CN111917981A - Privacy protection method, device, equipment and computer readable storage medium - Google Patents

Privacy protection method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN111917981A
CN111917981A CN202010771512.3A CN202010771512A CN111917981A CN 111917981 A CN111917981 A CN 111917981A CN 202010771512 A CN202010771512 A CN 202010771512A CN 111917981 A CN111917981 A CN 111917981A
Authority
CN
China
Prior art keywords
user
camera
mode
privacy
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010771512.3A
Other languages
Chinese (zh)
Inventor
李江波
叶兵
黄潼辉
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Trust Co Ltd
Original Assignee
Ping An Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Trust Co Ltd filed Critical Ping An Trust Co Ltd
Priority to CN202010771512.3A priority Critical patent/CN111917981A/en
Publication of CN111917981A publication Critical patent/CN111917981A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/667Camera operation mode switching, e.g. between still and video, sport and normal or high- and low-resolution modes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Studio Devices (AREA)

Abstract

The invention discloses a privacy protection method, which relates to the technical field of security monitoring, and comprises the following steps: judging whether a user is in a preset area or not according to a preset mode; if the user is in the preset area, switching the working mode of the camera to a privacy protection mode; and if the user is not in the preset area, switching the working mode of the camera to a non-public mode, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information. The invention also discloses a privacy protection device, equipment and a computer readable storage medium. The invention can protect the personal privacy of the user and improve the information security of the intelligent household camera.

Description

Privacy protection method, device, equipment and computer readable storage medium
Technical Field
The present invention relates to the field of security monitoring technologies, and in particular, to a privacy protection method, apparatus, device, and computer-readable storage medium.
Background
With the advance of the fourth industrial revolution, a hot tide of combining the traditional industry with internet technology is triggered. Under the trend of combining the traditional industry with the internet technology, the original business mode is modified and upgraded through a new generation of information technology (such as artificial intelligence, 5G, big data, cloud computing, block chains and the like), such as internet finance, smart home, smart factories and the like. However, the information security risk is increasingly highlighted due to the deep utilization of new generation information technologies.
At present, the utilization rate of the intelligent home camera is continuously increased, so that the information security requirement of a user on the intelligent home camera is continuously improved. However, the smart home camera communicates through the internet, so that a hacker can attack the smart home camera through the internet, and thus an image in the smart home camera may be acquired, thereby revealing personal privacy. Therefore, the existing intelligent household camera has information safety risk.
Disclosure of Invention
The invention mainly aims to provide a privacy protection method, a privacy protection device, privacy protection equipment and a computer readable storage medium, and aims to improve the information security of an intelligent home camera.
In order to achieve the above object, the present invention provides a privacy protecting method, including:
judging whether a user is in a preset area or not according to a preset mode;
if the user is in the preset area, switching the working mode of the camera to a privacy protection mode;
and if the user is not in the preset area, switching the working mode of the camera to a non-public mode, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information.
Optionally, the step of determining whether the user is in the preset area according to the preset mode includes:
when first information sent by an outdoor sensor and second information sent by an indoor sensor are received, acquiring first receiving time of the first information and second receiving time of the second information;
obtaining a time interval according to the first receiving time and the second receiving time;
judging whether the time interval is less than or equal to a preset time interval or not;
if the time interval is less than or equal to the preset time interval, comparing the first receiving time with the second receiving time;
if the first receiving time is before the second receiving time, determining that the user is in a preset area;
and if the first receiving time is after the second receiving time, judging that the user is not in a preset area.
Optionally, the step of determining whether the user is in the preset area according to the preset mode further includes:
when unlocking information sent by the intelligent lock is received, judging that the user is in a preset area;
when first information sent by an outdoor sensor is received, state information of the intelligent lock is acquired;
and if the state information is the locking state, judging that the user is not in the preset area.
Optionally, the privacy protecting method further includes:
when a control instruction sent by the user terminal is received, acquiring a user identifier of the user terminal;
judging whether the user identification is consistent with a preset identification or not;
if the user identification is consistent with the preset identification, executing the control instruction;
and if the user identification is inconsistent with the preset identification, the control instruction is not responded.
Optionally, after the step of determining whether the user identifier is consistent with a preset identifier, the method further includes:
if the user identification is inconsistent with the preset identification, generating an access event of the user identification;
and saving the access event to a historical event.
Optionally, the privacy preserving mode comprises: the method comprises the following steps of only saving images to a privacy memory card mode, clearing a user image mode, closing a camera shooting function mode, rotating a camera to avoid the user mode, only acquiring an audio mode or only acquiring an image mode, and switching the working mode of the camera to a privacy protection mode comprises the following steps:
switching the working mode of the camera to a mode of only storing images into a private memory card so as to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to a privacy memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a user image clearing mode to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to the privacy memory card, and removing the user image in the complete image to obtain a publicly available image;
storing the open image to an open memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a camera function closing mode to control the camera to close the camera function; or the like, or, alternatively,
switching the working mode of the camera to a mode of rotating the camera to avoid users so as to control the camera to turn until no user exists in a shot picture; or the like, or, alternatively,
switching the working mode of the camera to an audio acquisition mode to control the camera to close a camera shooting function and control the camera to open a voice recording function; or the like, or, alternatively,
switching the working mode of the camera to an image acquisition only mode to control the camera to start a camera shooting function;
and acquiring the image obtained by shooting to obtain the public image.
Further, to achieve the above object, the present invention provides a privacy protecting apparatus comprising:
the position judgment module is used for judging whether the user is in a preset area or not according to a preset mode;
the first mode switching module is used for switching the working mode of the camera to a privacy protection mode if a user is in a preset area;
and the second mode switching module is used for switching the working mode of the camera to a non-public mode if the user is not in the preset area, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information.
Further, to achieve the above object, the present invention also provides a privacy protecting apparatus including: a memory, a processor and a privacy preserving program stored on the memory and executable on the processor, the privacy preserving program when executed by the processor implementing the steps of the privacy preserving method as described above.
Furthermore, to achieve the above object, the present invention also provides a computer-readable storage medium having a privacy protecting program stored thereon, which when executed by a processor, implements the steps of the privacy protecting method as described above.
The invention provides a privacy protection method, a privacy protection device, privacy protection equipment and a computer readable storage medium, wherein whether a user is in a preset area or not is judged according to a preset mode; if the user is in the preset area, switching the working mode of the camera to a privacy protection mode; and if the user is not in the preset area, switching the working mode of the camera to a non-public mode, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information. According to the invention, when a user is in a preset area, the working mode of the camera is switched to the privacy protection mode, so that the personal privacy of the user is protected; when the user is not in the preset area, the working mode of the camera is switched to the non-disclosure mode so that the personal information is not disclosed, and therefore the personal privacy of the user is protected. Therefore, the invention can improve the information security of the intelligent household camera.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a privacy protecting method according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of the privacy protecting method according to the present invention;
FIG. 4 is a flowchart illustrating a third embodiment of a privacy protecting method according to the present invention;
fig. 5 is a schematic functional block diagram of a privacy protecting apparatus according to a first embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
The privacy protection device according to the embodiment of the present invention may be a terminal device having a processing function, such as an intelligent home camera, a Personal Computer (PC), a notebook computer, or a server.
As shown in fig. 1, the privacy protecting apparatus may include: a processor 1001, such as a CPU (Central Processing Unit), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
It will be appreciated by those skilled in the art that the privacy protecting apparatus shown in fig. 1 does not constitute a limitation of the privacy protecting apparatus and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a privacy securing program.
In the privacy protecting apparatus shown in fig. 1, the processor 1001 may be configured to call a privacy protecting program stored in the memory 1005 and perform the following operations:
judging whether a user is in a preset area or not according to a preset mode;
if the user is in the preset area, switching the working mode of the camera to a privacy protection mode;
and if the user is not in the preset area, switching the working mode of the camera to a non-public mode, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information.
Further, the processor 1001 may be configured to invoke the privacy preserving program stored in the memory 1005, and further perform the following operations:
when first information sent by an outdoor sensor and second information sent by an indoor sensor are received, acquiring first receiving time of the first information and second receiving time of the second information;
obtaining a time interval according to the first receiving time and the second receiving time;
judging whether the time interval is less than or equal to a preset time interval or not;
if the time interval is less than or equal to the preset time interval, comparing the first receiving time with the second receiving time;
if the first receiving time is before the second receiving time, determining that the user is in a preset area;
and if the first receiving time is after the second receiving time, judging that the user is not in a preset area.
Further, the processor 1001 may be configured to invoke the privacy preserving program stored in the memory 1005, and further perform the following operations:
when unlocking information sent by the intelligent lock is received, judging that the user is in a preset area;
when first information sent by an outdoor sensor is received, state information of the intelligent lock is acquired;
and if the state information is the locking state, judging that the user is not in the preset area.
Further, the processor 1001 may be configured to invoke the privacy preserving program stored in the memory 1005, and further perform the following operations:
when a control instruction sent by the user terminal is received, acquiring a user identifier of the user terminal;
judging whether the user identification is consistent with a preset identification or not;
if the user identification is consistent with the preset identification, executing the control instruction;
and if the user identification is inconsistent with the preset identification, the control instruction is not responded.
Further, the processor 1001 may be configured to invoke the privacy preserving program stored in the memory 1005, and further perform the following operations:
if the user identification is inconsistent with the preset identification, generating an access event of the user identification;
and saving the access event to a historical event.
Further, the privacy preserving mode includes: the processor 1001 may be configured to call a privacy protection program stored in the memory 1005, and further perform the following operations:
switching the working mode of the camera to a mode of only storing images into a private memory card so as to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to a privacy memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a user image clearing mode to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to the privacy memory card, and removing the user image in the complete image to obtain a publicly available image;
storing the open image to an open memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a camera function closing mode to control the camera to close the camera function; or the like, or, alternatively,
switching the working mode of the camera to a mode of rotating the camera to avoid users so as to control the camera to turn until no user exists in a shot picture; or the like, or, alternatively,
switching the working mode of the camera to an audio acquisition mode to control the camera to close a camera shooting function and control the camera to open a voice recording function; or the like, or, alternatively,
switching the working mode of the camera to an image acquisition only mode to control the camera to start a camera shooting function;
and acquiring the image obtained by shooting to obtain the public image.
Further, the unpublished mode is to turn on a camera function, store the captured image in a public memory card, and turn off the right to send the image to the internet.
Based on the above hardware structure, embodiments of the privacy protection method of the present invention are provided.
The invention provides a privacy protection method.
Referring to fig. 2, fig. 2 is a flowchart illustrating a privacy protecting method according to a first embodiment of the present invention.
In this embodiment, the privacy protecting method includes:
step S10, judging whether the user is in a preset area according to a preset mode;
in this embodiment, the privacy protection method is implemented by a privacy protection device, and the privacy protection device may be a terminal device such as an intelligent home camera, a PC, a notebook computer, and a server. The privacy protection device is described by taking an intelligent home camera as an example, and the intelligent home camera comprises software and hardware for operating a server, a camera and the like. The smart home camera communicates with a user terminal through the internet, the user terminal can be a mobile phone, a PC, a notebook computer, a tablet computer and other terminals with a display function and an internet communication function, and the user terminal is described by taking the mobile phone as an example.
The preset area in the present embodiment may be an area such as a home, an office, and a shop, and the preset area is described by taking a home as an example.
In this embodiment, first, whether the user is in the preset area is determined according to a preset mode. The essence of the preset mode is to acquire the user position and the user house position, and then judge whether the user is at home or not according to the distance between the user position and the user house position. It is understood that the user's home location may default to a camera location. The user may be a person who has a login authority of a user terminal APP (Application), a family member, or the like. In addition, the user accessible operation user terminal APP communicates with intelligent house camera, and is specific, and intelligent house camera communicates with the router through LAN, and the cell-phone inserts the internet based on mobile network (2G, 3G, 4G, 5G etc.) and wireless network etc. communicates with the router through the internet to communicate with intelligent house camera based on the router. When the user is at home, the mobile phone can also communicate with the intelligent home camera through the local area network, namely the mobile phone and the intelligent home camera are connected with the same router to communicate. The user terminal APP can be used for checking images and controlling operations such as the intelligent home camera.
As one of the ways of determining whether the user is at home, step S10 may include:
a11, when first information sent by an outdoor sensor and second information sent by an indoor sensor are received, acquiring first receiving time of the first information and second receiving time of the second information;
in this embodiment, when first information sent by the outdoor sensor and second information sent by the indoor sensor are received, a first receiving time of the first information and a second receiving time of the second information are obtained. The intelligent home camera receives information sent by the outdoor sensor and the indoor sensor through the local area network, namely the intelligent home camera is connected with the sensor and communicated with the same router, and certainly, the intelligent home camera can also be communicated in modes of wired connection, Bluetooth, radio frequency and the like, and the details are not repeated here.
The installation positions of the outdoor sensor and the indoor sensor are usually near the residential gate, wherein the outdoor sensor is arranged outside the residential gate, the indoor sensor is arranged in the residential gate, the number of the outdoor sensor and the number of the indoor sensor are one, and the outdoor sensor and the indoor sensor can comprise a plurality of sensors in order to improve the detection accuracy. The door outer sensor and the door inner sensor can be devices capable of detecting people, such as a distance sensor, a photoelectric sensor, a thermal infrared sensor and the like.
It should be noted that the first information is set according to the outdoor sensor and the smart home camera, so that when the outdoor sensor detects a person, the first information can be generated and sent to the smart home camera, and meanwhile, the smart home camera can analyze the first information, and then, according to an analysis result, it can be known that the outdoor sensor detects the person. The second information is set according to the in-door sensor and the intelligent home camera, so that when the in-door sensor detects a person, the second information can be generated and sent to the intelligent home camera, meanwhile, the intelligent home camera can analyze the second information, and then according to an analysis result, the in-door sensor can be known to detect the person.
It can be understood that, because the information transmission speed in the local area network is very fast, the difference between the time when the sensor detects the person and the time when the smart home camera receives the information is not great, the receiving time can be used as the time when the person is detected, that is, the receiving time of the first information and the second information is used as the time when the sensor detects the person.
In this embodiment, a distance sensor is taken as an example for explanation, when the distance sensor outside the door detects a person within a first preset distance, first information is sent to the smart home camera through the local area network, and when the distance sensor inside the door detects a person within a second preset distance, second information is sent to the smart home camera through the local area network, where the first preset distance and the second preset distance are set according to environmental factors such as a size and a structure of a house, and are not specifically limited herein.
a12, obtaining a time interval according to the first receiving time and the second receiving time;
then, a time interval is obtained according to the first receiving time and the second receiving time. The sequence of the first receiving time and the second receiving time is judged firstly, then the subsequent receiving time and the previous receiving time are subtracted, and the result of the subtraction is taken as the time interval.
a13, judging whether the time interval is less than or equal to a preset time interval;
and after the time interval is obtained, judging whether the time interval is smaller than or equal to a preset time interval. The preset time interval is set according to actual needs, for example, 1 minute, 2 minutes, and the like, and is not limited specifically here.
a14, if the time interval is less than or equal to the preset time interval, comparing the first receiving time with the second receiving time;
in this embodiment, if the time interval is less than or equal to the preset time interval, the first receiving time is compared with the second receiving time. When the time interval is less than or equal to the preset time interval, it can be determined that the user moves from the outside of the door to the inside of the door or from the inside of the door to the outside of the door within the preset time interval, that is, the user goes home or out of the door. Then, the sequence of the first receiving time and the second receiving time is compared, and whether the user is at home or not is judged according to the comparison result.
a15, if the first receiving time is before the second receiving time, determining that the user is at home;
in this embodiment, if the first receiving time is before the second receiving time, it is determined that the user is at home. The first reception time is before and the second reception time is after, and it is determined that the user moves from the outside of the door to the inside of the door, that is, it is determined that the user returns home, and it is determined that the user is at home.
a16, if the first receiving time is after the second receiving time, then determining that the user is not at home.
In this embodiment, if the first reception time is after the second reception time, it is determined that the user is not at home. It is to be noted that, after the first reception time and before the second reception time, it is determined that the user has moved from inside to outside, that is, it is determined that the user is out, and it is determined that the user is not at home.
As another way of determining whether the user is at home, step S10 may include:
a17, when unlocking information sent by the intelligent lock is received, judging that the user is in a preset area;
in this embodiment, when the unlocking information sent by the smart lock is received, it is determined that the user is in the preset area. Wherein, the unblock information can be analyzed by intelligent house camera, and intelligent house camera learns that the intelligence lock is by the unblock through the result of analysis. It can be understood that the user needs to unlock the intelligent lock when getting home, and therefore, when the intelligent lock is unlocked, namely, the intelligent lock is in an unlocked state, the intelligent lock sends unlocking information to the intelligent home camera, so that the intelligent home camera knows that the intelligent lock is unlocked, and therefore the user is judged to be at home. Meanwhile, the intelligent lock can be unlocked only by a user, family members or authorized persons, so that persons entering the room by prying doors or other illegal ways cannot avoid camera shooting of the intelligent household camera, and strangers or thieves can be prevented from being judged that the user is at home when the user is at home, and the safety of the intelligent household camera is further improved.
It should be noted that, because the same router is connected between the smart home camera and the smart lock, that is, the smart home camera and the smart lock are located under the same local area network, the smart home camera and the smart lock communicate through the local area network without adding additional equipment cost and manual operation. Certainly, the smart home camera can also receive the unlocking information of the smart lock through communication modes such as wired connection, bluetooth and radio frequency.
In addition, it should be noted that the unlocking modes of the intelligent lock include password unlocking, fingerprint unlocking, face unlocking, voiceprint unlocking, iris unlocking and the like, specifically, the password unlocking can be performed by analyzing the input password of the user, so as to judge whether the input password is correct, and if the input password is correct, the intelligent lock is unlocked; fingerprint unlocking can be realized by collecting fingerprints through an optical technology, a capacitance technology and an ultrasonic technology, then analyzing fingerprint characteristics such as ridges, valleys, end points, bifurcation points and bifurcation points to obtain fingerprint information, comparing the fingerprint information with preset user fingerprint information, and unlocking the intelligent lock if the comparison results are the same; the face unlocking method comprises the steps that a face is collected through a camera of an intelligent lock, then face features such as distances, angles and appearance sizes between facial features and facial organs are analyzed to obtain face information, the face information is compared with preset user face information, and if the comparison results are the same, the intelligent lock is unlocked; voice recognition equipment such as a sunlight single-chip microcomputer collects voice during voiceprint unlocking, then waveform and change of the voice are analyzed to obtain voice information, the voice information is compared with preset user voiceprint information, and if the comparison result is the same, the intelligent lock is unlocked; the iris unlocking method includes the steps that iris is collected through a camera, iris features such as crowns, crystalline lens, filament spots, pits, wrinkles and stripes are analyzed to obtain iris information, the iris information is compared with iris information of a preset user, and if the comparison result is the same, the intelligent lock is unlocked. It can be understood that the preset user information is also acquired by the corresponding biometric technology.
a18, acquiring the state information of the intelligent lock when receiving first information sent by an outdoor sensor;
in the embodiment, when first information sent by the door outside sensor is received, the state information of the intelligent lock is acquired. When the intelligent home camera receives first information sent by the outdoor sensor, the intelligent home camera analyzes the first information, the user is judged to be outdoors according to an analysis result, and meanwhile, the intelligent home camera acquires state information of the intelligent lock within preset time. The door external sensor can include 1 or more, which can be a distance sensor, a photoelectric sensor, a thermal infrared sensor, etc.; the state information may include a locked state, an unlocked state, a door closed state, and a door opened state, wherein the locked state is a state in which the door opened state is changed to the door closed state, and the unlocked state is a state in which the door closed state is changed to the door opened state.
a19, if the status information is locked, determining that the user is not in the preset area.
In this embodiment, if the status information is the locked status, it is determined that the user is not in the predetermined area. It can be understood that when the state of the intelligent lock is locked, namely the intelligent lock is changed from the door opening state to the door closing state, the user can be judged to go out, and therefore the user is judged not to be at home.
As another way of determining whether the user is at home: the smart home camera is communicated with the router through the local area network and is accessed to the Internet through the router, so that the position of the user mobile phone is obtained based on the Internet, wherein the user mobile phone can obtain the position of the user mobile phone through the positioning function of the user mobile phone; the intelligent home camera can acquire the position of the intelligent home camera through the positioning function of the intelligent home camera, and can also set the position of the intelligent home camera through the APP of the user mobile phone, so that the intelligent home camera acquires the set position of the intelligent home camera in the APP through the Internet communication mode; then, the intelligent home camera calculates the distance between the position of the mobile phone of the user and the position of the intelligent home camera, and the calculated result is used as the distance between the user and the home; further, comparing the distance from the user to the home with a preset distance from the user to the home; if the distance from the user to the home is smaller than or equal to the preset distance from the home, judging that the user is at home; and if the distance from the user to the home is greater than the preset distance from the home, judging that the user is not at home, wherein the preset distance from the home can be set according to the position of the camera, the size of the house, the structure of the house and the like.
As another way of determining whether the user is at home: the method comprises the steps that an intelligent home camera obtains a first IP (Internet Protocol) address and a first subnet mask of the intelligent home camera, and obtains a second IP address and a second subnet mask of a user mobile phone through the Internet; then, performing AND operation on the first IP address and the first subnet mask, and taking a result obtained by the AND operation as a first network number; performing an and operation on the second IP address and the second subnet mask, and taking a result obtained by the and operation as a second network number; then, comparing the first network number with the second network number; if the first network number is the same as the second network number, the user mobile phone and the intelligent home camera are judged to be in the same local area network, namely the user mobile phone and the intelligent home camera are connected with the same router, so that the user is judged to be at home; and if the first network number is different from the second network number, judging that the mobile phone of the user and the intelligent home camera are not in the same local area network, and judging that the user is not at home. Of course, whether the user mobile phone is connected with the router or not can be judged through the authentication mode of the router, so that whether the user is at home or not can be judged.
It should be noted that, in order to implement the privacy protection method automatically, an intelligent lock and a sensor may be used, so that the user does not need to perform excessive operations, thereby improving the experience of the user. Meanwhile, the intelligent lock is combined with the intelligent household camera, so that the idea of intelligent household is fully embodied, and the privacy protection method of the embodiment is more intelligent.
Step S20, if the user is in the preset area, the working mode of the camera is switched to the privacy protection mode;
in this embodiment, if the user is in the preset area, the working mode of the camera is switched to the privacy protection mode. The working mode comprises a privacy protection mode, a non-public mode and a public mode. It can be understood that the public mode is a general mode, and personal private information of the public mode is most likely to be acquired by hackers through the internet.
Further, the privacy preserving mode includes: the method comprises the following steps of only saving images to a privacy memory card mode, clearing a user image mode, closing a camera shooting function mode, rotating a camera to avoid the user mode, only acquiring an audio mode or only acquiring an image mode, and switching the working mode of the camera to a privacy protection mode comprises the following steps:
switching the working mode of the camera to a mode of only storing images into a private memory card so as to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to a privacy memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a user image clearing mode to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to the privacy memory card, and removing the user image in the complete image to obtain a publicly available image;
storing the open image to an open memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a camera function closing mode to control the camera to close the camera function; or the like, or, alternatively,
switching the working mode of the camera to a mode of rotating the camera to avoid users so as to control the camera to turn until no user exists in a shot picture; or the like, or, alternatively,
switching the working mode of the camera to an audio acquisition mode to control the camera to close a camera shooting function and control the camera to open a voice recording function; or the like, or, alternatively,
switching the working mode of the camera to an image acquisition only mode to control the camera to start a camera shooting function;
and acquiring the image obtained by shooting to obtain the public image.
In this embodiment, when the privacy protection mode is a mode of only saving images to the privacy memory card, the camera is controlled to start a camera function; and storing the complete image obtained by shooting to a privacy memory card, and closing the permission of sending the image to the Internet. Wherein, the complete image is an image related to personal information of a user; the privacy memory card is a memory card for storing the privacy information of the user, the content in the privacy memory card cannot be acquired through the internet, and can only be read through the memory card reading equipment, so that the image can be traced back by the user while the personal privacy of the user is protected only by storing the image to the privacy memory card mode.
In this embodiment, when the privacy protection mode is the user image clearing mode, the camera is controlled to start the camera function; storing the complete image obtained by shooting to a privacy memory card, and removing a user image in the complete image to obtain a publicly available image; and storing the open image to the open memory card, and closing the authority of sending the image to the Internet. The complete image comprises a user image and a public image, the user image is an image related to personal information of a user, the public image is an image not related to privacy of the user, the public image is obtained by intercepting the complete image in a video editing tool or an image processing technology and the like, specifically, the complete image can be detected to obtain a picture frame including the user, and the picture frame including the user is deleted from the complete image to obtain the public image; the public memory card is a memory card for storing publicable information, and the content in the public memory card can be acquired through the internet. Therefore, the user image clearing mode can ensure that the user can backtrack the open image through the internet and can backtrack the complete image through the memory card reading equipment while protecting the personal privacy of the user.
In this embodiment, when the privacy protection mode is the image capturing function off mode, the camera is controlled to turn off the image capturing function. And when the privacy protection mode is a mode of rotating the camera to avoid the user, controlling the camera to turn until no user is in the shot picture. When the privacy protection mode is the audio acquisition only mode, the camera is controlled to close the camera shooting function, and the camera is controlled to open the voice recording function. When the privacy protection mode is an image acquisition only mode, controlling the camera to start a camera shooting function; and acquiring the image obtained by shooting to obtain the public image. The mode that the camera is rotated to avoid the user is that when the camera faces the user, the camera is controlled to turn until the user cannot be shot. And only the audio acquisition mode is to turn off the camera shooting function and turn on the voice recording function to record the voice. And the image acquisition mode is to start the camera shooting function, and an open image is acquired through an image processing technology, wherein the open image is an image which does not relate to the personal privacy of the user.
Step S30, if the user is not in the preset area, switching the working mode of the camera to the unpublished mode, and sending request information indicating whether to be published to the user terminal, and when receiving a public control instruction sent by the user terminal based on the request information, switching the working mode to the public mode.
In this embodiment, if the user is not in the preset area, the working mode of the camera is switched to the unpublished mode, and the request information indicating whether to be published is sent to the user terminal, and when a public control instruction sent by the user terminal based on the request information is received, the working mode is switched to the public mode. The intelligent home camera is communicated with the router through the local area network, accesses the internet through the router, and sends whether public request information to the user terminal based on the internet so as to display whether public information on the user terminal APP and enable the user to select whether to disclose the home information by himself.
It is understood that the home information may also relate to the personal privacy of the user, and therefore, when the user is not at home, the working mode is switched to the non-public mode, which may protect the personal privacy that the user does not want to be disclosed, compared to directly switching the working mode to the public mode.
Further, the unpublished mode is to turn on a camera function, store the captured image in a public memory card, and turn off the right to send the image to the internet. The unpublished mode prevents hackers from acquiring the image through the internet by closing the right to send the image to the internet, thereby protecting the personal privacy of users, and meanwhile, the image is stored in the public storage card, so that the content in the public storage card can be acquired through the internet when the users select to disclose the home information.
The embodiment of the invention provides a privacy protection method, which is used for judging whether a user is at home or not according to a preset mode; if the user is at home, switching the working mode of the camera to a privacy protection mode; and if the user is not at home, switching the working mode of the camera to a non-public mode, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information. According to the embodiment of the invention, when a user is at home, the working mode of the camera is switched to the privacy protection mode, so that the personal privacy of the user is protected; when the user is not at home, the working mode of the camera is switched to the unpublished mode so that the personal information is not published, thereby protecting the personal privacy of the user, and meanwhile, the request information of whether to publish is sent to the user terminal so that the user can select whether to publish the personal information based on the request information, thereby protecting the personal privacy that the user does not want to be published. Therefore, the embodiment of the invention can improve the information security of the intelligent household camera.
Further, based on the first embodiment described above, a second embodiment of the privacy protecting method of the present invention is proposed.
Referring to fig. 3, fig. 3 is a flowchart illustrating a privacy protecting method according to a second embodiment of the present invention.
In this embodiment, the privacy protecting method further includes:
step S40, when receiving the control instruction sent by the user terminal, obtaining the user identification of the user terminal;
in this embodiment, when a control instruction sent by a user terminal is received, a user identifier of the user terminal is obtained. Specifically, the intelligent home camera is communicated with the router through the local area network, is accessed to the internet through the router, and is communicated with the user mobile phone based on the internet. In the communication process, if the intelligent home camera receives a control instruction sent by the user mobile phone, the user identification of the user mobile phone is obtained through the internet communication mode.
The control instruction comprises instructions for switching a working mode into a privacy protection mode, switching the working mode into a non-public mode, switching the working mode into a public mode, starting a camera shooting function, closing the camera shooting function and the like; the user identifier may be a unique and non-variable identifier such as a Media Access Control (MAC) address, an IP address, or a user ID. It should be noted that the MAC address is a hardware address, which can uniquely identify a user terminal; the IP address is a network address and can uniquely identify the network environment of the user terminal; the user ID is an exclusive identifier of each user, and the user inputs the user identifier in the user terminal APP, so that the intelligent home camera can acquire the user ID through the internet communication mode.
Step S50, judging whether the user identification is consistent with a preset identification;
in this embodiment, it is determined whether the user identifier is consistent with the preset identifier. The preset identifier is an authorized user terminal identifier, and the preset identifier may include 1 or more, and is set according to the number of users or the number of user terminals.
Step S60, if the user identification is consistent with the preset identification, executing the control instruction;
in this embodiment, if the user identifier is consistent with one of the preset identifiers, the control instruction is executed.
And step S70, if the user identification is not consistent with the preset identification, the control instruction is not responded.
In this embodiment, if the user identifier is not consistent with any one of the preset identifiers, the control instruction is not responded.
In this embodiment, the validity of the user terminal can be verified by determining the user identifier of the user terminal that sends the control instruction, that is, determining whether the user identifier is a preset identifier. Meanwhile, the control instruction of the unauthorized user terminal is not responded, namely the user identifier is not consistent with any one of the preset identifiers, so that other unauthorized user terminals cannot control the intelligent home camera, and the personal privacy of the user is further protected.
Further, based on the second embodiment, a third embodiment of the privacy protecting method of the present invention is provided.
Referring to fig. 4, fig. 4 is a flowchart illustrating a privacy protecting method according to a third embodiment of the present invention.
In this embodiment, after step S50, the privacy protecting method further includes:
step S80, if the user identification is not consistent with the preset identification, generating an access event of the user identification;
in this embodiment, if the user identifier is not consistent with any one of the preset identifiers, an access event of the user identifier is generated. The access time comprises a user identifier and access time, and the access time is the time when the intelligent home camera receives the control instruction.
And step S90, storing the access event into a history event.
The access event is then saved to the historical event.
In this embodiment, if the user identifier is inconsistent with the preset identifier, an access event of the user identifier is generated; and saving the access event to the historical event. Through the method, the information of the illegal user is stored in the historical event, so that the user can check the information of the illegal user from the historical event.
The invention also provides a privacy protection device.
Referring to fig. 5, fig. 5 is a schematic functional block diagram of a privacy protecting apparatus according to a first embodiment of the present invention.
In this embodiment, the privacy protecting apparatus includes:
the position judging module 10 is used for judging whether a user is in a preset area according to a preset mode;
the first mode switching module 20 is configured to switch a working mode of the camera to a privacy protection mode if the user is in a preset area;
the second mode switching module 30 is configured to switch a working mode of the camera to a non-public mode if the user is not in the preset area, send request information indicating whether the camera is public to the user terminal, and switch the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information.
Each virtual function module of the privacy protecting apparatus is stored in the memory 1005 of the privacy protecting device shown in fig. 1, and is used for implementing all functions of a privacy protecting program; when executed by the processor 1001, the modules may implement privacy preserving functions.
Further, the position determining module 10 includes:
the time acquisition unit is used for acquiring first receiving time of the first information and second receiving time of the second information when receiving the first information sent by an outdoor sensor and the second information sent by an indoor sensor;
the time calculation unit is used for obtaining a time interval according to the first receiving time and the second receiving time;
the time judging unit is used for judging whether the time interval is smaller than or equal to a preset time interval or not;
a time comparison unit, configured to compare the first receiving time with the second receiving time if the time interval is smaller than or equal to the preset time interval;
the position judging unit is used for judging that the user is in a preset area if the first receiving time is before the second receiving time;
and the position judging unit is further used for judging that the user is not in a preset area if the first receiving time is after the second receiving time.
Further, the position determining module 10 includes:
the position judging unit is used for judging that the user is in a preset area when unlocking information sent by the intelligent lock is received;
the state acquisition unit is used for acquiring the state information of the intelligent lock when receiving first information sent by an outdoor sensor;
and the position judging unit is also used for judging that the user is not in the preset area if the state information is in the locking state.
Further, the privacy protecting apparatus further includes:
the identification acquisition module is used for acquiring the user identification of the user terminal when receiving the control instruction sent by the user terminal;
the identification judgment module is used for judging whether the user identification is consistent with a preset identification or not;
the instruction execution module is used for executing the control instruction if the user identifier is consistent with the preset identifier;
and the instruction execution module is further used for not responding to the control instruction if the user identifier is inconsistent with the preset identifier.
Further, the privacy protecting apparatus further includes:
the event generation module is used for generating an access event of the user identifier if the user identifier is inconsistent with the preset identifier;
and the event storage module is used for storing the access event into a historical event.
Further, the first mode switching module 20 includes:
the camera shooting starting unit is used for switching the working mode of the camera into a mode of only storing images into the privacy memory card so as to control the camera to start a camera shooting function;
the permission closing unit is used for storing the complete image obtained by shooting to a privacy memory card and closing the permission of sending the image to the Internet;
the camera shooting starting unit is also used for switching the working mode of the camera into a user image clearing mode so as to control the camera to start a camera shooting function;
the image clearing unit is used for storing the complete image obtained by shooting to the privacy memory card and clearing the user image in the complete image to obtain a publicly available image;
the permission closing unit is also used for switching the working mode of the camera to a mode of rotating the camera to avoid users so as to control the camera to turn until no user exists in a shot picture;
the camera closing unit is used for switching the working mode of the camera to an audio acquisition mode so as to control the camera to close the camera shooting function and control the camera to start the voice recording function; or the like, or, alternatively,
the steering control unit is used for switching the working mode of the camera to a mode of rotating the camera to avoid users so as to control the camera to steer until no user exists in a shot picture;
the voice starting unit is used for switching the working mode of the camera to an audio acquisition mode so as to control the camera to close the camera shooting function and control the camera to start the voice recording function;
the camera shooting starting unit is also used for switching the working mode of the camera into an image acquisition only mode so as to control the camera to start a camera shooting function;
and the image acquisition unit is used for acquiring the images obtained by shooting to obtain public images.
Further, the unpublished mode is to turn on a camera function, store the captured image in a public memory card, and turn off the right to send the image to the internet.
The function implementation of each module in the privacy protection apparatus corresponds to each step in the privacy protection method embodiment, and the functions and implementation processes are not described in detail herein.
The present invention also provides a privacy protecting apparatus, including: a memory, a processor and a privacy preserving program stored on the memory and executable on the processor, the privacy preserving program when executed by the processor implementing the steps of the privacy preserving method as described in any one of the above embodiments.
The specific embodiment of the privacy protection device of the present invention is substantially the same as the embodiments of the privacy protection method described above, and details thereof are not described herein.
The invention also provides a computer-readable storage medium having stored thereon a privacy protecting program which, when executed by a processor, implements the steps of the privacy protecting method according to any one of the above embodiments.
The specific embodiment of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the privacy protecting method described above, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or an internet device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A privacy protection method, characterized in that the privacy protection method comprises the steps of:
judging whether a user is in a preset area or not according to a preset mode;
if the user is in the preset area, switching the working mode of the camera to a privacy protection mode;
and if the user is not in the preset area, switching the working mode of the camera to a non-public mode, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information.
2. The privacy protection method of claim 1, wherein the step of determining whether the user is in the preset area according to the preset mode comprises:
when first information sent by an outdoor sensor and second information sent by an indoor sensor are received, acquiring first receiving time of the first information and second receiving time of the second information;
obtaining a time interval according to the first receiving time and the second receiving time;
judging whether the time interval is less than or equal to a preset time interval or not;
if the time interval is less than or equal to the preset time interval, comparing the first receiving time with the second receiving time;
if the first receiving time is before the second receiving time, determining that the user is in a preset area;
and if the first receiving time is after the second receiving time, judging that the user is not in a preset area.
3. The privacy protection method of claim 1, wherein the step of determining whether the user is in the preset area according to the preset mode comprises:
when unlocking information sent by the intelligent lock is received, judging that the user is in a preset area;
when first information sent by an outdoor sensor is received, state information of the intelligent lock is acquired;
and if the state information is the locking state, judging that the user is not in the preset area.
4. The privacy protection method of claim 1, wherein the privacy protection method further comprises:
when a control instruction sent by the user terminal is received, acquiring a user identifier of the user terminal;
judging whether the user identification is consistent with a preset identification or not;
if the user identification is consistent with the preset identification, executing the control instruction;
and if the user identification is inconsistent with the preset identification, the control instruction is not responded.
5. The privacy protection method as claimed in claim 4, wherein after the step of determining whether the user identifier is consistent with a preset identifier, the method further comprises:
if the user identification is inconsistent with the preset identification, generating an access event of the user identification;
and saving the access event to a historical event.
6. A privacy protection method as claimed in any one of claims 1 to 5, wherein the privacy protection mode comprises: the method comprises the following steps of only saving images to a privacy memory card mode, clearing a user image mode, closing a camera shooting function mode, rotating a camera to avoid the user mode, only acquiring an audio mode or only acquiring an image mode, and switching the working mode of the camera to a privacy protection mode comprises the following steps:
switching the working mode of the camera to a mode of only storing images into a private memory card so as to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to a privacy memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a user image clearing mode to control the camera to start a camera shooting function;
storing the complete image obtained by shooting to the privacy memory card, and removing the user image in the complete image to obtain a publicly available image;
storing the open image to an open memory card, and closing the permission of sending the image to the Internet; or the like, or, alternatively,
switching the working mode of the camera to a camera function closing mode to control the camera to close the camera function; or the like, or, alternatively,
switching the working mode of the camera to a mode of rotating the camera to avoid users so as to control the camera to turn until no user exists in a shot picture; or the like, or, alternatively,
switching the working mode of the camera to an audio acquisition mode to control the camera to close a camera shooting function and control the camera to open a voice recording function; or the like, or, alternatively,
switching the working mode of the camera to an image acquisition only mode to control the camera to start a camera shooting function;
and acquiring the image obtained by shooting to obtain the public image.
7. The privacy protection method according to any one of claims 1 to 5, wherein the unpublished mode is to turn on a camera function, save a captured image to a public memory card, and turn off a right to transmit the image to the internet.
8. A privacy protecting apparatus, characterized in that the privacy protecting apparatus comprises:
the position judgment module is used for judging whether the user is in a preset area or not according to a preset mode;
the first mode switching module is used for switching the working mode of the camera to a privacy protection mode if a user is in a preset area;
and the second mode switching module is used for switching the working mode of the camera to a non-public mode if the user is not in the preset area, sending request information whether to be public or not to the user terminal, and switching the working mode to a public mode when receiving a public control instruction sent by the user terminal based on the request information.
9. A privacy preserving device, characterized in that the privacy preserving device comprises: memory, a processor and a privacy preserving program stored on the memory and executable on the processor, the privacy preserving program when executed by the processor implementing the steps of the privacy preserving method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a privacy protection program which, when executed by a processor, implements the steps of the privacy protection method of any one of claims 1 to 7.
CN202010771512.3A 2020-07-31 2020-07-31 Privacy protection method, device, equipment and computer readable storage medium Pending CN111917981A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010771512.3A CN111917981A (en) 2020-07-31 2020-07-31 Privacy protection method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010771512.3A CN111917981A (en) 2020-07-31 2020-07-31 Privacy protection method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111917981A true CN111917981A (en) 2020-11-10

Family

ID=73286485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010771512.3A Pending CN111917981A (en) 2020-07-31 2020-07-31 Privacy protection method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111917981A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112689093A (en) * 2020-12-24 2021-04-20 深圳创维-Rgb电子有限公司 Intelligent device privacy protection method, intelligent device and storage medium
CN112866653A (en) * 2021-03-05 2021-05-28 深圳市远古科技有限公司 Baby safety monitoring system and device of double-frequency circuit based on intranet control gateway
CN113418154A (en) * 2021-06-15 2021-09-21 读书郎教育科技有限公司 Device and method for realizing safe use of camera of intelligent desk lamp
WO2022161221A1 (en) * 2021-01-27 2022-08-04 惠州Tcl移动通信有限公司 Method and device for protecting user information, and storage medium
CN115242525A (en) * 2022-07-26 2022-10-25 北京京东方技术开发有限公司 Terminal equipment, state control method and control system of terminal equipment
WO2023024729A1 (en) * 2021-08-25 2023-03-02 京东方科技集团股份有限公司 Device configuration method, electronic device, and computer-readable storage medium
CN115723529A (en) * 2021-08-31 2023-03-03 上海博泰悦臻网络技术服务有限公司 In-vehicle privacy protection method, system, medium, and apparatus
WO2023071292A1 (en) * 2021-10-29 2023-05-04 京东方科技集团股份有限公司 Method for controlling application terminal, and application terminal, storage medium and camera

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656874A (en) * 2009-09-17 2010-02-24 杭州智傲科技有限公司 Remote video monitoring method
CN105137785A (en) * 2015-08-06 2015-12-09 上海斐讯数据通信技术有限公司 Smart home control system, method and circuit
CN105939236A (en) * 2016-06-14 2016-09-14 北京小米移动软件有限公司 Method and device for controlling intelligent home device
CN106940530A (en) * 2017-03-14 2017-07-11 胡渐佳 appliance control system based on intelligent door lock
CN108055455A (en) * 2017-12-08 2018-05-18 北京小米移动软件有限公司 Method for secret protection, device and the computer readable storage medium of family's monitoring
CN109640039A (en) * 2018-12-07 2019-04-16 遵义汇峰智能系统有限责任公司 A kind of intelligent safety and defence system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656874A (en) * 2009-09-17 2010-02-24 杭州智傲科技有限公司 Remote video monitoring method
CN105137785A (en) * 2015-08-06 2015-12-09 上海斐讯数据通信技术有限公司 Smart home control system, method and circuit
CN105939236A (en) * 2016-06-14 2016-09-14 北京小米移动软件有限公司 Method and device for controlling intelligent home device
CN106940530A (en) * 2017-03-14 2017-07-11 胡渐佳 appliance control system based on intelligent door lock
CN108055455A (en) * 2017-12-08 2018-05-18 北京小米移动软件有限公司 Method for secret protection, device and the computer readable storage medium of family's monitoring
CN109640039A (en) * 2018-12-07 2019-04-16 遵义汇峰智能系统有限责任公司 A kind of intelligent safety and defence system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112689093A (en) * 2020-12-24 2021-04-20 深圳创维-Rgb电子有限公司 Intelligent device privacy protection method, intelligent device and storage medium
CN112689093B (en) * 2020-12-24 2022-06-10 深圳创维-Rgb电子有限公司 Intelligent device privacy protection method, intelligent device and storage medium
WO2022161221A1 (en) * 2021-01-27 2022-08-04 惠州Tcl移动通信有限公司 Method and device for protecting user information, and storage medium
CN112866653A (en) * 2021-03-05 2021-05-28 深圳市远古科技有限公司 Baby safety monitoring system and device of double-frequency circuit based on intranet control gateway
CN113418154A (en) * 2021-06-15 2021-09-21 读书郎教育科技有限公司 Device and method for realizing safe use of camera of intelligent desk lamp
WO2023024729A1 (en) * 2021-08-25 2023-03-02 京东方科技集团股份有限公司 Device configuration method, electronic device, and computer-readable storage medium
CN115723529A (en) * 2021-08-31 2023-03-03 上海博泰悦臻网络技术服务有限公司 In-vehicle privacy protection method, system, medium, and apparatus
WO2023071292A1 (en) * 2021-10-29 2023-05-04 京东方科技集团股份有限公司 Method for controlling application terminal, and application terminal, storage medium and camera
CN115242525A (en) * 2022-07-26 2022-10-25 北京京东方技术开发有限公司 Terminal equipment, state control method and control system of terminal equipment
CN115242525B (en) * 2022-07-26 2024-01-30 北京京东方技术开发有限公司 Terminal equipment, state control method and control system of terminal equipment
WO2024022274A1 (en) * 2022-07-26 2024-02-01 京东方科技集团股份有限公司 Terminal apparatus, state control method for terminal apparatus, and control system for terminal apparatus

Similar Documents

Publication Publication Date Title
CN111917981A (en) Privacy protection method, device, equipment and computer readable storage medium
US11093731B2 (en) Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems
KR102467468B1 (en) Method and system for automated physical access control system using biometrics combined with tag authentication
US10686793B2 (en) Integrated biometrics for application security
US20210076212A1 (en) Recognizing users with mobile application access patterns learned from dynamic data
Ha Security and usability improvement on a digital door lock system based on internet of things
EP3105699B1 (en) Method and apparatus for authenticating security system users and unlocking selected feature sets
KR101872847B1 (en) An access certification system and the method thereof
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
CN111901567A (en) Privacy protection method, device, equipment and computer readable storage medium
CN107145772A (en) Terminal equipment security control method, device and terminal equipment
KR20170013597A (en) Method and Apparatus for Strengthening of Security
CN105868648A (en) Mobile terminal and data processing method and device for visitor mode of mobile terminal
CN104937602B (en) Privacy protection method and electronic equipment
CN112349009A (en) User identity identification method, device, equipment and computer readable storage medium
CN115690969A (en) Non-contact fingerprint authentication method, terminal, access control equipment and storage medium
Goud et al. Enhanced security for smart door using biometrics and OTP
CN118397739A (en) A smart access control system
CN112215994A (en) Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium
KR20070110152A (en) Image lock opening and closing device
CN105989265A (en) Early warning method and device and terminal equipment
CN112734999A (en) Data processing method, device and system, electronic equipment and storage medium
CN118644915B (en) A smart lock control method and system based on the Internet of Things
KR100445368B1 (en) A doorlock security device using Real-time Password Generator
CN117131527B (en) A security access control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201110

WD01 Invention patent application deemed withdrawn after publication