CN108282637A - A kind of method for secret protection and device based on video monitoring equipment - Google Patents

A kind of method for secret protection and device based on video monitoring equipment Download PDF

Info

Publication number
CN108282637A
CN108282637A CN201810170067.8A CN201810170067A CN108282637A CN 108282637 A CN108282637 A CN 108282637A CN 201810170067 A CN201810170067 A CN 201810170067A CN 108282637 A CN108282637 A CN 108282637A
Authority
CN
China
Prior art keywords
control
control instruction
eyelid
control centre
monitoring device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810170067.8A
Other languages
Chinese (zh)
Other versions
CN108282637B (en
Inventor
叶军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Pu Get Technology Co Ltd
Original Assignee
Shenzhen Pu Get Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Pu Get Technology Co Ltd filed Critical Shenzhen Pu Get Technology Co Ltd
Priority to CN201810170067.8A priority Critical patent/CN108282637B/en
Publication of CN108282637A publication Critical patent/CN108282637A/en
Application granted granted Critical
Publication of CN108282637B publication Critical patent/CN108282637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/50Constructional details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of method for secret protection and device based on video monitoring equipment, the method includes:User terminal sends control instruction and controls the monitoring device unlatching/closing to the monitoring device, and the control instruction is sent to the corresponding control centre of the eyelid device;Control centre receives and verifies the control instruction, and controls the eyelid device unlatching/closing according to the control instruction when being proved to be successful.The present invention in eyelid device by configuring control centre; when user terminal sends control instruction to monitoring device; the control instruction is synchronized and is sent to eyelid device; so that eyelid device is in same state with monitoring device; and then monitoring device is protected by eyelid device; it can reduce user's operation with automatic switch eyelid device, improve the intelligent of monitoring device again simultaneously.

Description

A kind of method for secret protection and device based on video monitoring equipment
Technical field
The present invention relates to monitoring device technical field, more particularly to a kind of method for secret protection based on video monitoring equipment And device.
Background technology
Video monitoring equipment enters into rapidly ordinary people family at present, but hacker can stealthily be opened using Malware Monitoring device spies upon privacy of user so that there are security risks security product.In view of the above-mentioned problems, generally using two kinds at present Mode, a kind of mode are to handle the collected data of monitoring device, such as data are encrypted, limit transmission channel or Person reinforces account management etc.;Although this method can solve the problems, such as to a certain extent, it is with larger technology requirement And safety problem can not be prevented completely.Another way is to increase physical equipment in monitoring device to be hidden to monitoring device Gear, steals user data to avoid by monitoring device, privacy of user is caused to reveal.But the physics of monitoring device configuration is set It is standby to need user's manual switch, the operation of user is increased, is made troubles to the use of user.
Thus the prior art could be improved and improve.
Invention content
The technical problem to be solved in the present invention is, in view of the deficiencies of the prior art, provides one kind and is set based on video monitoring Standby method for secret protection and device is asked with solving the existing monitoring device for blocking equipment configured with physics there are awkward Topic.
In order to solve the above-mentioned technical problem, the technical solution adopted in the present invention is as follows:
A kind of method for secret protection based on video monitoring equipment is applied to the monitoring device configured with eyelid device, packet It includes:
User terminal sends control instruction and controls the monitoring device unlatching/closing to the monitoring device, and by the control Instruction is sent to the corresponding control centre of the eyelid device;
Control centre receives and verifies the control instruction, and controls the eyelid according to the control instruction when being proved to be successful Device unlatching/closing.
The method for secret protection based on video monitoring equipment, wherein the user terminal sends control instruction to described Monitoring device is to control the monitoring device unlatching/closing, and it is corresponding that the control instruction is sent to the eyelid device Control centre specifically includes:
User terminal receives control instruction input by user, and the control instruction is sent to monitoring device and is opened with controlling monitoring device It opens/closes;
Control data is generated according to the control instruction, and the control data is sent to control centre, wherein the control Request carries the control instruction and verification information.
The method for secret protection based on video monitoring equipment, wherein the control centre receives and verifies the control System instruction, and the eyelid device unlatching/closing is controlled according to the control instruction when being proved to be successful and is specifically included:
Control centre receives the control data, extracts the control instruction and verification information, and according to the verification information The control instruction is verified;
When the authentication succeeds, the control instruction is sent to eyelid device by the control centre by serial ports, so that described Eyelid device is according to the control instruction unlatching/closing.
The method for secret protection based on video monitoring equipment, wherein when the control instruction is out code, After being proved to be successful, control instruction, which controls before the eyelid device is closed, includes:
The state of the eyelid device detects in control centre, wherein the state includes open state and closed state;
When the eyelid device is in open state, the eyelid device is closed according to the control instruction;
When the eyelid device is closed, the out code is abandoned.
The method for secret protection based on video monitoring equipment, wherein when the control instruction is open command, institute It states control centre and receives and verify the control instruction, and the eyelid is controlled according to the control instruction when being proved to be successful and is filled Setting unlatching/closing further includes later:
The working condition of the monitoring device is monitored by the control centre;
When the working condition meets preset condition, controls the eyelid device and close.
The method for secret protection based on video monitoring equipment, wherein described to preset item when the working condition meets When part, controls the eyelid device closing and specifically include:
When the working condition meets preset condition, start the timer of the first preset time of configuration;
When the timer expired, controls the eyelid device and close.
The method for secret protection based on video monitoring equipment, wherein when the control instruction is open command, institute It states control centre and receives and verify the control instruction, and the eyelid is controlled according to the control instruction when being proved to be successful and is filled Setting unlatching/closing further includes later:
The control centre judges whether system time reaches third preset time at interval of the second preset time;
When system time reaches third preset time, controls the eyelid device and close.
The method for secret protection based on video monitoring equipment, wherein after the control eyelid device is closed Further include:
The control centre sends prompt message to the user terminal, to prompt user monitoring equipment to be in by the user terminal Failure state.
A kind of privacy protection device based on video monitoring equipment comprising load eyelid device, control centre and prison Equipment is controlled, the monitoring device receives control instruction input by user, and corresponding operating is executed according to the control instruction, and by institute It states control instruction and is sent to control centre,;The control centre receives and verifies the control instruction, when being proved to be successful, leads to It crosses serial line interface and control instruction is sent to eyelid device, corresponding operating is executed to control eyelid device.
The privacy protection device based on video monitoring equipment, which is characterized in that the monitoring device and control centre It is communicated using P2P communication modes.
Advantageous effect:Compared with prior art, the present invention provides a kind of secret protection sides based on video monitoring equipment Method and device, the method includes:User terminal send control instruction controlled to the monitoring device monitoring device open/ It closes, and the control instruction is sent to the corresponding control centre of the eyelid device;Control centre receives and verifies described Control instruction, and the eyelid device unlatching/closing is controlled according to the control instruction when being proved to be successful.The present invention by Control centre is configured in eyelid device, when user terminal sends control instruction to monitoring device, which is synchronized and is sent To eyelid device so that eyelid device and monitoring device are in same state, and then by eyelid device to monitoring device into Row protection, while can reduce user's operation with automatic switch eyelid device, improving the intelligent of monitoring device again.
Description of the drawings
Fig. 1 is the flow chart of the method for secret protection preferred embodiment provided by the invention based on video monitoring equipment.
Fig. 2 is the flow chart of step S10 in the method for secret protection provided by the invention based on video monitoring equipment.
Fig. 3 is the flow chart of step S20 in the method for secret protection provided by the invention based on video monitoring equipment.
Fig. 4 is to be automatically closed in method for secret protection one embodiment provided by the invention based on video monitoring equipment The flow chart of one embodiment of journey.
Fig. 5 is to be automatically closed in method for secret protection one embodiment provided by the invention based on video monitoring equipment The flow chart of step S40 in journey.
Fig. 6 is to be automatically closed in method for secret protection one embodiment provided by the invention based on video monitoring equipment The flow chart of another embodiment of journey.
Fig. 7 is the structure principle chart of the privacy protection device provided by the invention based on video monitoring equipment.
Specific implementation mode
The present invention provides a kind of method for secret protection and device based on video monitoring equipment, for make the purpose of the present invention, Technical solution and effect are clearer, clear, and the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.It should Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that is used in the specification of the present invention arranges It refers to there are the feature, integer, step, operation, element and/or component, but it is not excluded that presence or addition to take leave " comprising " Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes that the whole of one or more associated list items or any cell are combined with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), there is meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless by specific definitions as here, the meaning of idealization or too formal otherwise will not be used To explain.
Below in conjunction with the accompanying drawings, by the description of the embodiment, being described further to invention content.
Fig. 1 is please referred to, Fig. 1 is the preferred embodiment of the method for secret protection provided by the invention based on video monitoring equipment Flow chart.The method includes:
S10, user terminal send control instruction and control the monitoring device unlatching/closing to the monitoring device, and will be described Control instruction is sent to the corresponding control centre of the eyelid device.
Specifically, the eyelid device is to be set in advance in the monitoring device, for being carried out to the monitoring device The device that physics blocks, and when the eyelid device is closed, monitoring device can not acquire it because being blocked Image in corresponding acquisition range.The eyelid device may include rotatable shutter and be rotated for controlling shutter Drive motor, and the drive motor and control centre(Such as, controller etc.)Be connected, with by control centre to the drive Dynamic motor is controlled.
The control centre is loaded into monitoring device, and is connected with the eyelid device by serial ports, i.e., the described control Center processed is the local control centre of the eyelid device, and eyelid device can receive the control that control centre sends without networking Instruction, the communication avoided between control centre and eyelid device is stolen, to improve the safety of eyelid device.This Outside, the drive motor receives the control signal that control centre is sent by serial ports, and is driven according to the control signal received The shutter rotation is to block the monitoring device.In the present embodiment, before the eyelid device is located at the monitoring device Just and can have gap, such eyelid device that can not only play the role of blocking between the two, but also will not be to monitoring device Camera lens causes to wear.Certainly, in the variant embodiment of the present embodiment, the eyelid device can also use other structures, If can be with control centre by serial communication, and control instruction is sent according to the control centre and carries out corresponding operating(It opens Open operation/shutoff operation).
In the present embodiment simultaneously, the user terminal can be user, and the monitoring device configuration receives the control of user Operation, and corresponding control instruction is generated according to control operation.For example, the monitoring device is configured with voice-input device(Such as, Microphone), and be identified by the voice messaging of voice-input device reception user, and to the voice messaging to obtain To the control instruction.The mechanical keys such as physical button or touch key-press either can be provided in the monitoring device, are led to It crosses and triggers the mechanical key and can generate the control instruction, can make monitoring device in the case of failed cluster in this way, The control instruction can be received.In addition, should illustrate, when the audiomonitor directly receives the control of user's operation formation When system instruction, the control instruction is sent to control centre by the audiomonitor by P2P agreements.
In addition, the user terminal can be terminal device, the control that user is received by the terminal device operates, according to The control operation generates control instruction, and the control instruction is sent to monitoring device, to realize the monitoring device Remote operation.Further, since user terminal needs to send control instruction to monitoring device, to which the user terminal and the monitoring are set It is standby to need to pre-establish connection, to ensure that the user terminal for authorized user end, improves the safety of monitoring device control.Also It is to say, can also includes before user terminal sends control instruction to monitoring device:User terminal sends connection request to monitoring and sets Standby, monitoring device receives the connection request and is simultaneously verified to it, receive when the authentication succeeds the connection request and with institute It states user terminal and establishes connection, so that the user terminal can send control instruction and the monitoring device, wherein the user End is communicated with the monitoring device using P2P communication modes.In the present embodiment, the user terminal can be mobile phone, IPOD and smartwatch etc..
The user terminal can receive user by loading the APP for controlling the monitoring device, and by the APP The account and password of input, the user terminal is associated with the account.In addition, the user terminal can pass through search Mode obtains attachable monitoring device, can also connect equipment mark by way of receiving monitoring device mark input by user Know corresponding monitoring device, the identification code that can also be carried by scanning monitoring device(Such as, Quick Response Code etc.)Mode with it is described Monitoring device establishes connection etc..In addition, after the user terminal and the monitoring device establish connection, by monitoring device device Control centre is connected with user terminal, so that the user terminal can be sent to the control centre carries verification information Connection request, control centre verify to be verified to the user terminal verification information, when being proved to be successful with The user terminal binding, and communicated using P2P communication modes, to improve the safety of communication.
Further, the control instruction includes open command and out code, and the open command is for controlling the prison Opening of device is controlled, the out code is closed for controlling the monitoring device, i.e., the described control instruction is for controlling the prison Control opening of device/closing.In addition, the user terminal is by the control instruction while being sent to monitoring device, by the control System instruction is sent to control centre, so that control centre generates corresponding control information, and foundation according to the control instruction The control information controls eyelid device unlatching/closing.It is converted to out that is, control centre will receive open command Information is opened to control the unlatching of eyelid device, the out code received is converted to close off information to control the closing of eyelid device.
In the present embodiment simultaneously, the user terminal and monitoring device and control centre establish after connection, user terminal to The control instruction that control centre and monitoring device are sent needs to carry verification information, the verification information can be user terminal with Control centre and monitoring device negotiate determination, are tested with the control instruction sent to user terminal by the verification information Card, improves the safety of control instruction.Correspondingly, as shown in Fig. 2, the user terminal sends control instruction to the monitoring device To control the monitoring device unlatching/closing, and the control instruction is sent to the corresponding control centre of the eyelid device It specifically includes:
S11, user terminal receive control instruction input by user, and the control instruction is sent to monitoring device and is set with controlling monitoring Standby unlatching/closing;
S12, control data is generated according to the control instruction, and the control data is sent to control centre, wherein is described Control data carries the control instruction and verification information.
Specifically, the user inputs the control instruction by user terminal, will after user terminal receives control instruction The control instruction is sent to monitoring device to control the monitoring device unlatching/closing;User terminal is according to the control simultaneously Instruction generates control data, wherein control data carries control instruction and verification information.In addition, the user terminal receives control After system instruction, the control instruction is encrypted in the private key that its configuration may be used, and encrypted control instruction is sent To monitoring device;Monitoring device receives the encrypted control instruction, is referred to the encrypted control using the public key of its storage Order is decrypted, and in successful decryption, executes corresponding operation according to the control instruction, and send feedback information to user. User terminal upon reception of the feedback information, according to the control instruction generate control data, can make in this way eyelid device with The state of the monitoring device is the same, on the one hand can improve the safety of monitoring device, does not on the other hand influence monitoring again and sets Standby normal use.
S20, control centre receive and verify the control instruction, and are controlled according to the control instruction when being proved to be successful The eyelid device unlatching/closing.
Specifically, after the control centre receives the control instruction, the first verification that extraction control instruction carries is believed Breath, and first verification information is compared with the second verification information that its own is carried to be carried out to the control instruction Verification.Described be proved to be successful refers to that the first verification information matches with the second verification information, for example, the first verification information and the Two verification informations are consistent, or preset rules may be used will be converted to the second verification information to the first verification information.Wherein, institute It can be base64 encryption rules to state preset rules, i.e., obtain second after being decrypted using base64 pairs of the first verification information and test Demonstrate,prove information.The preset rules may be Chinese character rule change, and first verification information is several default Chinese characters compositions The first character string, the second verification information is the second character string that several default Chinese characters are constituted, and the Chinese character rule change is advance It is stored in control centre, if you become me, becomes small etc. greatly.In the present embodiment, the control centre can be main controller, or Person MCU etc..
In addition, in order to avoid the communication between control centre and eyelid device is stolen or falsification, the control centre with It uses serial communication, i.e. control centre to be connect by serial ports with the drive motor of eyelid device between the eyelid device, controls Control instruction is sent to drive motor by center by serial ports, to control eyelid device unlatching/closing by the drive motor. Illustratively, as shown in figure 3, the control centre receives and verifies the control instruction, and when being proved to be successful according to Control instruction controls the eyelid device unlatching/closing and specifically includes:
S21, control centre receive the control data, extract the control instruction and verification information, and according to the verification Information verifies the control instruction;
S22, when the authentication succeeds, the control instruction is sent to eyelid device by the control centre by serial ports, so that The eyelid device is according to the control instruction unlatching/closing.
Specifically, the control instruction includes open command and out code, when control centre receives open command, The control instruction is sent to eyelid device by control centre, to control the unlatching of eyelid device.When control centre receives closing When instruction, control centre judges the state of the eyelid device, to determine whether to execute the out code.Correspondingly, described When the control instruction is out code, after a successful authentication, control instruction is controlled before the eyelid device is closed and is wrapped It includes:
S22a, control centre detect the state of the eyelid device, wherein the state includes open state and closed state;
S22b, when the eyelid device is in open state, the eyelid device is closed according to the control instruction;
S22c, when the eyelid device is closed, abandon the out code.
Specifically, the eyelid unit state includes open state and closed state, and the state can be according to driving horse The state that reaches and determine.Certainly, it can be provided with status indicator lamp in the eyelid device, by detecting the status indicator lamp State and determine the state of eyelid device.And receive that the state for detecting eyelid device is needed when out code is because of eyelid Device can be automatically closed when monitoring device can not acquire image due to network etc., and the Working mould of monitoring device at this time Formula is open mode, then control centre, when receiving out code, eyelid device has been closed.To avoid controlling Center processed sends the control instruction of mistake to eyelid state, when receiving out code, needs the shape for first detecting eyelid device State, and when eyelid device is closed, abandon the out code.
In addition, after control centre receives open command and controls the eyelid device unlatching according to the open command, Control centre can search its associated first user terminal, and send the prompt letter that eyelid device is opened to first user terminal Breath, to improve the safety of monitoring device.Certainly, in practical applications, the control centre may also listen for first use The feedback information at family end controls the eyelid device if not hearing feedback information in the first preset time, in this way can be into One step improves the safety of monitoring device.
In one embodiment of the invention, the eyelid dress can be automatically closed in the control centre according to preset condition It sets, the preset condition can be monitoring device failure or monitoring device coverage changes or monitoring device is disconnected Net etc..It is described to be automatically closed what operation carried out after the monitoring device and eyelid device are opened, to work as user terminal Control instruction when being open command, the control centre receives and verifies the control instruction, and when being proved to be successful according to The control instruction control after the eyelid device unlatching/closing further include process is automatically closed, as shown in figure 4, it is described from Dynamic closing process is specifically as follows:
S30, the control centre monitor the working condition of the monitoring device;
S40, when the working condition meets preset condition, control the eyelid device and close.
Specifically, the working condition may include network state, monitoring range, acquisition state etc., the working condition It can automatically be obtained with control centre, can also be that monitoring device is automatically sent to control centre.Control centre listens to institute After stating working condition, judge whether the working condition meets preset condition, if meeting preset condition, generates the first closing and refer to It enables and eyelid device is controlled according to the first out code and close.Wherein, the preset condition include network interruption, monitoring range with Default monitoring range is not consistent and does not collect image, and when meeting one in preset condition in the working condition that listen to Item then judges that working condition meets preset condition.
Further, in order to avoid the normal work that eyelid device influences monitoring device, meet preset condition in working condition When, the working condition duration can be monitored, when duration reaches the first preset time, then controls eyelid dress Set closing.Correspondingly, as shown in figure 5, described when the working condition meets preset condition, control the eyelid device and close It specifically includes:
S41, when the working condition meets preset condition, start configuration the first preset time timer;
S42, when the timer expired, control the eyelid device and close.
Specifically, first preset time is pre-set, e.g., 2 minutes, 5 minutes etc..That is, when monitoring After equipment meets preset condition and continues the first preset time, control centre controls eyelid device and closes.It is described to meet default item Part is one only met in preset condition, and in the process for meeting preset condition, meets the clause in preset condition It changes, the timer continues timing.Certainly, in the variant embodiment of the present embodiment, when the item for meeting preset condition When money changes, the timer can reset and restart timing, i.e., when the in running order satisfaction of monitoring device is pre- If one when reaching the first preset time in condition, control eyelid state is closed.For example, monitor state suspension 5 minutes, then control Eyelid device is closed.
Further, the condition being automatically closed can also be that timing is closed, i.e., user terminal pre-sets the shut-in time, when When reaching the shut-in time, eyelid device is automatically closed while the monitoring device is also automatically closed.Correspondingly, such as Fig. 6 institutes Show, the process that is automatically closed may include:
S50, the control centre judge whether system time reaches third preset time at interval of the second preset time;
S60, when system time reaches third preset time, control the eyelid device and close.
Specifically, the second preset time indicates duration, for example, 1 minute etc., third preset time indicates time point, e.g., 12 Point, 13 points etc..The control centre obtains system time at interval of the second preset time or request user terminal sends user terminal System time, and after getting system time, judge whether system time reaches third preset time, it is pre- when reaching third If when the time, controlling the eyelid device and closing.At the same time it can also generate a control information, the control information is sent to User terminal, so that user terminal, which sends out code, controls the monitoring device closing to monitoring device.
Based on the above-mentioned method for secret protection based on video monitoring equipment, the present invention also provides one kind being based on video monitoring The privacy protection device of equipment, as described in Figure 7 comprising be mounted with eyelid device 400, control centre 300 and monitoring device 200, the eyelid device 400 is set in the monitoring device 200, and the camera lens for blocking the monitoring device 200, institute It states control centre 300 to be configured in the monitoring device 200, and is connected with the eyelid device 400 by serial ports;The prison It controls equipment and receives control instruction input by user, corresponding operating is executed according to the control instruction, and the control instruction is sent out Send to and control centre 300;The control centre 300 receives and verifies the control instruction, when being proved to be successful by serial Control instruction is sent to eyelid device 400 by interface, and corresponding operating is executed to control eyelid device 400.
Further, as shown in fig. 7, the privacy protection device based on video monitoring equipment, can also include user End 100, the user terminal and the monitoring device and control centre communicate, and user terminal and the monitoring device 200 with And control centre 300 is communicated using P2P communications protocol.It should illustrate, the function, work of each component part in described device Make process and mutual communication composition illustrates in the above-mentioned methods, be not just described in detail here.
Based on the above-mentioned method for secret protection based on video monitoring equipment, the present invention also provides a kind of monitoring device, Including at least one first processor(processor);And first memory(memory), can also include that the first communication connects Mouthful(Communications Interface)With the first bus.Wherein, first processor, first memory and the first communication connect Mouth can complete mutual communication by the first bus.First communication interface can transmit information.First processor can be adjusted With the logical order in first memory, the operation of monitoring device in the method to execute above-described embodiment.
Based on the above-mentioned method for secret protection based on video monitoring equipment, the present invention also provides a kind of controller, packets Include at least one second processor(processor)And second memory(memory), can also include the second communication interface (Communications Interface)With the second bus.Wherein, second processor, second memory and the second communication interface Mutual communication can be completed by the second bus, the second communication interface can transmit information.Second processor can be called Logical order in second memory, the operation of control centre in the method to execute above-described embodiment.
In addition, a plurality of instruction first processor in above-mentioned terminal device loads and the detailed process executed and above-mentioned control A plurality of instruction second processor in device processed loads and the detailed process executed has been described in detail in the above-mentioned methods, herein Just no longer state one by one.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, it will be understood by those of ordinary skill in the art that:It still may be used With technical scheme described in the above embodiments is modified or equivalent replacement of some of the technical features; And these modifications or replacements, various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of method for secret protection based on video monitoring equipment, which is characterized in that it is applied to configured with eyelid device Monitoring device comprising:
User terminal sends control instruction and controls the monitoring device unlatching/closing to the monitoring device, and by the control Instruction is sent to the corresponding control centre of the eyelid device;
Control centre receives and verifies the control instruction, and controls the eyelid according to the control instruction when being proved to be successful Device unlatching/closing.
2. the method for secret protection based on video monitoring equipment according to claim 1, which is characterized in that the user terminal hair It send control instruction to the monitoring device to control the monitoring device unlatching/closing, and the control instruction is sent to institute The corresponding control centre of eyelid device is stated to specifically include:
User terminal receives control instruction input by user, and the control instruction is sent to monitoring device and is opened with controlling monitoring device It opens/closes;
Control data is generated according to the control instruction, and the control data is sent to control centre, wherein the control Request carries the control instruction and verification information.
3. the method for secret protection based on video monitoring equipment according to claim 2, which is characterized in that the control centre The control instruction is received and verified, and the eyelid device unlatching/pass is controlled according to the control instruction when being proved to be successful It closes and specifically includes:
Control centre receives the control data, extracts the control instruction and verification information, and according to the verification information The control instruction is verified;
When the authentication succeeds, the control instruction is sent to eyelid device by the control centre by serial ports, so that described Eyelid device is according to the control instruction unlatching/closing.
4. according to claim 1 or 3 method for secret protection based on video monitoring equipment, which is characterized in that when the control When system instruction is out code, after a successful authentication, control instruction, which controls before the eyelid device is closed, includes:
The state of the eyelid device detects in control centre, wherein the state includes open state and closed state;
When the eyelid device is in open state, the eyelid device is closed according to the control instruction;
When the eyelid device is closed, the out code is abandoned.
5. the method for secret protection based on video monitoring equipment according to claim 1, which is characterized in that when the control refers to When order is open command, the control centre receives and verifies the control instruction, and when being proved to be successful according to the control Instruction controls the eyelid device unlatching/closing:
The working condition of the monitoring device is monitored by the control centre;
When the working condition meets preset condition, controls the eyelid device and close.
6. the method for secret protection based on video monitoring equipment according to claim 5, which is characterized in that described to work as the work When meeting preset condition as state, controls the eyelid device closing and specifically include:
When the working condition meets preset condition, start the timer of the first preset time of configuration;
When the timer expired, controls the eyelid device and close.
7. the method for secret protection based on video monitoring equipment according to claim 1, which is characterized in that when the control refers to When order is open command, the control centre receives and verifies the control instruction, and when being proved to be successful according to the control Instruction controls the eyelid device unlatching/closing:
The control centre judges whether system time reaches third preset time at interval of the second preset time;
When system time reaches third preset time, controls the eyelid device and close.
8. the method for secret protection based on video monitoring equipment described according to claim 6 or 7, which is characterized in that the control The eyelid device, which is closed, further includes later:
The control centre sends prompt message to the user terminal, to prompt user monitoring equipment to be in by the user terminal Failure state.
9. a kind of privacy protection device based on video monitoring equipment, which is characterized in that it includes loading in eyelid device, control The heart and monitoring device, the monitoring device receive control instruction input by user, and corresponding behaviour is executed according to the control instruction Make, and the control instruction be sent to control centre,;The control centre receives and verifies the control instruction, is verifying When success, control instruction is sent to by eyelid device by serial line interface, corresponding operating is executed to control eyelid device.
10. the privacy protection device based on video monitoring equipment according to claim 9, which is characterized in that the monitoring is set It is standby to be communicated using P2P communication modes with control centre.
CN201810170067.8A 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment Active CN108282637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810170067.8A CN108282637B (en) 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810170067.8A CN108282637B (en) 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment

Publications (2)

Publication Number Publication Date
CN108282637A true CN108282637A (en) 2018-07-13
CN108282637B CN108282637B (en) 2021-01-12

Family

ID=62808871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810170067.8A Active CN108282637B (en) 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment

Country Status (1)

Country Link
CN (1) CN108282637B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022204912A1 (en) * 2021-03-30 2022-10-06 华为技术有限公司 Shielding method and apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05314380A (en) * 1992-05-11 1993-11-26 Fujitsu General Ltd Security system
CN202602811U (en) * 2011-12-23 2012-12-12 郭松 Audio and video monitoring apparatus with privacy protection
CN103778756A (en) * 2014-01-09 2014-05-07 成都理想科技开发有限公司 Remote video alarm system
CN203608272U (en) * 2013-12-16 2014-05-21 北京精仪达盛科技有限公司 Intelligent monitoring camera and camera system which are provided with protection function
CN104683744A (en) * 2013-12-02 2015-06-03 南京理工高新技术发展有限公司 Network video monitoring system based on cloud platform
CN106440199A (en) * 2016-09-26 2017-02-22 珠海格力电器股份有限公司 Control method and device of air conditioner

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05314380A (en) * 1992-05-11 1993-11-26 Fujitsu General Ltd Security system
CN202602811U (en) * 2011-12-23 2012-12-12 郭松 Audio and video monitoring apparatus with privacy protection
CN104683744A (en) * 2013-12-02 2015-06-03 南京理工高新技术发展有限公司 Network video monitoring system based on cloud platform
CN203608272U (en) * 2013-12-16 2014-05-21 北京精仪达盛科技有限公司 Intelligent monitoring camera and camera system which are provided with protection function
CN103778756A (en) * 2014-01-09 2014-05-07 成都理想科技开发有限公司 Remote video alarm system
CN106440199A (en) * 2016-09-26 2017-02-22 珠海格力电器股份有限公司 Control method and device of air conditioner

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022204912A1 (en) * 2021-03-30 2022-10-06 华为技术有限公司 Shielding method and apparatus

Also Published As

Publication number Publication date
CN108282637B (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN105894627B (en) A kind of control of bluetooth access equipment, control of bluetooth access management system and method
CN110462692B (en) Safety communication method based on intelligent lock system and intelligent lock system thereof
CN1781099B (en) Automatic configuration of client terminal in public hot spot
KR101160603B1 (en) Device and process for wireless local area network association, modem and computer readable recording medium
CN103929748B (en) A kind of Internet of Things wireless terminal and its collocation method and wireless network access point
CN104639624B (en) A kind of method and apparatus for realizing mobile terminal remote access control
CN101217805B (en) A wireless LAN access control method
CN101853533B (en) Password setting method and device used for building gate control system
CN109410410A (en) Method, apparatus, system and the electronic equipment of intelligent door lock Cipher Processing
CN105553964B (en) Control the method and device of bluetooth equipment
KR20060049882A (en) Device and process for wireless local area network association and corresponding products
CN109005185A (en) Promote the multilayer authentication method communicated between intelligent home equipment and server based on cloud
KR101278974B1 (en) Door lock system
US9603018B2 (en) Peer to peer remote control method between one or more mobile devices
CN105261100A (en) Entrance guard unlocking method and system
CN107770137A (en) A kind of information processing method and device
US20210351920A1 (en) Secure communication method and smart lock system based thereof
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
CN104052817A (en) Intelligent door and intelligent door control method and system
CN109920100A (en) A kind of smart lock method for unlocking and system
CN107026935A (en) The authority control method and device of mobile device and mobile device
US7962608B2 (en) Monitoring systems and methods that incorporate instant messaging
CN108282637A (en) A kind of method for secret protection and device based on video monitoring equipment
CN109841273A (en) A kind of one-stop integration method and device of medical diagnosis software
CN108810892A (en) A kind of wireless network management method, smart machine and router

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201214

Address after: No.4, area a, 2 / F, building B1, digital technology park, No.16, Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Xiaomo Intelligent Technology Co.,Ltd.

Address before: 518000 Nanshan District, Shenzhen City, Guangdong Province, No. 4, Area A, Building B1, 2nd floor, High-tech Nanqidao Digital Technology Park

Applicant before: SHENZHEN PILOT LABORATORIES Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant