CN108282637B - Privacy protection method and device based on video monitoring equipment - Google Patents

Privacy protection method and device based on video monitoring equipment Download PDF

Info

Publication number
CN108282637B
CN108282637B CN201810170067.8A CN201810170067A CN108282637B CN 108282637 B CN108282637 B CN 108282637B CN 201810170067 A CN201810170067 A CN 201810170067A CN 108282637 B CN108282637 B CN 108282637B
Authority
CN
China
Prior art keywords
control
monitoring equipment
control instruction
eyelid
control center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810170067.8A
Other languages
Chinese (zh)
Other versions
CN108282637A (en
Inventor
叶军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xiaomo Intelligent Technology Co ltd
Original Assignee
Shenzhen Xiaomo Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xiaomo Intelligent Technology Co ltd filed Critical Shenzhen Xiaomo Intelligent Technology Co ltd
Priority to CN201810170067.8A priority Critical patent/CN108282637B/en
Publication of CN108282637A publication Critical patent/CN108282637A/en
Application granted granted Critical
Publication of CN108282637B publication Critical patent/CN108282637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/50Constructional details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses a privacy protection method and a privacy protection device based on video monitoring equipment, wherein the method comprises the following steps: the user side sends a control instruction to the monitoring equipment to control the monitoring equipment to be turned on/off, and sends the control instruction to a control center corresponding to the eyelid device; and the control center receives and verifies the control command, and controls the eyelid device to be opened/closed according to the control command when the verification is successful. According to the invention, the control center is configured in the eyelid device, and when the user side sends the control instruction to the monitoring equipment, the control instruction is synchronously sent to the eyelid device, so that the eyelid device and the monitoring equipment are in the same state, the monitoring equipment is protected through the eyelid device, meanwhile, the eyelid device can be automatically switched on and off, the user operation is reduced, and the intelligence of the monitoring equipment is improved.

Description

Privacy protection method and device based on video monitoring equipment
Technical Field
The invention relates to the technical field of monitoring equipment, in particular to a privacy protection method and device based on video monitoring equipment.
Background
At present, video monitoring equipment rapidly enters a common family, but a hacker can open the monitoring equipment by stealing with malicious software to snoop the privacy of a user, so that security products have potential safety hazards. For the above problems, two methods are generally adopted at present, one is to process data acquired by the monitoring device, such as encrypting the data, limiting a transmission channel or enhancing account management; although the method can solve the problems to a certain extent, the method has larger technical requirements and cannot completely eliminate the safety problem. The other mode is that physical equipment is added on the monitoring equipment to shield the monitoring equipment, so that the condition that user data is stolen through the monitoring equipment and the privacy of a user is leaked is avoided. However, the physical device configured by the monitoring device needs a manual switch of the user, which increases the operation of the user and brings inconvenience to the user.
Thus, the prior art has yet to be improved and enhanced.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a privacy protection method and apparatus based on a video monitoring device, aiming at the defects of the prior art, so as to solve the problem that the existing monitoring device configured with a physical shielding device is inconvenient to use.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a privacy protection method based on a video monitoring device is applied to the monitoring device provided with an eyelid device, and comprises the following steps:
the user side sends a control instruction to the monitoring equipment to control the monitoring equipment to be turned on/off, and sends the control instruction to a control center corresponding to the eyelid device;
and the control center receives and verifies the control command, and controls the eyelid device to be opened/closed according to the control command when the verification is successful.
The privacy protection method based on the video monitoring equipment, wherein the sending of the control instruction to the monitoring equipment by the user side to control the monitoring equipment to be turned on/off and the sending of the control instruction to the control center corresponding to the eyelid device specifically includes:
the method comprises the steps that a user side receives a control instruction input by a user, and the control instruction is sent to monitoring equipment to control the monitoring equipment to be turned on/off;
and generating a control request according to the control instruction, and sending the control request to a control center, wherein the control request carries the control instruction and verification information.
The privacy protection method based on the video monitoring equipment, wherein the control center receives and verifies the control instruction, and controls the eyelid device to be opened/closed according to the control instruction when the verification is successful specifically comprises the following steps:
the control center receives the control request, extracts the control instruction and verification information, and verifies the control instruction according to the verification information;
and when the verification is successful, the control center sends the control instruction to the eyelid device through a serial port, so that the eyelid device is turned on/off according to the control instruction.
The privacy protection method based on the video monitoring equipment, wherein when the control instruction is a closing instruction, after the verification is successful, the control instruction controls the eyelid device to be closed before the eyelid device is closed, and comprises the following steps:
the control center detects the state of the eyelid device, wherein the state comprises an opening state and a closing state;
when the eyelid device is in an open state, closing the eyelid device according to the control instruction;
discarding the close command when the eyelid device is in a closed state.
The privacy protection method based on the video monitoring equipment, wherein when the control instruction is an opening instruction, the control center receives and verifies the control instruction, and when the verification is successful, after the control instruction controls the eyelid device to be opened/closed, the method further comprises the following steps:
the control center monitors the working state of the monitoring equipment;
and when the working state meets a preset condition, controlling the eyelid device to be closed.
The privacy protection method based on the video monitoring equipment, wherein when the working state meets a preset condition, the controlling of the eyelid device comprises:
when the working state meets a preset condition, starting a timer for configuring first preset time;
and when the timer is over, controlling the eyelid device to be closed.
The privacy protection method based on the video monitoring equipment, wherein when the control instruction is an opening instruction, the control center receives and verifies the control instruction, and when the verification is successful, after the control instruction controls the eyelid device to be opened/closed, the method further comprises the following steps:
the control center judges whether the system time reaches a third preset time every second preset time;
and when the system time reaches a third preset time, controlling the eyelid device to be closed.
The privacy protection method based on the video monitoring equipment further comprises the following steps after the control of the eyelid device is turned off:
and the control center sends prompt information to the user side so as to prompt the user that the monitoring equipment is in a failure state through the user side.
A privacy protection device based on video monitoring equipment comprises an eyelid loading device, a control center and monitoring equipment, wherein the monitoring equipment receives a control instruction input by a user, executes corresponding operation according to the control instruction and sends the control instruction to the control center; and the control center receives and verifies the control command, and sends the control command to the eyelid device through the serial interface when the verification is successful so as to control the eyelid device to execute corresponding operation.
The privacy protection device based on the video monitoring equipment is characterized in that the monitoring equipment and the control center communicate in a P2P communication mode.
Has the advantages that: compared with the prior art, the invention provides a privacy protection method and a device based on video monitoring equipment, wherein the method comprises the following steps: the user side sends a control instruction to the monitoring equipment to control the monitoring equipment to be turned on/off, and sends the control instruction to a control center corresponding to the eyelid device; and the control center receives and verifies the control command, and controls the eyelid device to be opened/closed according to the control command when the verification is successful. According to the invention, the control center is configured in the eyelid device, and when the user side sends the control instruction to the monitoring equipment, the control instruction is synchronously sent to the eyelid device, so that the eyelid device and the monitoring equipment are in the same state, the monitoring equipment is protected through the eyelid device, meanwhile, the eyelid device can be automatically switched on and off, the user operation is reduced, and the intelligence of the monitoring equipment is improved.
Drawings
Fig. 1 is a flowchart of a privacy protection method based on a video surveillance device according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart of step S10 in the privacy protection method based on a video monitoring device according to the present invention.
Fig. 3 is a flowchart of step S20 in the privacy protection method based on a video monitoring device according to the present invention.
Fig. 4 is a flowchart of an embodiment of an automatic shutdown process in an embodiment of a privacy protection method based on a video surveillance device according to the present invention.
Fig. 5 is a flowchart of step S40 in the automatic shutdown process in an embodiment of the privacy protection method based on a video surveillance device according to the present invention.
Fig. 6 is a flowchart of another embodiment of an automatic shutdown process in an embodiment of a privacy protection method based on a video surveillance device according to the present invention.
Fig. 7 is a schematic structural diagram of a privacy protecting apparatus based on a video monitoring device according to the present invention.
Detailed Description
The invention provides a privacy protection method and a privacy protection device based on video monitoring equipment, and in order to make the purpose, technical scheme and effect of the invention clearer and clearer, the invention is further described in detail below by referring to the attached drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The invention will be further explained by the description of the embodiments with reference to the drawings.
Referring to fig. 1, fig. 1 is a flowchart illustrating a privacy protection method based on a video surveillance device according to a preferred embodiment of the present invention. The method comprises the following steps:
and S10, the user side sends a control instruction to the monitoring equipment to control the monitoring equipment to be turned on/off, and sends the control instruction to a control center corresponding to the eyelid device.
Specifically, the eyelid device is a device which is arranged on the monitoring device in advance and is used for physically shielding the monitoring device, and when the eyelid device is in a closed state, the monitoring device cannot acquire images within a corresponding acquisition range due to being shielded. The eyelid device may include a rotatable shutter and a driving motor for controlling the rotation of the shutter, and the driving motor is connected to a control center (e.g., a controller, etc.) to control the driving motor through the control center.
The control center is loaded in the monitoring equipment and is connected with the eyelid device through a serial port, namely the control center is a local control center of the eyelid device, the eyelid device can receive a control instruction sent by the control center without being connected with a network, and the communication between the control center and the eyelid device is prevented from being stolen, so that the safety of the eyelid device is improved. In addition, the driving motor receives a control signal sent by the control center through a serial port, and drives the shielding plate to rotate according to the received control signal so as to shield the monitoring equipment. In this embodiment, the eyelid device is located in front of the monitoring device and a gap may be formed between the eyelid device and the monitoring device, so that the eyelid device may not only shield but also prevent the lens of the monitoring device from being worn. Of course, in the modified embodiment of this embodiment, the eyelid device may also have other structures, as long as it can communicate with a control center through a serial port, and perform corresponding operations (opening/closing operations) according to a control instruction sent by the control center.
Meanwhile, in this embodiment, the user side may be a user, and the monitoring device is configured to receive a control operation of the user and generate a corresponding control instruction according to the control operation. For example, the monitoring device is configured with a voice input device (e.g., a microphone), and receives voice information of a user through the voice input device, and recognizes the voice information to obtain the control instruction. Or the monitoring device may be provided with a physical key or a touch key or other mechanical keys, and the control instruction may be generated by triggering the mechanical keys, so that the monitoring device may receive the control instruction without networking. In addition, it should be noted that, when the monitoring device directly receives the control instruction formed by the user operation, the monitoring device sends the control instruction to the control center through the P2P protocol.
In addition, the user side can be a terminal device, the control operation of the user is received through the terminal device, a control instruction is generated according to the control operation, and the control instruction is sent to the monitoring device, so that the remote operation of the monitoring device is realized. In addition, the user side needs to send a control instruction to the monitoring device, so that the user side and the monitoring device need to establish connection in advance to ensure that the user side is an authorized user side, and the control safety of the monitoring device is improved. That is, before the user sends the control instruction to the monitoring device, the method may further include: the method comprises the steps that a user side sends a connection request to a monitoring device, the monitoring device receives and verifies the connection request, and when verification is successful, the monitoring device receives the connection request and establishes connection with the user side, so that the user side can send a control command to the monitoring device, wherein the user side and the monitoring device communicate in a P2P communication mode. In this embodiment, the user terminal may be a mobile phone, an IPOD, a smart watch, or the like.
The user side can be used for controlling the monitoring equipment by loading an APP, and receiving an account number and a password input by a user through the APP so as to associate the user side with the account number. In addition, the user side may obtain connectable monitoring devices in a searching manner, may connect the monitoring devices corresponding to the device identifiers in a manner of receiving the monitoring device identifiers input by the user, and may establish a connection with the monitoring devices in a manner of scanning identification codes (e.g., two-dimensional codes) carried by the monitoring devices. In addition, after the user side is connected with the monitoring equipment, the control center of the monitoring equipment device is connected with the user side, so that the user side can send a connection request carrying verification information to the control center, the control center verifies the verification information to verify the user side, and when the verification is successful, the control center is bound with the user side and communicates in a P2P communication mode to improve the communication safety.
Further, the control instruction includes an opening instruction and a closing instruction, the opening instruction is used to control the monitoring device to open, and the closing instruction is used to control the monitoring device to close, that is, the control instruction is used to control the monitoring device to open/close. In addition, the user side sends the control instruction to the monitoring equipment and sends the control instruction to the control center at the same time, so that the control center generates corresponding control information according to the control instruction and controls the opening/closing of the eyelid device according to the control information. That is, the control center converts the received opening command into opening information to control the eyelid device to be opened, and converts the received closing command into closing information to control the eyelid device to be closed.
Meanwhile, in this embodiment, after the user side establishes the connection with the monitoring device and the control center, the control instruction sent by the user side to the control center and the monitoring device needs to carry verification information, where the verification information may be determined by negotiation between the user side and the control center and the monitoring device, so as to verify the control instruction sent by the user side through the verification information, and improve the security of the control instruction. Correspondingly, as shown in fig. 2, the sending, by the user side, a control instruction to the monitoring device to control the monitoring device to open/close, and sending the control instruction to the control center corresponding to the eyelid device specifically includes:
s11, the user side receives a control instruction input by a user, and sends the control instruction to the monitoring equipment to control the monitoring equipment to be opened/closed;
and S12, generating a control request according to the control instruction, and sending the control request to a control center, wherein the control request carries the control instruction and verification information.
Specifically, the user inputs the control instruction through a user side, and after receiving the control instruction, the user side sends the control instruction to the monitoring equipment to control the monitoring equipment to be turned on/off; and simultaneously, the user side generates a control request according to the control instruction, wherein the control request carries the control instruction and the verification information. In addition, after receiving the control instruction, the user side can encrypt the control instruction by using a private key configured by the user side and send the encrypted control instruction to the monitoring equipment; and the monitoring equipment receives the encrypted control instruction, decrypts the encrypted control instruction by adopting the public key stored in the monitoring equipment, executes corresponding operation according to the control instruction when decryption is successful, and sends feedback information to a user. After receiving the feedback information, the user side generates a control request according to the control instruction, so that the eyelid device is in the same state as the monitoring equipment, the safety of the monitoring equipment can be improved on one hand, and the normal use of the monitoring equipment is not influenced on the other hand.
And S20, the control center receives and verifies the control command, and controls the eyelid device to be opened/closed according to the control command when the verification is successful.
Specifically, after receiving the control instruction, the control center extracts first verification information carried by the control instruction, and compares the first verification information with second verification information carried by the control center to verify the control instruction. The verification success refers to that the first verification information matches the second verification information, for example, the first verification information is consistent with the second verification information, or a preset rule may be adopted to convert the first verification information into the second verification information. The preset rule may be a base64 encryption rule, that is, the base64 is used to decrypt the first verification information to obtain the second verification information. The preset rule can also be a Chinese character change rule, the first verification information is a first character string formed by a plurality of preset Chinese characters, the second verification information is a second character string formed by a plurality of preset Chinese characters, and the Chinese character change rule is stored in the control center in advance, and if you become me, the size of the Chinese character change rule is changed into small, and the like. In this embodiment, the control center may be a master controller, or an MCU.
In addition, in order to avoid communication between the control center and the eyelid device from being stolen or changed, serial communication is adopted between the control center and the eyelid device, namely the control center is connected with a driving motor of the eyelid device through a serial port, and the control center sends a control instruction to the driving motor through the serial port so as to control the opening/closing of the eyelid device through the driving motor. For example, as shown in fig. 3, the receiving and verifying the control command by the control center, and controlling the opening/closing of the eyelid device according to the control command when the verification is successful specifically includes:
s21, the control center receives the control request, extracts the control instruction and verification information, and verifies the control instruction according to the verification information;
and S22, when the verification is successful, the control center sends the control instruction to the eyelid device through a serial port, so that the eyelid device is turned on/off according to the control instruction.
Specifically, the control instruction comprises an opening instruction and a closing instruction, and when the control center receives the opening instruction, the control center sends the control instruction to the eyelid device to control the eyelid device to be opened. When the control center receives a closing instruction, the control center judges the state of the eyelid device to determine whether to execute the closing instruction. Correspondingly, when the control command is a closing command, after the verification is successful, the control command before controlling the eyelid device to close comprises:
s22a, the control center detects the state of the eyelid device, wherein the state comprises an opening state and a closing state;
s22b, when the eyelid device is in an open state, closing the eyelid device according to the control instruction;
s22c, when the eyelid device is in a closing state, discarding the closing instruction.
Specifically, the eyelid device states include an open state and a closed state, which may be determined according to the state of the driving motor. Of course, a status indicator lamp may be provided in the eyelid device, and the status of the eyelid device is determined by detecting the status of the status indicator lamp. The reason why the state of the eyelid device needs to be detected when the closing instruction is received is that the eyelid device is automatically closed when the monitoring equipment cannot collect images due to network and the like, and the working mode of the monitoring equipment is the opening mode at the moment, so that the eyelid device is already in the closing state when the control center receives the closing instruction. Therefore, the control center is prevented from sending wrong control instructions to the eyelid state, the state of the eyelid device needs to be detected firstly when the closing instructions are received, and the closing instructions are discarded when the eyelid device is in the closing state.
In addition, after the control center receives the opening instruction and controls the eyelid device to be opened according to the opening instruction, the control center can search the first user terminal associated with the control center and send prompting information of opening the eyelid device to the first user terminal, so that the safety of the monitoring equipment is improved. Certainly, in practical applications, the control center may also monitor the feedback information of the first user, and if the feedback information is not monitored within the first preset time, the control center controls the eyelid device, so that the safety of the monitoring device may be further improved.
In an embodiment of the present invention, the control center may automatically turn off the eyelid device according to a preset condition, where the preset condition may be that the monitoring device fails, or that the shooting range of the monitoring device changes, or that the monitoring device is disconnected from the network. The automatic closing operation is performed after the monitoring device and the eyelid device are opened, so that when a control instruction generated at the user side is an opening instruction, the control center receives and verifies the control instruction, and when the verification is successful, the control center controls the eyelid device to open/close according to the control instruction, and then an automatic closing process is further included, as shown in fig. 4, the automatic closing process may specifically be:
s30, the control center monitors the working state of the monitoring equipment;
and S40, controlling the eyelid device to close when the working state meets the preset condition.
Specifically, the working state may include a network state, a monitoring range, an acquisition state, and the like, and the working state may be automatically obtained by the control center, or may be automatically sent to the control center by the monitoring device. And after monitoring the working state, the control center judges whether the working state meets a preset condition, and if so, generates a first closing instruction and controls the eyelid device to be closed according to the first closing instruction. The preset conditions comprise network interruption, a monitoring range which is not consistent with the preset monitoring range and no image acquisition, and when one of the monitored working states meets one of the preset conditions, the working state is judged to meet the preset conditions.
Further, in order to avoid the influence of the eyelid device on the normal operation of the monitoring device, when the working state meets the preset condition, the duration time of the working state can be monitored, and when the duration time reaches the first preset time, the eyelid device is controlled to be closed. Correspondingly, as shown in fig. 5, when the working state satisfies the preset condition, controlling the eyelid device to close specifically includes:
s41, when the working state meets a preset condition, starting a timer for configuring first preset time;
and S42, controlling the eyelid device to close when the timer is over.
Specifically, the first preset time is preset, such as 2 minutes, 5 minutes, and the like. That is, after the monitoring device meets the preset condition and lasts for the first preset time, the control center controls the eyelid device to be closed. The meeting of the preset conditions is only one of the preset conditions, and in the process of meeting the preset conditions, the meeting of the terms in the preset conditions is changed, and the timer continues to count time. Of course, in a modified embodiment of the present embodiment, when the terms meeting the preset conditions change, the timer may be cleared and restarted, that is, when one of the preset conditions that the monitoring device is in the working state meets the first preset time, the eyelid state is controlled to be closed. For example, if the monitoring state is disconnected for 5 minutes, the eyelid device is controlled to be closed.
Further, the automatic closing condition may be a timed closing condition, that is, the user end sets a closing time in advance, and when the closing time is reached, the eyelid device is automatically closed and the monitoring device is also automatically closed. Accordingly, as shown in fig. 6, the auto-close process may include:
s50, judging whether the system time reaches a third preset time every second preset time interval by the control center;
and S60, controlling the eyelid device to close when the system time reaches a third preset time.
Specifically, the second preset time represents a time period, for example, 1 minute or the like, and the third preset time represents a time point, for example, 12 points, 13 points or the like. The control center acquires system time or requests the user side to send the system time of the user side every second preset time, judges whether the system time reaches third preset time after the system time is acquired, and controls the eyelid device to be closed when the third preset time is reached. Meanwhile, control information can be generated and sent to the user side, so that the user side sends a closing instruction to the monitoring equipment to control the monitoring equipment to be closed.
Based on the privacy protection method based on the video monitoring equipment, the invention further provides a privacy protection device based on the video monitoring equipment, as shown in fig. 7, the privacy protection device comprises an eyelid device 400, a control center 300 and a monitoring device 200, wherein the eyelid device 400 is arranged on the monitoring device 200 and is used for shielding the lens of the monitoring device 200, and the control center 300 is configured in the monitoring device 200 and is connected with the eyelid device 400 through a serial port; the monitoring equipment receives a control instruction input by a user, executes corresponding operation according to the control instruction, and sends the control instruction to the control center 300; the control center 300 receives and verifies the control command, and transmits the control command to the eyelid device 400 through the serial interface when the verification is successful, so as to control the eyelid device 400 to perform corresponding operations.
Further, as shown in fig. 7, the privacy protecting apparatus based on a video monitoring device may further include a user end 100, where the user end communicates with the monitoring device and the control center, and communicates with the monitoring device 200 and the control center 300 by using a P2P communication protocol. It should be noted that the functions, working processes and mutual communication constitutions of the components of the apparatus are explained in the above-mentioned method, and will not be described in detail here.
Based on the privacy protection method based on the video monitoring equipment, the invention also provides the monitoring equipment, which comprises at least one first processor (processor); and a first memory (memory), which may further include a first communication Interface (Communications Interface) and a first bus. The first processor, the first memory and the first communication interface can complete mutual communication through the first bus. The first communication interface may transmit information. The first processor may call the logic instructions in the first memory to perform the operations of the monitoring device in the methods of the above embodiments.
Based on the privacy protection method based on the video monitoring equipment, the invention also provides a controller, which comprises at least one second processor (processor) and a second memory (memory), and also comprises a second communication Interface (Communications Interface) and a second bus. The second processor, the second memory and the second communication interface can complete mutual communication through the second bus, and the second communication interface can transmit information. The second processor may call the logic instructions in the second memory to perform the operations of the control center in the method of the above embodiment.
In addition, the specific processes loaded and executed by the first processors of the plurality of instructions in the terminal device and the specific processes loaded and executed by the second processors of the plurality of instructions in the controller are described in detail in the method, and are not stated herein.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. A privacy protection method based on a video monitoring device is characterized in that the privacy protection method is applied to the monitoring device provided with an eyelid device, and comprises the following steps:
the user side sends a control instruction to the monitoring equipment to control the monitoring equipment to be turned on/off, and sends the control instruction to a control center corresponding to the eyelid device;
the control center receives and verifies the control instruction, and controls the eyelid device to be opened/closed according to the control instruction when the verification is successful;
the sending of the control instruction to the monitoring device by the user side to control the opening/closing of the monitoring device and the sending of the control instruction to the control center corresponding to the eyelid device specifically includes: the user side receives a control instruction input by a user, encrypts the control instruction by using a private key configured by the user side, and sends the encrypted control instruction to the monitoring equipment, the monitoring equipment receives the encrypted control instruction, decrypts the encrypted control instruction by using a public key stored by the monitoring equipment, and controls the monitoring equipment to be turned on/off according to the control instruction and sends feedback information to the user side when decryption is successful;
and after receiving the feedback information, the user side generates a control request according to the control instruction, and sends the control request to a control center so as to enable the states of the monitoring equipment and the eyelid device to be consistent, wherein the control instruction and the verification information are carried by the control request.
2. The privacy protection method based on the video monitoring equipment as claimed in claim 1, wherein the control center receives and verifies the control command, and controls the eyelid device to open/close according to the control command when the verification is successful specifically comprises:
the control center receives the control request, extracts the control instruction and verification information, and verifies the control instruction according to the verification information;
and when the verification is successful, the control center sends the control instruction to the eyelid device through a serial port, so that the eyelid device is turned on/off according to the control instruction.
3. The privacy protection method based on the video monitoring equipment according to claim 1 or 2, wherein when the control command is a closing command, after the verification is successful, before the control command controls the eyelid device to close, the method comprises:
the control center detects the state of the eyelid device, wherein the state comprises an opening state and a closing state;
when the eyelid device is in an open state, closing the eyelid device according to the control instruction;
discarding the close command when the eyelid device is in a closed state.
4. The privacy protection method based on video monitoring equipment according to claim 1, wherein when the control command is an open command, the control center receives and verifies the control command, and when the verification is successful, after controlling the eyelid device to open according to the control command, the method further comprises:
the control center monitors the working state of the monitoring equipment;
and when the working state meets a preset condition, controlling the eyelid device to be closed.
5. The privacy protection method based on the video monitoring equipment as claimed in claim 4, wherein the controlling the eyelid device to be closed when the working state satisfies a preset condition specifically comprises:
when the working state meets a preset condition, starting a timer for configuring first preset time;
and when the timer is over, controlling the eyelid device to be closed.
6. The privacy protection method based on video monitoring equipment according to claim 1, wherein when the control command is an open command, the control center receives and verifies the control command, and when the verification is successful, after controlling the eyelid device to open according to the control command, the method further comprises:
the control center judges whether the system time reaches a third preset time every second preset time;
and when the system time reaches a third preset time, controlling the eyelid device to be closed.
7. The privacy protection method based on the video monitoring equipment according to claim 5 or 6, wherein after the controlling the eyelid device to be closed, the method further comprises:
and the control center sends prompt information to the user side so as to prompt the user that the monitoring equipment is in a failure state through the user side.
8. A privacy protection device based on video monitoring equipment is characterized by comprising an eyelid loading device, a control center and monitoring equipment, wherein the monitoring equipment receives a control instruction input by a user, executes corresponding operation according to the control instruction and sends the control instruction to the control center; the control center receives and verifies the control command, and when the verification is successful, the control command is sent to the eyelid device through the serial interface so as to control the eyelid device to execute corresponding operation; the monitoring device also comprises a user side which is communicated with the monitoring device and the control center; the user side receives a control instruction input by a user, encrypts the control instruction by using a private key configured by the user side, and sends the encrypted control instruction to the monitoring equipment, the monitoring equipment receives the encrypted control instruction, decrypts the encrypted control instruction by using a public key stored by the monitoring equipment, and controls the monitoring equipment to be turned on/off according to the control instruction and sends feedback information to the user side when decryption is successful;
and after receiving the feedback information, the user side generates a control request according to the control instruction, and sends the control request to a control center so as to enable the states of the monitoring equipment and the eyelid device to be consistent, wherein the control instruction and the verification information are carried by the control request.
9. The privacy protection apparatus based on video surveillance equipment as claimed in claim 8, wherein the surveillance equipment communicates with the control center in P2P communication.
CN201810170067.8A 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment Active CN108282637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810170067.8A CN108282637B (en) 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810170067.8A CN108282637B (en) 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment

Publications (2)

Publication Number Publication Date
CN108282637A CN108282637A (en) 2018-07-13
CN108282637B true CN108282637B (en) 2021-01-12

Family

ID=62808871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810170067.8A Active CN108282637B (en) 2018-03-01 2018-03-01 Privacy protection method and device based on video monitoring equipment

Country Status (1)

Country Link
CN (1) CN108282637B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113574529A (en) * 2021-03-30 2021-10-29 华为技术有限公司 Shielding method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202602811U (en) * 2011-12-23 2012-12-12 郭松 Audio and video monitoring apparatus with privacy protection
CN203608272U (en) * 2013-12-16 2014-05-21 北京精仪达盛科技有限公司 Intelligent monitoring camera and camera system which are provided with protection function
CN104683744A (en) * 2013-12-02 2015-06-03 南京理工高新技术发展有限公司 Network video monitoring system based on cloud platform
CN106440199A (en) * 2016-09-26 2017-02-22 珠海格力电器股份有限公司 Air conditioner control method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05314380A (en) * 1992-05-11 1993-11-26 Fujitsu General Ltd Security system
CN103778756A (en) * 2014-01-09 2014-05-07 成都理想科技开发有限公司 Remote video alarm system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202602811U (en) * 2011-12-23 2012-12-12 郭松 Audio and video monitoring apparatus with privacy protection
CN104683744A (en) * 2013-12-02 2015-06-03 南京理工高新技术发展有限公司 Network video monitoring system based on cloud platform
CN203608272U (en) * 2013-12-16 2014-05-21 北京精仪达盛科技有限公司 Intelligent monitoring camera and camera system which are provided with protection function
CN106440199A (en) * 2016-09-26 2017-02-22 珠海格力电器股份有限公司 Air conditioner control method and device

Also Published As

Publication number Publication date
CN108282637A (en) 2018-07-13

Similar Documents

Publication Publication Date Title
US11070364B2 (en) Secure communication method and smart lock system based thereof
CN110035048B (en) Method for controlling access to an in-vehicle wireless network
TWI491790B (en) A smart lock structure and an operating method thereof
KR20040075293A (en) Apparatus and method simplifying an encrypted network
US11456999B2 (en) Network monitoring apparatus, and remote encryption and remote activation method, device and system thereof
CN112106118B (en) Intelligent lock control method and device
WO2012048493A1 (en) Method and apparatus for protecting software of mobile terminal
US12010105B2 (en) Control method, apparatus, and system
US10831879B2 (en) Network monitoring device, method, apparatus and system for resetting password thereof, and server
US11997193B2 (en) Secure communication method and smart lock system based thereof
KR20130013588A (en) System for protecting information and method thereof
US11604886B2 (en) Portable communication peripheral, system for protecting a portable terminal, and communication method
CN108282637B (en) Privacy protection method and device based on video monitoring equipment
WO2016146046A1 (en) Data access method and device
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN108184091B (en) Video monitoring equipment deployment method and device
CN103702323A (en) Wireless information security equipment system and method
CN107800563B (en) Method, authorization device and system for recovering settings on network connection device
CN110008672A (en) A kind of mobile device method for secret protection and system
CN109067798B (en) Reverse interconnection authentication method and device
CN113641535A (en) Data backup system, data backup method, electronic device, and storage medium
CN117858079B (en) Safety control method of building intercom system
CN114978784B (en) Data protection equipment and system
JP2016218768A (en) Server device and communication system
CN115801250A (en) Data processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201214

Address after: No.4, area a, 2 / F, building B1, digital technology park, No.16, Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Xiaomo Intelligent Technology Co.,Ltd.

Address before: 518000 Nanshan District, Shenzhen City, Guangdong Province, No. 4, Area A, Building B1, 2nd floor, High-tech Nanqidao Digital Technology Park

Applicant before: SHENZHEN PILOT LABORATORIES Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant