CN109145560B - Method and device for accessing monitoring equipment - Google Patents

Method and device for accessing monitoring equipment Download PDF

Info

Publication number
CN109145560B
CN109145560B CN201810898688.8A CN201810898688A CN109145560B CN 109145560 B CN109145560 B CN 109145560B CN 201810898688 A CN201810898688 A CN 201810898688A CN 109145560 B CN109145560 B CN 109145560B
Authority
CN
China
Prior art keywords
information
account
equipment
request
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810898688.8A
Other languages
Chinese (zh)
Other versions
CN109145560A (en
Inventor
孙永利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201810898688.8A priority Critical patent/CN109145560B/en
Publication of CN109145560A publication Critical patent/CN109145560A/en
Application granted granted Critical
Publication of CN109145560B publication Critical patent/CN109145560B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The disclosure relates to a method and a device for accessing a monitoring device, wherein the method is applied to a terminal and comprises the following steps: sending a request for accessing monitoring equipment, shooting an image of an accessor, and acquiring first account information logged by the accessor; wherein the visitor's image includes first portrait information; sending a verification request to a server, wherein the verification request comprises the first portrait information, the first account information and accessed equipment information of monitoring equipment; when a message that the server responds to the verification request and returns that the verification is passed is received, the visitor is allowed to access the monitoring picture of the monitoring equipment through the first account information, and the user viewing the monitoring picture and the account viewing the monitoring picture are limited.

Description

Method and device for accessing monitoring equipment
Technical Field
The present disclosure relates to the field of video surveillance technologies, and in particular, to a method and an apparatus for accessing a surveillance device.
Background
Monitoring equipment such as an intelligent camera is increasingly widely used in the field of home monitoring, and the monitoring equipment can be connected with a network of a user home and is bound with account information of the user, so that the user to which the monitoring equipment belongs is identified. The bound user can also share the authority of the monitoring device to other users, so that the shared use of the same device is realized. After the binding user and the sharing user log in at the terminal, the monitoring picture of the monitoring device can be checked in real time, so that the condition in a family is monitored. When the monitoring equipment detects that the activity of suspicious personnel exists in the monitored area, the abnormal information can be reported to the server, and the server can push the abnormal information to the terminal, so that the user can know the abnormal condition of the family in time.
When account information of a bound user or a shared user is stolen, an invading user can conveniently check a monitoring picture through a terminal, so that the privacy information of the user is leaked.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a method and an apparatus for accessing a monitoring device, which can improve the security of the monitoring device.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for accessing a monitoring device, the method being applied to a terminal, the method including: sending a request for accessing monitoring equipment, shooting an image of an accessor, and acquiring first account information logged by the accessor; wherein the visitor's image includes first portrait information; sending a verification request to a server, wherein the verification request comprises the first portrait information, the first account information and the accessed equipment information of the monitoring equipment, so that the server can verify the identity of the visitor and verify the access authority of the first account according to the first portrait information, the first account information and the accessed equipment information of the monitoring equipment; and when receiving a message that the server responds to the verification request and returns that the verification is passed, allowing the visitor to access the monitoring picture of the monitoring equipment through the first account information.
In one possible implementation, the verification request further includes time information and location information when the request to access the monitoring device is sent.
In one possible implementation, the method further includes: generating an authority setting request, wherein the authority setting request comprises equipment information of monitoring equipment to be set, second account information to be set and authority information of a second account; and sending the permission setting request to the server so as to establish a permission record by the server, wherein the permission record is used for storing the association relationship among the equipment information of the monitoring equipment to be set, the second account information and the permission information of the second account.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for accessing a monitoring device, the method being applied to a server, the method including: receiving an authentication request sent by a terminal, wherein the authentication request comprises first portrait information of an accessor, first account information of current login and equipment information of accessed monitoring equipment; searching second head portrait information related to the first account information; if the first avatar information is consistent with the second avatar information, access authority verification is carried out according to the first account information and the accessed equipment information of the monitoring equipment; and when the access right passes the verification, returning a message of passing the verification to the terminal.
In one possible implementation, the method further includes: receiving an authority setting request sent by a terminal, wherein the authority setting request comprises equipment information of monitoring equipment to be set, second account information to be set and authority information of a second account; and establishing an authority record, wherein the authority record is used for storing the equipment information of the monitoring equipment to be set, the second account information and the association relation with the authority information of the second account.
In one possible implementation, the method further includes: receiving a registration request sent by a terminal, wherein the registration request comprises third account information to be registered and avatar information to be registered; and establishing a registration record, wherein the registration record is used for storing the incidence relation between the third account information and the avatar information to be registered.
In one possible implementation, the method further includes: if the first avatar information is consistent with the second avatar information, account information related to the equipment information of the accessed monitoring equipment is searched in an existing authority record; if the first account information exists in the account information associated with the accessed monitoring equipment, determining whether the first account is a sharing account or not according to the authority information of the first account; if the first account is a sharing account, determining a binding account associated with the equipment information of the monitoring equipment according to authority information of each account associated with the equipment information of the accessed monitoring equipment; and pushing an access record of the visitor to a terminal adopting the binding account for login, wherein the access record is used for storing the association relationship among the first portrait information, the first account information, the equipment information of the monitoring equipment and the verification result.
In one possible implementation, the method further includes: and if the first avatar information is inconsistent with the second avatar information or the access authority verification is not passed, returning a verification failure message to the terminal.
In a possible implementation manner, the verification request further includes time information and location information when the terminal sends a request for accessing the monitoring device, and the method further includes: and establishing and storing an access record, wherein the access record is used for storing the association relationship among the first head portrait information, the first account information, the time information, the position information, the equipment information of the monitoring equipment and the verification result.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a monitoring device, the apparatus being applied to a terminal, the apparatus including: the monitoring device comprises an access request sending module, a monitoring device access module and a monitoring device access module, wherein the access request sending module is used for sending a request for accessing the monitoring device, shooting an image of an accessor and acquiring first account information logged by the accessor; wherein the visitor's image includes first portrait information; a verification request sending module, configured to send a verification request to a server, where the verification request includes the first portrait information, the first account information, and device information of an accessed monitoring device, so that the server verifies an identity of the visitor and verifies an access right of the first account according to the first portrait information, the first account information, and the device information of the accessed monitoring device; and the verification message receiving module is used for allowing the visitor to access the monitoring picture of the monitoring equipment through the first account information when receiving a message which is returned by the server in response to the verification request and passes the verification.
In one possible implementation, the verification request further includes time information and location information when the request to access the monitoring device is sent.
In one possible implementation, the apparatus further includes: the device comprises a setting request generating module, a setting request generating module and a permission setting module, wherein the setting request generating module is used for generating a permission setting request which comprises device information of monitoring equipment to be set, second account information to be set and permission information of a second account; and the setting request sending module is used for sending the permission setting request to the server so as to establish a permission record by the server, wherein the permission record is used for storing the association relationship among the equipment information of the monitoring equipment to be set, the second account information and the permission information of the second account.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a monitoring device, the apparatus being applied to a server, the apparatus including: the authentication request receiving module is used for receiving an authentication request sent by a terminal, wherein the authentication request comprises first portrait information of an accessor, first account information of current login and equipment information of accessed monitoring equipment; the head portrait searching module is used for searching second head portrait information related to the first account information; the authority verification module is used for verifying the access authority according to the first account information and the accessed equipment information of the monitoring equipment when the first avatar information is consistent with the second avatar information; and the first message returning module is used for returning the verified message to the terminal when the access right is verified to pass.
In one possible implementation, the apparatus further includes: the device comprises a setting request receiving module, a permission setting module and a permission setting module, wherein the setting request receiving module is used for receiving a permission setting request sent by a terminal, and the permission setting request comprises device information of monitoring equipment to be set, second account information to be set and permission information of the second account information; and the authority record establishing module is used for establishing an authority record, and the authority record is used for storing the equipment information of the monitoring equipment to be set, the second account information and the incidence relation with the authority information of the second account.
In one possible implementation, the apparatus further includes: the registration request receiving module is used for receiving a registration request sent by a terminal, wherein the registration request comprises third account information to be registered and avatar information to be registered; and the registration record establishing module is used for establishing a registration record, and the registration record is used for storing the incidence relation between the third account information and the head portrait information to be registered.
In one possible implementation, the apparatus further includes: the account number searching module is used for searching account number information related to the accessed equipment information of the monitoring equipment in the existing authority record when the first head portrait information is consistent with the second head portrait information; the account determination module is used for determining whether the first account is a sharing account according to the authority information of the first account when the first account information exists in the account information associated with the accessed equipment information of the monitoring equipment; the information determining module is used for determining a binding account related to the equipment information of the monitoring equipment according to authority information of each account related to the equipment information of the accessed monitoring equipment when the first account is a sharing account; and the record pushing module is used for pushing an access record of the visitor to a terminal logged in by the binding account, wherein the access record is used for storing the association relationship among the first head portrait information, the first account information, the equipment information of the monitoring equipment and the verification result.
In one possible implementation, the apparatus further includes: and the second message returning module is used for returning a message of failed verification to the terminal when the first avatar information is inconsistent with the second avatar information or the access authority verification fails.
In a possible implementation manner, the verification request further includes time information and location information when the terminal sends a request for accessing the monitoring device, and the apparatus further includes: and the access record establishing module is used for establishing and storing an access record, wherein the access record is used for storing the association relationship among the first head portrait information, the first account information, the time information, the position information, the equipment information of the monitoring equipment and the verification result.
According to a fifth aspect of an embodiment of the present disclosure, there is provided an apparatus for accessing a monitoring device, including a processor; a memory for storing processor-executable instructions; wherein the processor is configured to perform the method of the first aspect.
According to a sixth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium, wherein instructions of the storage medium, when executed by a processor, enable the processor to perform the method of the first aspect described above.
According to a seventh aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a monitoring device, including a processor; a memory for storing processor-executable instructions; wherein the processor is configured to perform the method of the second aspect described above.
According to an eighth aspect of embodiments of the present disclosure, there is provided a non-transitory computer readable storage medium, wherein instructions, when executed by a processor, enable the processor to perform the method of the second aspect described above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: according to the method and the system, when a request for accessing the monitoring equipment is sent, the identity of the visitor and the access authority of the account number logged by the visitor are verified through the server according to the head portrait information of the visitor, the account number information logged by the visitor and the equipment information of the monitoring equipment to be accessed, when the identity of the visitor and the access authority of the account number logged by the visitor are verified, the visitor is allowed to access the monitoring picture of the monitoring equipment through the logged account number information, so that the visitor can view the monitoring picture, the limitation is made on the user viewing the monitoring picture and the account number viewing the monitoring picture, the possibility of leakage of the monitoring picture caused by leakage of the account number information is reduced, and the safety of the monitoring equipment is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment.
FIG. 2 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment.
FIG. 3 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment.
FIG. 4 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment.
FIG. 5 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment.
FIG. 6 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an example embodiment.
FIG. 7 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an example embodiment.
FIG. 8 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an exemplary embodiment.
FIG. 9 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with one illustrative embodiment.
FIG. 10 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an example embodiment.
FIG. 11 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a method of accessing a monitoring device, which may be applied to a terminal, such as a mobile phone, a tablet computer, or a computer, according to an exemplary embodiment. As shown in fig. 1, the method of accessing a monitoring device may include the steps of:
in step S101, a request for accessing a monitoring device is sent, an image of an accessor is captured, and first account information logged in by the accessor is acquired; wherein the visitor's image includes first portrait information.
When a user performs an operation of viewing a monitoring screen of the monitoring device on the terminal, the terminal may be triggered to generate a request for accessing the monitoring device. The terminal may acquire the monitoring screen by sending a request to access the monitoring device. After the terminal sends the request for accessing the monitoring equipment, the terminal can shoot the image of the visitor and acquire the first account information logged in by the visitor to generate an authentication request, and further determine whether to present the acquired monitoring picture to the user.
The first account information is account information of a first account logged in a current application program when a terminal sends a request for accessing the monitoring equipment. The first account information may be a user name, a mailbox, a mobile phone number, or the like, and the disclosure is not limited thereto.
The visitor is a user who accesses the monitoring screen through the terminal currently, the image of the visitor comprises first image information, the first portrait information is portrait information of the visitor, and the first portrait information can represent the visitor. After the terminal captures an image of the visitor, the first portrait information may be obtained from the image, for example, the image may be cut or face-recognized to obtain the first portrait information.
In a possible implementation mode, when the terminal shoots an image of an accessor, whether a current application program has the authority of opening a front camera of the terminal or not can be obtained; if no authority exists, the user is informed that the user can check the information only by acquiring the corresponding authority; if the visitor has the authority, the visitor can shoot through the front camera automatically, and therefore the image of the visitor is shot.
It should be noted that the application program may be an application program used for connecting the monitoring device in the terminal, and after the user logs in the application program, the binding and authorization of the monitoring device, the viewing of the monitoring screen, and the like may be implemented through the application program.
In step S102, a verification request is sent to a server, where the verification request includes the first portrait information, the first account information, and the device information of the accessed monitoring device, so that the server can verify the identity of the visitor and verify the access right of the first account according to the first portrait information, the first account information, and the device information of the accessed monitoring device.
The terminal may generate a verification request including the first header information, the first account information, and the device information of the accessed monitoring device. When the server receives the verification request, the identity of the visitor and the access authority of the first account where the visitor currently logs in can be verified according to the first head portrait information, the first account information and the accessed equipment information of the monitoring equipment. The device information may be a device name or a device serial number, and the like, which is not limited in this disclosure.
The identity of the visitor includes whether the visitor is the owner of the first account information or whether the visitor is not the owner of the first account information. The server may determine the identity of the visitor (whether the owner of the first account information) based on the first portrait information. When the visitor is the owner of the first account information, it is indicated that the first account information is safe, and the server may further verify whether the first account has an access right according to the first account information and the device information of the accessed monitoring device.
In a possible implementation manner, the server may store an association relationship between the account information and the avatar information of the account information owner, and the server may determine the avatar information of the first account information owner according to the association relationship, and further determine the identity of the visitor according to the avatar information of the first account information owner and the first avatar information. The association relationship between the account information and the head portrait information of the account information owner can be established in the account registration process.
In one possible implementation manner, the server may store an association relationship between the device information, the account information, and the authority information of the account. The server may determine, according to the association relationship, authority information of the first account for the accessed monitoring device, and further determine an access authority of the first account. The association relationship among the device information, the account information and the authority information of the account can be established in the authority setting process.
When the server determines that the visitor is the owner of the first account information and the first account has the access right, the server may return a message that the authentication is passed to the terminal. When the server determines that the visitor is not the owner of the first account information or the first account does not have the access right, the server may return a message that the authentication has failed to the terminal.
In a possible implementation manner, the verification request in step S102 may further include time information and location information when the request for accessing the monitoring device is sent. Therefore, when the server receives the verification request, the time information and the position information of the monitoring equipment accessed by the visitor through the first account can be recorded, so that the user can know the time and the position of the monitoring picture which is applied for viewing conveniently.
In step S103, when receiving a message that the authentication returned by the server in response to the authentication request is passed, allowing the visitor to access the monitoring screen of the monitoring device through the first account information.
And the terminal receives a message that the verification returned by the server in response to the verification request is passed, and the message indicates that the visitor is the owner of the first account information, and the first account information has the access authority, at the moment, the first account information is safe, and the visitor has the authority to view the monitoring picture. Therefore, the terminal may allow the visitor to access the monitoring screen of the monitoring apparatus through the first account information.
In a possible implementation manner, when a message of authentication failure returned by the server in response to the authentication request is received, access to the monitoring screen of the monitoring device through the first account information by the visitor is denied. Meanwhile, the terminal can prompt the reason of the authentication failure, such as the failure of the identity authentication (for example, the login person is not the principal), or the failure of the authority authentication, and the like.
According to the method and the system, when a request for accessing the monitoring equipment is sent, the identity of the visitor and the access authority of the account number logged by the visitor are verified through the server according to the head portrait information of the visitor, the account number information logged by the visitor and the equipment information of the monitoring equipment to be accessed, when the identity of the visitor and the access authority of the account number logged by the visitor are verified, the visitor is allowed to access the monitoring picture of the monitoring equipment through the logged account number information, so that the visitor can view the monitoring picture, the limitation is made on the user viewing the monitoring picture and the account number viewing the monitoring picture, the possibility of leakage of the monitoring picture caused by leakage of the account number information is reduced, and the safety of the monitoring equipment is improved.
FIG. 2 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment. As shown in fig. 2, the method of accessing a monitoring device may further include step S104 and step S105.
In step S104, an authority setting request is generated, where the authority setting request includes device information of the monitoring device to be set, second account information to be set, and authority information of the second account.
When the terminal binds the monitoring device and the account or shares the authority of the monitoring device, an authority setting request can be generated. The permission setting request can include device information of the monitoring device to be set, second account information to be set, and permission information of the second account.
And the second account information is the information of the second account to be set with the authority. The authority information of the second account can be used for determining whether the second account is a bound account or a shared account, wherein the bound account is an account bound with the monitoring device, and the shared account information is an account subjected to authority sharing.
It should be noted that one monitoring device may correspond to one bound account and multiple shared accounts, and the rights of the shared accounts are shared by the bound accounts.
In step S105, the permission setting request is sent to the server, so that the server establishes a permission record, where the permission record is used to store association relationships among the device information of the monitoring device to be set, the second account information, and the permission information of the second account.
In a possible implementation manner, when the server receives the permission setting request, a permission record may be established, so as to verify the access permission of the first account in step S101 according to the existing permission record, where the permission record is used to store the association relationship between the device information of the monitoring device to be set, the second account information, and the permission information of the second account.
The second account is taken as a binding account corresponding to the first monitoring device for explanation. The server can verify whether the first account has the authority to access the first device according to the account information in the authority record matched with the device information of the first monitoring device and the authority information of the account. When the first account information is the same as the second account information, the server may determine that the first account is a binding account corresponding to the first monitoring device, and the first account has a right to view the first monitoring device. When the first account information is the same as any sharing account information associated with the second account information, the server may determine that the first account is a sharing account, and the first account has a right to view the first monitoring device. When the first account information is not related to the second account information (the first account information is different from the second account information, and the first account information is different from the sharing account information related to each piece of second account information), the server may determine that the first account does not have the permission to view the first monitoring device.
FIG. 3 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment. The method of accessing a monitoring device may be applied to a server. As shown in fig. 3, the method of accessing a monitoring device may include:
in step S201, an authentication request sent by a terminal is received, where the authentication request includes first header information of an accessor, first account information of a current login, and device information of an accessed monitoring device.
The verification request, the first avatar information, the first account information, and the device information of the accessed monitoring device may refer to step S101 and step S102, which are not described herein again.
In step S202, second avatar information associated with the first account information is searched.
The second avatar information is avatar information associated with the first account information and may represent avatar information of an owner of the first account information. The server can pre-store the association relationship between each account information and the head portrait information of the account information owner, and determine the second head portrait information associated with the first account information by searching the association relationship.
In one possible implementation, step S202 may include: and searching second head portrait information related to the first account information in the existing registration record. The acquiring process of the registration record may include: receiving a registration request sent by a terminal, wherein the registration request comprises third account information to be registered and avatar information to be registered; and establishing a registration record, wherein the registration record is used for storing the incidence relation between the third account information and the avatar information to be registered.
The third account information may represent account information of a third account to be registered. When a user performs an account registration operation in a terminal, the terminal may generate a registration request, where the registration request includes third account information and avatar information to be registered. When the terminal generates the registration request, the terminal may capture an image of the registrant, and use the avatar information obtained from the image as the avatar information to be registered.
In step S203, if the first avatar information is consistent with the second avatar information, performing access right verification according to the first account information and the device information of the accessed monitoring device.
When the first avatar information is consistent with the second avatar information, it is indicated that the visitor represented by the first avatar information is the owner of the first account information, so that the server can further verify the access right of the first account according to the first account information and the accessed device information of the monitoring device.
In step S204, when the access right is verified, a message that the verification is passed is returned to the terminal.
The authority verification pass indicates that the first account has the authority to access the accessed monitoring equipment, so that the server can return a verification pass message to the terminal, so that the terminal allows an accessor to access the monitoring picture of the monitoring equipment through the first account information.
In a possible implementation manner, if the first avatar information and the second avatar information are not consistent, or the access right verification fails, a message of failed verification is returned to the terminal. When the first head portrait information is inconsistent with the second head portrait information, the first account number is possibly stolen; the verification of the access right of the first account fails to indicate that the first account does not have the right to access the monitoring device. In the two cases, the visitor may be an invading user, and the server returns a verification failure message to the terminal, so that the terminal can refuse the visitor to access the monitoring picture of the monitoring device through the first account information, and the possibility of leakage of the privacy information of the user is reduced.
According to the method and the device, when an authentication request is received, the identity of an accessor and the access authority of a currently logged account are authenticated according to the head image information of the accessor, the currently logged account information and the accessed device information of the monitoring device, and when the identity of the accessor and the access authority of the currently logged account are authenticated, the accessor is allowed to access the monitoring picture of the monitoring device through the currently logged account information, so that the accessor can check the monitoring picture, limits a user checking the monitoring picture and an account checking the monitoring picture, reduces the possibility of leakage of the monitoring picture caused by the leakage of the account, and improves the safety of the monitoring device.
FIG. 4 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment. As shown in fig. 4, the method for accessing a monitoring device may further include: step S205 and step S206.
In step S205, an authority setting request sent by the terminal is received, where the authority setting request includes device information of the monitoring device to be set, second account information to be set, and authority information of the second account.
In step S206, an authority record is established, where the authority record is used to store the device information of the monitoring device to be set, the second account information, and the association relationship between the device information and the authority information of the second account.
Step S205 and step S206 may refer to step S104 and step S105, and are not described here.
FIG. 5 is a flow chart illustrating a method of accessing a monitoring device in accordance with an exemplary embodiment. As shown in fig. 5, the method of accessing a monitoring device may further include: step S207 to step S208.
In step S207, if the first avatar information is consistent with the second avatar information, the account information associated with the device information of the accessed monitoring device is searched in an existing permission record.
In step S208, if the first account information exists in the account information associated with the accessed device information of the monitoring device, determining whether the first account is a sharing account according to the authority information of the first account.
Step S104 may be referred to for sharing account information, which is not described herein again.
In step S209, if the first account is a sharing account, a binding account associated with the device information of the monitoring device is determined according to the authority information of each account associated with the device information of the accessed monitoring device.
In step S210, an access record of the visitor is pushed to a terminal logged in by using the binding account, where the access record is used to store an association relationship between the first portrait information, the first account information, the device information of the monitoring device, and a verification result.
Wherein, the access record may be established by the server according to the information included in the authentication request when the server receives the authentication request. In one example, when the server receives the authentication request of step S201 (the authentication request includes the first portrait information, the currently logged-in first account information, and the accessed device information of the monitoring device), an access record may be established, where the access record is used to store an association relationship between the first portrait information, the first account information, the device information of the monitoring device, and the authentication result.
When the account information associated with the accessed device information of the monitoring device contains the first account information, the fact that the first account has the authority of accessing the monitoring device is indicated. At this time, the server may determine whether the first account is a sharing account according to the permission information of the first account. When the first account is a sharing account, the server may determine, according to the authority information of each account associated with the accessed device information of the monitoring device, a binding account associated with the device information of the monitoring device.
Because the owner of the bound account information is the owner of the corresponding monitoring device, when the user requests to access the monitoring picture through the account information except the bound account information, the access record is pushed to the owner of the bound account information, so that the owner of the monitoring device can know which user tries to view the monitoring picture and whether the monitoring picture is successfully viewed or not.
In a possible implementation manner, the verification request may further include time information and location information when the terminal sends a request for accessing the monitoring device. At this time, the server may establish and store an access record for storing an association relationship between the first portrait information, the first account information, the time information, the location information, the device information of the monitoring device, and the verification result, according to the first portrait information, the first account information, the time information, the location information, the device information of the monitoring device, and the verification result.
In this way, the owner of the monitoring device can view the existing access records at any time, knowing which users attempted to view the monitoring screen at what time and where, and ultimately, whether the monitoring screen was successfully viewed.
In a possible implementation manner, when the access record stores the association relationship between the first portrait information, the first account information, the time information, the location information, the device information of the monitoring device, and the verification result, the access record pushed in step S210 may also include the first portrait information, the first account information, the time information, the location information, the device information of the monitoring device, and the verification result. At this time, the information obtained by the owner of the monitoring device is more detailed.
FIG. 6 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an example embodiment. The apparatus 500 may be applied to a terminal. Referring to fig. 6, the apparatus 500 may include: an access request sending module 501, an authentication request sending module 502 and an authentication message receiving module 503.
The access request sending module 501 is configured to send a request for accessing a monitoring device, capture an image of an accessor, and acquire first account information logged in by the accessor; wherein the visitor's image includes first portrait information;
the verification request sending module 502 is configured to send a verification request to a server, where the verification request includes the first portrait information, the first account information, and the device information of the accessed monitoring device, so that the server can verify the identity of the visitor and verify the access right of the first account according to the first portrait information, the first account information, and the device information of the accessed monitoring device;
the verification message receiving module 503 is configured to allow the visitor to access the monitoring screen of the monitoring device through the first account information when receiving a verification-passed message returned by the server in response to the verification request.
In one possible implementation, the verification request further includes time information and location information when the request to access the monitoring device is sent.
FIG. 7 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an example embodiment. Referring to fig. 7, in one possible implementation, the apparatus 500 may further include: a setting request generating module 504 and a setting request transmitting module 505.
The setting request generating module 504 is configured to generate an authority setting request, where the authority setting request includes device information of a monitoring device to be set, second account information to be set, and authority information of a second account;
the setting request sending module 505 is configured to send the permission setting request to the server, so that the server establishes a permission record, where the permission record is used to store association relations of the device information of the monitoring device to be set, the second account information, and the permission information of the second account.
According to the method and the system, when a request for accessing the monitoring equipment is sent, the identity of the visitor and the access authority of the account number logged by the visitor are verified through the server according to the head portrait information of the visitor, the account number information logged by the visitor and the equipment information of the monitoring equipment to be accessed, when the identity of the visitor and the access authority of the account number logged by the visitor are verified, the visitor is allowed to access the monitoring picture of the monitoring equipment through the logged account number information, so that the visitor can view the monitoring picture, the limitation is made on the user viewing the monitoring picture and the account number viewing the monitoring picture, the possibility of leakage of the monitoring picture caused by leakage of the account number information is reduced, and the safety of the monitoring equipment is improved.
FIG. 8 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with an exemplary embodiment. The apparatus 600 may be applied to a server. Referring to fig. 8, the apparatus 600 may include: an authentication request receiving module 601, an avatar lookup module 602, an authority authentication module 603, and a first message returning module 604.
The authentication request receiving module 601 is configured to receive an authentication request sent by a terminal, where the authentication request includes first portrait information of an accessor, first account information of a current login, and device information of an accessed monitoring device;
the avatar lookup module 602 is configured to lookup second avatar information associated with the first account information;
the authority verification module 603 is configured to perform access authority verification according to the first account information and the device information of the accessed monitoring device when the first avatar information is consistent with the second avatar information;
the first message returning module 604 is configured to return a verified message to the terminal when the access right is verified.
FIG. 9 is a block diagram illustrating an apparatus for accessing a monitoring device in accordance with one illustrative embodiment. Referring to fig. 9, in one possible implementation, the apparatus 600 may further include: a setting request receiving module 605 and an authority record establishing module 606.
The setting request receiving module 605 is configured to receive an authority setting request sent by a terminal, where the authority setting request includes device information of a monitoring device to be set, second account information to be set, and authority information of the second account information;
the authority record establishing module 606 is configured to establish an authority record, where the authority record is used to store the device information of the monitoring device to be set, the second account information, and an association relationship with the authority information of the second account.
In one possible implementation, the apparatus 600 may further include: a registration request receiving module 607 and a registration record establishing module 608.
The registration request receiving module 607 is configured to receive a registration request sent by a terminal, where the registration request includes third account information to be registered and avatar information to be registered;
the registration record establishing module 608 is configured to establish a registration record, where the registration record is used to store an association relationship between the third account information and the avatar information to be registered.
In one possible implementation, the apparatus 600 may further include: an account searching module 609, an account determining module 610, an information determining module 611, and a record pushing module 612.
The account number searching module 609 is configured to search account number information associated with the device information of the accessed monitoring device in an existing authority record when the first avatar information is consistent with the second avatar information;
the account determination module 610 is configured to determine whether the first account is a sharing account according to authority information of the first account when the first account information exists in account information associated with the device information of the accessed monitoring device;
the information determination module 611 is configured to, when the first account is a sharing account, determine a binding account associated with the device information of the monitoring device according to authority information of each account associated with the device information of the accessed monitoring device;
the record pushing module 612 is configured to push an access record of the visitor to a terminal logged in by using the binding account, where the access record is used to store an association relationship between the first portrait information, the first account information, the device information of the monitoring device, and the verification result.
In one possible implementation, the apparatus 600 may further include: a second message return module 613.
The second message returning module 613 is configured to return a message of failed authentication to the terminal when the first avatar information and the second avatar information are not consistent or the access right authentication fails.
In a possible implementation manner, the verification request further includes time information and location information when the terminal sends a request for accessing the monitoring device, and the apparatus 600 further includes: the record setup module 614 is accessed.
The access record establishing module 614 is configured to establish and store an access record, where the access record is used to store an association relationship between the first portrait information, the first account information, the time information, the location information, the device information of the monitoring device, and a verification result.
According to the method and the device, when a verification request is received, the identity of an accessor and the access authority of the currently logged account information are verified according to the head image information of the accessor, the currently logged account information and the accessed device information of the monitored device, when the identity of the accessor and the access authority of the currently logged account information are verified, the currently logged account information is allowed to access a monitoring picture of the monitored device, so that the accessor can check the monitoring picture, limits a user checking the monitoring picture and the account information checking the monitoring picture, reduces the possibility of leakage of the monitoring picture caused by leakage of the account information, and improves the safety of the monitored device.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 10 is a block diagram illustrating an apparatus 800 for accessing a monitoring device in accordance with an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 10, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G or 4G or 5G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods applied to the terminal.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the apparatus 800 to perform the above-described method applied to the access monitoring device of the terminal is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Fig. 11 is a block diagram illustrating an apparatus 1900 for accessing a monitoring device according to an example embodiment. For example, the apparatus 1900 may be provided as a server. Referring to FIG. 11, the device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by the processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method applied to the access monitoring device of the server.
The device 1900 may also include a power component 1926 configured to perform power management of the device 1900, a wired or wireless network interface 1950 configured to connect the device 1900 to a network, and an input/output (I/O) interface 1958. The device 1900 may operate based on an operating system stored in memory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 1932 comprising instructions, executable by the processing component 1922 of the apparatus 1900 to perform the method described above as applied to a server is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (16)

1. A method for accessing a monitoring device, wherein the method is applied to a terminal, and the method comprises the following steps:
sending a request for accessing monitoring equipment, shooting an image of an accessor, and acquiring first account information logged by the accessor; wherein the visitor's image includes first portrait information;
sending a verification request to a server, wherein the verification request comprises the first portrait information, the first account information and the accessed equipment information of the monitoring equipment, so that the server can verify the identity of the visitor and verify the access authority of the first account according to the first portrait information, the first account information and the accessed equipment information of the monitoring equipment;
when a message that the server responds to the verification request and returns that the verification is passed is received, allowing the visitor to access a monitoring picture of the monitoring equipment through first account information;
the verification request further comprises time information and position information when a request for accessing the monitoring equipment is sent, so that the server sends an access record to a terminal which logs in a binding account associated with the equipment information of the monitoring equipment when the first account is determined to be a sharing account, wherein the access record is used for storing the association relationship among the first head portrait information, the first account information, the time information, the position information, the equipment information of the monitoring equipment and a verification result.
2. The method of claim 1, further comprising:
generating an authority setting request, wherein the authority setting request comprises equipment information of monitoring equipment to be set, second account information to be set and authority information of a second account;
and sending the permission setting request to the server so as to establish a permission record by the server, wherein the permission record is used for storing the association relationship among the equipment information of the monitoring equipment to be set, the second account information and the permission information of the second account.
3. A method for accessing a monitoring device, the method being applied to a server, the method comprising:
receiving an authentication request sent by a terminal, wherein the authentication request comprises first portrait information of an accessor, first account information of current login and equipment information of accessed monitoring equipment;
searching second head portrait information related to the first account information;
if the first avatar information is consistent with the second avatar information, access authority verification is carried out according to the first account information and the accessed equipment information of the monitoring equipment;
when the access authority passes the verification, returning a message of passing the verification to the terminal;
the verification request further includes time information and location information when the terminal sends a request for accessing the monitoring device, and the method further includes:
if the first avatar information is consistent with the second avatar information, account information related to the equipment information of the accessed monitoring equipment is searched in an existing authority record;
if the first account information exists in the account information associated with the accessed monitoring equipment, determining whether the first account is a sharing account or not according to the authority information of the first account;
if the first account is a sharing account, determining a binding account associated with the equipment information of the monitoring equipment according to authority information of each account associated with the equipment information of the accessed monitoring equipment;
and pushing an access record of the visitor to a terminal adopting the binding account for login, wherein the access record is used for storing the association relationship among the first portrait information, the first account information, the time information, the position information, the equipment information of the monitoring equipment and the verification result.
4. The method of claim 3, further comprising:
receiving an authority setting request sent by a terminal, wherein the authority setting request comprises equipment information of monitoring equipment to be set, second account information to be set and authority information of a second account;
and establishing an authority record, wherein the authority record is used for storing the equipment information of the monitoring equipment to be set, the second account information and the association relation with the authority information of the second account.
5. The method of claim 3, further comprising:
receiving a registration request sent by a terminal, wherein the registration request comprises third account information to be registered and avatar information to be registered;
and establishing a registration record, wherein the registration record is used for storing the incidence relation between the third account information and the avatar information to be registered.
6. The method according to any one of claims 3 to 5, further comprising:
and if the first avatar information is inconsistent with the second avatar information or the access authority verification is not passed, returning a verification failure message to the terminal.
7. An apparatus for accessing a monitoring device, the apparatus being applied to a terminal, the apparatus comprising:
the monitoring device comprises an access request sending module, a monitoring device access module and a monitoring device access module, wherein the access request sending module is used for sending a request for accessing the monitoring device, shooting an image of an accessor and acquiring first account information logged by the accessor; wherein the visitor's image includes first portrait information;
a verification request sending module, configured to send a verification request to a server, where the verification request includes the first portrait information, the first account information, and device information of an accessed monitoring device, so that the server verifies an identity of the visitor and verifies an access right of the first account according to the first portrait information, the first account information, and the device information of the accessed monitoring device;
the verification message receiving module is used for allowing the visitor to access the monitoring picture of the monitoring equipment through first account information when receiving a message which is returned by the server in response to the verification request and passes the verification;
the verification request further comprises time information and position information when a request for accessing the monitoring equipment is sent, so that the server sends an access record to a binding account related to the equipment information of the monitoring equipment when the first account is determined to be a sharing account, wherein the access record is used for storing the association relation among the first portrait information, the first account information, the time information, the position information, the equipment information of the monitoring equipment and a verification result.
8. The apparatus of claim 7, further comprising:
the device comprises a setting request generating module, a setting request generating module and a permission setting module, wherein the setting request generating module is used for generating a permission setting request which comprises device information of monitoring equipment to be set, second account information to be set and permission information of a second account;
and the setting request sending module is used for sending the permission setting request to the server so as to establish a permission record by the server, wherein the permission record is used for storing the association relationship among the equipment information of the monitoring equipment to be set, the second account information and the permission information of the second account.
9. An apparatus for accessing a monitoring device, the apparatus being applied to a server, the apparatus comprising:
the authentication request receiving module is used for receiving an authentication request sent by a terminal, wherein the authentication request comprises first portrait information of an accessor, first account information of current login and equipment information of accessed monitoring equipment;
the head portrait searching module is used for searching second head portrait information related to the first account information;
the authority verification module is used for verifying the access authority according to the first account information and the accessed equipment information of the monitoring equipment when the first avatar information is consistent with the second avatar information;
the first message returning module is used for returning a verified message to the terminal when the access authority passes verification;
the verification request further includes time information and location information when the terminal sends a request for accessing the monitoring device, and the apparatus further includes:
the account number searching module is used for searching account number information related to the accessed equipment information of the monitoring equipment in the existing authority record when the first head portrait information is consistent with the second head portrait information;
the account determination module is used for determining whether the first account is a sharing account according to the authority information of the first account when the first account information exists in the account information associated with the accessed equipment information of the monitoring equipment;
the information determining module is used for determining a binding account related to the equipment information of the monitoring equipment according to authority information of each account related to the equipment information of the accessed monitoring equipment when the first account is a sharing account;
and the record pushing module is used for pushing an access record of the visitor to a terminal logged in by the binding account, wherein the access record is used for storing the association relationship among the first head portrait information, the first account information, the time information, the position information, the equipment information of the monitoring equipment and the verification result.
10. The apparatus of claim 9, further comprising:
the device comprises a setting request receiving module, a permission setting module and a permission setting module, wherein the setting request receiving module is used for receiving a permission setting request sent by a terminal, and the permission setting request comprises device information of monitoring equipment to be set, second account information to be set and permission information of the second account information;
and the authority record establishing module is used for establishing an authority record, and the authority record is used for storing the equipment information of the monitoring equipment to be set, the second account information and the incidence relation with the authority information of the second account.
11. The apparatus of claim 9, further comprising:
the registration request receiving module is used for receiving a registration request sent by a terminal, wherein the registration request comprises third account information to be registered and avatar information to be registered;
and the registration record establishing module is used for establishing a registration record, and the registration record is used for storing the incidence relation between the third account information and the head portrait information to be registered.
12. The apparatus of any one of claims 9 to 11, further comprising:
and the second message returning module is used for returning a message of failed verification to the terminal when the first avatar information is inconsistent with the second avatar information or the access authority verification fails.
13. An apparatus for accessing a monitoring device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of any of claims 1 to 2.
14. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor, enable the processor to perform the method of any of claims 1-2.
15. An apparatus for accessing a monitoring device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of any of claims 3 to 6.
16. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor, enable the processor to perform the method of any of claims 3-6.
CN201810898688.8A 2018-08-08 2018-08-08 Method and device for accessing monitoring equipment Active CN109145560B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810898688.8A CN109145560B (en) 2018-08-08 2018-08-08 Method and device for accessing monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810898688.8A CN109145560B (en) 2018-08-08 2018-08-08 Method and device for accessing monitoring equipment

Publications (2)

Publication Number Publication Date
CN109145560A CN109145560A (en) 2019-01-04
CN109145560B true CN109145560B (en) 2022-03-25

Family

ID=64792220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810898688.8A Active CN109145560B (en) 2018-08-08 2018-08-08 Method and device for accessing monitoring equipment

Country Status (1)

Country Link
CN (1) CN109145560B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149203A (en) * 2019-05-05 2019-08-20 重庆科芮智能科技有限公司 Evidence processing method and processing device
CN110162946B (en) * 2019-05-30 2022-08-16 奇安信科技集团股份有限公司 Mobile storage management and control method and device
CN110140671A (en) * 2019-06-06 2019-08-20 江苏农牧科技职业学院 A kind of herding pet monitoring device and system
CN110336737B (en) * 2019-06-10 2021-09-24 王晟琦 Life record sharing method and device and computer equipment
CN112667982A (en) * 2019-10-16 2021-04-16 吴昌宇 Fingerprint and face identification monitoring system
CN111970498A (en) * 2020-10-20 2020-11-20 南京信同诚信息技术有限公司 Public safety video monitoring networking information safety system
CN113286116B (en) * 2020-12-28 2022-08-02 常熟昊虞电子信息科技有限公司 Information prompting method and device for monitoring security management and cloud server
CN112738251A (en) * 2020-12-30 2021-04-30 航天信息股份有限公司 Method and system for monitoring state based on sensor
CN113378135B (en) * 2021-06-08 2023-08-25 华中科技大学 Method for inquiring and verifying privacy data of computer
CN114499981A (en) * 2021-12-29 2022-05-13 中国电信股份有限公司 Video access method and device
CN115208616B (en) * 2022-05-20 2023-06-23 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines
CN116896482B (en) * 2023-09-08 2024-02-09 联通在线信息科技有限公司 Household camera remote control method and device based on shielding privacy information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101582769A (en) * 2009-07-03 2009-11-18 杭州华三通信技术有限公司 Authority setting method of user access network and equipment
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8223205B2 (en) * 2007-10-24 2012-07-17 Waterfall Solutions Ltd. Secure implementation of network-based sensors

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101582769A (en) * 2009-07-03 2009-11-18 杭州华三通信技术有限公司 Authority setting method of user access network and equipment
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification

Also Published As

Publication number Publication date
CN109145560A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN109145560B (en) Method and device for accessing monitoring equipment
US10123196B2 (en) Method and device for alarm triggering
CN106603667B (en) Screen information sharing method and device
CN105847243B (en) Method and device for accessing intelligent camera
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
CN108811179B (en) Wireless network connection method, device and storage medium
CN107733872B (en) Information printing method and device
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
CN110400405B (en) Method, device and medium for controlling access control
CN108052822B (en) Terminal control method, device and system
EP3163834B1 (en) Method and device for equipment control
CN107230060B (en) Account loss reporting method and device
KR20170126388A (en) Method, device and system for executing business process
US20170286927A1 (en) Method and device for online payment
CN106302528B (en) Short message processing method and device
CN107612888B (en) Enterprise user space creation method and device
CN107231338B (en) Network connection method, device and device for network connection
CN108664216B (en) Data storage method and device
CN105721506B (en) Method, device and system for account number theft prevention
CN106027601B (en) Remote control method and device
CN109151403B (en) Video data acquisition method and device
US20170013074A1 (en) Methods and apparatuses for providing information of video capture device
WO2018058598A1 (en) Method and apparatus for prompting abnormal information
CN107241318B (en) Account loss reporting method and device
CN107395895B (en) Unlocking method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant