to said Long-distance Control request, the output control command is operated to control said watch-dog accordingly.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed all is and the difference of other embodiment that identical similar part is mutually referring to getting final product between each embodiment.For method embodiment, because it is similar basically with device embodiment, so description is fairly simple, relevant part gets final product referring to the part explanation of device embodiment.
More than to the method and apparatus of a kind of access monitoring equipment provided by the present invention; Carried out detailed introduction; Used concrete example among this paper principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that on embodiment and range of application, all can change, in sum, this description should not be construed as limitation of the present invention.

Claims (15)

1. the device of an access monitoring equipment is characterized in that, comprising:
Phone;
The ring detection module is used to detect phone ringing, and when it satisfies first prerequisite, to the instruction of said simulation off-hook module output off-hook;
Simulation off-hook module is used for when receiving the off-hook instruction, carries out phone simulation off-hook;
Receiver module is used for behind closing of the circuit, receives the telephone signaling data from the calling party, and is converted into digital form;
Acquisition module is used for the telephone signaling data according to digital form, obtains caller party information;
Authentication module is used for according to said caller party information the corresponding call user being carried out authentication; And
Reminding module is used for after authentication is passed through, and converts the service option prompting voice data of storing in advance into analog form, and through phone output.
2. device as claimed in claim 1 is characterized in that said caller party information comprises caller ID;
Said authentication module comprises:
Judging unit is used to judge whether the current call number satisfies second prerequisite, if then this calling party passes through authentication.
3. device as claimed in claim 2 is characterized in that, said caller party information comprises that also the user imports the phone password;
Said authentication module also comprises:
First Tip element is used for when the current call number satisfies second prerequisite, converting the prompting voice data of importing the phone password into analog form, exports through phone;
First receiving element, the user who is used to receive from said acquisition module imports the phone password;
Authentication unit is used for said user is imported the phone password verifying according to presetting the phone password, if coincide, then current calling party passes through authentication.
4. like each described device in the claim 1 to 3, it is characterized in that said caller party information comprises the service option request;
Said device also comprises:
Processing module is used for handling to said service option request.
5. device as claimed in claim 4 is characterized in that, said service option request package includes network password configuring request;
Said processing module comprises:
Second receiving element is used to receive the network password configuring request from said acquisition module;
Network password dispensing unit is used for according to said network password configuring request, the password of configure user during through the access to netwoks watch-dog.
6. device as claimed in claim 4 is characterized in that, said service option request comprises the Long-distance Control request;
Said processing module comprises:
The 3rd receiving element is used to receive the Long-distance Control request from said acquisition module;
Control unit is used for according to said Long-distance Control request, and the output control command is operated to control said watch-dog accordingly.
7. like claim 2 or 3 described devices, it is characterized in that said second prerequisite is that the current call number is in the white list that presets.
8. like each described device in the claim 1 to 3, it is characterized in that said first prerequisite is that the number of times of phone ringing reaches pre-determined number.
9. the method for an access monitoring equipment is characterized in that, comprising:
When phone ringing satisfies first prerequisite, carry out phone simulation off-hook;
Behind closing of the circuit, receive telephone signaling data, and be converted into digital form from the calling party;
According to the telephone signaling data of digital form, obtain caller party information;
According to said caller party information, the corresponding call user is carried out authentication;
After authentication is passed through, convert the prompting voice data of storing in advance into analog form, and through phone output.
10. method as claimed in claim 9 is characterized in that said caller party information also comprises caller ID;
The said caller party information of said foundation, the step to the corresponding call user carries out authentication comprises:
Judge whether the current call number satisfies second prerequisite, if then this calling party passes through authentication.
11. method as claimed in claim 10 is characterized in that, said caller party information comprises that the user imports the phone password;
The said caller party information of said foundation, the step to the corresponding call user carries out authentication also comprises:
When the current call number satisfies second prerequisite, convert the prompting voice data of importing the phone password into analog form, export through phone;
The user is imported the phone password verify according to presetting the phone password, if coincide, then current calling party passes through authentication.
12., it is characterized in that said caller party information comprises the service option request like each described method in the claim 9 to 11;
Said method also comprises:
Handle to said service option request.
13. method as claimed in claim 12 is characterized in that, said service option request package includes network password configuring request;
Saidly carry out processed steps to said service option request, comprising:
According to said network password configuring request, the password of configure user during through the access to netwoks watch-dog;
Perhaps, said service option request comprises the Long-distance Control request;
Saidly carry out processed steps to said service option request, comprising:
According to said Long-distance Control request, the output control command is operated to control said watch-dog accordingly.
14., it is characterized in that said second prerequisite is that the current call number is in the white list that presets like claim 10 or 11 described methods.
15., it is characterized in that said first prerequisite is that the number of times of phone ringing reaches pre-determined number like each described method in the claim 9 to 11.
CN2010102644293A 2010-08-26 2010-08-26 Method and device for accessing monitoring equipment Pending CN102377857A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102644293A CN102377857A (en) 2010-08-26 2010-08-26 Method and device for accessing monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102644293A CN102377857A (en) 2010-08-26 2010-08-26 Method and device for accessing monitoring equipment

Publications (1)

Publication Number Publication Date
CN102377857A true CN102377857A (en) 2012-03-14

Family

ID=45795801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102644293A Pending CN102377857A (en) 2010-08-26 2010-08-26 Method and device for accessing monitoring equipment

Country Status (1)

Country Link
CN (1) CN102377857A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469037A (en) * 2014-12-03 2015-03-25 国网四川雅安电力(集团)股份有限公司 Internet of things remote control system and method applied to power field

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1520136A (en) * 2003-01-24 2004-08-11 英保达股份有限公司 Remote monitoring and controlling method and system based on telephone network
US20050286686A1 (en) * 2004-06-28 2005-12-29 Zlatko Krstulich Activity monitoring systems and methods
CN1874494A (en) * 2005-12-21 2006-12-06 华为技术有限公司 Remote range system and method of monitoring and controlling video
CN201199725Y (en) * 2008-02-28 2009-02-25 惠州市德赛工业发展有限公司 Wireless video monitoring apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1520136A (en) * 2003-01-24 2004-08-11 英保达股份有限公司 Remote monitoring and controlling method and system based on telephone network
US20050286686A1 (en) * 2004-06-28 2005-12-29 Zlatko Krstulich Activity monitoring systems and methods
CN1874494A (en) * 2005-12-21 2006-12-06 华为技术有限公司 Remote range system and method of monitoring and controlling video
CN201199725Y (en) * 2008-02-28 2009-02-25 惠州市德赛工业发展有限公司 Wireless video monitoring apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469037A (en) * 2014-12-03 2015-03-25 国网四川雅安电力(集团)股份有限公司 Internet of things remote control system and method applied to power field

Similar Documents

Publication Publication Date Title
US7466978B1 (en) Telephone network node device
CN103118306B (en) Building conversational system and ladder-port machine thereof use the method for Phonetically door-opening
CN105447938A (en) Door control visual intercom service system and control method thereof
CN103313024A (en) Visible intercom system and method for buildings
CN101938625A (en) Video conference system and realization method thereof
CN101695100A (en) Intelligent household security system and control method thereof
CN103326937A (en) Intelligent gateway equipment based on multi-network integration and community management intercom system
RU2648968C2 (en) Method and system making use of a home gateway and a smartphone to make a cordless telephone call
MXPA00012899A (en) Remote monitoring through the brg.
US7289789B2 (en) Wireless communications device and method for use with telephone network edge node providing privacy
CN101833805A (en) Access control system with remote call
CN104580984A (en) Visual intercom access control system based on standard communication protocols
CN101026636A (en) Dual-channel communication terminal and its system, communication method using said terminal and long distance control method
US6704567B1 (en) Wireless communications device and method
CN106170078A (en) A kind of satellite long-distance intelligent broadcast system and operational approach
CN206672194U (en) Intelligent access control system
CN106603994A (en) Electronic doorbell interception and break-in management apparatus and method
CN107172620A (en) A kind of wireless local area network (WLAN) verification method and apparatus
CN105227794A (en) There is the VOIP telephone system of internal switch function and management function
CN102045541A (en) Methods, platform, server and system for realizing video monitoring service
CN102377857A (en) Method and device for accessing monitoring equipment
US6690933B1 (en) Sharing of wirelines using a network node device
US7116971B2 (en) Configuring and maintaining network node device
CN110445938A (en) Implementation method, device and the electronic equipment of calling
CN203387630U (en) Building intercom system based on IP technology and IMS network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120314