CN105515846B - Client-based NVR configuration method and system - Google Patents

Client-based NVR configuration method and system Download PDF

Info

Publication number
CN105515846B
CN105515846B CN201510868463.4A CN201510868463A CN105515846B CN 105515846 B CN105515846 B CN 105515846B CN 201510868463 A CN201510868463 A CN 201510868463A CN 105515846 B CN105515846 B CN 105515846B
Authority
CN
China
Prior art keywords
nvr
client
binding
bound
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510868463.4A
Other languages
Chinese (zh)
Other versions
CN105515846A (en
Inventor
关春天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Uniview Technologies Co Ltd
Original Assignee
Zhejiang Uniview Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Uniview Technologies Co Ltd filed Critical Zhejiang Uniview Technologies Co Ltd
Priority to CN201510868463.4A priority Critical patent/CN105515846B/en
Publication of CN105515846A publication Critical patent/CN105515846A/en
Application granted granted Critical
Publication of CN105515846B publication Critical patent/CN105515846B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of client-based NVR configuration method, binding path is established with NVR after establishing link information detect that NVR sends including client, further includes: client sends logging request to NVR by binding path;NVR receives the binding information that client is judged whether there is after logging request: if there is no, login password authentication is then carried out between client and NVR, is only logged in NVR by binding path by client when being verified and is stored in binding information and completes to bind on NVR;If it is present client scan obtains the graphic form random cipher of NVR generation, and the matching of random cipher is carried out by binding path and is logged in after successful match.The invention also discloses corresponding NVR to configure system, the invention has the advantages that, it ensure that safety while fast logging in NVR.

Description

Client-based NVR configuration method and system
Technical field
The present invention relates to technical field of video monitoring more particularly to client-based NVR configuration methods and system.
Background technique
NVR (Network Video Recorder, i.e. network hard disk video recorder) most important function is connect by network The digital video bit stream of IPC (web camera) equipment transmission is received, and stored, managed, to realize networking bring Distributed structure/architecture advantage.
NVR is connected to display screen, the multiple nets that can be watched simultaneously by NVR, browse, play back, managing, store access NVR Network video camera.In the prior art, each user will log in NVR and configure or increase IPC, require by being manually entered The account and password login NVR of NVR is configured accordingly, needs user to remember account and corresponding password, if password is set Set it is too simple be easy to be cracked and can not guarantee safety, if setting password it is more complex, it is right although ensuring safety property It is sufficiently complex for the process of login configurations, and if forgotten Password, only look for manufacturer resetting NVR to match to be restored to default It sets and just can be carried out corresponding configuration, this makes the configuration of NVR very not convenient.The prior art, which exists, passes through client scan figure The random cipher of form (such as quick response code form) carries out the technology of register, if generated on NVR graphic form with Secret code, is scanned by client, client by scanning obtain random cipher directly match with NVR thus log in NVR into Row configuration, although this mode is very quick convenient, the display of figure be it is disclosed, any client can be by sweeping Mode is retouched to log in NVR, this allows for this login mode and there is very big hidden danger.
Therefore, guarantee safety while can quickly and easily log on to and be configured on NVR, be that the prior art needs It solves the problems, such as.
Summary of the invention
It is of the existing technology in order to solve the problems, such as, the configuration method of NVR a kind of is now provided, so that the mistake of configuration NVR Journey is simplified.
A kind of client-based NVR configuration method, including client obtain from NVR establish link information after Binding path is established with the NVR, further includes:
The client sends logging request to NVR by the binding path;
The NVR receives the binding information that the client is judged whether there is after logging request: if it does not exist, then Login password authentication is carried out between the client and the NVR, in the case where being verified, client passes through the binding Path logs in the NVR, and binding information is saved on NVR to complete binding;If it is present NVR, which is received, comes from user Instruction generate random cipher and be converted to figure and shown, client is obtained described random by the shown figure of scanning Password simultaneously sends random cipher to the NVR by the binding path, by the NVR carry out random cipher matching and match at Allow the client to log in after function, wherein NVR only allow in the case where there being binding information with the client bound into The matching of row random cipher.
Present invention utilizes clients to carry out graph scanning, matches to simplify and carry out client login by login password The process set, so that configuration process is simpler, configuration process is for example, changing the equipment order accessed and combination, checking difference Video image, carry out change of secret code etc..Meanwhile in order to guarantee safety, if client is not bound with NVR, tying up When logging in front of fixed, login password is inputted on NVR, only login password, which inputs in correct situation, can just save binding letter Breath, and could be logged in using graph scanning in the case that NVR only saves binding information, this ensures that only defeated to login The client of password could carry out graph scanning as trusted client to log in, even if other clients being capable of scanning figure Shape can not also carry out subsequent password match, ensure that safety.After using account number cipher binding at that time, the NVR later period can Can change password, if it is subsequent using login password as the password that logs in every time after binding, all needed after having changed every time The input for re-starting login password, is unable to reach the purpose fast logged in, and the present invention by generate graphic form with Secret code can guarantee safety while quick login configurations.Moreover, being matched if directly logging in NVR after binding It sets, if after a NVR is connected with multiple client, multiple client directly logs in simultaneously, may cause NVR repeat logon, from And generate relevant login problem.By the way that two dimensional code is arranged, considers above-mentioned extreme case, prevent arbitrarily login configurations.
Furthermore, when the NVR is there are after at least one client, only permitted at least one client bound Can when allow other clients detect it is described can establish link information, in the client license bound without any one In the case of the client that only allows to have bound detect and described can establish link information.
After NVR binds client, the client bound just is used as trust client, only trust client Authorization can detect that this mode, which allows, obtains login password and graphic form by some modes even if client Random cipher, permitted without trusted client, login configurations can not be also carried out, to increase configuration method Safety.
Furthermore, the client for having bound NVR sends unbinding signal, bound NVR to bound NVR The binding information of corresponding client is deleted after receiving unbinding signal, and counts the remaining client bound of the NVR End number: if number is zero, all clients is allowed to detect that the NVR's establishes link information;Otherwise, without appointing What one client for only allowing to have bound in the case where having bound client license can establish link information described in detecting.
After client unbundlings, show that the client has been cancelled configuration authorization, original client binding information is deleted It removes, at this time if NVR has carried out the change of the setting of the key such as login password, even if the client originally bound is stepped on It records password, can not also set up binding path with NVR due to cannot get NVR authorization, i.e., it is enabled further to obtain graphic form Random cipher can not also be matched with NVR by binding path and carry out login configurations, therefore avoided unwarranted client and step on Record configuration, to further ensure the safety of NVR configuration.
Furthermore, the binding path is bluetooth connection, and that binds path establishes mode are as follows:
What the client that need to log in the NVR detected that the NVR issues establishes bluetooth connection information, and is detecting it Preliminary connection is established afterwards;
The NVR is interacted with the client by tentatively connecting to generate respective key, and will be respective close Key is compared, and the foundation of the bluetooth connection is completed in the case where key agreement.
Binding path can be wherein established between NVR and client in several ways, such as Wi-Fi connection, bluetooth connect It connects, infrared connection etc., and bluetooth can be stably connected in short distance connection with multiple client, and be easily achieved, And in the case where being realized with bluetooth, only client can just configure NVR from the closer distance range of NVR, avoid remote Journey manipulates brought insecurity factor.
Furthermore, the figure that the NVR is generated is two dimensional code, and the client bound passes through established binding road The method that diameter is logged in includes:
The two dimensional code that random cipher caused by the NVR is converted to is scanned, and two dimensional code is converted into password again;
By password after conversion by established binding path transmission to the NVR, by the NVR by the received password of institute It is matched with itself random cipher generated, allows client to log in after successful match.
Existing client such as mobile phone or tablet computer etc. usually all have the function of two-dimensional code scanning, therefore use two Dimension code mode carries out the generation and scanning and matching of random cipher, can carry out to existing customer end real in the case where minimum change The goal of the invention that existing safety convenient of the present invention logs in.
Furthermore, the figure that NVR is generated is two dimensional code, and the NVR configuration method further includes having bound the visitor of NVR Family end is configured change to NVR, and the specific method that change is arranged includes:
The client sends setting change signal to bound NVR after login;
Bound NVR generates random cipher after receiving setting change signal and is converted to two dimensional code;
The client obtains the random cipher by scanning the two dimensional code, and with generated on bound NVR Random cipher matches, and carries out corresponding setting to bound NVR after successful match and changes.
When user needs to carry out the setting change of the key messages such as login password, it is common practice to need to input login Password is modified, and main purpose is, prevents unwarranted client from carrying out arbitrarily change of secret code, and this way is led Family of applying needs to remember login password, under password excessively complex situations, if user forgets Password, can only be carried out just by manufacturer Beginning state is restored, so that the modification of key message is inconvenient, and actually client itself has been trust client, leads to Two-dimensional code scanning change is crossed, even if then user is made to forget Password, two-dimensional code scanning is also can use and is modified.
Using method of the invention, the present invention also provides corresponding clients to carry out corresponding NVR configuration.
A kind of client-based NVR configuration system, the connection unit including client, for detecting NVR transmission Establish and establish binding path after link information with the NVR, which is characterized in that further include login unit, the visitor of client Graph scanning unit, the binding judging unit of NVR and the graphics generation unit of NVR at family end;Wherein,
Unit is logged in be used to send log-on message to NVR by the binding path;
The binding judging unit receives the binding information that the client is judged whether there is after logging request: if It is not present, then carries out login password authentication between the login unit and the NVR, in the case where NVR is verified, log in Unit logs in the NVR by the binding path and sends and saves on binding information to NVR for NVR to complete to bind;If In the presence of graphics generation unit receives instruction generation random cipher from the user and is converted to figure and shown, then client Random cipher is obtained by figure shown by graph scanning unit scan and is sent by login unit by the binding path Random cipher logs in NVR after NVR carries out the matching of random cipher and successful match to the NVR.
Present invention utilizes graph scannings, so that the process that client login configurations are carried out by login password is simplified, So that configuration process is simpler, meanwhile, in order to guarantee safety, if client is not bound with NVR, logged in front of binding When, login password is inputted on NVR, only login password, which inputs in correct situation, can just save binding information, and NVR is only It could be logged in using graph scanning in the case where saving binding information, this ensures that the only defeated client to login password End could be used as trusted client progress graph scanning to log in, though other clients can scanning patter, can not yet Subsequent password match is carried out, ensure that safety.After using account number cipher binding at that time, the NVR later period may be changed Password, if it is subsequent using login password as the password that logs in every time after binding, required after having changed every time again into The input of row login password is unable to reach the purpose fast logged in, and the present invention can by generating the random cipher of graphic form To guarantee safety while quick login configurations.Moreover, configured if directly logging in NVR after binding, if one After NVR with Duo Tai mobile phone connects, more mobile phones directly log in simultaneously in APP, may cause NVR repeat logon, to generate phase The login problem of pass.By the way that two dimensional code is arranged, considers above-mentioned extreme case, prevent arbitrarily login configurations.
It furthermore, further include the binding licence units of client, after the NVR binds at least one client, Only to can described in other unbound clients transmissions when the binding licence units license of client bound at least one Link information is established, is detected having bound the client for only allowing to have bound in the case where client license without any one It is described to establish link information.
After client unbundlings, show that the client has been cancelled configuration authorization, original client binding information is deleted It removes, at this time if NVR has carried out the change of the setting of the key such as login password, even if the client originally bound is stepped on It records password, can not also set up binding path with NVR due to cannot get NVR authorization, i.e., it is enabled further to obtain graphic form Random cipher can not also be matched with NVR by binding path and carry out login configurations, therefore avoided unwarranted client and step on Record configuration, to further ensure the safety of NVR configuration.
It furthermore, further include the unbinding unit of client, for sending unbinding letter to bound NVR Number, bound NVR deletes the binding letter of corresponding client after receiving the unbinding signal that unbinding unit is sent Breath, and count remaining binding client number: if number is zero, all clients is made to detect that the connection is established Request can establish link information;Otherwise, only allow to have bound in the case where having bound client license without any one Client can establish link information described in detecting.
After client unbundlings, show that the client has been cancelled configuration authorization, original client binding information is deleted It removes, at this time if NVR has carried out the change of the setting of the key such as login password, even if the client originally bound is stepped on It records password, can not also set up binding path with NVR due to cannot get NVR authorization, i.e., it is enabled further to obtain graphic form Random cipher can not also be matched with NVR by binding path and carry out login configurations, therefore avoided unwarranted client and step on Record configuration, to further ensure the safety of NVR configuration.
Furthermore, the binding path that the connection unit is established is bluetooth connection, and the connection unit is established Bind the mode in path are as follows:
That detects the NVR transmission establishes bluetooth connection information, and establishes preliminary connection after detection;
It is interacted by the NVR with the client by preliminary connect that the connection unit is established to generate respectively Key, and respective key is compared, the foundation of the bluetooth connection is completed in the case where key agreement.
Binding path can be wherein established between NVR and client in several ways, such as Wi-Fi connection, bluetooth connect It connects, infrared connection etc., and bluetooth can be stably connected in short distance connection with multiple client, and be easily achieved, And in the case where being realized with bluetooth, only client can just configure NVR from the closer distance range of NVR, avoid remote Journey manipulates brought insecurity factor.
Of the invention has the prominent advantages that, generates two dimensional code by NVR, and use client scan two dimensional code, Lai Jinhang With the information exchange and configuration of NVR, safety ensure that while fast logging in NVR;By cell phone application, control NVR can Establish the visual way of link information;Client carries out the change of crucial setting by two-dimensional code scanning mode, guarantees safety Property while improve convenience, avoid user forget because note login password caused by complicated change procedure.
Detailed description of the invention
Fig. 1 is one embodiment of the invention client and the process schematic that NVR is bound;
Fig. 2 is that present example client permits NVR to carry out the process schematic of other client bindings;
Fig. 3 is the process schematic of present example client and NVR unbundlings;
Fig. 4 is the process schematic for the client progress change of secret code that present example has bound NVR;
Fig. 5 is that present example has bound the process schematic that the client of NVR is logged in.
Specific embodiment
In order to keep the present invention more clear, detailed explain is subject to the present invention now in conjunction with drawings and examples It is bright.
NVR need to load bluetooth module and two-dimensional code generation module in present example of the present invention, pass through bluetooth and client The connection unit at end establishes binding path, and the generation and display of two dimensional code are carried out by two-dimensional code generation module.Accordingly, Yong Husuo The client used is also required to support bluetooth, and the Bluetooth function of client is set in connection unit client in present example For the mobile phone with bluetooth, in addition the mobile phone of present example also has graph scanning unit, and present example is swept for two dimensional code Unit is retouched, that is, has the function of two-dimensional code scanning.In present example of the present invention, system of the invention is equipped in mobile phone, current In the system of embodiment, client includes: connection unit, logs in unit, graph scanning unit, unbinding unit and binding Licence units, NVR include: binding judging unit and graphics generation unit, and wherein two-dimensional code generation module is set to current implement In the graphics generation unit of example, the figure of generation is two dimensional code.Mobile phone need to install specific mobile phone application (i.e. APP) for receiving The instruction of user controls the operation of each unit.
Wherein, there are " binding ", " binding other ", " unbundlings " and " scanning the two-dimensional code " 4 options in APP, selected by binding , the mobile phone bound can log in NVR and carry out corresponding video image and check, handle etc. to match by further scanning the two-dimensional code It sets, using the change for carrying out NVR password is scanned the two-dimensional code, in addition the option of the registration and unregistration of mobile phone will be placed on the user of NVR In configuration.In addition different accounts, it is understood that there may be different configurations, for example, administrator's account can carry out the configuration of all permissions, And tourist's account can only just browse video image.
The format that mobile phone is sent to the message of NVR (i.e. binding, other bindings, unbundlings and password login) is as shown in table 1:
Table 1
Behavior type indicates behavior suggested by the message in table;Information bit is 512 binary digit sizes.
1. when behavior type is 00, binary number that information bit is converted by the APP account inputted and password.Account Information is placed on first 256 of information bit, and password is at latter 256.
2. because only behavior type is effective, therefore information bit is without information when behavior type is 01 and 10.
3. when behavior type be 11 when, password field be scan the two-dimensional code, convert come password reconvert at binary system Number.Because 16 passwords (comprising upper and lower case letter and number) can be randomly generated, encrypted message be placed on after 256, preceding 256 Position zero.
The binding information of the client is judged whether there is after the binding judging unit of NVR receives logging request: Login password authentication is carried out between unit and NVR if it does not exist, then logging in, is bound after being verified, such as step A5 and A6; It is shown if it does, graphics generation unit receives instruction generation random cipher from the user and is converted to figure, then it is objective Family end by the shown figure of scanning obtains random cipher and by binding path transmission random cipher to the NVR, NVR utilizes login unit to log in NVR after carrying out the matching of random cipher and successful match, such as D11 to D17.
In present example, if do not bound between mobile phone and NVR, and if NVR unbound any mobile phone, mobile phone is wanted It logs in NVR to need first to bind, binding procedure is as shown in Figure 1, comprising:
A1, when on NVR without binding any mobile phone, its bluetooth visual way is " visible to all devices ".Work as hand Confidential when being registered on NVR, mobile phone need to open included Bluetooth function, and search for the bluetooth equipment of surrounding.
NVR carries bluetooth module, and bluetooth module is always on when NVR is run, in present example NVR and mobile phone it Between binding path be bluetooth connection, the more mobile phones that may be implemented in short distance are stably connected with, while this mode makes user only Having can just be attached near NVR, it is possible to reduce the quantity of connection is reduced and asked caused by excessive mobile phone while login configurations Topic also avoids Telnet configuration NVR connective stability that may be present and safety issue.In other embodiments may be used To realize this binding path using the connection types such as Wi-Fi, infrared.
A2, as bluetooth title NVR1 of the mobile phone by bluetooth discovery to NVR, mobile phone is clicked in the equipment that can be matched Mobile phone and NVR are established preliminary connection by NVR1, connection unit.
It is interacted between A3, NVR and mobile phone by the preliminary connection established, and number is respectively generated according to interactive information According to code key needed for encryption, and respective code key is shown on the display interface and mobile phone display screen of NVR.
A4, both sides authenticate in such a way that 6 random ciphers compare.That is the code key shown on NVR and mobile phone is phase 6 same random ciphers, and click determine manually.Mobile phone and NVR are successful with regard to Bluetooth pairing in this way, that is, establish bluetooth company It connects.
A5, user click " binding " option in APP, and the login unit on mobile phone can be by the binding report including log-on message Text (message, behavior type 00, password are login password used by a user at that time in such as table 1) is sent to NVR by bluetooth.
A6 carries out corresponding binding information preservation when NVR, which receives mobile phone, logs in the binding message that unit is sent.Binding Device number of the information for example including mobile phone, Bluetooth address, further include in present example account corresponding to login password and Corresponding configuration permission.NVR can contain multiple accounts, and save the account of itself, the login power of password and corresponding account Limit, different accounts correspond to different configuration permissions.For example including administrator's account, user account etc., and configure permission not Together, the function choosing-item that can be configured on NVR also has difference, and highest permission can configure all function choosing-items, and with permission Reduction, the function choosing-item that can be configured can also reduce, and this authority distribution mode is conducive to improve the configuration safety of NVR.
When in message account and password and NVR in save identical, the display screen of NVR will appear prompt and " be bound into Function ".Meanwhile the Bluetooth address and NVR account of mobile phone are held together in NVR, i.e., mobile phone and NVR account are bound.Cell phone application It can be carried out other operations such as unbundlings.The bluetooth module of NVR can modify its visual way, be become from " to all devices " For " only paired device is visible ", mobile phone other so also just can not be by bluetooth discovery to the NVR, and is tied up with the NVR It is fixed.This mode allow even if other mobile phones by some modes obtain login password and graphic form with secret Code, is permitted without trusted mobile phone, can not also carry out login configurations, to increase the safety of configuration method.
If different, the display screen of NVR will appear prompt " Bind Failed ", and cell phone application cannot also carry out unbinding etc. it He operates.If NVR is not with any handset binding, after Bind Failed, the bluetooth module visual way for not modifying NVR (is bound Do not succeed, other mobile phones still can search the NVR by bluetooth);If NVR has handset binding, NVR bluetooth module is by " right All devices are visible " become " only paired device is visible ".
In the case where NVR has bound at least one mobile phone, by having bound, mobile phone completes NVR and another mobile phone carries out The process of pairing, as shown in Fig. 2, including the following steps:
B1, clicks " binding other " option in APP, and the binding licence units on mobile phone can will allow other handset bindings Message NVR is sent to by bluetooth.
B2, when NVR receives the message (report that behavior type is 01 i.e. in table 1 of other handset bindings of the permission of mobile phone transmission Text, the password field of message are all 0 i.e. without password), the bluetooth module of NVR can modify its visual way, by " only having matched and having set It is standby visible " become " visible to all devices ".Other mobile phones can pass through bluetooth discovery to the NVR in this way.
Other handset binding processes are identical as the process steps A1-A6 of first handset binding.
B3, after the success of other handset bindings, the bluetooth module of NVR can modify its visual way again, by " setting to all It is standby visible " become " only paired device is visible ".In this way other unauthorized mobile phones also just can not by bluetooth discovery to should NVR, and be bundled with the NVR.
When user wants to cancel the permission for the trust mobile phone that NVR has been bound, i.e. the unbinding process of mobile phone and NVR, such as Shown in Fig. 3, include the following steps:
C1, clicks " unbundlings " option in APP, and the message of unbundlings can be sent to NVR by bluetooth by mobile phone.
C2, when NVR receives message (message i.e. in table 1, behavior type 10, the password field of the unbundlings of mobile phone transmission 0 is all i.e. without password), the bluetooth module of NVR can remove the pair record of the mobile phone.Mobile phone just needs to re-start with NVR in this way Bluetooth binding, Cai Keyu NVR carry out message interaction.
C3, removes the pair record of the mobile phone on NVR, and NVR can check that bluetooth module is remaining and match mobile phone number. If number is not 0, then the visual way of NVR bluetooth module is not modified, be still " only paired device is visible ";If number is 0, then the visual way of NVR bluetooth module is modified, being changed to " visible to all devices ", (such NVR has been returned to initially without hand The state of machine binding).
After unbundlings, the solution binding mobile phone be cancelled configuration authorization, original binding information be deleted, at this time if NVR has carried out the change of the setting of the key such as login password, even if the client originally bound has obtained login password, due to Cannot get NVR authorization can not also set up binding path with NVR, i.e., enabled further to obtain graphic form random cipher, It can not be matched by binding path with NVR and carry out login configurations
Under the scene that user forgets the man-machine login password of NVR, simultaneously login process, such as Fig. 4 are scanned the two-dimensional code using mobile phone It is shown:
D11, the included bluetooth of mobile phone open and NVR complete automatic bluetooth pairing.Since this mobile phone is NVR setting binding Trust mobile phone, bluetooth can automatic matching success.NVR in this way and mobile phone can be carried out message interaction.
D12 has the option of " forgetting Password " in the man-machine login interface of NVR.After the option for clicking " forgetting Password ", 16 passwords can be randomly generated in NVR (comprising upper and lower case letter and number).
D13, NVR can convert thereof into two dimensional code, and show sweep for mobile phone on a display screen according to 16 passwords of generation It retouches.
D14 after two dimensional code occurs in display screen, opens cell phone application, clicks " scanning the two-dimensional code " option, the figure in mobile phone The two dimensional code occurred on scanning element (two-dimensional code scanning unit in position in present example) scanning NVR display screen.Other realization sides It can also be generated using other graphic codes in formula, such as bar code etc. can be made.
The two dimensional code scanned can be re-converted into 16 passwords by D15, mobile phone.
D16 is converted successfully, and mobile phone can (message that behavior type is 11 i.e. in table 1, password field be complete by the message of password For the two dimensional code scanned, convert the password reconvert come at binary number), NVR is sent to by bluetooth.
D17 verifies the password that password is generated with oneself after NVR receives password.If password is different, then NVR It can not log in;It if password is identical, then logins successfully, and pops up Modify password window, by user's Modify password.
Wherein, the mobile phone for having bound NVR is also the login configurations that NVR is carried out by two-dimensional code scanning.Detailed process is such as Shown in Fig. 5, include the following steps:
D21: same to D11, the included bluetooth of mobile phone open and NVR complete automatic bluetooth pairing.
D22: in the man-machine login interface of NVR, " two dimensional code login " option is clicked by user.
Because NVR has the fixed password of oneself, if being provided with excessively long and complex password for safety, can lead It causes to log in difficult.It clicks " two dimensional code login ", 16 passwords can be randomly generated in NVR (comprising upper and lower case letter and number) The fixed password of the account can be converted into two dimensional code by NVR.
D23-D26: same D13-D16 respectively, it is shown after generating two dimensional code by NVR, and two dimensional code is carried out by mobile phone and is swept It retouches, and the two dimensional code that scanning obtains is converted into password again and is sent to NVR.
D27: after NVR receives password, first passing through Bluetooth address, finds matched account, then by password and oneself production Raw password is verified.If password is identical, login successfully, will appear prompt " logining successfully " in the display screen of NVR, enters NVR configuration interface;If account mismatches or password is different, then NVR can not be logged in, and be will appear prompt in the display screen of NVR and " stepped on Record failure ".
Of the invention has the prominent advantages that, generates two dimensional code by NVR, and use client scan two dimensional code, Lai Jinhang With the information exchange and configuration of NVR, safety ensure that while fast logging in NVR;By cell phone application, control NVR can Establish the visual way of link information;Client carries out the change of crucial setting by two-dimensional code scanning mode, guarantees safety Property while improve convenience, avoid user forget because note login password caused by complicated change procedure.

Claims (8)

1. a kind of client-based NVR configuration method, including client obtain from NVR establish after link information with The NVR establishes binding path, which is characterized in that further include:
The client sends logging request to NVR by the binding path;
The NVR receives the binding information that the client is judged whether there is after logging request: if it does not exist, then described Login password authentication is carried out between client and the NVR, in the case where being verified, client passes through the binding path The NVR is logged in, and binding information is saved on NVR to complete binding;If it is present NVR receives finger from the user It enables generating random cipher and being converted to figure and be shown, client obtains the random cipher by the shown figure of scanning And random cipher is sent to the NVR by the binding path, the matching of random cipher is carried out by the NVR and after successful match Allow the client to log in, wherein NVR only allow to carry out with the client bound in the case where there being binding information with The matching of secret code;
After the NVR binds at least one client, only allow other visitors in the client license that at least one has been bound Family end can establish link information described in detecting, only allow in the case where the client license bound without any one The client of binding can establish link information described in detecting.
2. client-based NVR configuration method as described in claim 1, which is characterized in that further include the visitor for having bound NVR Family end sends unbinding signal to bound NVR, and bound NVR deletes corresponding visitor after receiving unbinding signal The binding information at family end, and count the remaining client number bound of the NVR: if number is zero, allow all visitors Family end detects that the NVR's establishes link information;Otherwise, only in the case where having bound client license without any one The client for allowing to have bound can establish link information described in detecting.
3. client-based NVR configuration method as described in claim 1, which is characterized in that the binding path is bluetooth company It connects, that binds path establishes mode are as follows:
What the client that need to log in the NVR detected that the NVR issues establishes bluetooth connection information, and builds after detection Vertical preliminary connection;
The NVR and the client are interacted by tentatively connecting to generate respective key, and by respective key into Row compares, and the foundation of the bluetooth connection is completed in the case where key agreement.
4. client-based NVR configuration method as described in claim 1, which is characterized in that the figure that the NVR is generated is two Code is tieed up, the client bound includes: by the method that established binding path is logged in
The two dimensional code that random cipher caused by the NVR is converted to is scanned, and two dimensional code is converted into password again;
By password after conversion by established binding path transmission to the NVR, by the NVR by the received password of institute and certainly Body random cipher generated is matched, and allows client to log in after successful match.
5. client-based NVR configuration method as described in claim 1, which is characterized in that the figure that NVR is generated is two dimension Code, the NVR configuration method further include having bound the client of NVR to be configured change to NVR, and the specific side of change is arranged Method includes:
The client sends setting change signal to bound NVR after login;
Bound NVR generates random cipher after receiving setting change signal and is converted to two dimensional code;
The client obtains the random cipher by scanning the two dimensional code, and random with generating on bound NVR Password matches, and carries out corresponding setting to bound NVR after successful match and changes.
6. a kind of client-based NVR configures system, the connection unit including client, for detecting what NVR was sent It can establish after link information and establish binding path with the NVR, which is characterized in that further include login unit, the client of client Graph scanning unit, the binding judging unit of NVR and the graphics generation unit of NVR at end;Wherein,
Unit is logged in be used to send logging request to NVR by the binding path;
The binding judging unit receives the binding information that the client is judged whether there is after logging request: if do not deposited Login password authentication then is being carried out between the login unit and the NVR, in the case where NVR is verified, is logging in unit The NVR, which is logged in, by the binding path and is sent saves on binding information to NVR for NVR to complete to bind;If it does,
Graphics generation unit receives instruction generation random cipher from the user and is converted to figure and shown, then client is logical Cross figure shown by graph scanning unit scan obtain random cipher and by login unit by the binding path transmission with Secret code logs in NVR after NVR carries out the matching of random cipher and successful match to the NVR;
Further include the binding licence units of client, after the NVR binds at least one client, is only tied up at least one Link information can be established to described in other unbound clients transmissions when the binding licence units license of fixed client, not The client for only allowing to have bound in the case where having bound client license through any one can establish connection letter described in detecting Breath.
7. client-based NVR configures system as claimed in claim 6, which is characterized in that further include that the releasing of client is tied up Order member, for sending unbinding signal to bound NVR, bound NVR is receiving unbinding unit transmission Unbinding signal after delete the binding information of corresponding client, and count remaining binding client number: if number It is zero, then detecting all clients described can establish link information;Otherwise, client is being bound without any one The client for only allowing to have bound in the case where license can establish link information described in detecting.
8. client-based NVR configures system as claimed in claim 6, which is characterized in that the institute that the connection unit is established Stating binding path is bluetooth connection, and the connection unit establishes the mode in binding path are as follows:
That detects the NVR transmission establishes bluetooth connection information, and establishes preliminary connection after detection;
It is interacted by the NVR and the client by tentatively connecting of establishing of the connection unit respective close to generate Key, and respective key is compared, the foundation of the bluetooth connection is completed in the case where key agreement.
CN201510868463.4A 2015-12-01 2015-12-01 Client-based NVR configuration method and system Active CN105515846B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510868463.4A CN105515846B (en) 2015-12-01 2015-12-01 Client-based NVR configuration method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510868463.4A CN105515846B (en) 2015-12-01 2015-12-01 Client-based NVR configuration method and system

Publications (2)

Publication Number Publication Date
CN105515846A CN105515846A (en) 2016-04-20
CN105515846B true CN105515846B (en) 2019-10-18

Family

ID=55723505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510868463.4A Active CN105515846B (en) 2015-12-01 2015-12-01 Client-based NVR configuration method and system

Country Status (1)

Country Link
CN (1) CN105515846B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827624B (en) * 2016-04-26 2019-10-18 浙江宇视科技有限公司 A kind of authentication system
CN106453243B (en) * 2016-08-29 2019-11-29 捷开通讯(深圳)有限公司 The verification method of server, terminal and its authorization code
KR20180042929A (en) * 2016-10-19 2018-04-27 현대자동차주식회사 Wireless Connection System and Method for Controlling thereof
CN115242857B (en) * 2022-07-14 2024-05-24 杭州萤石软件有限公司 Network camera access method, network video recorder, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1028568A1 (en) * 1999-02-08 2000-08-16 Bull S.A. Device and method for authentication of a remote user
EP2498472A1 (en) * 2011-03-10 2012-09-12 France Telecom Method and system for granting access to a secured website
CN103001975A (en) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 Method, system and device used for controlling login and based on two-dimensional code
CN103763469A (en) * 2014-01-03 2014-04-30 浙江宇视科技有限公司 Simulation camera and parameter configuration method thereof
CN104468582A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 User information certification authorization method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1028568A1 (en) * 1999-02-08 2000-08-16 Bull S.A. Device and method for authentication of a remote user
EP2498472A1 (en) * 2011-03-10 2012-09-12 France Telecom Method and system for granting access to a secured website
CN103001975A (en) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 Method, system and device used for controlling login and based on two-dimensional code
CN103763469A (en) * 2014-01-03 2014-04-30 浙江宇视科技有限公司 Simulation camera and parameter configuration method thereof
CN104468582A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 User information certification authorization method and system

Also Published As

Publication number Publication date
CN105515846A (en) 2016-04-20

Similar Documents

Publication Publication Date Title
US10686655B2 (en) Proximity and context aware mobile workspaces in enterprise systems
US9992176B2 (en) Systems and methods for encrypted communication in a secure network
CN106233796B (en) Calculate the automatic subscriber registration and unlock of equipment
US9178890B1 (en) Passwordless strong authentication using trusted devices
US9338164B1 (en) Two-way authentication using two-dimensional codes
CN103607712B (en) The cut-in method and device of wireless network
US8710953B2 (en) Automatic portable electronic device configuration
WO2015154488A1 (en) Method and device for accessing router
CN105515846B (en) Client-based NVR configuration method and system
US9979725B1 (en) Two-way authentication using two-dimensional codes
US11277401B1 (en) Data integrity checker
US9603018B2 (en) Peer to peer remote control method between one or more mobile devices
CN101986598B (en) Authentication method, server and system
CN102177676A (en) System and method for setting up security for controlled device by control point in a home network
CN110336870B (en) Method, device and system for establishing remote office operation and maintenance channel and storage medium
CN106488453A (en) A kind of method and system of portal certification
EP2611096A1 (en) Method for authenticating a user using a second mobile device
KR102356474B1 (en) Systems that support smart work
CN103176987A (en) Method and device for controlling database access
KR101087698B1 (en) Method for authenticating security of smart-phone
CN101854357B (en) Method and system for monitoring network authentication
CN100438446C (en) Switch-in control equipment, Switch-in control system and switch-in control method
Braun et al. A System to Save the Internet from the Malicious Internet of Things at Home
WO2024102216A1 (en) Techniques for unifying multiple identity clouds
CN104243433B (en) Login method based on browser client account, equipment and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant