CN106412498B - monitoring data acquisition method and cloud terminal - Google Patents

monitoring data acquisition method and cloud terminal Download PDF

Info

Publication number
CN106412498B
CN106412498B CN201610797228.7A CN201610797228A CN106412498B CN 106412498 B CN106412498 B CN 106412498B CN 201610797228 A CN201610797228 A CN 201610797228A CN 106412498 B CN106412498 B CN 106412498B
Authority
CN
China
Prior art keywords
mobile client
keep
monitoring data
alive message
alive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610797228.7A
Other languages
Chinese (zh)
Other versions
CN106412498A (en
Inventor
周迪
赵晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Uniview Technologies Co Ltd
Original Assignee
Zhejiang Uniview Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Uniview Technologies Co Ltd filed Critical Zhejiang Uniview Technologies Co Ltd
Priority to CN201610797228.7A priority Critical patent/CN106412498B/en
Publication of CN106412498A publication Critical patent/CN106412498A/en
Application granted granted Critical
Publication of CN106412498B publication Critical patent/CN106412498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a monitoring data acquisition method and a cloud terminal, wherein the method associates the cloud terminal and a mobile client through a keep-alive message, only under the condition that the mobile client passes verification and the keep-alive message is effective, the cloud terminal decodes the monitoring data, so that the mobile client or the cloud terminal can normally play the monitoring data, but after the user leaves with the mobile client, the keep-alive message fails, the cloud terminal performs display control on the monitoring data, so that, the monitoring data stream is continuously received but not decoded, so that on one hand, the illegal user can be prevented from continuously acquiring the monitoring data, on the other hand, the regression of the user carrying the mobile client and the recovery of the keep-alive message can be realized, and the normal decoding processing of the monitoring data stream is quickly recovered, so that a legal user can quickly recover the normal browsing of the monitoring data.

Description

Monitoring data acquisition method and cloud terminal
Technical Field
the application relates to the technical field of video monitoring, in particular to a monitoring data acquisition method and a cloud terminal.
Background
Video Surveillance (Cameras and surveyability) is an important component of security systems. The traditional monitoring system comprises a front-end camera, a transmission cable and a video monitoring platform. The cameras can be divided into network digital cameras and analog cameras and can be used for collecting front-end video image signals. The video monitoring system is a comprehensive system with strong precaution capability. Video monitoring is widely applied to many occasions due to intuition, accuracy, timeliness and rich information content. In recent years, with the rapid development of computers, networks, image processing and transmission technologies, video monitoring technologies have been developed.
With the development of video monitoring applications, the core audio and video content applications thereof relate to aspects such as public security, business confidentiality, personal privacy and the like, how to protect the privacy and security of video monitoring data, and how to perfectly verify the legality of a user of the video monitoring data gradually become the focus of attention of video monitoring technologies.
The applicant finds in the course of implementing the present application that the above-mentioned prior art treatment solutions have at least the following problems:
in a video monitoring system, the most main management end of audio and video contents is at a mobile client side, and a legal user can watch live videos, download videos and play back historical videos at the mobile client side. However, if the legal user does not stop playing when leaving, the illegal user can continue to watch the audio/video data played by the mobile client or take the audio/video data played by the mobile client by other means. Therefore, the mobile client side becomes a main place for monitoring data leakage, and a scheme for effectively and practically protecting the video monitoring audio and video data security at the mobile client side is urgently needed. Especially, under the condition that the legal user passes the verification and does not quit in time, how to avoid the illegal user obtaining the video monitoring data by using the verification result of the legal user is avoided. Such a solution has not been proposed in the prior art.
disclosure of Invention
the embodiment of the application provides a monitoring data acquisition method and a cloud terminal, which only provide monitoring data for legal users in the field, effectively protect the safety of the monitoring data, and solve the problems of mobile client authentication and monitoring data protection.
In order to achieve the technical purpose, the present application provides a monitoring data obtaining method, which is applied to a cloud terminal, and the method specifically includes:
establishing wireless connection with a mobile client, and carrying out periodic keep-alive message interaction with the mobile client;
judging whether the keep-alive message corresponding to the mobile client is normal or not;
Verifying the received identity verification information;
If the identity authentication information passes the authentication and the keep-alive message corresponding to the mobile client is normal, acquiring the requested monitoring data, decoding the monitoring data, and displaying the monitoring data locally or sending the monitoring data to the mobile client for displaying;
and performing display control on the requested monitoring data according to the keep-alive message maintenance condition of the mobile client.
preferably, after establishing the wireless connection with the mobile client, the cloud terminal performs periodic keep-alive message interaction with the mobile client, and specifically includes:
After wireless connection with a mobile client is established, the cloud terminal allocates an IP address for the mobile client;
Receiving a keep-alive message periodically sent by the mobile client, wherein the keep-alive message carries the equipment information of the mobile client and the identity information corresponding to the mobile client;
And sending a keep-alive response message to the IP address corresponding to the mobile client.
preferably, the verifying the identity authentication information and determining whether the keep-alive message corresponding to the mobile client is normal includes:
When receiving authentication information sent by the mobile client, judging whether the authentication information and password information included in the authentication information are matched, and if so, determining that the authentication information passes the authentication;
Judging whether the time of receiving the keep-alive message sent by the mobile client at the last time reaches a preset first time threshold value;
If the first time threshold value is not reached, judging whether the identity information corresponding to the mobile client carried in the keep-alive message is consistent with the identity information carried in the identity verification information sent by the mobile client;
and if the identity information carried in the keep-alive message is consistent with the identity information carried in the identity verification information, determining that the keep-alive message corresponding to the mobile client is normal.
Preferably, the displaying and controlling the monitoring data sent to the mobile client according to the keep-alive message maintaining condition of the mobile client specifically includes:
When the interruption time of the keep-alive message is determined to exceed a preset second time threshold, caching the monitoring data acquired through the video management server, stopping decoding the monitoring data and displaying the monitoring data locally, or stopping displaying the monitoring data by the mobile client;
and when the keep-alive message sent by the mobile client is received again, decoding the cached monitoring data, and displaying locally or sending the decoded monitoring data to the mobile client for displaying.
preferably, after the monitoring data sent to the mobile client is subjected to display control according to the keep-alive message maintenance condition of the mobile client, the method further includes:
When a login query request aiming at the mobile client and sent by a video management server is received, judging whether a keep-alive message corresponding to the mobile client is normal or not;
If the video is normal, sending a local login response to the video management server;
And if not, sending a non-local login response to the video management server, and sending monitoring data playing layout information corresponding to the mobile client to the video management server.
On the other hand, the embodiment of the present application further provides a cloud terminal, which specifically includes:
the wireless connection module is used for establishing wireless connection with the mobile client;
the keep-alive module is used for carrying out periodic keep-alive message interaction with the mobile client after the wireless connection module establishes wireless connection with the mobile client;
The verification module is used for verifying the received identity verification information and/or judging whether the keep-alive message corresponding to the mobile client is normal or not according to the interaction condition of the keep-alive module;
the data processing module is used for acquiring the requested monitoring data when the verification module confirms that the authentication information passes the verification and the keep-alive message corresponding to the mobile client is normal, decoding the monitoring data, and displaying the monitoring data locally or sending the monitoring data to the mobile client for displaying;
And the control module is used for carrying out display control on the requested monitoring data according to the record of the keep-alive message maintenance condition of the mobile client by the keep-alive module.
Preferably, the first and second liquid crystal materials are,
The wireless connection module is also used for allocating an IP address to the mobile client after establishing wireless connection with the mobile client;
the keep-alive module is specifically configured to receive a keep-alive message periodically sent by the mobile client, and send a keep-alive response message to the wireless connection module for the IP address allocated to the mobile client, where the keep-alive message carries device information of the mobile client and identity information corresponding to the mobile client.
Preferably, the verification module is specifically configured to:
When receiving authentication information sent by the mobile client, judging whether the authentication information and password information included in the authentication information are matched, and if so, determining that the authentication information passes the authentication;
Judging whether the time of receiving the keep-alive message sent by the mobile client at the last time reaches a preset first time threshold value;
if the first time threshold value is not reached, judging whether the identity information corresponding to the mobile client carried in the keep-alive message is consistent with the identity information carried in the identity verification information sent by the mobile client;
And if the identity information carried in the keep-alive message is consistent with the identity information carried in the identity verification information, determining that the keep-alive message corresponding to the mobile client is normal.
Preferably, the control module is specifically configured to:
When the keep-alive module determines that the time of the keep-alive message interruption exceeds a preset second time threshold, caching the monitoring data acquired through the video management server, stopping decoding the monitoring data, and stopping displaying the monitoring data locally or at the mobile client;
And when the keep-alive module receives the keep-alive message sent by the mobile client again, the cached monitoring data is decoded and then sent to the mobile client for display.
Preferably, the cloud terminal further includes a determining module, specifically configured to:
when a login query request aiming at the mobile client and sent by the video management server is received, judging whether the keep-alive message corresponding to the mobile client is normal or not according to the record of the keep-alive message maintenance condition of the mobile client by the keep-alive module;
If the video is normal, sending a local login response to the video management server;
And if the monitoring data is abnormal, sending a non-local login response to the video management server, and informing the data processing module to send the monitoring data playing layout information corresponding to the mobile client to the video management server.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the beneficial technical effects that:
the embodiment of the application discloses a monitoring data acquisition method and a cloud terminal, wherein the method associates the cloud terminal and a mobile client through a keep-alive message, only under the condition that the mobile client passes verification and the keep-alive message is effective, the decoding transmission of the monitoring data is carried out to the mobile client, so that the mobile client can play the monitoring data normally, but after the user leaves with the mobile client, the keep-alive message fails, the cloud terminal performs display control on the monitoring data, so that, the monitoring data stream is continuously received but not decoded, so that on one hand, the illegal user can be prevented from continuously acquiring the monitoring data, on the other hand, the regression of the user carrying the mobile client and the recovery of the keep-alive message can be realized, and the normal decoding transmission of the monitoring data stream is quickly recovered, so that the legal user can quickly recover the normal browsing of the monitoring data.
drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a monitoring data obtaining method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a monitoring data obtaining method in a specific application scenario according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a mobile client and a cloud terminal establishing a wireless connection in a specific application scenario according to an embodiment of the present application;
fig. 4 is a schematic diagram illustrating that a mobile client recovers wireless connection through other wifi in a specific application scenario according to an embodiment of the present application;
Fig. 5 is a schematic structural diagram of a cloud terminal according to an embodiment of the present application.
Detailed Description
as stated in the background of the present application, the original purpose of monitoring data is to provide the legal user with the monitoring data for watching and browsing, but since the network side can only verify whether the user identity is legal, and cannot continuously monitor whether the legal user is present after the user verifies the user is legal, if the legal user leaves, the legal user does not stop playing, the illegal user can continue watching, or recording the audio and video data played by the mobile client by other means, which causes the leakage of the monitoring data.
The inventor of the present application hopes that the method provided by the present application can continuously detect whether the user is present, the decoding and playing of the monitoring data can be performed only when the legal user is present, and the decoding and hiding of the monitoring data can be stopped when the legal user leaves, so that the monitoring data can be guaranteed to be always provided for the legal user and can not be acquired by the illegal user.
as shown in fig. 1, a schematic flow chart of a monitoring data acquisition method provided in the embodiment of the present application is shown, where the method specifically includes:
step S101, after the cloud terminal establishes wireless connection with the mobile client, the cloud terminal and the mobile client perform periodic keep-alive message interaction.
In a specific application scenario, the processing of this step specifically includes the following steps:
Firstly, after the cloud terminal establishes wireless connection with the mobile client, an IP address is allocated to the mobile client, so that the mobile client is accessed into a wireless network where the cloud terminal is located.
Then, the cloud terminal receives keep-alive messages periodically sent by the mobile client, wherein the keep-alive messages carry the equipment information of the mobile client and the identity information corresponding to the mobile client.
Correspondingly, the cloud terminal sends a keep-alive response message to the IP address corresponding to the mobile client.
through the receiving and responding processes of the keep-alive messages, the cloud terminal and the mobile client realize periodic keep-alive message interaction.
after establishing the protection message interaction, executing step S102;
when the cloud terminal receives the authentication information sent by the mobile client, step S103 is executed.
step S102, the cloud terminal judges whether the keep-alive message corresponding to the mobile client is normal.
and S103, the cloud terminal verifies the identity verification information.
Only if the determination results in step S102 and step S103 are both yes, step S104 is continued.
the determination processes of step S102 and step S103 will be comprehensively described as follows. In a specific application scenario, the corresponding verification process is divided into two parts:
first part, authentication.
when the cloud terminal receives the authentication information sent by the mobile client, the cloud terminal judges whether the identity information and the password information included in the authentication information are matched, and if the identity information and the password information are matched, the cloud terminal determines that the authentication information passes the authentication.
the authentication information sent by the mobile client at least needs to include user name and password information, and the user identity can be authenticated according to the authentication information, and when the user name corresponds to the registered user and the user name and the password are matched, the authentication is considered to be passed. In a specific application scenario, such a verification process can be realized through information which can be uniquely matched and verified with the user identity, such as fingerprint information, iris information and the like, and the change of the content of specific identity verification information does not affect the protection range of the application.
the authentication process of the identity information is mainly to avoid the condition that an illegal user logs in, and the authentication process is a basic identity defense mechanism to avoid the illegal user from acquiring monitoring data.
and the second part is the verification of the keep-alive message.
In a specific application scenario, the verification of the part needs to verify whether the keep-alive messages are normally interacted and whether the keep-alive messages are matched with the user identities.
Firstly, the cloud terminal judges whether the time of receiving the keep-alive message sent by the mobile client at the last time reaches a preset time threshold value. The time length corresponding to the time threshold is longer than the length of a single period of the mobile client periodically sending the keep-alive messages. Therefore, the processing process is to judge whether the interaction process of the keep-alive messages is normal.
if the matching is not achieved, namely the keep-alive messages are normally subjected to periodic interaction, the cloud terminal further performs matching identification on the keep-alive messages. Namely, the cloud terminal judges whether the identity information corresponding to the mobile client carried in the keep-alive message is consistent with the identity information carried in the identity verification information sent by the mobile client.
If the judgment result is yes, the keep-alive messages which are normally interacted periodically are matched with the identity information of the mobile client, and the cloud terminal determines that the keep-alive messages corresponding to the mobile client are normal.
In a specific application scenario, the sequence of the verification process can also be changed, that is, the keep-alive messages matched with the identity information of the mobile client are found first, and then whether the keep-alive messages are in a normal interaction state or not is judged. No matter which sequence is adopted for verification, the purpose is to respectively verify the interaction process and the identity matching of the keep-alive messages, and the keep-alive messages corresponding to the mobile client can be determined to be normal only if the two information passes the verification.
The verification process of the keep-alive messages is mainly to avoid the condition that an illegal user steals the identity information of a legal user for login, under the condition, the illegal user uses the legal identity information, but the used mobile client is different from the mobile client used by the legal user, and the mobile client can be identified through the keep-alive messages, so that the verification of the keep-alive messages cannot pass, and the illegal user is prevented from obtaining monitoring data.
If both of the above two parts are verified, that is, if the authentication information is verified, and the keep-alive message corresponding to the mobile client is normal, step S104 is executed.
on the contrary, in the case that the verification of any one of the above parts is not passed, it indicates that the identity of the user currently requesting access is at risk, and the cloud terminal refuses to provide the monitoring data to the mobile client, so as to avoid an illegal user from obtaining the monitoring data.
and step S104, the cloud terminal acquires the requested monitoring data, decodes the monitoring data, and displays the monitoring data locally or sends the monitoring data to the mobile client for display.
in a specific application scenario, the obtained monitoring data is specifically displayed by a legal user through a mobile client or a cloud terminal for an on-demand request. And the cloud terminal acquires the monitoring data from a network side server, such as a video management server, according to the acquisition request of the monitoring data.
The specific location where the display is performed can be adjusted according to actual needs, and such changes do not affect the scope of protection of the present application.
And S105, the cloud terminal displays and controls the requested monitoring data according to the keep-alive message maintenance condition of the mobile client.
In a specific application scenario, the processing procedure in this step is mainly based on the keep-alive message maintenance condition, so that the cloud terminal starts timing after receiving the keep-alive message. And if a new protection message is received, initializing timing and restarting timing. If the keep-alive message cannot be transmitted because the mobile client moves out of the network coverage range of the cloud terminal, the cloud terminal cannot receive the new keep-alive message all the time. In this case, the cloud terminal needs to further determine whether the interruption of the keep-alive message is overtime, where the determination generally presets a time length greater than a keep-alive message sending period (or directly presets a time length equivalent to multiple sending periods), and determines whether the time length is overtime based on whether the timing result reaches the time length. Before the timeout, the keeping condition of the keep-alive message is normal, and on the contrary, once the timeout is determined, the keeping condition of the keep-alive message is abnormal.
If the maintenance condition is normal, the process of step S103 may be maintained and the display of the monitoring data may be continued.
When the cloud terminal determines that the time of interruption of the keep-alive messages exceeds a preset time threshold, namely the interruption time exceeds, the cloud terminal determines that the maintenance condition of the corresponding keep-alive messages is abnormal, caches the monitoring data acquired by the video management server, stops decoding the monitoring data, and displays the monitoring data locally, or stops displaying the monitoring data by the mobile client.
and when the cloud terminal receives the keep-alive messages sent by the mobile client again, the maintenance condition of the keep-alive messages is changed from abnormal to normal, the cloud terminal recovers normal transmission and decoding of the monitoring data, and the cached monitoring data is decoded and then displayed locally or sent to the mobile client for displaying.
Therefore, the login of the mobile client to the cloud terminal and the acquisition process of the monitoring data are completed, and the purposes that the cloud terminal is associated with the mobile client through the keep-alive message and the transmission of the monitoring data is controlled are achieved.
It should be further noted that, after the mobile client leaves the network coverage of the cloud terminal, the mobile client may re-establish connection with the video management server through another network, in this case, if another cloud terminal with similar or identical functions is accessed, processing needs to be performed again according to the processing flow described above, the video management server directly moves transmission of the monitoring data from the original cloud terminal to the new cloud terminal according to the processing result, and if the cloud terminal is not accessed, the corresponding access process is irrelevant to the processing process of the application, and is not described herein again.
However, it should be noted that no matter which access method is used, in order to enable the user to obtain the monitoring data at the new access point more quickly, especially to keep the obtaining habit before switching, that is, to keep the same monitoring data playing layout on the playing interface, in this embodiment of the application, the cloud terminal is configured to feed back the monitoring data playing layout information to the new access point. The process needs to realize login query by means of a video management server, and the specific processing procedure is described as follows:
When the mobile client is connected to the video management server at another access point, because the user does not log out before, the video management server receives an operation request for continuously acquiring the previous monitoring data instead of a new login request.
when the cloud terminal receives a login query request for the mobile client sent by the video management server, the cloud terminal determines whether the keep-alive message corresponding to the mobile client is normal, and the determination process is consistent with the keep-alive message verification process in the previous step S103, and the description is not repeated.
And if the video data are normal, the cloud terminal sends a local login response to the video management server, and under the condition, the video management server does not need to perform new operation and directly continues to transmit the monitoring data.
And if the monitoring data is abnormal, the cloud terminal sends a non-local login response to the video management server and sends monitoring data playing layout information corresponding to the mobile client to the video management server. Under the condition, the video management server feeds back the monitoring data playing layout information to the new access point, so that the new access point continuously sends the decoded monitoring data to the mobile client according to the corresponding monitoring data playing layout condition, and the mobile client continuously and normally plays the monitoring data according to the previous playing layout.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the beneficial technical effects that:
The embodiment of the application discloses a monitoring data acquisition method and a cloud terminal, wherein the method associates the cloud terminal and a mobile client through a keep-alive message, only under the condition that the mobile client passes verification and the keep-alive message is effective, the decoding transmission of the monitoring data is carried out to the mobile client, so that the mobile client can play the monitoring data normally, but after the user leaves with the mobile client, the keep-alive message fails, the cloud terminal performs display control on the monitoring data, so that, the monitoring data stream is continuously received but not decoded, so that on one hand, the illegal user can be prevented from continuously acquiring the monitoring data, on the other hand, the regression of the user carrying the mobile client and the recovery of the keep-alive message can be realized, and the normal decoding transmission of the monitoring data stream is quickly recovered, so that the legal user can quickly recover the normal browsing of the monitoring data.
The technical solutions in the present application will be described clearly and completely with reference to the accompanying drawings in the present application, and it is obvious that the described embodiments are some, not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As described above, in the prior art, the problem that the monitoring data is obtained by the illegal user at the mobile client side is mainly caused because it is not possible to determine whether the legal user continues to watch the monitoring data, so that the monitoring data can only be continuously played before the legal user actively stops obtaining the monitoring data, and even if the legal user leaves, the playing of the monitoring data still cannot be stopped, which gives the illegal user an opportunity to obtain the monitoring data.
in order to solve such a problem, the embodiment of the present application expects to establish an association with a legitimate user through a certain mechanism. Considering that the legal users watch and browse the monitoring data through the mobile client, especially in a cloud terminal scene, the users mainly access the cloud terminal network through the mobile client (mobile phone, tablet computer, notebook computer, etc.) to play and display the monitoring data, therefore, when the legal users leave, the users often leave together with the mobile client, if the leaving of the mobile client can be detected, the leaving of the legal users can be determined, and if the leaving of the mobile client can be detected, the cloud terminal can stop the playing process of the monitoring data, the illegal users cannot continue to watch the monitoring data.
Based on the above thought, the embodiment of the application associates the cloud terminal and the mobile client through the keep-alive message, and only when the mobile client passes the verification and the keep-alive message is valid, the decoding transmission of the monitoring data is performed on the mobile client, so that the mobile client can normally play the monitoring data.
For convenience of description, in the embodiment of the present application, a mobile phone with a monitoring APP installed is taken as a mobile client, and a corresponding technical solution is described by taking this as an example. In an actual application scenario, the terminal types such as a tablet computer and a notebook computer can also replace a mobile phone as a mobile client, and such changes do not affect the protection scope of the present application.
as shown in fig. 2, a schematic flow chart of a monitoring data obtaining method in a specific application scenario provided in the embodiment of the present application is shown, where the method specifically includes:
step S201, a user scans the two-dimensional code on the cloud terminal through a monitoring APP installed on a mobile phone.
The two-dimensional code contains information such as a wifi SSID (service set identifier), a login password and an IP (Internet protocol) address of the cloud management server of the wireless network corresponding to the cloud terminal, and is used for realizing an access verification process of the mobile phone to the wireless network corresponding to the cloud terminal.
in a specific application scenario, if the cloud terminal is dedicated to the user, the two-dimensional code further includes a login account user name of the user, and a specific application method is described in subsequent steps and is not described herein again.
it should be noted that the two-dimensional code is only a convenient information acquisition way, and other information acquisition ways are also applicable to the technical scheme of the present application.
And S202, accessing the mobile phone to a wireless network of the cloud terminal through the network login information in the two-dimensional code.
And monitoring the APP to analyze the two-dimensional code, acquiring a wifi SSID, logging in a password, and requesting the mobile phone to connect a corresponding wireless network according to the request.
as shown in fig. 3, a schematic diagram of establishing a wireless connection between a mobile client and a cloud terminal in a specific application scenario provided in the embodiment of the present application is shown. As shown in the figure, the wifi SSID analyzed by the monitoring APP is specifically SSID1, the login password is SSIDXX, the IP address of the cloud terminal is 192.168.3.33, and the IP address of the video management server is 192.168.1.11.
In the application scenario shown in fig. 3, the mobile phone requests to connect to the wireless network of the cloud terminal through the wifi SSID and the login password obtained by monitoring the APP analysis, and after the wifi SSID and the login password are verified by the cloud terminal, the mobile phone is allowed to access to the wireless network of the mobile phone, and an IP address is allocated to the mobile phone. For convenience of explanation, a specific example of the IP address assigned to the mobile phone is 192.168.3.55 in this embodiment.
and S203, starting keep-alive message interaction between the mobile phone and the cloud terminal.
after the mobile phone accesses the wireless network of the cloud terminal, the cloud terminal is associated with the mobile phone through the keep-alive message. Certainly, the specific keep-alive message interaction is completed between the mobile phone and the cloud terminal, and the generation of the keep-alive message is the specific operation that the monitoring APP indicates the mobile phone to complete. And the cloud terminal receives the keep-alive information from the wifi air interface, records the MAC address of the mobile phone and acquires the information in the keep-alive information.
every 3 seconds (here is the keep-alive message sending cycle, and the specific time length can be set as required) of the monitoring APP instructs the mobile phone to send a keep-alive message to the IP address 192.168.3.33 of the cloud terminal, the source address of the keep-alive message is 192.168.3.55, the cloud terminal responds to the keep-alive response message to the mobile phone when receiving the keep-alive message, the monitoring APP on the mobile phone identifies the keep-alive response message, a complete keep-alive message interaction process is completed, and the monitoring APP and the cloud terminal mutually confirm that the opposite terminal is in an effective network coverage range.
It should be noted that, if the cloud terminal is dedicated to the user, the keep-alive message also needs to carry the login account user name of the user, and specific examples of the keep-alive message content are as follows:
<?xml version="1.0"encoding="GB2312"?>
<Notify>
<CmdType>Keepalive</CmdType>
<DeviceID>34010500001340000003</DeviceID>
<USER>user1</USER>
</Notify>
in this embodiment, the APP code installed on the mobile phone connected to the cloud terminal is specifically "34010500001340000003", and is distinguished from other mobile clients.
the USER field is used to carry the identity of the dedicated USER, and certainly, if the USER is not the dedicated USER, the USER field can also carry the information of the current USER to be logged in, so as to perform subsequent keep-alive message matching verification. In this embodiment, the cloud terminal is a cloud terminal dedicated to USER1, and the value of the USER field is USER 1.
And step S204, the user requests to log in a cloud server of the monitoring service through the monitoring APP.
Based on the determined login account user name, the user fills a corresponding login account password in the monitoring APP and sends the login account password to the cloud terminal through the mobile phone.
Step S205, the cloud terminal performs matching verification on the login account user name and the login account password.
If the matching is successful, the user is a valid user, the user is allowed to log in a cloud server for monitoring the service, the authority for operating the services such as live service, playback service, talkback service and the like can be obtained, and the step S206 is further executed
And if the matching is unsuccessful, confirming that the user is illegal, refusing the user to log in a cloud server of the monitoring service, and ensuring that the user cannot acquire the monitoring data.
step S206, the cloud terminal judges whether the keep-alive messages corresponding to the login account user names are normally interacted.
according to the login account user name information carried in the keep-alive message, the cloud terminal can find the keep-alive message corresponding to the login account user name passing the verification, and judge whether the keep-alive message is in a normal interaction state currently.
if so, it indicates that the user corresponding to the login account user1 is in the effective network coverage of the cloud terminal, and may transmit the monitoring data, and execute step S207.
if the user is not in the normal interaction state, it indicates that the user corresponding to the login account user1 is not currently in the effective network coverage of the cloud terminal, and may have left, and step S208 is executed.
for example, when the user has something and leaves the network coverage of the cloud terminal with the mobile phone, the signal between the cloud terminal and the mobile phone is weakened to be unable to carry the keep-alive message. The cloud terminal determines that if the keep-alive message from the user1 of the wifi air interface is not received within 3 keep-alive periods (the number of the keep-alive periods or the specific time length can be set according to actual needs), it is determined that the keep-alive message is not in a normal interaction state, and step S208 is executed.
Step S207, the cloud terminal acquires the monitoring data requested by the login account through the video management server, decodes the monitoring data, and sends the decoded monitoring data to the mobile phone corresponding to the login account for displaying.
Of course, as described above, the monitoring data in this step may also be displayed locally at the cloud terminal, and such changes are applicable to all embodiments provided in this application, and are not described in detail any more, and such changes do not affect the protection scope of this application.
and the cloud terminal acquires the monitoring data requested by the login account from the video management server.
And after receiving the monitoring data stream returned by the video management server, the cloud terminal decodes the monitoring data stream, sends the decoded monitoring data stream to the mobile phone, and normally plays the monitoring data stream in a playing interface of the monitoring APP.
After the processing in this step is completed, the normal acquisition and transmission process of the monitoring data is realized, and in the process of transmitting the monitoring data, the cloud terminal continuously executes step S206 to continuously monitor the interaction condition of the keep-alive messages corresponding to the login account for acquiring the monitoring data.
and S208, the cloud terminal performs hiding control on the monitoring data stream.
The cloud terminal determines a login account corresponding to the abnormally-interacted keep-alive message, stops decoding the monitoring data requested by the login account, simultaneously stops transmitting the decoded data to the mobile phone corresponding to the login account, and hides the picture. Namely, the monitoring data stream requested by the login account is not decoded and is not sent to the corresponding mobile phone for display after reaching the cloud terminal.
However, considering that the user does not actively log out, the current interruption may be only temporary, and in order to perform a quick reply of monitoring data transmission subsequently, the cloud terminal does not actively release the on-demand of the monitoring data, that is, the monitoring data requested by the login account is still sent to the cloud terminal by the video management server, and only the cloud terminal does not decode, and no user can see the image information, thereby implementing content protection of the video.
after the hiding control is realized, returning to step S206, continuing to monitor the interaction condition of the keep-alive messages, when the user returns, the mobile phone is connected with the cloud terminal again, and the keep-alive messages continue to interact normally, so that the judgment result of step S206 is that the interaction condition is normal, continuing to execute step S207, and resuming the transmission of the monitoring data.
in a specific application scenario, in order to realize quick recovery, it may be set that decoding and data transmission are recovered immediately after the cloud terminal receives 1 keep-alive message, and a user may quickly see recovered monitoring data image information.
the processing process realizes the control transmission of the monitoring data by the cloud terminal, and after the legal user logs in, the monitoring data can be effectively ensured to be only sent to the legal user, and the monitoring data can not be leaked even if the legal user temporarily leaves. And the cloud terminal can not release the on-demand of the monitoring data until the legal user actively performs the logout operation, and the monitoring data is not transmitted any more.
it needs to be further explained that, when the user carries the mobile phone to connect wifi in other areas and the monitoring APP logs in the video management server in the cloud again, in order to realize the continuous and fast recovery of the monitoring data, the application also provides a corresponding solution.
Under the condition that the monitoring APP leaves for a short time and logs in the video management server of the cloud again, the video management server finds that the account is not actively logged out and is disconnected in the midway. Then, the video management server inquires of the cloud terminal to which the user previously logged in whether the user is logged in from the cloud terminal. Correspondingly, the cloud terminal can judge whether the user logs in locally or not through the keep-alive message.
And if the cloud terminal answers the non-local login, the video management server collects the picture layout information before the user from the cloud terminal and inquires whether the monitoring APP needs to continuously check the original monitoring data. When the user determines to continue to check, the video management server pushes the corresponding picture layout information to the monitoring APP, and the user can continue to check the previously requested monitoring data picture on the monitoring APP according to the same previous picture layout.
If the cloud terminal replies the local login, the video management server does not perform any processing, and the cloud terminal continues to perform processing according to the processing scheme from the step S206 to the step S207.
as shown in fig. 4, a schematic diagram of a mobile client recovering wireless connection through other wifi in a specific application scenario provided in the embodiment of the present application is shown. After the user mobile phone leaves the network coverage range of the cloud terminal, other wifi APs are connected in other areas, the monitoring APP sends a notification message to the video management server, the video management server carries a login account user name user1, the video management server inquires that a user1 logs in the cloud terminal, then an information collection message is sent to the cloud terminal, the cloud terminal reports the local decoded image layout information of the login account to the video management server, and specific examples of the format of the reported message are as follows.
<?xml version="1.0"encoding="GB2312"?>
<Notify>
<CmdType>Message</CmdType>
< DeviceID >34010500001340000004</DeviceID > \ \ cloud terminal device encoding
< layout >4</layout > \ \ layout type, 4 pane
< Camera Info1> Camera123 \ \ Camera Info1 \ \ pane 1 decodes Camera123, Camera123 being the Camera ID
< CameraInfo2> Camera456 \ \ pane 2 decoding Camera456
< CameraInfo4> Camera789 \ \ pane 3 Decode Camera789 \\ \ CameraInfo3 \\ \ pane 3
< CameraInfo5> Camera999</CameraInfo4 \ \ pane 4 decoding Camera999
</Notify>
As shown in fig. 4, since the mobile phone is accessed through other wifi APs, the video management server queries whether the monitoring APP needs to continuously watch the original video, and informs the monitoring APP of the corresponding picture layout information. After the monitoring APP confirms the viewed message through the mobile phone feedback, the wifi AP receives the monitoring data stream sent by the video management server and transmits the monitoring data stream to the mobile phone, a user can continuously view the pictures which are originally arranged on the cloud terminal in the same way on the monitoring APP, namely 4-pane images, and the panes 1-4 view Camera images of Camera123, Camera456, Camera789 and Camera999 respectively.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the beneficial technical effects that:
The embodiment of the application discloses a monitoring data acquisition method and a cloud terminal, wherein the method associates the cloud terminal and a mobile client through a keep-alive message, only under the condition that the mobile client passes verification and the keep-alive message is effective, the decoding transmission of the monitoring data is carried out to the mobile client, so that the mobile client can play the monitoring data normally, but after the user leaves with the mobile client, the keep-alive message fails, the cloud terminal performs display control on the monitoring data, so that, the monitoring data stream is continuously received but not decoded, so that on one hand, the illegal user can be prevented from continuously acquiring the monitoring data, on the other hand, the regression of the user carrying the mobile client and the recovery of the keep-alive message can be realized, and the normal decoding transmission of the monitoring data stream is quickly recovered, so that the legal user can quickly recover the normal browsing of the monitoring data.
To more clearly illustrate the solutions provided by the foregoing embodiments of the present application, based on the same inventive concept as the foregoing method, the embodiments of the present application further provide a cloud terminal, a schematic structural diagram of which is shown in fig. 5, and the cloud terminal specifically includes:
A wireless connection module 51, configured to establish a wireless connection with a mobile client;
The keep-alive module 52 is configured to perform periodic keep-alive message interaction with the mobile client after the wireless connection module 51 establishes wireless connection with the mobile client;
The verification module 53 is configured to verify the identity verification information when receiving the identity verification information sent by the mobile client, and determine whether the keep-alive message corresponding to the mobile client is normal according to the interaction condition of the keep-alive module 52;
A data processing module 54, configured to, when the verification module 53 determines that the authentication information passes verification and the keep-alive message corresponding to the mobile client is normal, obtain, through the video management server, the requested monitoring data, decode the monitoring data, and display the monitoring data locally or send the monitoring data to the mobile client for display;
And the control module 55 is configured to perform display control on the requested monitoring data according to the record of the keep-alive message maintenance condition of the mobile client by the keep-alive module 52.
preferably, the first and second liquid crystal materials are,
the wireless connection module 51 is further configured to allocate an IP address to the mobile client after establishing a wireless connection with the mobile client;
The keep-alive module 52 is specifically configured to receive a keep-alive message periodically sent by the mobile client, and send a keep-alive response message to the IP address allocated by the wireless connection module 51 for the mobile client, where the keep-alive message carries the device information of the mobile client and the identity information corresponding to the mobile client.
preferably, the verification module 53 is specifically configured to:
When receiving authentication information sent by the mobile client, judging whether the authentication information and password information included in the authentication information are matched, and if so, determining that the authentication information passes the authentication;
judging whether the time of receiving the keep-alive message sent by the mobile client at the last time reaches a preset first time threshold value;
if the first time threshold value is not reached, judging whether the identity information corresponding to the mobile client carried in the keep-alive message is consistent with the identity information carried in the identity verification information sent by the mobile client;
and if the identity information carried in the keep-alive message is consistent with the identity information carried in the identity verification information, determining that the keep-alive message corresponding to the mobile client is normal.
preferably, the control module 55 is specifically configured to:
when the keep-alive module 52 determines that the time for interrupting the keep-alive message exceeds a preset second time threshold, caching the monitoring data acquired through the video management server, stopping decoding the monitoring data, and stopping displaying the monitoring data locally or at the mobile client;
When the keep-alive module 52 receives the keep-alive message sent by the mobile client again, the cached monitoring data is decoded and then sent to the mobile client for display.
Preferably, the cloud terminal further includes a determining module 56, specifically configured to:
When a login query request aiming at the mobile client and sent by the video management server is received, judging whether the keep-alive message corresponding to the mobile client is normal or not according to the record of the keep-alive message maintenance condition of the mobile client by the keep-alive module 52;
If the video is normal, sending a local login response to the video management server;
if not, a non-local login response is sent to the video management server, and the data processing module 54 is notified to send the monitoring data playing layout information corresponding to the mobile client to the video management server.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the beneficial technical effects that:
the embodiment of the application discloses a monitoring data acquisition method and a cloud terminal, wherein the method associates the cloud terminal and a mobile client through a keep-alive message, only under the condition that the mobile client passes verification and the keep-alive message is effective, the decoding transmission of the monitoring data is carried out to the mobile client, so that the mobile client can play the monitoring data normally, but after the user leaves with the mobile client, the keep-alive message fails, the cloud terminal performs display control on the monitoring data, so that, the monitoring data stream is continuously received but not decoded, so that on one hand, the illegal user can be prevented from continuously acquiring the monitoring data, on the other hand, the regression of the user carrying the mobile client and the recovery of the keep-alive message can be realized, and the normal decoding transmission of the monitoring data stream is quickly recovered, so that the legal user can quickly recover the normal browsing of the monitoring data.
through the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present invention may be implemented by hardware, or by software plus a necessary general hardware platform. Based on such understanding, the technical solution of the embodiment of the present invention may be embodied in the form of a software product, where the software product may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network-side device, etc.) to execute the method described in each embodiment of the present invention.
those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to implement embodiments of the present invention.
Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The sequence numbers of the embodiments of the present invention are only for description, and do not represent the advantages and disadvantages of the implementation scenarios.
the above disclosure is only a few specific implementation scenarios of the embodiments of the present invention, but the embodiments of the present invention are not limited thereto, and any variations that can be considered by those skilled in the art should fall within the scope of the business limitations of the embodiments of the present invention.

Claims (8)

1. a monitoring data acquisition method is applied to a cloud terminal, and is characterized by specifically comprising the following steps:
Establishing wireless connection with a mobile client, and carrying out periodic keep-alive message interaction with the mobile client;
Judging whether the keep-alive message corresponding to the mobile client is normal or not;
verifying the received identity verification information;
If the identity authentication information passes the authentication and the keep-alive message corresponding to the mobile client is normal, acquiring the requested monitoring data, decoding the monitoring data, and displaying the monitoring data locally or sending the monitoring data to the mobile client for displaying;
according to the keep-alive message maintenance condition of the mobile client, performing display control on the requested monitoring data;
the displaying and controlling the requested monitoring data according to the keep-alive message maintaining condition of the mobile client specifically comprises:
When the interruption time of the keep-alive message is determined to exceed a preset second time threshold, caching the monitoring data acquired through the video management server, stopping decoding the monitoring data and displaying the monitoring data locally, or stopping displaying the monitoring data by the mobile client;
And when the keep-alive message sent by the mobile client is received again, decoding the cached monitoring data, and displaying locally or sending the decoded monitoring data to the mobile client for displaying.
2. The method according to claim 1, wherein after establishing the wireless connection with the mobile client, the cloud terminal performs periodic keep-alive message interaction with the mobile client, specifically comprising:
after wireless connection with a mobile client is established, the cloud terminal allocates an IP address for the mobile client;
Receiving a keep-alive message periodically sent by the mobile client, wherein the keep-alive message carries the equipment information of the mobile client and the identity information corresponding to the mobile client;
And sending a keep-alive response message to the IP address corresponding to the mobile client.
3. The method of claim 2, wherein verifying the authentication information and determining whether a keep-alive packet corresponding to the mobile client is normal comprises:
when receiving authentication information sent by the mobile client, judging whether the authentication information and password information included in the authentication information are matched, and if so, determining that the authentication information passes the authentication;
judging whether the time of receiving the keep-alive message sent by the mobile client at the last time reaches a preset first time threshold value;
if the first time threshold value is not reached, judging whether the identity information corresponding to the mobile client carried in the keep-alive message is consistent with the identity information carried in the identity verification information sent by the mobile client;
And if the identity information carried in the keep-alive message is consistent with the identity information carried in the identity verification information, determining that the keep-alive message corresponding to the mobile client is normal.
4. The method of claim 1, wherein after performing display control on the monitoring data sent to the mobile client according to the keep-alive message maintenance condition of the mobile client, the method further comprises:
when a login query request aiming at the mobile client and sent by a video management server is received, judging whether a keep-alive message corresponding to the mobile client is normal or not;
If the video is normal, sending a local login response to the video management server;
And if not, sending a non-local login response to the video management server, and sending monitoring data playing layout information corresponding to the mobile client to the video management server.
5. the cloud terminal is characterized by specifically comprising:
The wireless connection module is used for establishing wireless connection with the mobile client;
The keep-alive module is used for carrying out periodic keep-alive message interaction with the mobile client after the wireless connection module establishes wireless connection with the mobile client;
the verification module is used for verifying the received identity verification information and/or judging whether the keep-alive message corresponding to the mobile client is normal or not according to the interaction condition of the keep-alive module;
the data processing module is used for acquiring the requested monitoring data when the verification module confirms that the authentication information passes the verification and the keep-alive message corresponding to the mobile client is normal, decoding the monitoring data, and displaying the monitoring data locally or sending the monitoring data to the mobile client for displaying;
The control module is used for carrying out display control on the requested monitoring data according to the record of the keep-alive message maintenance condition of the mobile client by the keep-alive module;
The control module is specifically configured to:
When the keep-alive module determines that the time of the keep-alive message interruption exceeds a preset second time threshold, caching the monitoring data acquired through the video management server, stopping decoding the monitoring data, and stopping displaying the monitoring data locally or at the mobile client;
And when the keep-alive module receives the keep-alive message sent by the mobile client again, the cached monitoring data is decoded and then sent to the mobile client for display.
6. The cloud terminal of claim 5,
The wireless connection module is also used for allocating an IP address to the mobile client after establishing wireless connection with the mobile client;
The keep-alive module is specifically configured to receive a keep-alive message periodically sent by the mobile client, and send a keep-alive response message to the wireless connection module for the IP address allocated to the mobile client, where the keep-alive message carries device information of the mobile client and identity information corresponding to the mobile client.
7. The cloud terminal of claim 6, wherein the verification module is specifically configured to:
when receiving authentication information sent by the mobile client, judging whether the authentication information and password information included in the authentication information are matched, and if so, determining that the authentication information passes the authentication;
judging whether the time of receiving the keep-alive message sent by the mobile client at the last time reaches a preset first time threshold value;
if the first time threshold value is not reached, judging whether the identity information corresponding to the mobile client carried in the keep-alive message is consistent with the identity information carried in the identity verification information sent by the mobile client;
And if the identity information carried in the keep-alive message is consistent with the identity information carried in the identity verification information, determining that the keep-alive message corresponding to the mobile client is normal.
8. The cloud terminal of claim 5, further comprising a determining module, specifically configured to:
When a login query request aiming at the mobile client and sent by the video management server is received, judging whether the keep-alive message corresponding to the mobile client is normal or not according to the record of the keep-alive message maintenance condition of the mobile client by the keep-alive module;
If the video is normal, sending a local login response to the video management server;
and if the monitoring data is abnormal, sending a non-local login response to the video management server, and informing the data processing module to send the monitoring data playing layout information corresponding to the mobile client to the video management server.
CN201610797228.7A 2016-08-31 2016-08-31 monitoring data acquisition method and cloud terminal Active CN106412498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610797228.7A CN106412498B (en) 2016-08-31 2016-08-31 monitoring data acquisition method and cloud terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610797228.7A CN106412498B (en) 2016-08-31 2016-08-31 monitoring data acquisition method and cloud terminal

Publications (2)

Publication Number Publication Date
CN106412498A CN106412498A (en) 2017-02-15
CN106412498B true CN106412498B (en) 2019-12-13

Family

ID=58000525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610797228.7A Active CN106412498B (en) 2016-08-31 2016-08-31 monitoring data acquisition method and cloud terminal

Country Status (1)

Country Link
CN (1) CN106412498B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110445640B (en) * 2019-07-10 2022-05-06 视联动力信息技术股份有限公司 Monitoring service control method, system, electronic equipment and storage medium
CN110765451B (en) * 2019-09-26 2021-05-28 支付宝(杭州)信息技术有限公司 Risk identification method and device and electronic equipment
CN112231679B (en) * 2020-09-29 2023-03-28 新华三信息安全技术有限公司 Terminal equipment verification method and device and storage medium
CN112422570B (en) * 2020-11-19 2022-04-26 上海幻电信息科技有限公司 Game login method and device
JP2022186090A (en) * 2021-06-04 2022-12-15 セイコーエプソン株式会社 Printing system, information processing apparatus, and control program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730094A (en) * 2009-11-30 2010-06-09 广州市聚晖电子科技有限公司 Method for accessing terminal equipment to service platform of security system and transmitting information
CN102547239A (en) * 2011-12-29 2012-07-04 浙江工业大学 Android mobile terminal-based video monitoring system
CN103051635A (en) * 2012-12-28 2013-04-17 宁波新然电子信息科技发展有限公司 Method of communication between streaming media server and terminal
CN103491102A (en) * 2013-09-30 2014-01-01 天脉聚源(北京)传媒科技有限公司 Method, system and device for monitoring stability of internet audio and video
CN103929482A (en) * 2014-04-15 2014-07-16 浙江宇视科技有限公司 Method and device for safely having access to monitoring front-end device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8941741B1 (en) * 2014-03-25 2015-01-27 Fmr Llc Authentication using a video signature
JP5857276B1 (en) * 2014-09-12 2016-02-10 パナソニックIpマネジメント株式会社 Authentication system for authenticating wearable cameras and their users
US9646216B2 (en) * 2014-12-08 2017-05-09 Intel Corporation Multiple user biometric for authentication to secured resources

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730094A (en) * 2009-11-30 2010-06-09 广州市聚晖电子科技有限公司 Method for accessing terminal equipment to service platform of security system and transmitting information
CN102547239A (en) * 2011-12-29 2012-07-04 浙江工业大学 Android mobile terminal-based video monitoring system
CN103051635A (en) * 2012-12-28 2013-04-17 宁波新然电子信息科技发展有限公司 Method of communication between streaming media server and terminal
CN103491102A (en) * 2013-09-30 2014-01-01 天脉聚源(北京)传媒科技有限公司 Method, system and device for monitoring stability of internet audio and video
CN103929482A (en) * 2014-04-15 2014-07-16 浙江宇视科技有限公司 Method and device for safely having access to monitoring front-end device

Also Published As

Publication number Publication date
CN106412498A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
CN106412498B (en) monitoring data acquisition method and cloud terminal
US8438593B2 (en) System and method of authorizing a device in a network system
US9363572B2 (en) Method and system for media adaption
CN110213522B (en) Video data processing method and device and related equipment
US20140289839A1 (en) Resource control method and apparatus
CN107211028B (en) Service controller device and method and system for supporting automatic connection with the same
US20150222601A1 (en) Systems for Securing Control and Data Transfer of Smart Camera
US11019013B2 (en) Apparatus and method for managing sharing of content
KR102015955B1 (en) Method for authenticating client
US10034057B2 (en) Message processing method, device, gateway, STB and IPTV
KR101439796B1 (en) Systems and methods for authorizing access to network services using information obtained from subscriber equipment
EP3468179B1 (en) Moving image splitting device and monitoring method
CN105391979B (en) A kind of method and apparatus of business processing
CN110519616B (en) Video distribution method, distribution node, scheduling center and storage medium
WO2014183540A1 (en) Method and system for video surveillance content adaptation, and central server and device
WO2010069220A1 (en) Method and device of video monitoring
US9769668B1 (en) System and method for common authentication across subscribed services
CN112217910B (en) Video service access method, device, network equipment and storage medium
CN109819278B (en) Optimization method of live video
CN113613029B (en) Live broadcast picture display method and device, storage medium and electronic equipment
KR20170082882A (en) Network video recorder and method for blocking video data using the same
KR101970200B1 (en) Method and system for multiple social network service live broadcasting at the same time based on image record apparatus
WO2007137500A1 (en) Public video system and implementation method
CN108965939A (en) Media data processing method, device, system and readable storage medium storing program for executing
CN114143616A (en) Target video processing method and system, storage medium and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant