Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a method for processing access to a law enforcement recorder, and as shown in fig. 1-a, the method for processing access to a law enforcement recorder in the embodiment of the present invention may include the following steps:
step 101, monitoring access events of a law enforcement recorder;
the access event of the law enforcement recorder is an event triggered when the law enforcement recorder is accessed to a police collection workstation.
Specifically, step 101 may include: monitoring a designated interface of a police acquisition workstation, wherein the designated interface is used for connecting a law enforcement recorder; and when the designated interface is monitored to be changed from the idle state to the use state, judging that the access event of the law enforcement recorder is monitored. The idle state refers to a state when the designated interface is not inserted into the law enforcement recorder, and the use state refers to a state when the designated interface is inserted into the law enforcement recorder.
In the embodiment of the invention, the access event of the law enforcement recorder can be continuously monitored after the police collection workstation is powered on and started; or after the police collection workstation is powered on and started, monitoring the access event of the law enforcement recorder in real time in one or more preset time periods; alternatively, the access event of the law enforcement recorder may be monitored under the trigger of a preset condition, which is not limited herein.
102, when monitoring the access event of the law enforcement recorder, sequentially calling identification protocols with corresponding priorities according to the priorities of all preset identification protocols from high to low to identify the currently accessed law enforcement recorder until the currently accessed law enforcement recorder is successfully identified or all currently available identification protocols are called;
in the embodiment of the invention, when the access event of the law enforcement recorder is monitored in step 101, it indicates that the police collection workstation has a newly accessed law enforcement recorder, and at this time, according to the priorities of the preset identification protocols, the identification protocols with the corresponding priorities are sequentially called from high to low according to the priorities of the preset identification protocols to identify the currently accessed law enforcement recorder until the currently accessed law enforcement recorder is successfully identified or all currently available identification protocols are called. It should be noted that, when the called identification protocol is compatible with the currently accessed law enforcement recorder, the currently accessed law enforcement recorder can be successfully identified through the called identification protocol. Specifically, the process of identifying the law enforcement recorder through the identification protocol compatible with the law enforcement recorder can be implemented by referring to the prior art, and is not described herein again.
For example, let the currently available identification protocols include the following 3 identification protocols: identifying protocol 1, identifying protocol 2 and identifying protocol 3, wherein the priority of identifying protocol 1 is higher than the priority of identifying protocol 2, and the priority of identifying protocol 2 is higher than the priority of identifying protocol 3. When the access event of the law enforcement recorder is monitored in the step 101, according to the sequence of the priority from high to low, firstly calling an identification protocol 1 to identify the currently accessed law enforcement recorder, and if the law enforcement recorder can be successfully identified by adopting the identification protocol 1, stopping the execution of the step 102; if the law enforcement recorder cannot be identified by the identification protocol 1, the identification protocol 2 is called to identify the currently accessed law enforcement recorder. If the law enforcement recorder can be successfully identified using identification protocol 2, execution of step 102 may be stopped; if the law enforcement recorder cannot be identified by adopting the identification protocol 2, calling the identification protocol 3 to identify the currently accessed law enforcement recorder. If the law enforcement recorder can be successfully identified using identification protocol 3, execution of step 102 may be stopped; if the law enforcement recorder cannot be identified using identification protocol 3, execution of step 102 may be stopped because all available identification protocols have been invoked at that time.
It should be noted that the currently available identification protocol may only include the identification protocol with configured priority, or the currently available identification protocol may also include all the identification protocols that are configured in advance and can be called (for example, all the identification protocols that are configured in advance in the police collection workstation), that is, may include the identification protocol with non-configured priority. For the case that the currently available identification protocol includes an identification protocol without priority, the invoked time of the identification protocol without priority will be later than the invoked time of the identification protocol with priority, that is, the identification protocol with priority will be invoked with priority to identify the currently accessed law enforcement recorder in step 102. Specifically, the currently available identification protocol may be set by the user according to actual needs, and is not limited herein.
Furthermore, in the implementation of the invention, when the currently accessed law enforcement recorder cannot be identified and all currently available identification protocols are called, the reminding information can be output, so that the user is reminded of the fact that the currently accessed law enforcement recorder cannot be identified through the reminding information. As further illustrated by the above example, when the currently accessed law enforcement recorder cannot be identified by using the identification protocol 3, the execution of step 102 may be stopped, and a reminder message may be further output to remind the user that the currently accessed law enforcement recorder cannot be identified by using the reminder message.
In the embodiment of the invention, a plurality of identification protocols compatible with various law enforcement recorders produced by various manufacturers can be collected in advance and configured in the police acquisition workstation so as to be called when the law enforcement recorders are accessed into the police acquisition workstation.
Optionally, the user may modify the priority of each identification protocol according to actual needs. That is, the access processing method for a law enforcement recorder in the embodiment of the present invention further includes a priority custom configuration flow, as shown in fig. 1-b, where the priority custom configuration flow includes the following steps:
a1, receiving an input priority configuration instruction;
in the embodiment of the invention, a priority configuration interface can be provided for a user, so that the user can input the priority configuration instruction through the priority configuration interface. Wherein, the priority configuration interface comprises: and the model selection control is respectively associated with various preset priorities, so that the user can select the model of the law enforcement recorder through the model selection control. For example, assuming that there are priority 1, priority 2, and priority 3, where priority 1 is higher than priority 2 and priority 2 is higher than priority 3, such as the priority configuration interface shown in fig. 1-c, model selection control 11 is associated with priority 1, model selection control 12 is associated with priority 2, and model selection control 13 is associated with priority 3. The user may select the desired law enforcement recorder model via the model selection control 11, the model selection control 12 and the model selection control 13, respectively, and when the "submit" button 14 of the priority configuration command is triggered, the input of the priority configuration command is triggered.
Further, the priority configuration interface may further include an available identification protocol selection control, so that the user can select a currently available identification protocol through the available identification protocol selection control. As shown in fig. 1-c, the user can select the currently available identification protocol through the available identification protocol selection control 15, and when the user selects the option designated "yes" and triggers the priority configuration instruction, only the identification protocol with configured priority is set as the currently available identification protocol, and when the user selects the option designated "no" and triggers the priority configuration instruction, all the identification protocols that are pre-configured and available are set as the currently available identification protocol.
Specifically, prior to step a1, the priority configuration interface may be displayed locally (e.g., locally at a police collection workstation). Alternatively, before step a1, the priority configuration interface may be pushed to an authentication terminal, so that the priority configuration interface is displayed at the authentication terminal, so that a user may perform a remote configuration operation based on the priority configuration interface. The authentication terminal is a terminal which successfully logs in a web management interface of the police collecting workstation after passing authentication, and specifically can be a mobile phone, a tablet computer, a personal computer, a notebook computer and the like.
Of course, in step a1, the user may not be provided with the priority configuration interface, and the user may input the priority configuration command by means of a script, a command line, or the like, which is not limited herein.
A2, updating the priority of the related identification protocol according to the priority configuration instruction;
in step A2, the priority of the associated identification protocol is updated according to the priority configuration instructions received in step A1. Specifically, when the priority configuration command is input through the priority configuration interface, step a2 may be represented as: and under the triggering of the received priority configuration instruction, updating the priority of the identification protocol compatible with the type of the law enforcement recorder currently selected through the type selection control into the priority associated with the corresponding type selection control. As further illustrated by the priority configuration interface shown in fig. 1-c, assuming that the user selects law enforcement recorder model B1, law enforcement recorder model B2, and law enforcement recorder model B3, respectively, in model select control 11, model select control 12, and model select control 13, and that key 14 is actuated, step a2 may be embodied as: the priority of the identification protocol compatible with the law enforcement recorder model B1 is updated to priority 1, the priority of the identification protocol compatible with the law enforcement recorder model B2 is updated to priority 2, and the priority of the identification protocol compatible with the law enforcement recorder model B3 is updated to priority 3.
It should be noted that the priority customization configuration process shown in fig. 1-b may be triggered and executed at any time after the police collection workstation is powered on and started, which is not limited herein.
It should be noted that, the law enforcement recorder access processing method in the embodiment of the present invention may be executed by a law enforcement recorder access processing device, and the law enforcement recorder access processing device may be integrated in the above-mentioned police collection workstation or other equipment capable of being communicatively connected with the police collection workstation, which is not limited herein.
As can be seen from the above, when a law enforcement recorder access event is monitored, the access processing method of the law enforcement recorder in the embodiment of the present invention sequentially calls the identification protocols of the corresponding priorities from high priority to low priority to identify the currently accessed law enforcement recorder until the currently accessed law enforcement recorder is successfully identified or all currently available identification protocols are called. On one hand, as more than one identification protocol exists, more than one law enforcement recorder can be identified, and the compatibility of the police collection workstation is improved; on the other hand, because the identification protocol with high priority is called preferentially to identify the currently accessed law enforcement recorder, the identification protocol with high priority can be set as the high priority, thereby improving the identification efficiency of the commonly used law enforcement recorder.
As shown in fig. 2, the access processing device 200 of the law enforcement recorder in the embodiment of the present invention includes:
the monitoring unit 201 is configured to monitor an access event of a law enforcement recorder, where the access event of the law enforcement recorder is an event triggered when the law enforcement recorder accesses a police collection workstation;
and the processing unit 202 is configured to, when the monitoring unit 201 monitors the access event of the law enforcement recorder, sequentially invoke the identification protocols with the corresponding priorities in the order from high priority to low priority according to the preset priorities of the identification protocols to identify the currently accessed law enforcement recorder until the currently accessed law enforcement recorder is successfully identified or all currently available identification protocols are invoked.
Optionally, the access processing device of the law enforcement recorder in the embodiment of the present invention further includes:
the command receiving unit is used for receiving an input priority configuration command;
and the updating unit is used for updating the priority of the related identification protocol according to the priority configuration instruction received by the instruction receiving unit.
Optionally, the instruction receiving unit is specifically configured to: receiving a priority configuration instruction input through a priority configuration interface, wherein the priority configuration interface comprises: model selection controls respectively associated with various preset priorities;
the update unit is specifically configured to: and under the triggering of the priority configuration instruction received by the instruction receiving unit, updating the priority of the identification protocol compatible with the type of the law enforcement recorder selected by the type selection control currently to the priority associated with the corresponding type selection control.
Optionally, the access processing device of the law enforcement recorder in the embodiment of the present invention further includes:
and the display unit is used for locally displaying the priority configuration interface.
Optionally, the access processing device of the law enforcement recorder in the embodiment of the present invention further includes:
and the pushing unit is used for pushing the priority configuration interface to an authentication terminal based on a web service so as to display the priority configuration interface at the authentication terminal.
It should be understood that the functions of each functional module of the access processing device of the law enforcement recorder in the embodiment of the present invention may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description in the foregoing method embodiment, which is not described herein again.
As can be seen from the above, when the access processing device of the law enforcement recorder in the embodiment of the present invention monitors an access event of the law enforcement recorder, the identification protocols with corresponding priorities are sequentially invoked according to the sequence from high priority to low priority to identify the currently accessed law enforcement recorder until the currently accessed law enforcement recorder is successfully identified or all currently available identification protocols are invoked. On one hand, as more than one identification protocol exists, more than one law enforcement recorder can be identified, and the compatibility of the police collection workstation is improved; on the other hand, because the identification protocol with high priority is called preferentially to identify the currently accessed law enforcement recorder, the identification protocol with high priority can be set as the high priority, thereby improving the identification efficiency of the commonly used law enforcement recorder.
In the several embodiments provided in the present application, it should be understood that the disclosed method, apparatus, and system may be implemented in other ways.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In view of the above description of the access processing method and apparatus for a law enforcement recorder provided by the present invention, for a person skilled in the art, according to the ideas of the embodiments of the present invention, there may be changes in the specific implementation manners and application ranges.