CN112995577A - Method, platform, terminal, system and storage medium for monitoring terminal desktop content - Google Patents

Method, platform, terminal, system and storage medium for monitoring terminal desktop content Download PDF

Info

Publication number
CN112995577A
CN112995577A CN201911214072.5A CN201911214072A CN112995577A CN 112995577 A CN112995577 A CN 112995577A CN 201911214072 A CN201911214072 A CN 201911214072A CN 112995577 A CN112995577 A CN 112995577A
Authority
CN
China
Prior art keywords
terminal
video recording
video
password
desktop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911214072.5A
Other languages
Chinese (zh)
Inventor
范贤友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201911214072.5A priority Critical patent/CN112995577A/en
Priority to PCT/CN2020/126588 priority patent/WO2021109786A1/en
Publication of CN112995577A publication Critical patent/CN112995577A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/27Server based end-user applications
    • H04N21/274Storing end-user multimedia data in response to end-user request, e.g. network recorder
    • H04N21/2743Video hosting of uploaded data from client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording

Abstract

The embodiment of the invention relates to the field of video monitoring, and discloses a method, a platform, a terminal, a system and a storage medium for monitoring terminal desktop contents. The method for monitoring the desktop content of the terminal comprises the following steps: receiving a video recording strategy set for the terminal aiming at the terminal desktop content; sending the video strategy and the address of the streaming media server to the terminal, so that the terminal can carry out real-time video recording on the desktop content of the terminal according to the video strategy and upload the obtained video data of the desktop content of the terminal to the streaming media server; the scheme to be protected by the embodiment of the invention ensures that the screen video data can be efficiently and safely managed.

Description

Method, platform, terminal, system and storage medium for monitoring terminal desktop content
Technical Field
The embodiment of the invention relates to the field of video monitoring, in particular to a monitoring technology of terminal desktop contents.
Background
The video monitoring system mainly comprises video acquisition equipment, video management equipment, video storage equipment and the like, and in recent years, video monitoring technology is rapidly developed and widely applied.
At present, the acquisition equipment in the video monitoring system mainly comprises various cameras, but in actual life, the video needing to be managed is not only the video acquired by the cameras, but also other video contents. For example, the law enforcement instrument in urban management currently only performs storage and offline management on shot contents, lacks monitoring on the operation process of the law enforcement instrument, and can further prevent data from being tampered and enhance the reliability if the operation record of the equipment has a full-range video and is well documented. For example, a specific post such as a car booking driver is more reliable and more difficult to forge if all-round recording is performed on the operation of telephone, short message, WeChat, APP and the like in the whole process of providing driving service for the specific post than the simple screenshot and the like.
However, the inventors found that at least the following problems exist in the related art: the screen recording on an intelligent terminal such as an Android mobile phone is a mature technology, but the current video monitoring method mainly depends on manual screen recording operation, and adopts an off-line management mode for the generated video of the screen recording, so that the efficiency and the safety are not high.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a platform, a terminal, a system and a storage medium for monitoring desktop contents of the terminal, so that screen video data can be efficiently and safely managed.
In order to solve the above technical problem, an embodiment of the present invention provides a method for monitoring desktop contents of a terminal, including: receiving a video recording strategy set for the terminal aiming at the terminal desktop content; and sending the video strategy and the address of the streaming media server to the terminal, so that the terminal can carry out real-time video recording on the desktop content of the terminal according to the video strategy, and uploading the obtained video data of the desktop content of the terminal to the streaming media server.
The embodiment of the invention also provides a method for monitoring the desktop content of the terminal, which comprises the following steps: receiving a video recording strategy aiming at the terminal desktop content and the address of a streaming media server sent by a network monitoring platform; real-time video recording is carried out on the desktop content of the terminal according to the video recording strategy; and uploading the video data of the terminal desktop content obtained by video recording to a streaming media server, so that the streaming media server responds to an access request of the client for the video data.
The embodiment of the present invention further provides a network monitoring platform, including: at least one processor; and a memory communicatively coupled to the at least one processor; the storage stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method for monitoring the desktop contents of the terminal.
An embodiment of the present invention further provides a terminal, including: at least one processor; and a memory communicatively coupled to the at least one processor; the storage stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method for monitoring the desktop contents of the terminal.
The embodiment of the invention also provides a monitoring system of the desktop content of the terminal, which comprises the following steps: the system comprises a client, a network monitoring platform in communication connection with the client, at least one terminal in communication connection with the network monitoring platform, and a streaming media server in communication connection with the client and the terminal; the streaming media server is used for storing video data uploaded by the terminal; the client is used for setting a video recording strategy for the terminal desktop content in the network monitoring platform and accessing video recording data stored in the streaming media server.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and the computer program realizes the monitoring method of the terminal desktop content when being executed by the processor.
Compared with the prior art, the method and the device for video recording have the advantages that the terminal receives the video recording strategy aiming at the terminal desktop content, which is sent by the network monitoring platform and set for the terminal by the client, and the terminal adopts the video recording strategy to record video, so that the video recording function can be started without manually operating the screen video recording action, the video recording is more convenient, and the use experience of a user is improved. The obtained video data is uploaded to the streaming media server, so that offline management of the video data is avoided, the video data can be prevented from being tampered, the reliability of the video data is enhanced, and the method has safety.
In addition, before sending the video recording strategy and the address of the streaming media server to the terminal, the method further comprises the following steps: receiving a login request of a terminal; the login request comprises a unique number and a login password of the terminal; detecting whether the terminal is a registered terminal or not according to the unique number and the login password of the terminal; after the terminal is judged to be the registered terminal, a temporary password is sent to the client; receiving an authentication request sent by a terminal, wherein the authentication request carries an authentication password; and judging whether the terminal passes the authentication according to the matching result of the verification password and the temporary password. By the method, a person who uses the terminal to record the video is guaranteed to be approved by a corresponding administrator of the client, and the safety of the monitoring method of the desktop content of the terminal is improved.
In addition, after the terminal is judged to be the registered terminal, before the temporary password is sent to the client, the method further comprises the following steps: sending a random password to user equipment bound to the terminal; receiving a verification request sent by a terminal, wherein the verification request carries a verification password; and if the verification password is matched with the random password, sending the temporary password to the client. By the method, the person who uses the terminal to record the video is guaranteed to be approved by the corresponding person of the user equipment bound with the terminal, the terminal is prevented from being forged, and the safety of the monitoring method of the desktop content of the terminal is further improved.
In addition, the real-time video recording of the desktop content of the terminal according to the video recording strategy comprises the following steps: and if the current state meets a plurality of video recording strategies, executing the video recording strategy with the highest priority according to the priority of each video recording strategy. The video recording strategy comprises the following steps: a timing video recording strategy and an application triggering video recording strategy, wherein the priority of each video recording strategy is preset; by setting different video recording strategies and setting the priority of the corresponding video recording strategy, the video recording strategies are buckled, the video recording strategy with high priority can cover the video recording strategy with low priority, and the use experience of a user is improved.
In addition, when the client updates the video strategy for the terminal, the updated video strategy is sent to the terminal; or when the difference value between the current time and the recording time contained in the video recording strategy is smaller than a preset threshold, the video recording strategy is sent to the terminal. The network monitoring platform updates the video recording strategy set for the terminal by the client in real time, so that the corresponding terminal can record video by using the updated video recording strategy; and when the difference value between the current recording time and the recording time contained in the video recording strategy is smaller than a preset threshold, sending the video recording strategy to the terminal, so that the terminal can acquire the video recording strategy in time.
In addition, after receiving the video recording strategy and the address of the streaming media server for the terminal desktop content sent by the network monitoring platform, the method further comprises the following steps: when an active video event signal is received, real-time video recording is carried out on the desktop content of the terminal, and the obtained video data are uploaded to a streaming media server; the active video event signal is generated according to preset operation on a screen. Besides the video recording under the corresponding video recording strategy, the user can also perform manual operation to perform video recording, and the user can perform manual video recording when in need, so that any important condition needing to be recorded can not be missed.
In addition, after uploading the video data of the terminal desktop content obtained by video recording to the streaming media server, the method further comprises the following steps: and uploading the video stream shot by the camera to a streaming media server, and splicing the video data and the video stream by the streaming media server so as to be accessed by the client. When the user checks the video recording data, the user does not need to search and search the videos one by one, and the efficiency of checking the corresponding videos by the user is improved.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of a method for monitoring desktop contents of a terminal according to a first embodiment of the present invention;
fig. 2 is a schematic diagram illustrating login verification between a terminal and a network monitoring platform according to a first embodiment of the present invention;
fig. 3 is a flowchart of a method for monitoring desktop contents of a terminal according to a second embodiment of the present invention;
fig. 4 is a schematic diagram of login verification between a terminal and a network monitoring platform according to a second embodiment of the present invention;
fig. 5 is a flowchart of a method for monitoring desktop contents of a terminal according to a third embodiment of the present invention;
fig. 6 is a schematic structural diagram of a network monitoring platform according to a fourth embodiment of the present invention;
fig. 7 is a schematic device composition diagram of a monitoring system for terminal desktop contents according to a sixth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present invention, and the embodiments may be combined with each other and referred to each other without contradiction.
The method for monitoring the desktop content of the terminal can be applied to a network monitoring platform or a terminal device, and the embodiment is described by taking the application to the network monitoring platform as an example.
The first embodiment of the invention relates to a method for monitoring terminal desktop contents, in the embodiment, a video recording strategy set for a terminal aiming at the terminal desktop contents is received; and sending the video strategy and the address of the streaming media server to the terminal, so that the terminal can carry out real-time video recording on the desktop content of the terminal according to the video strategy, and uploading the obtained video data of the desktop content of the terminal to the streaming media server. The video recording strategy can be issued to the terminal through the network monitoring platform, and the video recording specifically refers to the action that the terminal carries out video recording according to the video recording strategy; the data recorded by the terminal in the video recording process is video recording data. The terminal receives a video recording strategy aiming at the terminal desktop content, which is set by the client side sent by the network monitoring platform for the terminal, and the terminal adopts the video recording strategy to record video, so that the video recording function can be started without manually operating a screen video recording action, the video recording is more convenient, and the use experience of a user is improved. The obtained video data is uploaded to the streaming media server, so that offline management of the data is avoided, the video data can be prevented from being tampered, the reliability of the video data is enhanced, and the method has safety.
The following describes implementation details of the method for monitoring desktop contents of a terminal in this embodiment in a specific manner, and the following description is only for implementation details that are easy to understand and is not necessary in this embodiment.
A specific flowchart of the method for monitoring desktop content of a terminal according to this embodiment is shown in fig. 1, and specifically includes the following steps:
step 101, receiving a video recording strategy set for a terminal.
Specifically, before receiving a video recording policy set for a terminal, basic information of the terminal, such as a unique number of the terminal, for example, an IMEI, a mobile phone number capable of receiving a short message is configured in advance in a network monitoring platform, where the mobile phone number may be a mobile phone number of a person carrying the terminal, a login password, and a user id to which the mobile phone number belongs, that is, a client id of an administrator who manages the terminal.
In this step, the video recording policy set for the terminal: the method comprises a timing video recording strategy and an application triggering video recording strategy. The timing video recording strategy comprises the following steps: the video recording time interval and the periodicity thereof (one-time or periodicity, such as 10 to 12 points of one-time video recording or 2 to 3 points of each Monday of periodicity), taking a law enforcement instrument of urban management as an example, the video recording is automatically started when the patrol time interval is set; the application triggered video recording strategy at least comprises an application name, and the corresponding video recording action is on or off and other attributes. Taking the WeChat as an example, the video recording is started when the WeChat is started by the terminal, and the video recording is stopped when the WeChat is closed. Similarly, the application name may be a call, a camera, or the like, and the corresponding recording operation may be off, which is not illustrated here. The video recording strategy set for the terminal may include one or more timer video recording strategies, and may also include one or more application trigger video recording strategies.
The timing video recording strategy and the application triggering video recording strategy can understand the video recording strategy in the passive mode, and in practical application, the video recording strategy in the active mode can be set, namely, the video recording strategy is controlled by a terminal user and is similar to a shortcut key of a screenshot, such as key screenshot, three-finger sliding screenshot and the like, and once an active video recording event signal is detected, the screenshot is started.
Specifically, the video recording policy may be configured directly on the network monitoring platform by a manager of the terminal, or may be configured on the network monitoring platform by the manager of the terminal through the client.
In practical applications, each video recording policy may also correspond to a priority, for example, the attribute of each application triggering the video recording policy includes not only an application name, and the corresponding video recording action is on or off, but also a priority, and the priority is used for executing the video recording policy corresponding to the higher priority when the video recording policies conflict in the same time period. For example, a video recording action corresponding to an application triggered video recording strategy is used as a video pause, when the application is started, the terminal is currently carrying out video recording according to a certain timing video recording strategy, and if the priority of the application triggered video recording strategy is higher than that of the timing video recording strategy, the video recording is paused; and if the priority of the application triggering video recording strategy is lower than that of the timing video recording strategy, continuing to record the video.
And 102, judging whether the terminal passes the authentication.
The method for judging whether the terminal authentication passes specifically comprises the following steps: receiving a login request of a terminal; the login request comprises a unique number and a login password of the terminal; detecting whether the terminal is a registered terminal or not according to the unique number and the login password of the terminal; after the terminal is judged to be the registered terminal, a temporary password is sent to the client; receiving an authentication request sent by a terminal, wherein the authentication request carries an authentication password; and judging whether the terminal passes the authentication according to the matching result of the verification password and the temporary password.
Specifically, referring to fig. 2, a schematic diagram of login authentication between a terminal 604 and a network monitoring platform 601 includes the terminal 604, the network monitoring platform 601, and a client 602.
In this embodiment, the terminal is an example of an Android smart phone, and the terminal includes an intelligent operating system, a display screen, a screen recording capability, an International Mobile Equipment Identity (IMEI) for short, an International Mobile Subscriber Identity (IMSI) for Mobile client SIM card, a capability of receiving a short message, and a capability of accessing the internet.
Assuming that the network monitoring platform 601 has been configured in advance with the information of the completed terminal 604: the unique number of the terminal 604, such as IMEI, the user equipment bound by the terminal, login password, and the client corresponding to the terminal; assume that the access address, such as an IP address and port, of the network monitoring platform 601 has been pre-configured on the terminal 604.
In step S201, the terminal 604 sends a login request to the network monitoring platform 601, where the login request specifically includes a unique number and a login password of the terminal.
Specifically, the terminal 604 sends a login password of a unique number of the terminal 604 to the network monitoring platform 601 through a pre-configured access address of the network monitoring platform 601. The unique number of the terminal 604 includes the IMEI of the terminal 604, and the login password is the password set by the terminal 604 when the network monitoring platform 601 completes registration.
In step S202, the network monitoring platform 601 determines whether the terminal 604 is a registered terminal.
Specifically, after receiving a login request sent by the terminal 604, the network monitoring platform 601 first determines whether the terminal 604 is a user already registered in the network monitoring platform 601 according to the unique number of the terminal 604.
If the user is a registered user, judging whether the unique number and the password of the terminal 604 in the login request correspond to each other, if the unique number and the password of the terminal 604 correspond to each other, feeding back information of 'login success, waiting for next verification' to the terminal 604, and executing step S203; if the unique number of the terminal 604 does not correspond to the password, the information of "wrong login password" is fed back to the terminal 604.
If not, the information of "the device is not registered" is fed back to the terminal 604.
In step S203, the network monitoring platform 601 sends the temporary password to the client 602.
Specifically, the network monitoring platform 601 transmits the temporary password to the client 602 through the information of the client 602 reserved when the terminal 604 registers. In one specific example, the temporary password is a randomly generated 6-digit number.
It should be noted that the manner in which the network monitoring platform 601 sends the random password to the client 602 may be performed by a short message or a voice call.
In step S204, the client 602 transmits the temporary password to the terminal 604.
Specifically, since the temporary password is sent by the network monitoring platform 601 to the client 602, the temporary password sent by the network monitoring platform 601 is actually sent to the administrator of the terminal 604, and the user using the terminal 604 can obtain the temporary password through the administrator of the terminal 604.
In step S205, the terminal 604 sends an authentication request to the network monitoring platform 601, where the authentication request includes an authentication password.
After inquiring about the temporary password obtained by the administrator of the terminal 604, the user of the terminal 604 uses the temporary password as the verification password, and sends the verification password to the network monitoring platform 601 through the terminal 604.
In step S206, the network monitoring platform 601 detects whether the received verification password matches the issued temporary password.
Specifically, after receiving the authentication request sent by the terminal 604, the network monitoring platform 601 determines whether the authentication password is matched with the temporary password, and if the authentication password is matched with the temporary password, feeds back information of "login success" to the terminal 604; if the verification password is not matched with the temporary password, the information of 'verification failure, please re-verify' is fed back to the terminal 604.
It should be noted that, in other embodiments, the network monitoring platform 601 may also preset a temporary password authentication time and an authentication timeout number. After the network monitoring platform 601 sends the temporary password to the client 602, the network monitoring platform 601 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time length exceeds the preset temporary password verification time, and if the waiting time length is less than the preset temporary password verification time, step S206 is executed; if the waiting time is longer than the preset temporary password verification time, the information of 'waiting for overtime and please perform verification again' is fed back to the terminal 604, and the verification overtime times are recorded; if the verification overtime times exceed the preset verification overtime times, the information of 'login failure and please login again' is fed back to the terminal 604.
By adopting the terminal verification method, the terminal can be ensured to be successfully on line only by the agreement of the client 602 corresponding to the terminal 604 through a mechanism of the temporary password, so that the video recording function is prevented from being maliciously opened and abused.
And 103, issuing the video strategy and the streaming media server address to the terminal.
The terminal 604 records the video according to the video strategy and according to the obtained address of the streaming media server. And uploading the video data to a streaming media server.
The purpose of sending the video strategy to the terminal 604 is to enable the terminal 604 to perform video recording according to the received video strategy, and the video recording function can be started without manually operating a screen video recording action, so that the video recording is more convenient, and the use experience of a user is improved; the video data is uploaded through the received streaming media server address, and the client 602 can check the video content through the streaming media server, so that offline management of the video data is avoided, the video data can be prevented from being tampered, the reliability of the video data is enhanced, and the security is realized.
In a specific example, the video recording policy sent by the network monitoring platform 601 to the terminal 604 may be slightly different from the video recording policy set in step 101, for example, the timer video recording policy sent by the network monitoring platform 601 to the terminal 604 may not include period information, and when a video recording time point is close, the timer video recording policy is sent. That is to say, the issuing of the video recording policy may be performed in time after the authentication of the terminal is passed, or the video recording policy may be sent to the terminal when the difference between the current time and the recording time included in the video recording policy is detected to be smaller than a preset threshold.
Specifically, when a difference between the current recording time and the recording time included in the video recording policy is smaller than a preset threshold (for example, a time period of 10 minutes or 5 minutes), the video recording policy is sent to the terminal. Due to the update of the video recording strategy, the network monitoring platform 601 sends the video recording strategy to the terminal 604 in advance, so that the terminal 604 adopts the corresponding video recording strategy to perform video recording.
In other embodiments, when the client updates the video recording policy for the terminal, the updated video recording policy may be sent to the terminal.
According to the embodiment, the desktop of the mobile terminal is used as a video source to be accessed into the video monitoring platform, and the advantages of the video monitoring technology are utilized, so that the screen video data can be efficiently and safely managed. The terminal receives a video recording strategy aiming at the terminal desktop content, which is set by the client side sent by the network monitoring platform for the terminal, and the terminal adopts the video recording strategy to record video, so that the video recording function can be started without manually operating a screen video recording action, the video recording is more convenient, and the use experience of a user is improved. The obtained video data is uploaded to the streaming media server, so that offline management of the video data is avoided, the video data can be prevented from being tampered, the reliability of the video data is enhanced, and the method has safety.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the flow or to introduce insignificant design, but not to change the core design of the flow.
The second embodiment of the invention relates to a method for monitoring desktop contents of a terminal. The second embodiment is substantially the same as the first embodiment, and in the second embodiment of the present invention, after determining that the terminal is a registered terminal, before transmitting the temporary password to the client, the method further includes: sending a random password to user equipment bound to the terminal; receiving a verification request sent by a terminal, wherein the verification request carries a verification password; and if the verification password is matched with the random password, sending the temporary password to the client.
A specific flowchart of a method for monitoring desktop contents of a terminal according to this embodiment is shown in fig. 3, and specifically includes the following steps;
step 401, receiving a video recording policy set for the terminal, which is similar to step 101 of the first embodiment and will not be described herein again.
Step 402, judging whether the terminal passes the authentication.
The method for judging whether the terminal verification passes specifically comprises the following steps: receiving a login request of a terminal; the login request comprises a unique number and a login password of the terminal; detecting whether the terminal is a registered terminal or not according to the unique number and the login password of the terminal; after the terminal is judged to be the registered terminal, a temporary password is sent to the client; receiving an authentication request sent by a terminal, wherein the authentication request carries an authentication password; and judging whether the terminal passes the authentication according to the matching result of the verification password and the temporary password.
After the terminal is judged to be the registered terminal, before the temporary password is sent to the client, the method further comprises the following steps: sending a random password to user equipment bound to the terminal; receiving a verification request sent by a terminal, wherein the verification request carries a verification password; detecting whether the check password is matched with the random password; and if the verification password is matched with the random password, sending the temporary password to the client.
Specifically, referring to fig. 4, a schematic diagram of information verification between a terminal 604 and a network monitoring platform 601 includes the terminal 604, the network monitoring platform 601, a client 602, and a terminal-bound user equipment 614.
Assuming that the network monitoring platform 601 has been configured in advance with the information of the completed terminal 604: the unique number of the terminal 604, such as IMEI, the user equipment bound by the terminal, login password, and client information corresponding to the terminal; assume that the access address, such as an IP address and port, of the network monitoring platform 601 has been pre-configured on the terminal 604.
In step S201, the terminal 604 sends a login request to the network monitoring platform 601, where the login request specifically includes a unique number and a login password of the terminal.
Specifically, the terminal 604 sends a login password of a unique number of the terminal 604 to the network monitoring platform 601 through a pre-configured access address of the network monitoring platform 601. The unique number of the terminal 604 includes the IMEI of the terminal 604, and the login password is the password set by the terminal 604 when the network monitoring platform 601 completes registration.
In step S202, the network monitoring platform 601 determines whether the terminal 604 is a registered terminal.
Specifically, after receiving a login request sent by the terminal 604, the network monitoring platform 601 first determines whether the terminal 604 is a user already registered in the network monitoring platform 601 according to the unique number of the terminal 604.
If the user is a registered user, judging whether the unique number and the password of the terminal 604 in the login request correspond to each other, if the unique number and the password of the terminal 604 correspond to each other, feeding back information of 'login success, waiting for next verification' to the terminal 604, and executing the step S301; if the unique number of the terminal 604 does not correspond to the password, the information of "wrong login password" is fed back to the terminal 604.
If not, the information of "the device is not registered" is fed back to the terminal 604.
In step S301, the network monitoring platform 601 sends a random password to the terminal-bound user equipment 614.
Specifically, the network monitoring platform 601 sends a random password to the bound user equipment 614 of the terminal according to the information of the terminal bound user equipment 614 reserved by the terminal 604 on the platform. In one specific example, the random password is a randomly generated 6-digit number.
It should be noted that the manner in which the network monitoring platform 601 sends the random password to the terminal-bound user equipment 614 may be a short message or a voice call.
In step S302, the terminal-bound user equipment 614 sends a random password to the terminal 604.
Specifically, since the random password is sent by the network monitoring platform 601 to the user device 614 bound to the terminal, the random password sent by the network monitoring platform 601 is actually sent to the holder of the terminal 604, and the terminal 204 can obtain the random password through the user device of the holder of the terminal 604.
In step S303, the terminal 604 sends a verification request to the network monitoring platform 601, where the verification request includes a verification password.
After the random password is acquired by the user device of the owner of the terminal 604, the random password is used as a verification password, and the verification password is sent to the network monitoring platform 601 through the terminal 604.
In step S304, the network monitoring platform 601 detects whether the verification password matches the random password.
Specifically, after receiving the verification request sent by the terminal 604, the network monitoring platform 601 determines whether the verification password is matched with the random password, and if the verification password is matched with the random password, feeds back information of "verification is successful, please perform next verification" to the terminal 604, and executes step S203; if the verification password is not matched with the random password, the information of 'authentication failure, please re-authenticate' is fed back to the terminal 604.
It should be noted that, in other embodiments, the network monitoring platform 601 further preset a random password authentication time and an authentication timeout number. After the network monitoring platform 601 sends the random password to the terminal-bound user device 614, the network monitoring platform 614 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time length exceeds the preset random password verification time, and if the waiting time length is less than the preset random password verification time, the step S304 is executed; if the waiting time is longer than the preset random password authentication time, the information of 'waiting for overtime and please perform authentication again' is fed back to the terminal 604, and the number of times of the overtime of the authentication is recorded; if the verification overtime times exceed the preset verification overtime times, the information of 'login failure and please login again' is fed back to the terminal 604.
In step S203, the network monitoring platform 601 sends the temporary password to the client 602.
Specifically, the network monitoring platform 601 transmits a temporary password to the client 602 through the information that the terminal 604 registers the client 602 as a reservation. In one specific example, the temporary password is a randomly generated 6-digit number.
It should be noted that the manner in which the network monitoring platform 601 sends the random password to the client 602 may be performed by a short message or a voice call.
In step S204, the client 602 transmits the temporary password to the terminal 604.
Specifically, since the temporary password is sent by the network monitoring platform 601 to the client 602, the temporary password sent by the network monitoring platform 601 is actually sent to the administrator of the terminal 604, and the user using the terminal 604 can obtain the temporary password through the administrator of the terminal 604.
In step S205, the terminal 604 sends an authentication request to the network monitoring platform 601, where the authentication request includes an authentication password.
After inquiring about the temporary password obtained by the administrator of the terminal 604, the user of the terminal 604 uses the temporary password as the verification password, and sends the verification password to the network monitoring platform 601 through the terminal 604.
In step S206, the network monitoring platform 601 detects whether the received verification password matches the issued temporary password.
Specifically, after receiving the authentication request sent by the terminal 604, the network monitoring platform 601 determines whether the authentication password is matched with the temporary password, and if the authentication password is matched with the temporary password, feeds back information of "login success" to the terminal 604; if the verification password is not matched with the temporary password, the information of 'verification failure, please re-verify' is fed back to the terminal 604.
It should be noted that, in other embodiments, the network monitoring platform 601 further preset a temporary password authentication time and an authentication timeout number. After the network monitoring platform 601 sends the temporary password to the client 602, the network monitoring platform 601 starts to calculate the waiting time. When the network monitoring platform 601 receives the verification request sent by the terminal 604, it first determines whether the waiting time length exceeds the preset temporary password verification time, and if the waiting time length is less than the preset temporary password verification time, step S206 is executed; if the waiting time is longer than the preset temporary password verification time, the information of 'waiting for overtime and please perform verification again' is fed back to the terminal 604, and the verification overtime times are recorded; if the verification overtime times exceed the preset verification overtime times, the information of 'login failure and please login again' is fed back to the terminal 604.
And 403, issuing the video strategy and the streaming media server address to the terminal. This step is similar to step 103 of the first embodiment, and is not described again here.
The embodiment adopts a double-terminal verification method, and ensures that even if an attacker learns the unique serial number and the login password of the terminal, the attacker fails because of being unable to receive the random password by a random password mechanism, thereby avoiding the terminal from being forged; through a mechanism of the temporary password, it is ensured that the terminal can be successfully on line only if the client 602 agrees, and the video recording function is prevented from being maliciously opened and abused.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the flow or to introduce insignificant design, but not to change the core design of the flow.
The third embodiment of the invention relates to a method for monitoring desktop contents of a terminal. In a third embodiment of the present invention, a method for monitoring desktop contents of a terminal is applied to the terminal.
In the embodiment, a video recording strategy aiming at terminal desktop contents and an address of a streaming media server sent by a network monitoring platform are received; real-time video recording is carried out on the desktop content of the terminal according to the video recording strategy; and uploading the video data of the terminal desktop content obtained by video recording to a streaming media server, so that the streaming media server responds to an access request of the client for the video data. The terminal receives a video recording strategy aiming at the terminal desktop content, which is set by the client side sent by the network monitoring platform for the terminal, and the terminal adopts the video recording strategy to record video, so that the video recording function can be started without manually operating a screen video recording action, the video recording is more convenient, and the use experience of a user is improved. The obtained video data is uploaded to the streaming media server, so that offline management of the video data is avoided, the video data can be prevented from being tampered, the reliability of the video data is enhanced, and the method has safety.
The following describes implementation details of the method for monitoring desktop contents of a terminal in this embodiment in a specific manner, and the following description is only for implementation details that are easy to understand and is not necessary in this embodiment.
A specific flowchart of the method for monitoring desktop content of a terminal according to this embodiment is shown in fig. 5, and specifically includes the following steps:
step 501, whether the right is passed.
Sending a login request to a network monitoring platform; the login request comprises a unique number and a login password of the terminal; sending a verification request to the network monitoring platform, wherein the verification request carries a verification password; the verification password is generated according to a random password sent by user equipment bound with the terminal; sending a verification request to the network monitoring platform, wherein the verification request carries a verification password for the network monitoring platform to authenticate according to the verification password; and the verification password is generated according to the temporary password sent by the client.
For a specific verification process, reference is made to the contents of the second specific embodiment, which have been described in detail herein and are not described herein again.
Step 502, receiving a video recording strategy and a streaming media server address sent by a network monitoring platform.
Specifically, after the terminal passes the verification, the terminal receives a video recording strategy and a streaming media server address sent by the network monitoring platform, and the terminal performs video recording by adopting the received video recording strategy and uploads video recording data obtained by video recording to the streaming media server.
And 503, recording the desktop contents in real time according to the recording strategy.
Step 504, uploading the video data to a streaming media server.
And the terminal adopts the video recording strategy sent to the terminal by the streaming media server to record video and uploads the video data obtained by video recording to the streaming media server.
The video recording strategy comprises a timing video recording strategy and an application triggering video recording strategy.
It should be noted that uploading the video data obtained by video to the streaming media server may be performed in a timed uploading or real-time uploading manner; the method of uploading at regular time can effectively save the video cost, and the method of uploading at real time is higher in cost, but the video data is the first hand data, so that the video content is more reliable.
The video recording strategy comprises the following steps: a timing video recording strategy and an application triggering video recording strategy; wherein each video strategy corresponds to a priority level respectively; and if the current state of the terminal meets a plurality of video recording strategies, executing the video recording strategy with the highest priority.
It should be noted that the terminal includes an active mode besides adopting a corresponding video recording strategy to perform video recording.
An active mode: and if the active video event signal is detected, carrying out real-time video recording on the desktop content of the terminal, and uploading the obtained video data to the streaming media server. The active video event signal is generated according to preset operation on a screen.
Specifically, after the terminal 604 is successfully verified to be on-line, the active mode is turned on by the active video event signal under the control of the user of the terminal 604. The active video event signal is similar to a shortcut key of a screenshot, such as a key screen shot, a three-finger sliding screen shot and the like. Once the terminal 604 detects the active video event signal, it starts the video on screen, and sends the video data to the streaming media server allocated by the network monitoring platform 601 when the terminal 604 is on line through the RTSP stream.
After the terminal uploads the video data obtained by video recording to the streaming media server, the streaming media server splices the video data and the video stream for the client to access. After the streaming media server splices the video data and the video stream sent by the terminal, the client does not need to search and search the videos one by one when checking and accessing the videos, and the efficiency of checking the corresponding videos by the user is improved.
According to the embodiment, the desktop of the mobile terminal is used as a video source to be accessed into the video monitoring platform, and the advantages of the video monitoring technology are utilized, so that the screen video data can be efficiently and safely managed.
Compared with the prior art, the terminal receives the video recording strategy aiming at the terminal desktop content, which is set by the client side sent by the network monitoring platform for the terminal, adopts the video recording strategy to record video, and the video recording function can be started without manually operating a screen video recording action, so that the video recording is more convenient, and the use experience of a user is improved. The obtained video data is uploaded to the streaming media server, so that offline management of the video data is avoided, the video data can be prevented from being tampered, the reliability of the video data is enhanced, and the method has safety.
In addition, by adopting a double-terminal verification method and a password verification mechanism, even if an attacker learns the unique serial number and the login password of the terminal, the attacker fails to receive the verification password, so that the terminal is prevented from being forged; through a password checking mechanism, the terminal can be successfully on line only by the agreement of the client, and the video recording function is prevented from being maliciously opened and abused.
The following will specifically describe the terminal as a law enforcement instrument or a network car booking driver:
when the terminal is embodied as a law enforcement instrument:
the common intelligent law enforcement instrument generally has the functions of an operating system such as an Android system, a display screen, storage, a camera, network communication, GPS positioning and the like. In a law enforcement instrument, the embodiment exists in the form of an application, which is called a screen recording APP; while the application of law enforcement video is called law enforcement APP.
The method specifically comprises the following steps:
step 1, initially setting a law enforcement instrument: the administrator of the law enforcement instrument inputs the unique number of the law enforcement instrument, the telephone number of the law enforcement instrument, the ID of the administrator of the law enforcement instrument, namely the ID of the administrator who approves whether the law enforcement instrument can start the screen video or not and the address of the network monitoring platform on the network monitoring platform.
Step 2, video strategy configuration: and the manager of the law enforcement instrument sets a periodic video recording strategy for the law enforcement instrument on the network monitoring platform. For example, the video is started from 10 to 11 in the morning of a working day; and when the law enforcement APP is detected to be opened, immediately starting the video recording.
Step 3, login process: a law enforcement instrument user, namely a law enforcement personnel, opens a screen video APP before starting to execute a task, logs on the screen video APP to be verified successfully, and then obtains a video strategy and a streaming media server address; the specific login verification process is as described in the first embodiment, and is not described herein again.
Step 4, after the terminal logs on, the network monitoring platform regularly detects whether the law enforcement instrument has periodic video to be executed or not, and issues the periodic video to the law enforcement instrument in advance; with the configuration in 2 above, law enforcement will receive the video strategy before 10 o 'clock, and when the time reaches 10 o' clock, the screen video APP will record the screen and send it to the streaming media server.
And 5, in other time periods, the law enforcement person has a temporary task to process, opens the law enforcement APP according to the flow, namely when the law enforcement APP is displayed on the desktop of the law enforcement instrument, the video recording APP starts to record the screen and sends the screen to the streaming media server.
Step 6, when a law enforcement officer starts to carry out video recording evidence obtaining, two or even multiple paths of video streams exist, wherein one path is video content shot by a camera of the law enforcement officer, and if a plurality of cameras are opened, the paths of the video streams may exist; and the other path is the content displayed by the screen of the law enforcement instrument. The video APP firstly pushes the screen video content to the streaming media server, and meanwhile, optionally pushes the video stream of the camera to the streaming media server according to configuration. The video stream generated by the screen video and the video stream generated by the camera have the same prefix, namely the naming rule of the only number of the law enforcement instrument, so that the streaming media server can splice the two or even multiple streams into a picture for display. Through the processing, a law enforcement officer cannot delete and modify videos which are unfavorable to a certain party at will, and authenticity and integrity of videos shot by the law enforcement officer are guaranteed.
When the terminal is used by a net car booking driver:
in order to more comprehensively manage the service quality of the car booking driver, a car booking company requires the car booking driver to use a specific terminal, a screen recording APP described by the invention is installed on the terminal, and the whole service process is comprehensively recorded.
Step 1, the processes of configuration, online and the like are similar to those of a law enforcement instrument, and are not described herein;
step 2, the network car booking company sets an application-based video recording strategy for the terminal used by the driver in a unified way, for example, when the applications such as taxi taking application, WeChat, telephone, short message and the like are activated, the video recording is started actively; and when the internet bank APP is activated, if the video recording is currently carried out, the video recording is stopped, and the video recording is resumed after the internet bank APP quits.
The specific video recording strategy can be described as follows:
{ "APPname": get used "," action ": on", "priority": 1 "};
{ "APPname": Internet bank "," action ": off", "priority": 3 "};
where priority makes sense only at action is the corresponding on or off. Convention 1 means that the priority of the application is higher than that of active video recording, convention 2 is higher than that of periodic video recording, and convention 3 is higher than that of active and periodic video recording.
By adopting the mode, when a driver opens a taxi taking application, the driver actively starts the video; and at the moment, the 'online bank' is opened, because the priority of the 'online bank' is higher than that of the 'taxi taking application', the corresponding operation of the 'online bank' is executed, the video is closed, and the video is recovered after the 'online bank' is closed.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the flow or to introduce insignificant design, but not to change the core design of the flow.
A fourth embodiment of the present invention relates to a network monitoring platform, as shown in fig. 6, including: at least one processor 701; and, a memory 702 communicatively coupled to the at least one processor 701; the memory 702 stores instructions executable by the at least one processor 701, and the instructions are executed by the at least one processor 701, so that the at least one processor 701 can execute the method for monitoring desktop contents of a terminal according to the first or second embodiment.
The memory 702 and the processor 701 are coupled by a bus, which may comprise any number of interconnecting buses and bridges that couple one or more of the various circuits of the processor 701 and the memory 702. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor 701.
The processor 701 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory may be used to store data used by the processor in performing operations.
A communication component 703, configured to send a temporary password to a terminal or send a random password to a user equipment bound to the terminal; and the terminal is also used for receiving an authentication request or a verification request sent by the terminal.
It should be noted that this embodiment is an example of the apparatus corresponding to the first embodiment or the second embodiment, and may be implemented in cooperation with the first embodiment or the second embodiment. The related technical details mentioned in the first embodiment or the second embodiment are still valid in this embodiment, and are not described herein again in order to reduce the repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first embodiment or the second embodiment. In order to highlight the innovative part of the present invention, elements that are not so closely related to solving the technical problems proposed by the present invention are not introduced in the present embodiment, but this does not indicate that no other elements exist in the present embodiment.
A fifth embodiment of the present invention relates to a terminal including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method for monitoring desktop contents of a terminal according to the third embodiment.
Where the memory and processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the various circuits of the processor and the memory. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor.
The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory may be used to store data used by the processor in performing operations.
In a specific example, the terminal may adopt a typical, i.e. common, Android smartphone.
It should be understood that this embodiment is an example of the apparatus corresponding to the third embodiment, and may be implemented in cooperation with the third embodiment. The related technical details mentioned in the third embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the third embodiment. In order to highlight the innovative part of the present invention, elements that are not so closely related to solving the technical problems proposed by the present invention are not introduced in the present embodiment, but this does not indicate that no other elements exist in the present embodiment.
A sixth embodiment of the present invention relates to a desktop content monitoring system, as shown in fig. 7, including:
a client 602, a network monitoring platform 601 connected to the client 602 in communication, at least one terminal 604 connected to the network monitoring platform 601 in communication, and a streaming server 603 connected to the client 602 and the terminal 604 in communication; the streaming media server 603 is configured to store the video data uploaded by the terminal 604; the client 602 is configured to set a video recording policy for the terminal 604 in the network monitoring platform 601, and access video recording data stored in the streaming media server 603.
Specifically, the terminal 604 is an intelligent terminal having a display screen, a video recording capability, and a network communication capability. In one specific example, a typical, i.e., common, Android smartphone may be employed. The terminal 604 accesses the screen content as a video source to the network monitoring platform 601.
The client 602 is software used by a user to perform monitoring operations. There are several types of clients 602 in the monitoring system of the terminal desktop content, including a C/S mode client, a B/S mode client, and a mobile client.
The streaming media server 604: video data generated by the terminal is received and stored, and is provided for the client 602 to access, and responds to a request for playing the screen recording video from the client 602.
The network monitoring platform 601: the core of the monitoring system of the whole terminal desktop content manages all the terminals 604, the clients 602, the streaming media servers 603, the user information when the terminals 604 register, and the like.
It should be noted that this embodiment is a system example corresponding to the first embodiment or the third embodiment, and may be implemented in cooperation with the first embodiment or the third embodiment. The related technical details mentioned in the first embodiment or the third embodiment are still valid in this embodiment, and are not described herein again in order to reduce the repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first embodiment or the third embodiment. In order to highlight the innovative part of the present invention, the device that is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but it does not indicate that no other device exists in the present embodiment.
A seventh embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (16)

1. A method for monitoring desktop contents of a terminal is characterized by comprising the following steps:
receiving a video recording strategy set for the terminal aiming at the terminal desktop content;
and sending the video recording strategy and the address of the streaming media server to the terminal, so that the terminal can record the desktop content of the terminal in real time according to the video recording strategy, and uploading the obtained video recording data of the desktop content of the terminal to the streaming media server.
2. The method for monitoring desktop contents of a terminal according to claim 1, wherein before the sending the video recording policy and the address of the streaming media server to the terminal, the method further comprises:
receiving a login request of the terminal; the login request comprises a unique number and a login password of the terminal;
detecting whether the terminal is a registered terminal or not according to the unique number and the login password of the terminal;
after the terminal is judged to be a registered terminal, a temporary password is sent to the client;
receiving an authentication request sent by the terminal, wherein the authentication request carries an authentication password;
and judging whether the terminal passes the authentication according to the matching result of the verification password and the temporary password.
3. The method for monitoring desktop contents of a terminal according to claim 2, wherein after determining that the terminal is a registered terminal, before sending the temporary password to the client, the method further comprises:
sending a random password to the user equipment bound to the terminal;
receiving a verification request sent by the terminal, wherein the verification request carries a verification password;
and if the verification password is matched with the random password, the temporary password is sent to the client side again.
4. The method for monitoring desktop contents of a terminal according to claim 1, wherein the video recording policy comprises: a timing video recording strategy and an application triggering video recording strategy; wherein, each video strategy corresponds to a priority.
5. The method for monitoring the desktop contents of the terminal according to any one of claims 1 to 4, further comprising:
when the client updates the video recording strategy for the terminal, the updated video recording strategy is sent to the terminal;
or when the difference value between the current time and the recording time contained in the video recording strategy is smaller than a preset threshold, the video recording strategy is sent to the terminal.
6. A method for monitoring desktop contents of a terminal is characterized by comprising the following steps:
receiving a video recording strategy aiming at the terminal desktop content and the address of a streaming media server sent by a network monitoring platform;
real-time video recording is carried out on the desktop content of the terminal according to the video recording strategy;
and uploading the video data of the terminal desktop content obtained by video recording to the streaming media server, so that the streaming media server responds to an access request of a client for the video data.
7. The method for monitoring desktop contents of a terminal according to claim 6, after receiving the video recording policy for the desktop contents of the terminal and the address of the streaming media server sent by the network monitoring platform, further comprising:
and when receiving the active video event signal, carrying out real-time video recording on the desktop content of the terminal, and uploading the obtained video data to the streaming media server.
8. The method for monitoring desktop contents of a terminal as claimed in claim 7, wherein the active video event signal is generated according to a preset operation on a screen.
9. The method for monitoring desktop contents of a terminal according to claim 6, before receiving the video recording policy for the desktop contents of the terminal and the address of the streaming media server sent by the network monitoring platform, further comprising:
sending a login request to the network monitoring platform; the login request comprises a unique number and a login password of the terminal;
sending a verification request to the network monitoring platform, wherein the verification request carries a verification password for the network monitoring platform to authenticate according to the verification password; and the verification password is generated according to the temporary password notified by the client.
10. The method for monitoring desktop contents of a terminal according to claim 9, wherein after sending the login request to the network monitoring platform and before sending the verification request to the network monitoring platform, the method further comprises:
sending a verification request to the network monitoring platform, wherein the verification request carries a verification password; and the check password is generated according to the random password notified by the bound user equipment.
11. The method for monitoring the desktop contents of the terminal according to any one of claims 6 to 10, wherein the real-time video recording of the desktop contents of the terminal according to the video recording policy comprises:
if the current state meets a plurality of video recording strategies, executing the video recording strategy with the highest priority according to the priority of each video recording strategy;
wherein, the video recording strategy comprises: the method comprises a timing video recording strategy and an application triggering video recording strategy, wherein the priority of each video recording strategy is preset.
12. The method for monitoring desktop content of a terminal according to any one of claims 6 to 10, wherein after the video data of the desktop content of the terminal obtained by video recording is uploaded to the streaming media server, the method further comprises:
and uploading the video stream shot by the camera to the streaming media server, so that the streaming media server can splice the video data and the video stream for the client to access.
13. A network monitoring platform, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of monitoring desktop content of a terminal according to any one of claims 1 to 5.
14. A terminal, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of monitoring desktop content of a terminal according to any one of claims 6 to 12.
15. A monitoring system for terminal desktop contents is characterized by comprising: a client, the network monitoring platform of claim 13 communicatively coupled to the client, at least one terminal of claim 14 communicatively coupled to the network monitoring platform, and a streaming server communicatively coupled to the client and the terminal;
the streaming media server is used for storing video data uploaded by the terminal;
the client is used for setting a video recording strategy aiming at the terminal desktop content for the terminal in the network monitoring platform and accessing the video recording data stored in the streaming media server.
16. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the method for monitoring desktop contents of a terminal according to any one of claims 1 to 5, or implements the method for monitoring desktop contents of a terminal according to any one of claims 6 to 12.
CN201911214072.5A 2019-12-02 2019-12-02 Method, platform, terminal, system and storage medium for monitoring terminal desktop content Pending CN112995577A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911214072.5A CN112995577A (en) 2019-12-02 2019-12-02 Method, platform, terminal, system and storage medium for monitoring terminal desktop content
PCT/CN2020/126588 WO2021109786A1 (en) 2019-12-02 2020-11-04 Terminal desktop content monitoring method, platform, terminal, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911214072.5A CN112995577A (en) 2019-12-02 2019-12-02 Method, platform, terminal, system and storage medium for monitoring terminal desktop content

Publications (1)

Publication Number Publication Date
CN112995577A true CN112995577A (en) 2021-06-18

Family

ID=76222080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911214072.5A Pending CN112995577A (en) 2019-12-02 2019-12-02 Method, platform, terminal, system and storage medium for monitoring terminal desktop content

Country Status (2)

Country Link
CN (1) CN112995577A (en)
WO (1) WO2021109786A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040155910A1 (en) * 2003-02-11 2004-08-12 Academia Sinica Real-time screen recording system
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN108509232A (en) * 2018-03-29 2018-09-07 北京小米移动软件有限公司 Screen recording method, device and computer readable storage medium
CN108600824A (en) * 2018-04-28 2018-09-28 维沃移动通信有限公司 A kind of record screen method and terminal device
CN109783328A (en) * 2017-11-13 2019-05-21 国网山东省电力公司烟台供电公司 A method of user's operation screen is recorded and played based on application filtering piecemeal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040155910A1 (en) * 2003-02-11 2004-08-12 Academia Sinica Real-time screen recording system
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN109783328A (en) * 2017-11-13 2019-05-21 国网山东省电力公司烟台供电公司 A method of user's operation screen is recorded and played based on application filtering piecemeal
CN108509232A (en) * 2018-03-29 2018-09-07 北京小米移动软件有限公司 Screen recording method, device and computer readable storage medium
CN108600824A (en) * 2018-04-28 2018-09-28 维沃移动通信有限公司 A kind of record screen method and terminal device

Also Published As

Publication number Publication date
WO2021109786A1 (en) 2021-06-10

Similar Documents

Publication Publication Date Title
CN105069880B (en) A kind of method and system of the mobile terminal access control based on converged communication
CN110958218B (en) Data transmission method based on multi-network communication and related equipment
CN110121873A (en) A kind of access token management method, terminal and server
CN109784031B (en) Account identity verification processing method and device
CN110602216B (en) Method and device for using single account by multiple terminals, cloud server and storage medium
US20150312296A1 (en) Method and device for pushing multimedia resource and display terminal
US9363663B2 (en) Method and apparatus for providing cellphone service from any device
US20170171585A1 (en) Method and Electronic Device for Recording Live Streaming Media
CN107820702B (en) Management and control method, device and electronic equipment
CN102523282A (en) Mobile terminal data sharing method, apparatus thereof and network server
CN103581441A (en) Mobile terminal tracking anti-theft system and method
WO2017166906A1 (en) Method of managing euicc subscription profile and associated apparatus
CN108123961A (en) Information processing method, apparatus and system
AU2021282382A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
CN111404918A (en) Cloud mobile phone distributed service emergency authentication method, device and system
CN111767558B (en) Data access monitoring method, device and system
CN109819278B (en) Optimization method of live video
CN112995577A (en) Method, platform, terminal, system and storage medium for monitoring terminal desktop content
CN111063061A (en) Method, equipment and storage medium for using temporary password for intelligent door lock
CN105262824B (en) A kind of automobile monitoring method, apparatus and system
CN111355970A (en) Live broadcast management method and device and electronic equipment
CN106105128A (en) The system and method that terminal, server, user identify
WO2017191876A1 (en) System for managing online records by individuals via network and method for managing online records by individuals using system
CN108055262A (en) Video conference terminal register method, terminal and gatekeeper
KR101308628B1 (en) Server and method for transferring mms contents during call from soip device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210618