CN108282637A - A kind of method for secret protection and device based on video monitoring equipment - Google Patents
A kind of method for secret protection and device based on video monitoring equipment Download PDFInfo
- Publication number
- CN108282637A CN108282637A CN201810170067.8A CN201810170067A CN108282637A CN 108282637 A CN108282637 A CN 108282637A CN 201810170067 A CN201810170067 A CN 201810170067A CN 108282637 A CN108282637 A CN 108282637A
- Authority
- CN
- China
- Prior art keywords
- control
- control instruction
- eyelid
- control centre
- monitoring device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/50—Constructional details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/66—Remote control of cameras or camera parts, e.g. by remote control devices
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Closed-Circuit Television Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of method for secret protection and device based on video monitoring equipment, the method includes:User terminal sends control instruction and controls the monitoring device unlatching/closing to the monitoring device, and the control instruction is sent to the corresponding control centre of the eyelid device;Control centre receives and verifies the control instruction, and controls the eyelid device unlatching/closing according to the control instruction when being proved to be successful.The present invention in eyelid device by configuring control centre; when user terminal sends control instruction to monitoring device; the control instruction is synchronized and is sent to eyelid device; so that eyelid device is in same state with monitoring device; and then monitoring device is protected by eyelid device; it can reduce user's operation with automatic switch eyelid device, improve the intelligent of monitoring device again simultaneously.
Description
Technical field
The present invention relates to monitoring device technical field, more particularly to a kind of method for secret protection based on video monitoring equipment
And device.
Background technology
Video monitoring equipment enters into rapidly ordinary people family at present, but hacker can stealthily be opened using Malware
Monitoring device spies upon privacy of user so that there are security risks security product.In view of the above-mentioned problems, generally using two kinds at present
Mode, a kind of mode are to handle the collected data of monitoring device, such as data are encrypted, limit transmission channel or
Person reinforces account management etc.;Although this method can solve the problems, such as to a certain extent, it is with larger technology requirement
And safety problem can not be prevented completely.Another way is to increase physical equipment in monitoring device to be hidden to monitoring device
Gear, steals user data to avoid by monitoring device, privacy of user is caused to reveal.But the physics of monitoring device configuration is set
It is standby to need user's manual switch, the operation of user is increased, is made troubles to the use of user.
Thus the prior art could be improved and improve.
Invention content
The technical problem to be solved in the present invention is, in view of the deficiencies of the prior art, provides one kind and is set based on video monitoring
Standby method for secret protection and device is asked with solving the existing monitoring device for blocking equipment configured with physics there are awkward
Topic.
In order to solve the above-mentioned technical problem, the technical solution adopted in the present invention is as follows:
A kind of method for secret protection based on video monitoring equipment is applied to the monitoring device configured with eyelid device, packet
It includes:
User terminal sends control instruction and controls the monitoring device unlatching/closing to the monitoring device, and by the control
Instruction is sent to the corresponding control centre of the eyelid device;
Control centre receives and verifies the control instruction, and controls the eyelid according to the control instruction when being proved to be successful
Device unlatching/closing.
The method for secret protection based on video monitoring equipment, wherein the user terminal sends control instruction to described
Monitoring device is to control the monitoring device unlatching/closing, and it is corresponding that the control instruction is sent to the eyelid device
Control centre specifically includes:
User terminal receives control instruction input by user, and the control instruction is sent to monitoring device and is opened with controlling monitoring device
It opens/closes;
Control data is generated according to the control instruction, and the control data is sent to control centre, wherein the control
Request carries the control instruction and verification information.
The method for secret protection based on video monitoring equipment, wherein the control centre receives and verifies the control
System instruction, and the eyelid device unlatching/closing is controlled according to the control instruction when being proved to be successful and is specifically included:
Control centre receives the control data, extracts the control instruction and verification information, and according to the verification information
The control instruction is verified;
When the authentication succeeds, the control instruction is sent to eyelid device by the control centre by serial ports, so that described
Eyelid device is according to the control instruction unlatching/closing.
The method for secret protection based on video monitoring equipment, wherein when the control instruction is out code,
After being proved to be successful, control instruction, which controls before the eyelid device is closed, includes:
The state of the eyelid device detects in control centre, wherein the state includes open state and closed state;
When the eyelid device is in open state, the eyelid device is closed according to the control instruction;
When the eyelid device is closed, the out code is abandoned.
The method for secret protection based on video monitoring equipment, wherein when the control instruction is open command, institute
It states control centre and receives and verify the control instruction, and the eyelid is controlled according to the control instruction when being proved to be successful and is filled
Setting unlatching/closing further includes later:
The working condition of the monitoring device is monitored by the control centre;
When the working condition meets preset condition, controls the eyelid device and close.
The method for secret protection based on video monitoring equipment, wherein described to preset item when the working condition meets
When part, controls the eyelid device closing and specifically include:
When the working condition meets preset condition, start the timer of the first preset time of configuration;
When the timer expired, controls the eyelid device and close.
The method for secret protection based on video monitoring equipment, wherein when the control instruction is open command, institute
It states control centre and receives and verify the control instruction, and the eyelid is controlled according to the control instruction when being proved to be successful and is filled
Setting unlatching/closing further includes later:
The control centre judges whether system time reaches third preset time at interval of the second preset time;
When system time reaches third preset time, controls the eyelid device and close.
The method for secret protection based on video monitoring equipment, wherein after the control eyelid device is closed
Further include:
The control centre sends prompt message to the user terminal, to prompt user monitoring equipment to be in by the user terminal
Failure state.
A kind of privacy protection device based on video monitoring equipment comprising load eyelid device, control centre and prison
Equipment is controlled, the monitoring device receives control instruction input by user, and corresponding operating is executed according to the control instruction, and by institute
It states control instruction and is sent to control centre,;The control centre receives and verifies the control instruction, when being proved to be successful, leads to
It crosses serial line interface and control instruction is sent to eyelid device, corresponding operating is executed to control eyelid device.
The privacy protection device based on video monitoring equipment, which is characterized in that the monitoring device and control centre
It is communicated using P2P communication modes.
Advantageous effect:Compared with prior art, the present invention provides a kind of secret protection sides based on video monitoring equipment
Method and device, the method includes:User terminal send control instruction controlled to the monitoring device monitoring device open/
It closes, and the control instruction is sent to the corresponding control centre of the eyelid device;Control centre receives and verifies described
Control instruction, and the eyelid device unlatching/closing is controlled according to the control instruction when being proved to be successful.The present invention by
Control centre is configured in eyelid device, when user terminal sends control instruction to monitoring device, which is synchronized and is sent
To eyelid device so that eyelid device and monitoring device are in same state, and then by eyelid device to monitoring device into
Row protection, while can reduce user's operation with automatic switch eyelid device, improving the intelligent of monitoring device again.
Description of the drawings
Fig. 1 is the flow chart of the method for secret protection preferred embodiment provided by the invention based on video monitoring equipment.
Fig. 2 is the flow chart of step S10 in the method for secret protection provided by the invention based on video monitoring equipment.
Fig. 3 is the flow chart of step S20 in the method for secret protection provided by the invention based on video monitoring equipment.
Fig. 4 is to be automatically closed in method for secret protection one embodiment provided by the invention based on video monitoring equipment
The flow chart of one embodiment of journey.
Fig. 5 is to be automatically closed in method for secret protection one embodiment provided by the invention based on video monitoring equipment
The flow chart of step S40 in journey.
Fig. 6 is to be automatically closed in method for secret protection one embodiment provided by the invention based on video monitoring equipment
The flow chart of another embodiment of journey.
Fig. 7 is the structure principle chart of the privacy protection device provided by the invention based on video monitoring equipment.
Specific implementation mode
The present invention provides a kind of method for secret protection and device based on video monitoring equipment, for make the purpose of the present invention,
Technical solution and effect are clearer, clear, and the present invention is described in more detail for the embodiment that develops simultaneously referring to the drawings.It should
Understand, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that is used in the specification of the present invention arranges
It refers to there are the feature, integer, step, operation, element and/or component, but it is not excluded that presence or addition to take leave " comprising "
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes that the whole of one or more associated list items or any cell are combined with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), there is meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless by specific definitions as here, the meaning of idealization or too formal otherwise will not be used
To explain.
Below in conjunction with the accompanying drawings, by the description of the embodiment, being described further to invention content.
Fig. 1 is please referred to, Fig. 1 is the preferred embodiment of the method for secret protection provided by the invention based on video monitoring equipment
Flow chart.The method includes:
S10, user terminal send control instruction and control the monitoring device unlatching/closing to the monitoring device, and will be described
Control instruction is sent to the corresponding control centre of the eyelid device.
Specifically, the eyelid device is to be set in advance in the monitoring device, for being carried out to the monitoring device
The device that physics blocks, and when the eyelid device is closed, monitoring device can not acquire it because being blocked
Image in corresponding acquisition range.The eyelid device may include rotatable shutter and be rotated for controlling shutter
Drive motor, and the drive motor and control centre(Such as, controller etc.)Be connected, with by control centre to the drive
Dynamic motor is controlled.
The control centre is loaded into monitoring device, and is connected with the eyelid device by serial ports, i.e., the described control
Center processed is the local control centre of the eyelid device, and eyelid device can receive the control that control centre sends without networking
Instruction, the communication avoided between control centre and eyelid device is stolen, to improve the safety of eyelid device.This
Outside, the drive motor receives the control signal that control centre is sent by serial ports, and is driven according to the control signal received
The shutter rotation is to block the monitoring device.In the present embodiment, before the eyelid device is located at the monitoring device
Just and can have gap, such eyelid device that can not only play the role of blocking between the two, but also will not be to monitoring device
Camera lens causes to wear.Certainly, in the variant embodiment of the present embodiment, the eyelid device can also use other structures,
If can be with control centre by serial communication, and control instruction is sent according to the control centre and carries out corresponding operating(It opens
Open operation/shutoff operation).
In the present embodiment simultaneously, the user terminal can be user, and the monitoring device configuration receives the control of user
Operation, and corresponding control instruction is generated according to control operation.For example, the monitoring device is configured with voice-input device(Such as,
Microphone), and be identified by the voice messaging of voice-input device reception user, and to the voice messaging to obtain
To the control instruction.The mechanical keys such as physical button or touch key-press either can be provided in the monitoring device, are led to
It crosses and triggers the mechanical key and can generate the control instruction, can make monitoring device in the case of failed cluster in this way,
The control instruction can be received.In addition, should illustrate, when the audiomonitor directly receives the control of user's operation formation
When system instruction, the control instruction is sent to control centre by the audiomonitor by P2P agreements.
In addition, the user terminal can be terminal device, the control that user is received by the terminal device operates, according to
The control operation generates control instruction, and the control instruction is sent to monitoring device, to realize the monitoring device
Remote operation.Further, since user terminal needs to send control instruction to monitoring device, to which the user terminal and the monitoring are set
It is standby to need to pre-establish connection, to ensure that the user terminal for authorized user end, improves the safety of monitoring device control.Also
It is to say, can also includes before user terminal sends control instruction to monitoring device:User terminal sends connection request to monitoring and sets
Standby, monitoring device receives the connection request and is simultaneously verified to it, receive when the authentication succeeds the connection request and with institute
It states user terminal and establishes connection, so that the user terminal can send control instruction and the monitoring device, wherein the user
End is communicated with the monitoring device using P2P communication modes.In the present embodiment, the user terminal can be mobile phone,
IPOD and smartwatch etc..
The user terminal can receive user by loading the APP for controlling the monitoring device, and by the APP
The account and password of input, the user terminal is associated with the account.In addition, the user terminal can pass through search
Mode obtains attachable monitoring device, can also connect equipment mark by way of receiving monitoring device mark input by user
Know corresponding monitoring device, the identification code that can also be carried by scanning monitoring device(Such as, Quick Response Code etc.)Mode with it is described
Monitoring device establishes connection etc..In addition, after the user terminal and the monitoring device establish connection, by monitoring device device
Control centre is connected with user terminal, so that the user terminal can be sent to the control centre carries verification information
Connection request, control centre verify to be verified to the user terminal verification information, when being proved to be successful with
The user terminal binding, and communicated using P2P communication modes, to improve the safety of communication.
Further, the control instruction includes open command and out code, and the open command is for controlling the prison
Opening of device is controlled, the out code is closed for controlling the monitoring device, i.e., the described control instruction is for controlling the prison
Control opening of device/closing.In addition, the user terminal is by the control instruction while being sent to monitoring device, by the control
System instruction is sent to control centre, so that control centre generates corresponding control information, and foundation according to the control instruction
The control information controls eyelid device unlatching/closing.It is converted to out that is, control centre will receive open command
Information is opened to control the unlatching of eyelid device, the out code received is converted to close off information to control the closing of eyelid device.
In the present embodiment simultaneously, the user terminal and monitoring device and control centre establish after connection, user terminal to
The control instruction that control centre and monitoring device are sent needs to carry verification information, the verification information can be user terminal with
Control centre and monitoring device negotiate determination, are tested with the control instruction sent to user terminal by the verification information
Card, improves the safety of control instruction.Correspondingly, as shown in Fig. 2, the user terminal sends control instruction to the monitoring device
To control the monitoring device unlatching/closing, and the control instruction is sent to the corresponding control centre of the eyelid device
It specifically includes:
S11, user terminal receive control instruction input by user, and the control instruction is sent to monitoring device and is set with controlling monitoring
Standby unlatching/closing;
S12, control data is generated according to the control instruction, and the control data is sent to control centre, wherein is described
Control data carries the control instruction and verification information.
Specifically, the user inputs the control instruction by user terminal, will after user terminal receives control instruction
The control instruction is sent to monitoring device to control the monitoring device unlatching/closing;User terminal is according to the control simultaneously
Instruction generates control data, wherein control data carries control instruction and verification information.In addition, the user terminal receives control
After system instruction, the control instruction is encrypted in the private key that its configuration may be used, and encrypted control instruction is sent
To monitoring device;Monitoring device receives the encrypted control instruction, is referred to the encrypted control using the public key of its storage
Order is decrypted, and in successful decryption, executes corresponding operation according to the control instruction, and send feedback information to user.
User terminal upon reception of the feedback information, according to the control instruction generate control data, can make in this way eyelid device with
The state of the monitoring device is the same, on the one hand can improve the safety of monitoring device, does not on the other hand influence monitoring again and sets
Standby normal use.
S20, control centre receive and verify the control instruction, and are controlled according to the control instruction when being proved to be successful
The eyelid device unlatching/closing.
Specifically, after the control centre receives the control instruction, the first verification that extraction control instruction carries is believed
Breath, and first verification information is compared with the second verification information that its own is carried to be carried out to the control instruction
Verification.Described be proved to be successful refers to that the first verification information matches with the second verification information, for example, the first verification information and the
Two verification informations are consistent, or preset rules may be used will be converted to the second verification information to the first verification information.Wherein, institute
It can be base64 encryption rules to state preset rules, i.e., obtain second after being decrypted using base64 pairs of the first verification information and test
Demonstrate,prove information.The preset rules may be Chinese character rule change, and first verification information is several default Chinese characters compositions
The first character string, the second verification information is the second character string that several default Chinese characters are constituted, and the Chinese character rule change is advance
It is stored in control centre, if you become me, becomes small etc. greatly.In the present embodiment, the control centre can be main controller, or
Person MCU etc..
In addition, in order to avoid the communication between control centre and eyelid device is stolen or falsification, the control centre with
It uses serial communication, i.e. control centre to be connect by serial ports with the drive motor of eyelid device between the eyelid device, controls
Control instruction is sent to drive motor by center by serial ports, to control eyelid device unlatching/closing by the drive motor.
Illustratively, as shown in figure 3, the control centre receives and verifies the control instruction, and when being proved to be successful according to
Control instruction controls the eyelid device unlatching/closing and specifically includes:
S21, control centre receive the control data, extract the control instruction and verification information, and according to the verification
Information verifies the control instruction;
S22, when the authentication succeeds, the control instruction is sent to eyelid device by the control centre by serial ports, so that
The eyelid device is according to the control instruction unlatching/closing.
Specifically, the control instruction includes open command and out code, when control centre receives open command,
The control instruction is sent to eyelid device by control centre, to control the unlatching of eyelid device.When control centre receives closing
When instruction, control centre judges the state of the eyelid device, to determine whether to execute the out code.Correspondingly, described
When the control instruction is out code, after a successful authentication, control instruction is controlled before the eyelid device is closed and is wrapped
It includes:
S22a, control centre detect the state of the eyelid device, wherein the state includes open state and closed state;
S22b, when the eyelid device is in open state, the eyelid device is closed according to the control instruction;
S22c, when the eyelid device is closed, abandon the out code.
Specifically, the eyelid unit state includes open state and closed state, and the state can be according to driving horse
The state that reaches and determine.Certainly, it can be provided with status indicator lamp in the eyelid device, by detecting the status indicator lamp
State and determine the state of eyelid device.And receive that the state for detecting eyelid device is needed when out code is because of eyelid
Device can be automatically closed when monitoring device can not acquire image due to network etc., and the Working mould of monitoring device at this time
Formula is open mode, then control centre, when receiving out code, eyelid device has been closed.To avoid controlling
Center processed sends the control instruction of mistake to eyelid state, when receiving out code, needs the shape for first detecting eyelid device
State, and when eyelid device is closed, abandon the out code.
In addition, after control centre receives open command and controls the eyelid device unlatching according to the open command,
Control centre can search its associated first user terminal, and send the prompt letter that eyelid device is opened to first user terminal
Breath, to improve the safety of monitoring device.Certainly, in practical applications, the control centre may also listen for first use
The feedback information at family end controls the eyelid device if not hearing feedback information in the first preset time, in this way can be into
One step improves the safety of monitoring device.
In one embodiment of the invention, the eyelid dress can be automatically closed in the control centre according to preset condition
It sets, the preset condition can be monitoring device failure or monitoring device coverage changes or monitoring device is disconnected
Net etc..It is described to be automatically closed what operation carried out after the monitoring device and eyelid device are opened, to work as user terminal
Control instruction when being open command, the control centre receives and verifies the control instruction, and when being proved to be successful according to
The control instruction control after the eyelid device unlatching/closing further include process is automatically closed, as shown in figure 4, it is described from
Dynamic closing process is specifically as follows:
S30, the control centre monitor the working condition of the monitoring device;
S40, when the working condition meets preset condition, control the eyelid device and close.
Specifically, the working condition may include network state, monitoring range, acquisition state etc., the working condition
It can automatically be obtained with control centre, can also be that monitoring device is automatically sent to control centre.Control centre listens to institute
After stating working condition, judge whether the working condition meets preset condition, if meeting preset condition, generates the first closing and refer to
It enables and eyelid device is controlled according to the first out code and close.Wherein, the preset condition include network interruption, monitoring range with
Default monitoring range is not consistent and does not collect image, and when meeting one in preset condition in the working condition that listen to
Item then judges that working condition meets preset condition.
Further, in order to avoid the normal work that eyelid device influences monitoring device, meet preset condition in working condition
When, the working condition duration can be monitored, when duration reaches the first preset time, then controls eyelid dress
Set closing.Correspondingly, as shown in figure 5, described when the working condition meets preset condition, control the eyelid device and close
It specifically includes:
S41, when the working condition meets preset condition, start configuration the first preset time timer;
S42, when the timer expired, control the eyelid device and close.
Specifically, first preset time is pre-set, e.g., 2 minutes, 5 minutes etc..That is, when monitoring
After equipment meets preset condition and continues the first preset time, control centre controls eyelid device and closes.It is described to meet default item
Part is one only met in preset condition, and in the process for meeting preset condition, meets the clause in preset condition
It changes, the timer continues timing.Certainly, in the variant embodiment of the present embodiment, when the item for meeting preset condition
When money changes, the timer can reset and restart timing, i.e., when the in running order satisfaction of monitoring device is pre-
If one when reaching the first preset time in condition, control eyelid state is closed.For example, monitor state suspension 5 minutes, then control
Eyelid device is closed.
Further, the condition being automatically closed can also be that timing is closed, i.e., user terminal pre-sets the shut-in time, when
When reaching the shut-in time, eyelid device is automatically closed while the monitoring device is also automatically closed.Correspondingly, such as Fig. 6 institutes
Show, the process that is automatically closed may include:
S50, the control centre judge whether system time reaches third preset time at interval of the second preset time;
S60, when system time reaches third preset time, control the eyelid device and close.
Specifically, the second preset time indicates duration, for example, 1 minute etc., third preset time indicates time point, e.g., 12
Point, 13 points etc..The control centre obtains system time at interval of the second preset time or request user terminal sends user terminal
System time, and after getting system time, judge whether system time reaches third preset time, it is pre- when reaching third
If when the time, controlling the eyelid device and closing.At the same time it can also generate a control information, the control information is sent to
User terminal, so that user terminal, which sends out code, controls the monitoring device closing to monitoring device.
Based on the above-mentioned method for secret protection based on video monitoring equipment, the present invention also provides one kind being based on video monitoring
The privacy protection device of equipment, as described in Figure 7 comprising be mounted with eyelid device 400, control centre 300 and monitoring device
200, the eyelid device 400 is set in the monitoring device 200, and the camera lens for blocking the monitoring device 200, institute
It states control centre 300 to be configured in the monitoring device 200, and is connected with the eyelid device 400 by serial ports;The prison
It controls equipment and receives control instruction input by user, corresponding operating is executed according to the control instruction, and the control instruction is sent out
Send to and control centre 300;The control centre 300 receives and verifies the control instruction, when being proved to be successful by serial
Control instruction is sent to eyelid device 400 by interface, and corresponding operating is executed to control eyelid device 400.
Further, as shown in fig. 7, the privacy protection device based on video monitoring equipment, can also include user
End 100, the user terminal and the monitoring device and control centre communicate, and user terminal and the monitoring device 200 with
And control centre 300 is communicated using P2P communications protocol.It should illustrate, the function, work of each component part in described device
Make process and mutual communication composition illustrates in the above-mentioned methods, be not just described in detail here.
Based on the above-mentioned method for secret protection based on video monitoring equipment, the present invention also provides a kind of monitoring device,
Including at least one first processor(processor);And first memory(memory), can also include that the first communication connects
Mouthful(Communications Interface)With the first bus.Wherein, first processor, first memory and the first communication connect
Mouth can complete mutual communication by the first bus.First communication interface can transmit information.First processor can be adjusted
With the logical order in first memory, the operation of monitoring device in the method to execute above-described embodiment.
Based on the above-mentioned method for secret protection based on video monitoring equipment, the present invention also provides a kind of controller, packets
Include at least one second processor(processor)And second memory(memory), can also include the second communication interface
(Communications Interface)With the second bus.Wherein, second processor, second memory and the second communication interface
Mutual communication can be completed by the second bus, the second communication interface can transmit information.Second processor can be called
Logical order in second memory, the operation of control centre in the method to execute above-described embodiment.
In addition, a plurality of instruction first processor in above-mentioned terminal device loads and the detailed process executed and above-mentioned control
A plurality of instruction second processor in device processed loads and the detailed process executed has been described in detail in the above-mentioned methods, herein
Just no longer state one by one.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, it will be understood by those of ordinary skill in the art that:It still may be used
With technical scheme described in the above embodiments is modified or equivalent replacement of some of the technical features;
And these modifications or replacements, various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of method for secret protection based on video monitoring equipment, which is characterized in that it is applied to configured with eyelid device
Monitoring device comprising:
User terminal sends control instruction and controls the monitoring device unlatching/closing to the monitoring device, and by the control
Instruction is sent to the corresponding control centre of the eyelid device;
Control centre receives and verifies the control instruction, and controls the eyelid according to the control instruction when being proved to be successful
Device unlatching/closing.
2. the method for secret protection based on video monitoring equipment according to claim 1, which is characterized in that the user terminal hair
It send control instruction to the monitoring device to control the monitoring device unlatching/closing, and the control instruction is sent to institute
The corresponding control centre of eyelid device is stated to specifically include:
User terminal receives control instruction input by user, and the control instruction is sent to monitoring device and is opened with controlling monitoring device
It opens/closes;
Control data is generated according to the control instruction, and the control data is sent to control centre, wherein the control
Request carries the control instruction and verification information.
3. the method for secret protection based on video monitoring equipment according to claim 2, which is characterized in that the control centre
The control instruction is received and verified, and the eyelid device unlatching/pass is controlled according to the control instruction when being proved to be successful
It closes and specifically includes:
Control centre receives the control data, extracts the control instruction and verification information, and according to the verification information
The control instruction is verified;
When the authentication succeeds, the control instruction is sent to eyelid device by the control centre by serial ports, so that described
Eyelid device is according to the control instruction unlatching/closing.
4. according to claim 1 or 3 method for secret protection based on video monitoring equipment, which is characterized in that when the control
When system instruction is out code, after a successful authentication, control instruction, which controls before the eyelid device is closed, includes:
The state of the eyelid device detects in control centre, wherein the state includes open state and closed state;
When the eyelid device is in open state, the eyelid device is closed according to the control instruction;
When the eyelid device is closed, the out code is abandoned.
5. the method for secret protection based on video monitoring equipment according to claim 1, which is characterized in that when the control refers to
When order is open command, the control centre receives and verifies the control instruction, and when being proved to be successful according to the control
Instruction controls the eyelid device unlatching/closing:
The working condition of the monitoring device is monitored by the control centre;
When the working condition meets preset condition, controls the eyelid device and close.
6. the method for secret protection based on video monitoring equipment according to claim 5, which is characterized in that described to work as the work
When meeting preset condition as state, controls the eyelid device closing and specifically include:
When the working condition meets preset condition, start the timer of the first preset time of configuration;
When the timer expired, controls the eyelid device and close.
7. the method for secret protection based on video monitoring equipment according to claim 1, which is characterized in that when the control refers to
When order is open command, the control centre receives and verifies the control instruction, and when being proved to be successful according to the control
Instruction controls the eyelid device unlatching/closing:
The control centre judges whether system time reaches third preset time at interval of the second preset time;
When system time reaches third preset time, controls the eyelid device and close.
8. the method for secret protection based on video monitoring equipment described according to claim 6 or 7, which is characterized in that the control
The eyelid device, which is closed, further includes later:
The control centre sends prompt message to the user terminal, to prompt user monitoring equipment to be in by the user terminal
Failure state.
9. a kind of privacy protection device based on video monitoring equipment, which is characterized in that it includes loading in eyelid device, control
The heart and monitoring device, the monitoring device receive control instruction input by user, and corresponding behaviour is executed according to the control instruction
Make, and the control instruction be sent to control centre,;The control centre receives and verifies the control instruction, is verifying
When success, control instruction is sent to by eyelid device by serial line interface, corresponding operating is executed to control eyelid device.
10. the privacy protection device based on video monitoring equipment according to claim 9, which is characterized in that the monitoring is set
It is standby to be communicated using P2P communication modes with control centre.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810170067.8A CN108282637B (en) | 2018-03-01 | 2018-03-01 | Privacy protection method and device based on video monitoring equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810170067.8A CN108282637B (en) | 2018-03-01 | 2018-03-01 | Privacy protection method and device based on video monitoring equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108282637A true CN108282637A (en) | 2018-07-13 |
CN108282637B CN108282637B (en) | 2021-01-12 |
Family
ID=62808871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810170067.8A Active CN108282637B (en) | 2018-03-01 | 2018-03-01 | Privacy protection method and device based on video monitoring equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108282637B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022204912A1 (en) * | 2021-03-30 | 2022-10-06 | 华为技术有限公司 | Shielding method and apparatus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05314380A (en) * | 1992-05-11 | 1993-11-26 | Fujitsu General Ltd | Security system |
CN202602811U (en) * | 2011-12-23 | 2012-12-12 | 郭松 | Audio and video monitoring apparatus with privacy protection |
CN103778756A (en) * | 2014-01-09 | 2014-05-07 | 成都理想科技开发有限公司 | Remote video alarm system |
CN203608272U (en) * | 2013-12-16 | 2014-05-21 | 北京精仪达盛科技有限公司 | Intelligent monitoring camera and camera system which are provided with protection function |
CN104683744A (en) * | 2013-12-02 | 2015-06-03 | 南京理工高新技术发展有限公司 | Network video monitoring system based on cloud platform |
CN106440199A (en) * | 2016-09-26 | 2017-02-22 | 珠海格力电器股份有限公司 | Control method and device of air conditioner |
-
2018
- 2018-03-01 CN CN201810170067.8A patent/CN108282637B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05314380A (en) * | 1992-05-11 | 1993-11-26 | Fujitsu General Ltd | Security system |
CN202602811U (en) * | 2011-12-23 | 2012-12-12 | 郭松 | Audio and video monitoring apparatus with privacy protection |
CN104683744A (en) * | 2013-12-02 | 2015-06-03 | 南京理工高新技术发展有限公司 | Network video monitoring system based on cloud platform |
CN203608272U (en) * | 2013-12-16 | 2014-05-21 | 北京精仪达盛科技有限公司 | Intelligent monitoring camera and camera system which are provided with protection function |
CN103778756A (en) * | 2014-01-09 | 2014-05-07 | 成都理想科技开发有限公司 | Remote video alarm system |
CN106440199A (en) * | 2016-09-26 | 2017-02-22 | 珠海格力电器股份有限公司 | Control method and device of air conditioner |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022204912A1 (en) * | 2021-03-30 | 2022-10-06 | 华为技术有限公司 | Shielding method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN108282637B (en) | 2021-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105894627B (en) | A kind of control of bluetooth access equipment, control of bluetooth access management system and method | |
CN110462692B (en) | Safety communication method based on intelligent lock system and intelligent lock system thereof | |
CN1781099B (en) | Automatic configuration of client terminal in public hot spot | |
KR101160603B1 (en) | Device and process for wireless local area network association, modem and computer readable recording medium | |
CN103929748B (en) | A kind of Internet of Things wireless terminal and its collocation method and wireless network access point | |
CN104639624B (en) | A kind of method and apparatus for realizing mobile terminal remote access control | |
CN101217805B (en) | A wireless LAN access control method | |
CN101853533B (en) | Password setting method and device used for building gate control system | |
CN109410410A (en) | Method, apparatus, system and the electronic equipment of intelligent door lock Cipher Processing | |
CN105553964B (en) | Control the method and device of bluetooth equipment | |
KR20060049882A (en) | Device and process for wireless local area network association and corresponding products | |
CN109005185A (en) | Promote the multilayer authentication method communicated between intelligent home equipment and server based on cloud | |
KR101278974B1 (en) | Door lock system | |
US9603018B2 (en) | Peer to peer remote control method between one or more mobile devices | |
CN105261100A (en) | Entrance guard unlocking method and system | |
CN107770137A (en) | A kind of information processing method and device | |
US20210351920A1 (en) | Secure communication method and smart lock system based thereof | |
CN108537927B (en) | Lockset terminal and method for controlling lockset terminal through regional management | |
CN104052817A (en) | Intelligent door and intelligent door control method and system | |
CN109920100A (en) | A kind of smart lock method for unlocking and system | |
CN107026935A (en) | The authority control method and device of mobile device and mobile device | |
US7962608B2 (en) | Monitoring systems and methods that incorporate instant messaging | |
CN108282637A (en) | A kind of method for secret protection and device based on video monitoring equipment | |
CN109841273A (en) | A kind of one-stop integration method and device of medical diagnosis software | |
CN108810892A (en) | A kind of wireless network management method, smart machine and router |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201214 Address after: No.4, area a, 2 / F, building B1, digital technology park, No.16, Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Shenzhen Xiaomo Intelligent Technology Co.,Ltd. Address before: 518000 Nanshan District, Shenzhen City, Guangdong Province, No. 4, Area A, Building B1, 2nd floor, High-tech Nanqidao Digital Technology Park Applicant before: SHENZHEN PILOT LABORATORIES Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |