CN110659473A - AI camera authorization method, user terminal and computer readable storage medium - Google Patents

AI camera authorization method, user terminal and computer readable storage medium Download PDF

Info

Publication number
CN110659473A
CN110659473A CN201910915967.5A CN201910915967A CN110659473A CN 110659473 A CN110659473 A CN 110659473A CN 201910915967 A CN201910915967 A CN 201910915967A CN 110659473 A CN110659473 A CN 110659473A
Authority
CN
China
Prior art keywords
camera
application
user terminal
software service
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910915967.5A
Other languages
Chinese (zh)
Inventor
覃吉磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth RGB Electronics Co Ltd
Shenzhen Chuangwei RGB Electronics Co Ltd
Original Assignee
Shenzhen Chuangwei RGB Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chuangwei RGB Electronics Co Ltd filed Critical Shenzhen Chuangwei RGB Electronics Co Ltd
Priority to CN201910915967.5A priority Critical patent/CN110659473A/en
Publication of CN110659473A publication Critical patent/CN110659473A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides an AI camera authorization method, a user terminal and a computer readable storage medium, wherein the method comprises the following steps: when the user terminal is started for the first time, the AI application acquires user terminal information; the AI application writes the user terminal information into the software service application so that the software service application can acquire the authorization of the AI camera corresponding to the authorization server; and after the software service application acquires the authorization, the AI application acquires AI camera use data from the software service application and sends the AI camera use data to an internal server and a third-party server of the opposite user terminal. The multi-party AI technical cooperation including AI manufacturers is realized by embedding an AI camera and related applications in a user terminal in advance, and commercial settlement can be carried out according to the use data of the AI camera after the AI camera is authorized.

Description

AI camera authorization method, user terminal and computer readable storage medium
Technical Field
The present invention relates to the field of AI, and in particular, to an AI camera authorization method, a user terminal, and a computer-readable storage medium.
Background
With the continuous improvement of floating point arithmetic capability of an embedded processor Chip (CPU), the GPU rendering capability of a new generation chip is increased in a step-like manner compared with the GPU rendering capability of the previous generation chip, and the high-speed development of the chip provides powerful hardware support for the development of the image recognition industry, so that all manufacturers are keen to research AI scene recognition technology. However, if a single terminal manufacturer performs independent AI technology research and development in various terminals, the research and development difficulty is high, and the related range is wide, so how to implement multi-party AI technology cooperation including the terminal manufacturer is very important in a market with intense competition.
Disclosure of Invention
The invention mainly aims to provide an AI camera authorization method, a user terminal and a computer readable storage medium, aiming at solving the problem of how to realize multi-party AI technical cooperation including terminal manufacturers in the prior art.
In order to achieve the above object, the present invention provides an AI camera authorization method, where an AI camera is applied to a user terminal, and a software service application and an AI application corresponding to the AI camera are pre-installed on the user terminal, and the method includes the steps of:
when the user terminal is started for the first time, the AI application acquires user terminal information;
the AI application writes the user terminal information into the software service application so that the software service application can acquire the authorization of the AI camera corresponding to the authorization server;
and after the software service application acquires the authorization, the AI application acquires AI camera use data from the software service application and sends the AI camera use data to an internal server and a third-party server of the opposite user terminal.
Optionally, the user terminal information includes a CPU chip ID, an eMMC ID, and a MAC address;
the step that the AI application writes the user terminal information into the software service application so that the software service application obtains the authorization of the authorization server corresponding to the AI camera comprises the following steps:
and the AI application writes the user terminal information into the software service application so that the software service application sends a read-only information file generated according to the CPU chip ID, the eMMC ID and the MAC address to an authorization server and then receives an authorization permission protocol issued by the authorization server to finish authorization.
Optionally, after the software service application obtains the authorization, the step of obtaining, by the AI application, AI camera usage data from the software service application includes:
after the software service application obtains the authorization and the user terminal is started again, the AI application obtains the latest user terminal information when the user terminal is started currently and sends the latest user terminal information to the software service application;
and after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the AI camera use data.
Optionally, after the step of sending the latest user terminal information to the software service application, the method further includes:
the AI application triggers the software service application to verify whether the AI camera is authorized;
when the software service application determines that the AI camera obtains authorization, executing the following steps: after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the use data of the AI camera;
and when the software service application verifies that the AI camera does not obtain authorization, the AI application adds a watermark to the image file output by the AI camera.
Optionally, the step of the AI application triggering the software service application to verify whether the AI camera is authorized includes:
the AI application triggers the software service application to perform a first determination of whether the grant permission protocol is included in the corresponding storage location; and when the first judgment is in effect, the AI camera obtains authorization.
Optionally, before the step that the AI application uses the working state information as the AI camera usage data after the AI application obtains the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information, the method further includes:
when the software service application determines that the AI camera obtains authorization, the AI application sends the latest MAC address of the user terminal to the software service application so that the software service application uploads the latest MAC address to an authorization server to judge whether the latest MAC address corresponds to at least two user terminals;
when the latest MAC address does not correspond to at least two user terminals, executing the following steps: and after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the AI camera use data.
Optionally, the latest user terminal information includes a latest CPU chip ID, a latest eMMC ID, and a latest MAC address;
the step of using the working state information as the AI camera usage data by the AI application after the AI application acquires the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information includes:
and when the AI application acquires the software service application and determines that at least one item of the CPU chip ID, the eMMC ID and the MAC address in the user terminal information and the latest CPU chip ID, the latest eMMC ID and the latest MAC address in the latest user terminal information are correspondingly matched with the fed back working state information including normal AI camera functions, the AI application takes the working state information including normal AI camera functions as the AI camera use data.
Optionally, the method further comprises:
after the software service application obtains the authorization, the AI application obtains an update file containing an AI application upgrade file and a software service application configuration file through an internal server;
and the AI application carries out self-updating through the AI application upgrading file in the updating file, and upgrades the software service application through the software service application configuration file after the self-updating is finished.
To achieve the above object, the present invention also provides a user terminal including a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the AI camera authorization method as described above.
To achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a computer program that, when being executed by a processor, implements the steps of the AI camera authorization method as described above.
According to the AI-camera-based authorization method, the user terminal and the computer-readable storage medium, when the user terminal is started for the first time, an AI application acquires user terminal information; the AI application writes the user terminal information into the software service application so that the software service application can acquire the authorization of the AI camera corresponding to the authorization server; and after the software service application acquires the authorization, the AI application acquires AI camera use data from the software service application and sends the AI camera use data to an internal server and a third-party server of the opposite user terminal. The multi-party AI technical cooperation including AI manufacturers is realized by embedding an AI camera and related applications in a user terminal in advance, and commercial settlement can be carried out according to the use data of the AI camera after the AI camera is authorized.
Drawings
Fig. 1 is a schematic flow chart of a first embodiment of an AI camera authorization method according to the present invention;
fig. 2 is a detailed flowchart of step S30 in the third embodiment of the AI camera authorization method according to the present invention;
fig. 3 is a schematic block diagram of a ue according to the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides an AI camera authorization method, wherein the user terminal can be a television, a tablet computer, a mobile phone or wearable equipment, and can also be computer equipment and the like.
Referring to fig. 1, fig. 1 is a schematic flow chart of a first embodiment of an AI camera authorization method according to the present invention, where an AI camera is applied to a user terminal, and a software service application and an AI application corresponding to the AI camera are installed in advance on the user terminal, and the method includes the steps of:
step S10, when the user terminal is started for the first time, the AI application acquires the user terminal information;
the software service application is developed based on AI camera hardware and is resident in a memory service process, and can acquire image resources shot by the camera. The AI application is mainly used for monitoring the registration working state of the software service application, writing hardware identification information and performing iterative upgrade on the AI application and the software service application.
When the user terminal is first started, the AI application obtains user terminal information from the system interface, where the obtaining of the user terminal information in this embodiment is to obtain hardware identification information, where the hardware identification information is, for example, an Identity Document (ID) of a Central Processing Unit (CPU), an eMMC (Embedded MultiMedia Card, an Embedded memory standard specification) ID, a Media Access Control Address (MAC Address), or the like, and the hardware identification information is unique, so that the user terminal can be determined according to the hardware identification information.
Step S20, the AI application writes the user terminal information into the software service application for the software service application to obtain the authorization of the AI camera corresponding to the authorization server;
the software service application generates a read-only and non-rewritable encrypted information file according to the user terminal information written by the AI application, in this embodiment, the software service application generates an information file Authorize, and then uploads the Authorize to the authorization server, and the server generates an authorization permission protocol according to the Authorize after receiving the Authorize and issues the authorization file to the software service application, in this embodiment, the authorization permission protocol is lienceauthorize.
Since the authorization process requires file transfer with the authorization server through the network, the step of obtaining authorization is set when the user terminal is networked for the first time.
Step S30, after the software service application obtains the authorization, the AI application obtains AI camera usage data from the software service application, and sends the AI camera usage data to an internal server and a third-party server of the opposite user terminal.
The AI application registers the working state monitoring Listener to the AI camera software service, after the registration is completed, the software service application returns the working state and the authorization information to the AI application according to the MSG of the Listener, the AI application processes the returned information and carries out big data statistics on the software service application, each occurrence event is provided with the current timestamp of a user terminal system and simultaneously reports to a third party server and an internal server, the data events collected by the data of the two servers are consistent with the time point, and then commercial settlement can be carried out with a partner according to the statistical result.
The multi-party AI technical cooperation including AI manufacturers is realized by embedding the AI camera and related applications in the user terminal in advance, and after the AI camera is authorized, commercial settlement is conveniently carried out according to the use data of the AI camera.
Further, in a second embodiment of the AI camera authorization method according to the present invention based on the first embodiment of the present invention, the user terminal information includes a CPU chip ID, an eMMC ID, and a MAC address, and the step S20 includes the steps of:
and step S21, the AI application writes the user terminal information into the software service application, so that the software service application sends a read-only information file generated according to the CPU chip ID, the eMMC ID and the MAC address to an authorization server and then receives an authorization permission protocol issued by the authorization server to finish authorization.
The CPU chip ID and the eMMC ID are burnt by a chip manufacturer and cannot be rewritten, the uniqueness of the machine can be guaranteed by the CPU chip ID or the eMMC ID in hardware identification information, and in actual use, the CPU chip ID or the eMMC ID is inconsistent before and after the CPU chip ID or the eMMC ID is caused by the conditions that authorization cannot be authorized due to the fact that a production line has no network state, delivery is restored, an authorization file is erased due to firmware upgrading, the chip is damaged and needs to be maintained and replaced, and the like, so that writing of MAC addresses is increased, and the condition that authorization verification cannot be passed after a user terminal replaces a CPU and a memory chip is avoided. In this embodiment, the three hardware identifiers are stored in the form of ArrayList < [ String, String ] > data set, as shown in Table one:
data set CPUChipID EmmcID
Data two group CPUChipID MAC
Data three groups EmmcID MAC
Watch 1
The CPU chip ID, the eMMC ID and the MAC address are written into an authorization permission protocol so as to judge whether hardware identification information in the current user terminal and the authorization permission protocol is consistent or not in the later use process, and the loss caused by repeated use of the AI camera is avoided.
Further, referring to fig. 2, in the third embodiment of the AI camera authorization method according to the present invention proposed based on the first embodiment of the present invention, the step S30 includes the steps of:
step S31, when the software service application obtains authorization and the user terminal is restarted, the AI application obtains the latest user terminal information when the user terminal is started currently, and sends the latest user terminal information to the software service application;
step S32, after the AI application obtains the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information, the AI application uses the working state information as the AI camera usage data.
The AI application acquires and sends the latest user terminal information to the software service application so that the software service application judges whether the latest user terminal information corresponds to and is consistent with the user terminal information in the authorization permission protocol or not, different working states are set according to the judgment result, and when the latest user terminal information corresponds to and is consistent with the user terminal information in the authorization permission protocol, the working state of the AI camera is a normal state, namely, both the camera shooting of the AI camera and the AI function can be normally used; when the latest user terminal information is not corresponding to the user terminal information in the authorization permission protocol, the working state of the AI camera is a use limiting state, namely the AI function of the AI camera is limited to use.
After judging whether the latest user terminal information is consistent with the user terminal information in the authorization permission agreement, setting the working state of the software service application according to the judgment result, limiting the use of the AI function of the AI camera which is not legally authorized, and ensuring the benefits of manufacturers.
Further, in the AI camera authorization method according to the third embodiment of the present invention, the method includes, after the step S31, the steps of:
the AI application triggers the software service application to verify whether the AI camera is authorized;
when the software service application determines that the AI camera is authorized, then step S32 is performed: after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the use data of the AI camera;
and when the software service application verifies that the AI camera does not obtain authorization, the AI application adds a watermark to the image file output by the AI camera.
When the user terminal is started, whether the user terminal is the user terminal corresponding to the authorized AI camera needs to be judged, and whether the current AI camera and the user terminal are authorized is determined by judging whether the authorization permission protocol exists in a user terminal memory and judging whether the hardware identification information of the current user terminal is consistent with the hardware identification information in the authorization permission protocol. When the user terminal does not acquire authorization, the AI camera still can use the basic photographing and shooting functions, so that the image file output by the AI camera is added with the watermark to remind the user of acquiring authorization in time and guarantee the rights and interests of manufacturers.
The authorization states of the AI camera and the user terminal are verified when the user terminal is started, so that the illegal authorization of the authorization permission protocol copied to other user terminals is avoided, and the loss is avoided.
Further, the step of the AI application triggering the software service application to verify whether the AI camera is authorized comprises:
the AI application triggers the software service application to perform a first determination of whether the grant permission protocol is included in the corresponding storage location; and when the first judgment is in effect, the AI camera obtains authorization.
When the user terminal is not started in a networking mode, the software service application cannot acquire authorization, and therefore an authorization permission protocol does not exist in the corresponding storage position.
Whether the AI camera is authorized can be clearly judged directly by determining whether the authorization permission protocol is included in the corresponding storage position.
Further, before the step that the AI application uses the working state information as the AI camera usage data after the AI application obtains the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information, the method further includes:
when the software service application determines that the AI camera obtains authorization, the AI application sends the latest MAC address of the user terminal to the software service application so that the software service application uploads the latest MAC address to an authorization server to judge whether the latest MAC address corresponds to at least two user terminals;
when the latest MAC address does not correspond to at least two user terminals, executing the following steps: and after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the AI camera use data.
When the latest MAC address corresponds to at least two user terminals, the server returns a matching result to the software service application, and the software service application limits the use of the AI function after receiving the matching result, namely the user terminal can still use the AI camera to perform the camera shooting function but cannot use the AI identification and other functions.
In this embodiment, the CPU chip ID and the eMMC ID in the hardware identification information cannot be modified, but the MAC address is not, so that there is a possibility that the authorization permission protocol is copied to another user terminal with an AI camera, and the MAC address of the user terminal is modified to the MAC address corresponding to the authorization permission protocol, so as to illegally pass the authorization verification. In order to avoid the situation, under the networking condition, the MAC address is reported to the authorization server, the authorization server judges whether the same MAC address is matched or not by comparing all reported MAC addresses, and when the same MAC address is matched, the user terminal corresponding to the MAC address illegally passes authorization verification.
And uploading the MAC address to the software service application so that the software service application uploads the latest MAC address to an authorization server to judge whether the latest MAC address corresponds to at least two user terminals, thereby preventing illegal passing of authorization verification and guaranteeing the rights and interests of manufacturers.
Further, the latest user terminal information includes the latest CPU chip ID, the latest eMMC ID, and the latest MAC address;
the step of using the working state information as the AI camera usage data by the AI application after the AI application acquires the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information includes:
and when the AI application acquires the software service application and determines that at least one item of the CPU chip ID, the eMMC ID and the MAC address in the user terminal information and the latest CPU chip ID, the latest eMMC ID and the latest MAC address in the latest user terminal information are correspondingly matched with the fed back working state information including normal AI camera functions, the AI application takes the working state information including normal AI camera functions as the AI camera use data.
And when the software service application determines that the CPU chip ID, the eMMC ID and the MAC address in the user terminal information do not match with the latest CPU chip ID, the latest eMMC ID and the latest MAC address in the latest user terminal information correspondingly, the use of an AI function is limited, namely the user terminal can still use an AI camera to perform a camera shooting function, but can not use AI identification and other functions.
In the actual use process, when the CPU chip ID or the eMMC ID causes inconsistency between the ID number and the authorization permission protocol due to chip replacement, the MAC address may be changed, and it is not reasonable if the CPU chip ID, the eMMC ID, and the MAC address are all required to be consistent every time authorization verification is performed. Therefore, when the authorization status is verified, the verification is passed as long as at least one of the CPU chip ID, the eMMC ID, or the MAC address is consistent.
And when the AI application acquires the software service application and determines that at least one of the CPU chip ID, the eMMC ID and the MAC address in the user terminal information is correspondingly matched with at least one of the latest CPU chip ID, the latest eMMC ID and the latest MAC address in the latest user terminal information, the verification is passed, so that the verification process is more reasonable.
Further, the method further comprises:
after the software service application obtains the authorization, the AI application obtains an update file containing an AI application upgrade file and a software service application configuration file through an internal server;
and the AI application carries out self-updating through the AI application upgrading file in the updating file, and upgrades the software service application through the software service application configuration file after the self-updating is finished.
When the user terminal is in a starting state and is connected to the world wide web, the AI application can carry an AI camera software service update file to perform iterative upgrade on a system of each user terminal through the internal server and the world wide web, aiming at the improvement and the expansion of the self functions of the AI application, a configuration file of the software service application, an image recognition model file and the like, and operating the AI camera software file to update and configure the authority of a specific file.
The AI application carries out self-updating through the AI application upgrading file in the updating file, and upgrades the software service application through the software service application configuration file after the self-updating is finished, thereby realizing the light weight and quick updating of the whole AI camera function.
Referring to fig. 3, the user terminal may include components of a communication module 10, a memory 20, and a processor 30 in a hardware structure. In the user terminal, the processor 30 is connected to the memory 20 and the communication module 10, respectively, the memory 20 stores thereon a computer program, which is executed by the processor 30 at the same time, and when executed, implements the steps of the above-mentioned method embodiments.
The communication module 10 may be connected to an external communication device through a network. The communication module 10 may receive a request from an external communication device, and may also send a request, an instruction, and information to the external communication device, where the external communication device may be another user terminal, a server, or an internet of things device, such as a television.
The memory 20 may be used to store software programs as well as various data. The memory 20 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (for example, when the software service application verifies that the AI camera is not authorized, the AI application watermarks an image file output by the AI camera), and the like; the storage data area may include a database, and the storage data area may store data or information created according to use of the system, or the like. Further, the memory 20 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 30, which is a control center of the user terminal, connects various parts of the entire user terminal using various interfaces and lines, and performs various functions of the user terminal and processes data by operating or executing software programs and/or modules stored in the memory 20 and calling data stored in the memory 20, thereby performing overall monitoring of the user terminal. Processor 30 may include one or more processing units; alternatively, the processor 30 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 30.
Although not shown in fig. 3, the user terminal may further include a circuit control module, which is used for connecting with a power supply to ensure the normal operation of other components. Those skilled in the art will appreciate that the user terminal architecture shown in fig. 3 is not intended to be limiting of user terminals and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The invention also proposes a computer-readable storage medium on which a computer program is stored. The computer-readable storage medium may be the Memory 20 in the user terminal in fig. 3, and may also be at least one of a ROM (Read-Only Memory)/RAM (Random Access Memory), a magnetic disk, and an optical disk, where the computer-readable storage medium includes instructions for enabling a terminal device (which may be a television, an automobile, a mobile phone, a computer, a server, a terminal, or a network device) having a processor to execute the method according to the embodiments of the present invention.
In the present invention, the terms "first", "second", "third", "fourth" and "fifth" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance, and those skilled in the art can understand the specific meanings of the above terms in the present invention according to specific situations.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although the embodiment of the present invention has been shown and described, the scope of the present invention is not limited thereto, it should be understood that the above embodiment is illustrative and not to be construed as limiting the present invention, and that those skilled in the art can make changes, modifications and substitutions to the above embodiment within the scope of the present invention, and that these changes, modifications and substitutions should be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An AI camera authorization method is characterized in that an AI camera is applied to a user terminal, and a software service application and an AI application corresponding to the AI camera are pre-installed on the user terminal, and the method comprises the following steps:
when the user terminal is started for the first time, the AI application acquires user terminal information;
the AI application writes the user terminal information into the software service application so that the software service application can acquire the authorization of the AI camera corresponding to the authorization server;
and after the software service application acquires the authorization, the AI application acquires AI camera use data from the software service application and sends the AI camera use data to an internal server and a third-party server of the opposite user terminal.
2. The AI camera authorization method of claim 1, wherein the user terminal information includes a CPU chip ID, an eMMC ID, and a MAC address;
the step that the AI application writes the user terminal information into the software service application so that the software service application obtains the authorization of the authorization server corresponding to the AI camera comprises the following steps:
and the AI application writes the user terminal information into the software service application so that the software service application sends a read-only information file generated according to the CPU chip ID, the eMMC ID and the MAC address to an authorization server and then receives an authorization permission protocol issued by the authorization server to finish authorization.
3. The AI camera authorization method according to claim 2, wherein the step of the AI application obtaining AI camera usage data from the software service application after the software service application obtains authorization comprises:
after the software service application obtains the authorization and the user terminal is started again, the AI application obtains the latest user terminal information when the user terminal is started currently and sends the latest user terminal information to the software service application;
and after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the AI camera use data.
4. The AI camera authorization method of claim 3, wherein after the step of sending the latest user terminal information to the software service application, further comprising:
the AI application triggers the software service application to verify whether the AI camera is authorized;
when the software service application determines that the AI camera obtains authorization, executing the following steps: after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the use data of the AI camera;
and when the software service application verifies that the AI camera does not obtain authorization, the AI application adds a watermark to the image file output by the AI camera.
5. The AI camera authorization method of claim 4, wherein the step of the AI application triggering the software service application to verify whether the AI camera is authorized comprises:
the AI application triggers the software service application to perform a first determination of whether the grant permission protocol is included in the corresponding storage location; and when the first judgment is in effect, the AI camera obtains authorization.
6. The AI camera authorization method according to claim 4, wherein before the step in which the AI application uses the working state information as the AI camera usage data after the AI application obtains the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information, the AI camera authorization method further comprises:
when the software service application determines that the AI camera obtains authorization, the AI application sends the latest MAC address of the user terminal to the software service application so that the software service application uploads the latest MAC address to an authorization server to judge whether the latest MAC address corresponds to at least two user terminals;
when the latest MAC address does not correspond to at least two user terminals, executing the following steps: and after the AI application acquires the working state information of the AI camera fed back by the software service application after the latest user terminal information is matched, the AI application takes the working state information as the AI camera use data.
7. The AI camera authorization method according to any of claims 3-6, characterized in that the latest user terminal information includes the latest CPU chip ID, the latest eMMC ID, and the latest MAC address;
the step of using the working state information as the AI camera usage data by the AI application after the AI application acquires the working state information of the AI camera fed back by the software service application completing matching with the latest user terminal information includes:
and when the AI application acquires the software service application and determines that at least one item of the CPU chip ID, the eMMC ID and the MAC address in the user terminal information and the latest CPU chip ID, the latest eMMC ID and the latest MAC address in the latest user terminal information are correspondingly matched with the fed back working state information including normal AI camera functions, the AI application takes the working state information including normal AI camera functions as the AI camera use data.
8. The AI camera authorization method according to claim 1, characterized in that the method further comprises:
after the software service application obtains the authorization, the AI application obtains an update file containing an AI application upgrade file and a software service application configuration file through an internal server;
and the AI application carries out self-updating through the AI application upgrading file in the updating file, and upgrades the software service application through the software service application configuration file after the self-updating is finished.
9. A user terminal, characterized in that the user terminal comprises a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the AI camera authorization method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, implements the steps of the AI-camera authorization method according to any one of claims 1 to 8.
CN201910915967.5A 2019-09-24 2019-09-24 AI camera authorization method, user terminal and computer readable storage medium Pending CN110659473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910915967.5A CN110659473A (en) 2019-09-24 2019-09-24 AI camera authorization method, user terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910915967.5A CN110659473A (en) 2019-09-24 2019-09-24 AI camera authorization method, user terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110659473A true CN110659473A (en) 2020-01-07

Family

ID=69039216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910915967.5A Pending CN110659473A (en) 2019-09-24 2019-09-24 AI camera authorization method, user terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110659473A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491968A (en) * 2020-11-05 2021-03-12 深圳供电局有限公司 Edge-end operation method of AI camera in power grid
CN112527344A (en) * 2020-11-11 2021-03-19 联想(北京)有限公司 Collaborative updating method and device for distributed AI model and program
WO2023090037A1 (en) * 2021-11-22 2023-05-25 ソニーセミコンダクタソリューションズ株式会社 Information processing device, information processing method, image-capturing device, and control method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916415A (en) * 2010-08-06 2010-12-15 西北工业大学 On-demand service method for software license in cloud computing platform
US20130014108A1 (en) * 2008-12-12 2013-01-10 International Business Machines Corporation Virtual machine
CN103544409A (en) * 2012-07-11 2014-01-29 腾讯科技(深圳)有限公司 Method for controlling application program, use equipment and server
CN103592927A (en) * 2013-11-26 2014-02-19 蓝盾信息安全技术股份有限公司 Method for binding product server and service function through license
CN104580316A (en) * 2013-10-24 2015-04-29 深圳市国信互联科技有限公司 Software authorization management method and software authorization management system
CN106534072A (en) * 2016-10-13 2017-03-22 腾讯科技(深圳)有限公司 User information authorization method, apparatus, equipment and system
CN108737395A (en) * 2018-05-08 2018-11-02 北京小米移动软件有限公司 Access method, apparatus, storage medium and the camera of camera

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130014108A1 (en) * 2008-12-12 2013-01-10 International Business Machines Corporation Virtual machine
CN101916415A (en) * 2010-08-06 2010-12-15 西北工业大学 On-demand service method for software license in cloud computing platform
CN103544409A (en) * 2012-07-11 2014-01-29 腾讯科技(深圳)有限公司 Method for controlling application program, use equipment and server
CN104580316A (en) * 2013-10-24 2015-04-29 深圳市国信互联科技有限公司 Software authorization management method and software authorization management system
CN103592927A (en) * 2013-11-26 2014-02-19 蓝盾信息安全技术股份有限公司 Method for binding product server and service function through license
CN106534072A (en) * 2016-10-13 2017-03-22 腾讯科技(深圳)有限公司 User information authorization method, apparatus, equipment and system
CN108737395A (en) * 2018-05-08 2018-11-02 北京小米移动软件有限公司 Access method, apparatus, storage medium and the camera of camera

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
兴业证券: "视觉AI算法全球厂商,手机为体、IOT为翼", 《PDF.DFCFW.COMPDFH3_AP201907221340532514_1.PDF》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491968A (en) * 2020-11-05 2021-03-12 深圳供电局有限公司 Edge-end operation method of AI camera in power grid
CN112527344A (en) * 2020-11-11 2021-03-19 联想(北京)有限公司 Collaborative updating method and device for distributed AI model and program
WO2023090037A1 (en) * 2021-11-22 2023-05-25 ソニーセミコンダクタソリューションズ株式会社 Information processing device, information processing method, image-capturing device, and control method

Similar Documents

Publication Publication Date Title
CN110659473A (en) AI camera authorization method, user terminal and computer readable storage medium
CN110661658B (en) Node management method and device of block chain network and computer storage medium
CN110750267B (en) Service information updating method, device, computer equipment and storage medium
CN110597918B (en) Account management method, account management device and computer readable storage medium
CN109040190B (en) Scheduling method, device and computer readable storage medium
CN110008665B (en) Authority control method and device for blockchain
US20050050363A1 (en) Secure data management apparatus
CN108322533A (en) Configuration and synchronization method between distributed type assemblies node based on operation log
JP6647410B2 (en) Data storage method, non-volatile computer storage medium, electronic device, open-ended entity and base station
CN110826799B (en) Service prediction method, device, server and readable storage medium
CN109002312A (en) Method for upgrading software, device and upgrade server and equipment
CN114610341A (en) Production line flashing method and device, electronic equipment, chip and storage medium
CN111918263B (en) Bluetooth connection method and device and Internet of things equipment
CN110781149A (en) Method, device, equipment and storage medium for managing live broadcast room information
CN104504587A (en) Advertisement monitoring method and device, electronic apparatus
CN107018194A (en) The implementation method that a kind of strategy is correctly downloaded in time
CN113672894A (en) Data processing method, device and equipment for identifying code request and storage medium
CN114095538B (en) Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology
CN104516744A (en) Software updating method and system
KR102564488B1 (en) BLOCKCHAIN-BASED IoT DEVICE FIRMWARE SUPPLY SYSTEM AND FIRMWARE UPDATE METHOD USING THE SAME
CN106293814B (en) Upgrading method and device
CN115694847A (en) Equipment management method, system and device
WO2018166322A1 (en) Repairing method and device for system partition
CN113315750A (en) Kafka message issuing method, device and storage medium
CN111259376A (en) Authority configuration method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200107