CN109635532A - A kind of picture pick-up device and its binding method - Google Patents

A kind of picture pick-up device and its binding method Download PDF

Info

Publication number
CN109635532A
CN109635532A CN201811482284.7A CN201811482284A CN109635532A CN 109635532 A CN109635532 A CN 109635532A CN 201811482284 A CN201811482284 A CN 201811482284A CN 109635532 A CN109635532 A CN 109635532A
Authority
CN
China
Prior art keywords
picture pick
user equipment
equipment
bound
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811482284.7A
Other languages
Chinese (zh)
Inventor
蔡蓓蓓
顾正相
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Carbon Blue Network Technology Co Ltd
Original Assignee
Shanghai Carbon Blue Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Carbon Blue Network Technology Co Ltd filed Critical Shanghai Carbon Blue Network Technology Co Ltd
Priority to CN201811482284.7A priority Critical patent/CN109635532A/en
Publication of CN109635532A publication Critical patent/CN109635532A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles

Abstract

This application provides a kind of picture pick-up device and its binding methods, the two dimensional code that first user equipment provides is scanned by picture pick-up device, the two dimensional code is generated by first user equipment according to identity information relevant to first user equipment, therefore the picture pick-up device can obtain the identity information from the two dimensional code scanned, directly can be bound picture pick-up device and first user equipment according to the identity information.Thus, change the mode for needing to be scanned the two-dimensional code by user equipment, and without registering account number, therefore the operation complexity in binding procedure is enormously simplified, it is only managed simultaneously by user for the offer two dimensional code of the first user equipment, other people are difficult to obtain, therefore information leakage or the risk being cracked significantly reduce, to improve safety.

Description

A kind of picture pick-up device and its binding method
Technical field
This application involves information technology field more particularly to a kind of picture pick-up devices and its binding method.
Background technique
Increasingly developed with technology, the application of all kinds of intelligent video camera heads is also more and more extensive.Using intelligent video camera head Types of functionality when, user often requires to use the user equipmenies such as mobile phone and binds with intelligent video camera head, and phase just can be used The function of answering.Currently, user equipment is as follows by the way of when binding with intelligent video camera head: intelligent video camera head can provide one Two dimensional code comprising its identity information, user equipment scans two dimensional code, then in the application program about the intelligent video camera head Or account number is registered on webpage, the identity information for the intelligent video camera head for including in account number and two dimensional code based on registration is tied up It is fixed.In such mode, the two dimensional code that needs to be gone scanning intelligent video camera head to provide by user equipment simultaneously needs to register account number, operation compared with To be cumbersome, simultaneously because anyone can remove the two dimensional code of scanning intelligent video camera head offer, therefore relevant information is easy leakage, It is invaded so as to cause smart machine head, security risk is higher.
Summary of the invention
The first purpose of the application is to provide a kind of picture pick-up device and its binding method.
To achieve the above object, some embodiments of the present application provide a kind of binding method of picture pick-up device, this method Include:
Picture pick-up device scans the two dimensional code that the first user equipment provides, wherein the two dimensional code is set by first user It is standby to be generated according to identity information relevant to first user equipment;
The picture pick-up device obtains the identity information from the two dimensional code scanned;
The picture pick-up device ties up the picture pick-up device and first user equipment according to the identity information It is fixed.
Some embodiments of the present application additionally provide a kind of picture pick-up device, which includes referring to for storing computer program The memory of order and processor for executing computer program instructions, wherein when the computer program instructions are by the processor When execution, triggers the equipment and execute the binding method.
In addition, some embodiments of the present application additionally provide a kind of computer-readable medium, it is stored thereon with computer journey Sequence instruction, the computer-readable instruction can be executed by processor to realize the binding method.
In the scheme that some embodiments of the present application provide, the two dimension that the first user equipment provides is scanned by picture pick-up device Code, the two dimensional code are generated by first user equipment according to identity information relevant to first user equipment, therefore The picture pick-up device can obtain the identity information from the two dimensional code scanned, directly can will according to the identity information Picture pick-up device is bound with first user equipment.The side for needing to be scanned the two-dimensional code by user equipment is changed as a result, Formula, and without registering account number, therefore the operation complexity in binding procedure is enormously simplified, while being used for the first user equipment Offer two dimensional code only by user manage, other people are difficult to obtain, therefore information leakage or the risk being cracked significantly drop It is low, to improve safety.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of process flow diagram of the binding method of picture pick-up device provided by the embodiments of the present application;
Fig. 2 is the interaction process schematic diagram during mobile phone is bound with camera;
Fig. 3 is process flow of the picture pick-up device when handling the operation requests from user equipment in the embodiment of the present application Figure;
Fig. 4 is the interaction process schematic diagram during visitor's equipment is bound with camera;
The stream that picture pick-up device handles the operation requests from multiple second user equipment in Fig. 5 the embodiment of the present application Cheng Tu;
Fig. 6 is processing of the picture pick-up device to the operation requests from owner's equipment and visitor's equipment in the embodiment of the present application Process;
Fig. 7 is a kind of structural schematic diagram of picture pick-up device provided by the embodiments of the present application;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
In a typical configuration of this application, terminal, the equipment of service network include one or more processors (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media, can be by any side Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM (CD- ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.
The embodiment of the present application provides a kind of binding method of picture pick-up device, for carrying out picture pick-up device and user equipment Binding changes the mode for needing to be scanned the two-dimensional code by user equipment, and without registering account number, therefore enormously simplifies and tie up Operation complexity during fixed, while the offer two dimensional code for the first user equipment is only managed by user, other people It is difficult to obtain, therefore information leakage or the risk being cracked significantly reduce, to improve safety.
In actual scene, the executing subject of this method can include but is not limited to all kinds of taking the photograph with data-handling capacity As equipment, such as intelligent camera head etc..Institute's structure is integrated by network alternatively, being also possible to the picture pick-up device and the network equipment At equipment, the network equipment include but is not limited to as network host, single network server, multiple network server collection or Set of computers based on cloud computing etc. realize, here, cloud by based on cloud computing (Cloud Computing) a large amount of hosts or Network server is constituted, wherein cloud computing is that distributed computing can be consisting of a loosely coupled set of computers one A virtual machine.At this point, the executing subject, which can be, is connected with network host, server, camera of cloud platform etc., by Partly or completely calculation processing can be committed in the network equipment and carry out in this above method, and camera is then used to handle Interaction and partial calculating between user equipment.
Fig. 1 shows a kind of binding method of picture pick-up device provided by the embodiments of the present application, including following processing step:
Step S101, picture pick-up device scan the two dimensional code that the first user equipment provides.Wherein, first user equipment is Refer to the user equipment for needing to be bound with picture pick-up device, such as picture pick-up device can be with the mobile phone, smartwatch, plate of user Apparatus such as computer is bound.Picture pick-up device scanning before, the first user equipment can according to first user equipment Relevant identity information generates a two dimensional code, scans for picture pick-up device, these identity informations may include: first use User's voiceprint that user fingerprints information that family equipment has acquired, first user equipment have acquired, first user The customer identification information of application program binding in user's face information that equipment has acquired, first user equipment, described the The device identifying information of one user equipment.
It takes the mobile phone as an example, user fingerprints information, user's voiceprint and the user people that first user equipment has acquired Face information can be the finger print information, voiceprint and face information etc. for unlocking mobile phone screen lock state.First user equipment The customer identification information of upper application program binding can be operate in user account number in the types of applications program on mobile phone, ID, Cell-phone number etc. can be used in distinguishing the identification information of user identity.The device identifying information of first user equipment can be about hand The identification information of machine, such as MAC (Media Access Control, media access control) address, IMEI of mobile phone (International Mobile Equipment Identity, international mobile equipment identification number), MEID (Mobile Equipment Identifier, mobile device identification code), ICCID (Integrate circuit card identity, collection At circuit card identification code) etc..In actual scene, one of or a variety of next life can be selected according to the demand of actual scene At two dimensional code, thus when the two dimensional code is arrived in picture pick-up device scanning, these identity informations can be parsed from two dimensional code.
Step S102, the picture pick-up device obtain the identity information from the two dimensional code scanned.If two dimensional code is based on The user fingerprints information that has been acquired by the first user equipment according to it, user's voiceprint generate, then picture pick-up device is scanned and solved After analysing two codes, corresponding identity information, i.e. user fingerprints information and user's voiceprint can also be therefrom obtained.
Step S103, the picture pick-up device set the picture pick-up device and first user according to the identity information It is standby to be bound.For example, identity information can be the user fingerprints information acquired on the first user equipment (UE) 1 Fingerprint1 and user voiceprint sound1, then can be according to user fingerprints information fingerprint1 and user's sound Line information sound1 realizes that the picture pick-up device and the first user equipment (UE) 1 are bound.
Interaction process schematic diagram during being bound Fig. 2 shows mobile phone 210 and camera 220, due to using Binding method provided by the embodiments of the present application, therefore mobile phone 210 firstly generates two dimensional code, include corresponding in the two dimensional code Identity information, then camera 220 scans the two dimensional code, and after parsing two dimensional code obtains identity information, identity information is added It adds in white list, this completes the bindings between mobile phone and camera.
It can be in a kind of embodiment of the application, when the picture pick-up device and first user equipment are bound By the way of white list, i.e., the described picture pick-up device can safeguard a white list, if desired be bound with a certain user equipment, then Its corresponding identity information is added to white list.The equipment that the picture pick-up device has been bound as a result, is in the white list Identity information corresponding to the first user equipment, if such as in white list include user fingerprints information fingerprint1 and use Family voiceprint sound1 is then capable of providing user fingerprints information fingerprint1 and/or user's voiceprint sound1 User equipment be equipment that the picture pick-up device has been bound.
After user equipment and picture pick-up device are completed to bind, user equipment can be operated picture pick-up device use, Such as check the real-time pictures of picture pick-up device current shooting, the camera lens direction for controlling picture pick-up device, unlatching/closing camera function Deng.When stating operation in realization, picture pick-up device is to ensure that the operational order executed comes from the user equipment bound, can be with It is verified before executing operational order.Another program of the embodiment of the present application also wraps on the basis of realizing binding as a result, Include processing step as shown in Figure 3:
Step S301, picture pick-up device obtain the operation requests from second user equipment.The second user equipment refers to Need the user equipment operated to picture pick-up device, wherein " first " in " second " and the first user equipment above-mentioned is simultaneously Any specific sequence is not indicated, is only used for distinguishing equipment in the title in binding stage and operation control stage.In actual scene In, the first user equipment and second user equipment may be same equipment, such as mobile phone phone1 complete binding and then to Picture pick-up device issues operation requests, wherein and the first user equipment is for indicating the mobile phone phone1 in binding procedure, and second User equipment is used to indicate the mobile phone phone1 in operation control process.
The operation requests include the identity information of operational order and the second user equipment.Wherein, operational order is used Corresponding operation is executed in control picture pick-up device, such as can be to second user equipment passback real-time pictures, change camera lens court To, unlatching/closing camera function etc., the identity information of the second user equipment be used for picture pick-up device execute corresponding operating it The preceding identity to second user equipment is verified, and only by verifying, just executes the operational order in operation requests.This second The particular content of the identity information of user equipment can be similar with the identity information of aforementioned first user equipment, is also possible to user One of information such as finger print information, user's voiceprint, user's face information, customer identification information and device identifying information or Person is a variety of.
Step S302, identity information and the second user equipment of the picture pick-up device according to the first user equipment bound Identity information, judge whether the second user equipment has bound.If picture pick-up device be in such a way that white list is set into The binding of the first user equipment of row, the equipment bound in white list is identity letter relevant to first user equipment Breath.For example, the content of white list may include: user fingerprints information fingerprint1 and user voiceprint sound1, this A little corresponding user equipmenies of information are UE1, if the identity information of second user equipment is user fingerprints information in operation requests The second user equipment for existing in white list and receiving can be determined after content comparison in fingerprint1, with white list Identity information, it is possible thereby to determine the second user equipment with picture pick-up device bind.
Since the identity information relied on when being bound can be one or more, when in white list comprising about When a variety of identity informations of one the first user equipment, second user equipment whether in binding procedure is judged in step S302, Can be set according to the demand of actual scene needs several identity informations to match.For example, the content of white list includes coming from user Tri- kinds of user fingerprints information fingerprint1, user's voiceprint sound1, user's face information face1 bodies of equipment UE1 Part information, if setting only needs a kind of identity information matching to can determine that the operation that second user equipment has been bound, and is received It only needs to can be user fingerprints information fingerprint1, Yong Husheng comprising a kind of correct identity information in request Any one in line information sound1, user's face information face1.If setting needs at least two identity informations, matching just may be used Determine that second user equipment has been bound, then only needs in the operation requests received comprising two kinds of correct identity informations.Pass through Such mode can set the degree of verifying, thus the safety in adjustment control operating process.
Step S303, if having bound, the picture pick-up device executes the operational order.
The method provided by the application previous embodiment, user equipment can by picture pick-up device provide two dimensional code, from And realize its binding between picture pick-up device, and then control picture pick-up device.In order to improve safety, corresponding power can be set Limit, avoids any user equipment from directly being bound or be controlled through the above way picture pick-up device with picture pick-up device. The embodiment of the present application provides in another binding method as a result, in picture pick-up device according to the identity information, by described first When user equipment and the picture pick-up device are bound, it can be determined that whether picture pick-up device is not present owner's equipment, wherein described Owner's equipment refers to first the first user equipment with picture pick-up device binding, possesses biggish permission, subsequent other For user equipment when binding or controlling operation, relevant information can be sent to owner's equipment by picture pick-up device, by owner's equipment It is examined, and only in the case where owner's equipment is agreed to, subsequent other user equipmenies is allowed to complete binding or control operation.
According to actual binding situation, judging result is there are two kinds, i.e., there is no owner's equipment either to take the photograph for picture pick-up device As there are owner's equipment for equipment.If owner's equipment is not present in the picture pick-up device as a result, picture pick-up device is believed according to the identity Breath, first user equipment is bound with the picture pick-up device, and first user equipment is set as owner and is set Standby, binding procedure can be as shown in Figure 2.
If the existing owner's equipment of picture pick-up device, picture pick-up device sends bind request to owner's equipment, main People's equipment can examine the bind request after getting bind request, such as agree to binding or disagree binding Deng then to picture pick-up device return approval results.Picture pick-up device can receive owner's equipment and return, about described as a result, The approval results of bind request, when the approval results are to agree to binding, according to the identity information, by first user Equipment is bound with the picture pick-up device.Due to existing owner's equipment, the first user equipment bound at this time can be set For visitor's equipment, binding procedure can be as shown in Figure 4.
In some embodiments of the present application, owner's equipment can be to non-owner's equipment that picture pick-up device is bound (i.e. Visitor's equipment) it is managed, the binding management information of the available owner's equipment of the picture pick-up device as a result, and according to institute It states binding management information and adjusts binding relationship between the picture pick-up device and non-owner's equipment.Wherein, the binding management letter Breath such as is can be and deletes certain in white list for the information being adjusted to non-owner's equipment that picture pick-up device is bound The concrete operations such as all or part of identity informations of one visitor's equipment, the identity information for adding corresponding visitor's equipment Instruction.
For the operation requests from owner's equipment and visitor's equipment, picture pick-up device can use identical processing side Formula, such as do not distinguish its permission and be all made of processing mode as shown in Figure 3.Herein on basis, if receiving multiple second simultaneously The operation requests of user equipment, and when operational order in these operation requests has conflict (can not be performed simultaneously), it can Preferentially to execute the operational order from owner's equipment.Fig. 5 shows in the embodiment of the present application picture pick-up device to from multiple the The process that the operation requests of two user equipmenies are handled, including following processing step:
Step S501, picture pick-up device obtain the operation requests from multiple second user equipment, and the operation requests include The identity information of operational order and corresponding second user equipment.
Step S502, identity information and the second user equipment of the picture pick-up device according to the first user equipment bound Identity information, judge whether there is multiple second user equipment bound.
Step S503, if it exists multiple second user equipment bound, the picture pick-up device judge multiple bound It whether there is owner's equipment in second user equipment.Such as 5 operation requests are received, respectively from user equipment (UE) 1~5, when In judging result at least 2 bound second user equipment when, then need to continue judgement wherein with the presence or absence of owner's equipment. If only having the 1 second user equipment bound in judging result, without judging whether there is owner's equipment, behaviour is directly executed It instructs.
Step S504, if multiple second user equipment bound, there are owner's equipment, the picture pick-up device execution comes from The operational order of owner's equipment.Conversely, owner's equipment if it does not exist, then it represents that these second user equipment bound It is visitor's equipment, the picture pick-up device according to preset rules, ask by the operation transmitted by multiple second user equipment at this time Middle determining object run request is asked, the object run is then executed and requests the operational order for including.Wherein, the preset rules It can be set according to the demand of practical application scene, for example, can be based on time, the operational order for specifically receiving operation requests The information settings preset rules such as difficulty of implementation, when determining object run request, by comparing the time of each operation requests, The operation requests being initially received are determined as object run request;Or it can also operational order in more each operation requests Difficulty of implementation, by the minimum operation requests of the difficulty of implementation for the operational order for being included be determined as object run request.
In addition, picture pick-up device can also use different for the operation requests from owner's equipment and visitor's equipment Processing mode, Fig. 6 show picture pick-up device in the embodiment of the present application offer scheme to from owner's equipment and visitor's equipment The process flow of operation requests, including following processing step:
Step S601, picture pick-up device obtain the operation requests from second user equipment, and the operation requests include operation The identity information of instruction and the second user equipment;
Step S602, identity information and the second user equipment of the picture pick-up device according to the first user equipment bound Identity information, judge whether the second user equipment has bound;
Step S603, if having bound, the picture pick-up device judges whether the second user equipment is owner's equipment.With figure Scheme shown in 3 still needs to continue to judge whether it is owner the difference is that after determining that second user equipment has been bound Equipment.
Step S604, if owner's equipment, picture pick-up device can directly execute the operational order, thereby executing various behaviour Make.
Step S605, if not owner's equipment, the picture pick-up device sends action queries request to owner's equipment, needs This operation requests is examined by owner's equipment, and return to the examination & approval knot to picture pick-up device after determining approval results Fruit.
Step S606, the picture pick-up device receive owner's equipment returns, examining about action queries request Criticize result.
Step S607, if the approval results are to agree to operation, picture pick-up device executes operational order.Conversely, if examination & approval knot Fruit is to disagree operation, then picture pick-up device does not execute operational order, thus will lead to this operation failure of second user equipment.
Based on the same inventive concept, a kind of picture pick-up device is additionally provided in the embodiment of the present application, the picture pick-up device is in reality Method when now binding is the binding method in previous embodiment, and its principle solved the problems, such as is similar to this method.It should Picture pick-up device includes the memory for storing computer program instructions and the processor for executing computer program instructions, In, when the computer program instructions are executed by the processor, triggers the equipment and execute binding method above-mentioned.
Fig. 7 shows a kind of picture pick-up device for the method and/or technology scheme being adapted to carry out in the embodiment of the present application Structure, the picture pick-up device 700 include central processing unit (CPU, Central Processing Unit) 701, can basis The program that is stored in read-only memory (ROM, Read Only Memory) 702 is loaded at random from storage section 708 It accesses the program in memory (RAM, Random Access Memory) 703 and executes various movements appropriate and processing.? In RAM 703, it is also stored with various programs and data needed for system operatio.CPU 701, ROM 702 and RAM 703 pass through Bus 704 is connected with each other.Input/output (I/O, Input/Output) interface 705 is also connected to bus 704.
I/O interface 705 is connected to lower component: the importation 706 including photographing module etc.;Including hard disk, CD, magnetic The storage section 708 of the one or more computer-readable medium such as disk, semiconductor memory;And including such as LAN (local Net, Local Area Network) card, modem etc. network interface card communications portion 709.Communications portion 709 passes through Communication process is executed by the network of such as internet.
Particularly, the method in the embodiment of the present application and/or embodiment may be implemented as computer software programs.Example Such as, embodiment of the disclosure includes a kind of computer program product comprising carries computer on a computer-readable medium Program, the computer program include the program code for method shown in execution flow chart.It is central in the computer program When processing unit (CPU) 401 executes, the above-mentioned function of limiting in the present processes is executed.
It should be noted that computer-readable medium described herein can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In this application, computer-readable medium, which can be, any includes or storage program has Shape medium, the program can be commanded execution system, device or device use or in connection.
And in this application, computer-readable signal media may include passing in a base band or as carrier wave a part The data-signal broadcast, wherein carrying computer-readable program code.The data-signal of this propagation can use a variety of shapes Formula, including but not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media may be used also To be any computer-readable medium other than computer readable storage medium, which can send, propagate Either transmission is for by the use of instruction execution system, device or device or program in connection.It is computer-readable The program code for including on medium can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. Deng or above-mentioned any appropriate combination.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof Machine program code, described program design language include object oriented program language-such as Java, Smalltalk, C+ +, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flowchart or block diagram in attached drawing shows the equipment according to the various embodiments of the application, method and computer program The architecture, function and operation in the cards of product.In this regard, each box in flowchart or block diagram can represent A part of a part of one module, program segment or code, the module, program segment or code is used for comprising one or more The executable instruction of logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box Function can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated actually may be used To be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that , the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with executing The dedicated systems for hardware of defined functions or operations realizes, or can use specialized hardware and computer instruction Combination is to realize.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more computer-readable instruction, the computer-readable instruction can be executed by processor with Realize the method and/or technology scheme of multiple embodiments of aforementioned the application.
In conclusion scanning the first user equipment in the scheme that some embodiments of the present application provide by picture pick-up device and mentioning The two dimensional code of confession, the two dimensional code are raw according to identity information relevant to first user equipment by first user equipment At, therefore the picture pick-up device can obtain the identity information from the two dimensional code scanned, can be believed according to the identity Breath directly binds picture pick-up device and first user equipment.Needs are changed as a result, scans two by user equipment The mode of code is tieed up, and without registering account number, therefore enormously simplify the operation complexity in binding procedure, while being used for first The offer two dimensional code of user equipment is only managed by user, other people are difficult to obtain, therefore information leakage or the wind being cracked Danger significantly reduces, to improve safety.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In some embodiments In, the software program of the application can be executed by processor to realize above step or function.Similarly, the software of the application Program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, magnetic or CD-ROM driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, for example, As the circuit cooperated with processor thereby executing each step or function.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (13)

1. a kind of binding method of picture pick-up device, wherein this method comprises:
Picture pick-up device scans the two dimensional code that the first user equipment provides, wherein the two dimensional code is by the first user equipment root It is generated according to identity information relevant to first user equipment;
The picture pick-up device obtains the identity information from the two dimensional code scanned;
The picture pick-up device binds the picture pick-up device and first user equipment according to the identity information.
2. according to the method described in claim 1, wherein, identity information relevant to first user equipment, including it is following At least any one:
The user fingerprints information that first user equipment has acquired;
User's voiceprint that first user equipment has acquired;
User's face information that first user equipment has acquired;
The customer identification information that application program is bound on first user equipment;
The device identifying information of first user equipment.
3. according to the method described in claim 1, wherein, the picture pick-up device sets the camera shooting according to the identity information It is standby to be bound with first user equipment, comprising:
The identity information is added to white list by the picture pick-up device, wherein the equipment that the picture pick-up device has been bound is institute State the first user equipment corresponding to the identity information in white list.
4. according to the method described in claim 1, wherein, the picture pick-up device is used according to the identity information by described first Family equipment is bound with the picture pick-up device, comprising:
If owner's equipment is not present in the picture pick-up device, the picture pick-up device is according to the identity information, by first user Equipment is bound with the picture pick-up device, and first user equipment is set as owner's equipment, wherein the owner sets Standby the first user equipment for the binding of the first and picture pick-up device.
5. according to the method described in claim 1, wherein, the picture pick-up device is used according to the identity information by described first Family equipment is bound with the picture pick-up device, comprising:
If the existing owner's equipment of picture pick-up device, the picture pick-up device sends bind request to owner's equipment, wherein Owner's equipment is first the first user equipment with picture pick-up device binding;
The picture pick-up device receives approval results that owner's equipment returns, about the bind request;
If the approval results are to agree to binding, the picture pick-up device is according to the identity information, by first user equipment It is bound with the picture pick-up device.
6. according to the method described in claim 1, wherein, this method further include:
The picture pick-up device obtains the operation requests from second user equipment, and the operation requests include operational order and described The identity information of second user equipment;
The picture pick-up device is believed according to the identity information for the first user equipment bound and the identity of the second user equipment Breath, judges whether the second user equipment has bound;
If having bound, the picture pick-up device executes the operational order.
7. method according to claim 4 or 5, wherein this method further include:
The picture pick-up device obtains the operation requests from second user equipment, and the operation requests include operational order and described The identity information of second user equipment;
The picture pick-up device is believed according to the identity information for the first user equipment bound and the identity of the second user equipment Breath, judges whether the second user equipment has bound;
If having bound, the picture pick-up device judges whether the second user equipment is owner's equipment;
If owner's equipment, the picture pick-up device executes the operational order.
8. according to the method described in claim 7, wherein, this method further include:
If not owner's equipment, the picture pick-up device sends action queries request to owner's equipment;
The picture pick-up device receives approval results that owner's equipment returns, about action queries request;
If the approval results are to agree to operation, the picture pick-up device executes the operational order.
9. method according to claim 4 or 5, wherein this method further include:
The picture pick-up device obtains the operation requests from multiple second user equipment, the operation requests include operational order and The identity information of corresponding second user equipment;
The picture pick-up device is believed according to the identity information for the first user equipment bound and the identity of the second user equipment Breath, judges whether there is multiple second user equipment bound;
Multiple second user equipment bound if it exists, the picture pick-up device judge in multiple second user equipment bound With the presence or absence of owner's equipment;
Owner's equipment if it exists, the picture pick-up device execute the operational order from owner's equipment.
10. according to the method described in claim 9, wherein, this method further include:
If owner's equipment is not present in multiple second user equipment bound, the picture pick-up device is according to preset rules, more Object run request is determined in operation requests transmitted by a second user equipment;
It executes the object run and requests the operational order for including.
11. according to the described in any item methods of claim 4 or 5, wherein this method further include:
The picture pick-up device obtains the binding management information of owner's equipment, and adjusts the camera shooting according to the binding management information Binding relationship between equipment and non-owner's equipment.
12. a kind of picture pick-up device, wherein the equipment includes memory by storing computer program instructions and based on executing The processor of calculation machine program instruction, wherein when the computer program instructions are executed by the processor, trigger the equipment and execute Method described in any one of claims 1 to 11.
13. a kind of computer-readable medium, is stored thereon with computer program instructions, the computer-readable instruction can be processed Device is executed to realize the method as described in any one of claims 1 to 11.
CN201811482284.7A 2018-12-05 2018-12-05 A kind of picture pick-up device and its binding method Pending CN109635532A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811482284.7A CN109635532A (en) 2018-12-05 2018-12-05 A kind of picture pick-up device and its binding method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811482284.7A CN109635532A (en) 2018-12-05 2018-12-05 A kind of picture pick-up device and its binding method

Publications (1)

Publication Number Publication Date
CN109635532A true CN109635532A (en) 2019-04-16

Family

ID=66071338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811482284.7A Pending CN109635532A (en) 2018-12-05 2018-12-05 A kind of picture pick-up device and its binding method

Country Status (1)

Country Link
CN (1) CN109635532A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080726A (en) * 2019-06-06 2020-04-28 广东小天才科技有限公司 Picture transmission method and equipment
CN111641640A (en) * 2020-05-28 2020-09-08 青岛海尔科技有限公司 Equipment binding processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203219497U (en) * 2013-04-28 2013-09-25 豪威科技(上海)有限公司 Automatic authentication identification login system of web camera
CN103414881A (en) * 2013-08-15 2013-11-27 中国科学院软件研究所 Method for fast configuring remote video monitoring system
CN103945268A (en) * 2014-03-17 2014-07-23 深圳创维-Rgb电子有限公司 Control processing method and system based on multiple accounts and multiple target devices
CN104751096A (en) * 2015-03-26 2015-07-01 浪潮集团有限公司 Rapid two-dimension code identification design and achievement method through IP (Internet Protocol) camera
CN105228222A (en) * 2015-07-10 2016-01-06 深圳市美贝壳科技有限公司 Certainly the WIFI method that is dynamically connected of home consumer device
CN107316019A (en) * 2017-06-23 2017-11-03 比奥香港有限公司 A kind of fingerprint lock control method and Fingerprint Lock System
CN108737395A (en) * 2018-05-08 2018-11-02 北京小米移动软件有限公司 Access method, apparatus, storage medium and the camera of camera

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203219497U (en) * 2013-04-28 2013-09-25 豪威科技(上海)有限公司 Automatic authentication identification login system of web camera
CN103414881A (en) * 2013-08-15 2013-11-27 中国科学院软件研究所 Method for fast configuring remote video monitoring system
CN103945268A (en) * 2014-03-17 2014-07-23 深圳创维-Rgb电子有限公司 Control processing method and system based on multiple accounts and multiple target devices
CN104751096A (en) * 2015-03-26 2015-07-01 浪潮集团有限公司 Rapid two-dimension code identification design and achievement method through IP (Internet Protocol) camera
CN105228222A (en) * 2015-07-10 2016-01-06 深圳市美贝壳科技有限公司 Certainly the WIFI method that is dynamically connected of home consumer device
CN107316019A (en) * 2017-06-23 2017-11-03 比奥香港有限公司 A kind of fingerprint lock control method and Fingerprint Lock System
CN108737395A (en) * 2018-05-08 2018-11-02 北京小米移动软件有限公司 Access method, apparatus, storage medium and the camera of camera

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080726A (en) * 2019-06-06 2020-04-28 广东小天才科技有限公司 Picture transmission method and equipment
CN111080726B (en) * 2019-06-06 2023-05-23 广东小天才科技有限公司 Picture transmission method and device
CN111641640A (en) * 2020-05-28 2020-09-08 青岛海尔科技有限公司 Equipment binding processing method and device

Similar Documents

Publication Publication Date Title
US9473458B2 (en) Connection configuration
US10833859B2 (en) Automating verification using secure encrypted phone verification
CN110572305A (en) Smart home equipment binding method and system, smart home equipment and mobile terminal
KR20120090388A (en) Method and apparatus for managing user device and contents using qr code
CN102045367A (en) Registration method and authentication server of real-name authentication
US20170373939A1 (en) Data uploading method, apparatus, and system
CN109615734A (en) It is a kind of for unlocking the method and apparatus of vehicle arrangement
US20170084159A1 (en) Tracking information technology (it) assets
CN113542201B (en) Access control method and equipment for Internet service
US20160149907A1 (en) Biometric-based wireless device association
KR20150015422A (en) method and apparatus for connecting terminals and Access Point apparatus among plural of Access Point apparatus which are located on the same network
CN104468552B (en) A kind of connection control method and device
CN110213290A (en) Data capture method, API gateway and storage medium
CN109635532A (en) A kind of picture pick-up device and its binding method
JP2022525551A (en) Preventing erroneous transmission of copies of data records to distributed ledger systems
EP3890312B1 (en) Distributed image analysis method and system, and storage medium
CN107846408A (en) Identity authorization system and method based on cloud platform
US20100185451A1 (en) Business-responsibility-centric identity management
CN109542590A (en) The method of virtual Socket communication under Docker cluster multi-tenant
CN110213250B (en) Data processing method and terminal equipment
US10200864B2 (en) Method and device for managing wireless access point
CN109495468A (en) Authentication method, device, electronic equipment and storage medium
CN108648300A (en) Auth method and device
CN110301127A (en) Device and method for predictive token authentication
US20200311244A1 (en) Video-based authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination