CN113079161A - Method and system for sharing monitoring camera - Google Patents
Method and system for sharing monitoring camera Download PDFInfo
- Publication number
- CN113079161A CN113079161A CN202110358371.7A CN202110358371A CN113079161A CN 113079161 A CN113079161 A CN 113079161A CN 202110358371 A CN202110358371 A CN 202110358371A CN 113079161 A CN113079161 A CN 113079161A
- Authority
- CN
- China
- Prior art keywords
- user
- camera
- information
- identity authentication
- app
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 41
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012795 verification Methods 0.000 claims description 8
- 238000012545 processing Methods 0.000 abstract description 5
- 238000004891 communication Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007667 floating Methods 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The invention relates to a sharing method and a system for monitoring video shot by a camera, wherein the method comprises the following steps: a user sends a request for sharing the monitoring camera to a management terminal by using an APP installed in the intelligent mobile equipment; after receiving the request, the management terminal sends identity authentication information to the intelligent mobile equipment; the user side receives the identity authentication information, then performs identity authentication through the intelligent mobile equipment, and sends the authenticated information to the management side; and the management terminal receives the authenticated information and verifies the authenticated information, if the authentication is passed, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user. The invention can provide the sharing of the monitoring video for the user passing the identity authentication, can uniquely determine the identity of the user who provides the request for sharing the monitoring video, and can also avoid invading the privacy of other people after processing the monitoring video.
Description
Technical Field
The invention relates to processing of videos shot by a monitoring camera, in particular to a sharing method and a sharing system for videos shot by the monitoring camera.
Background
Along with the development of social activities, the demand for monitoring videos is more and more great, and especially, the monitoring videos for the whereabouts of old people and children are obtained, so that guardians can know the whereabouts of the old people and the children in real time, and the safety of the old people and the children is convenient to pay attention to, for example: in order to ensure the safety of students going to school or going home, parents need to monitor and obtain the walking track of the students to know whether the students safely arrive at school or go home; in some larger occasions, such as tourist sites or amusement places where there are many floating persons, it is also necessary to obtain videos of their whereabouts in order to obtain the whereabouts of children or old people in real time to pay attention to their safety, and so on, in these cases, if the corresponding monitoring videos can be obtained in real time to know their whereabouts, it would be advantageous to pay attention to them in real time and prevent their safety in advance. However, at present, the monitoring cameras are usually installed for corresponding management departments or public security departments, the cameras are not disclosed to the public, corresponding monitoring videos can be obtained only after the accidents occur and are approved by related departments, and at the moment, the whereabouts of the monitoring videos cannot be obtained in advance and safety prompts cannot be given, namely, the videos can be only checked after the accidents and the accidents cannot be warned through the videos. In addition, since the surveillance video relates to personal privacy, sharing of the surveillance video is not facilitated if the video is shared at will and suspected of invading the privacy of others, which may touch the law.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method and a system for sharing videos shot by a monitoring camera.
The technical scheme adopted for realizing the aim of the invention is a sharing method for monitoring video shot by a camera, which comprises the following steps:
s1, the user sends a request for sharing the monitoring camera to the management terminal by using the APP installed in the intelligent mobile equipment;
s2, after receiving the request, the management terminal sends identity authentication information to the intelligent mobile equipment;
s3, after receiving the identity authentication information, the user side performs identity authentication through the intelligent mobile equipment, and sends the authenticated information to the management side;
and S4, the management terminal receives the authenticated information and verifies the authenticated information, if the authenticated information passes the verification, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user.
In the above technical solution, the step S1 includes:
s1.1, a user scans a two-dimensional code representing unique marking information of a camera through a rear camera of intelligent mobile equipment by using the APP, and after the two-dimensional code is identified, the APP prompts the start of the front camera of the intelligent mobile equipment and provides a request for shooting a head portrait of the user;
s1.2, a user finishes shooting a head portrait of the user through a front camera of the intelligent mobile equipment;
s1.3, the user uploads a request for sharing the monitoring camera and a shot head portrait of the user to a management terminal through the APP.
In the above technical solution, the step S2 includes:
s2.1, receiving the request and the head portrait image of the user by a management terminal;
and S2.2, the management terminal sends identity authentication information to the APP according to the request.
In the above technical solution, the step S3 includes:
s3.1, the user receives the identity authentication information through the APP, then identity authentication is carried out, and the information after identity authentication is sent to a management end;
and S3.2, the management terminal receives the information after the user identity authentication, performs identity matching verification on the information after the user identity authentication and the head portrait image of the user, if the information after the identity authentication is matched with the head portrait image of the user, the management terminal sends a request for using the camera by the user to the control system, and otherwise sends authentication error information to the APP.
Further, before the step S3.2, the management end performs authenticity check on the avatar image, where the authenticity check includes comparing the background of the avatar image, and if the background of the avatar image is a background that can be shot by the camera, the avatar image is considered to be a real avatar.
In the above technical solution, the identity authentication information includes face recognition information.
In the technical scheme, the control system sends a video shot by the camera to the intelligent mobile equipment of the user, wherein the video is displayed in a fuzzy manner in a non-interest area except a user interest area; the interested region is an object viewed by a user, and the user transmits the viewed object to a management end through the APP in a specified form.
In the technical scheme, the region of interest is a person viewed by the user, and the face of the other person in the region of no interest is displayed in a fuzzy manner.
In addition, the invention also provides a system for sharing the monitoring camera, which comprises intelligent mobile equipment, a management end and a control system, wherein the intelligent mobile equipment is internally provided with an APP, a user communicates with the management end through the APP, and the management end controls the control system to send the video shot by the monitoring camera to the user.
Further, the system for monitoring video sharing during camera shooting further comprises:
the two-dimensional code is arranged near the monitoring camera and comprises a unique mark signal of the monitoring camera;
and the identity authentication module is used for authenticating identity authentication information sent by the user through the APP and simultaneously performing identity matching authentication on the identity authentication information and the head portrait image of the user.
In the method, a user scans the two-dimensional code of the monitoring camera and sends a request for acquiring the video shot by the monitoring camera, namely, sends a request for sharing the monitoring camera (hereinafter referred to as a sharing request). The method comprises the steps that a user uploads a request for sharing a monitoring camera and a shot head portrait to a management end through an APP, the management end located at a remote position verifies the identity of the user, and an authentication result is compared with the uploaded photo, if the photo is really the user, the user is allowed to obtain a video shot by the camera after authentication, the identity verification of the user comprises APP identity authentication and head portrait authentication, the user identity is verified through the two layers of authentication, the user identity of the sharing request can be uniquely determined, the authentication mode can effectively determine the identity of the user, and the video source tracing of the user obtaining the video after the video is disclosed is facilitated.
In addition, in order to prevent the video from leaking the identity information of people irrelevant to the user and ensure the privacy of the video, the video provided for the user is processed, namely the region (non-interesting region) except the interesting region of the user in the video is subjected to fuzzy processing, so that the condition that the user checks the interesting region can be met, and the privacy of other people can be prevented from being leaked by irrelevant information.
Drawings
Fig. 1 is a schematic flow chart of a method for sharing a surveillance camera according to the present invention.
Fig. 2 is a block diagram of a system for sharing a surveillance camera according to the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and the specific embodiments.
As shown in fig. 1, the method for sharing a surveillance camera of the present invention includes:
s1, the user sends a request for sharing the camera to the management end by using the APP installed in the smart mobile device, as shown in fig. 1, the specific operations are as follows:
s1.1, firstly, a user performs real-name registration through an APP and needs real-name authentication, and the operations of registration and real-name authentication are the prior art and are not described herein again.
The user uses APP to scan the two-dimensional code through the rear camera of the intelligent mobile device, the two-dimensional code is arranged near the monitoring camera, namely the user is prompted to share the monitoring camera as required, the two-dimensional code must be scanned, and the two-dimensional code contains the only mark information of the monitoring camera.
The user uses APP to scan the two-dimensional code through the rear camera of the intelligent mobile device, and after the two-dimensional code is recognized, the APP prompts the start of the front camera of the intelligent mobile device and provides a request for shooting the head portrait of the user.
S1.2, the user finishes shooting the head portrait of the user through a front camera of the intelligent mobile device, and the background of the head portrait photo contains the surrounding environment.
S1.3, the user uploads a request for sharing the monitoring camera and a shot head portrait of the user to a management terminal through the APP.
S2, after receiving the sharing request, the management terminal sends identity authentication information to the APP, and the specific operations include:
and S2.1, the management terminal receives the sharing request information and the head portrait photo of the user, and obtains the corresponding monitoring camera number obtained by the user request through the unique mark information in the sharing request information.
S2.2, the management terminal sends identity authentication information to the APP according to the sharing request information, the authentication information comprises information required by real-name authentication, the information required by the real-name authentication comprises face recognition information, the face recognition information can be obtained through the APP, and for example, the APP obtains the face information of a user through a front camera of the intelligent mobile device.
S3, the user side receives the identity authentication information and then performs identity authentication through the intelligent mobile device, and sends the authenticated information to the management side, wherein the specific operation comprises the following steps:
s3.1, the user receives the authentication information through the APP and then performs identity authentication, and the information after the identity authentication is sent to a management end;
and S3.2, the management terminal receives the information after the user identity authentication, performs identity matching verification on the information after the user identity authentication and the head portrait image of the user, if the information after the identity authentication is matched with the head portrait image of the user, the management terminal sends a request for using the camera by the user to the control system, and otherwise sends authentication error information to the APP.
Because there is uncertainty in scanning the two-dimensional code in step S1, the two-dimensional code may also be scanned at the non-monitoring camera position, for example, the two-dimensional code is sent to another person after being photographed, and the identity authentication is performed after the other person scans again, which may occur in this case: others falsely use the user identity information to authenticate and log in (such as receiving a verification code through a conventional mobile phone number). Under the circumstance, anyone can share the monitoring camera at any place, so that not only is the resource waste (bandwidth and flow rate of a broadband) caused, but also the potential safety hazard is brought, for example, once the illegal outflow of the video causes adverse effects, the source tracing of the video is difficult to carry out, and therefore, the person requesting to share the video needs to be ensured to be the user. For example, in order to obtain the whereabouts of children playing in a large-scale amusement park in real time, parents may make a request for sharing videos shot by a camera in the amusement park, where the sharing of the videos is limited to the time when the children play in the amusement park, and therefore, it is necessary to ensure that a user who makes a video sharing request is a parent of the children, and at the same time, it is also necessary to ensure that the parent is in the amusement park. In order to solve the above technical problem, the present invention provides a preferred embodiment, in order to ensure the accuracy and uniqueness of the identity of the user issuing the sharing request, before step S3.2, the management terminal performs an authenticity check on the head portrait image, where the authenticity check includes comparing the background of the head portrait image, and if the background of the head portrait image is the background that can be taken by the camera, the head portrait image is considered to be a real head portrait, specifically, a 360 ° panoramic image near the camera is previously taken as a photograph and stored in the database of the management terminal, and when the background in the head portrait photograph uploaded by the user is compared with the background photograph pre-stored in the database, and if the background in the head portrait photograph matches the background photograph pre-stored in the database, the user issuing the sharing request is considered to be near the monitoring camera, and the sharing request issued by the APP is the request of a real shared video, i.e. can pass the authentication.
And S4, the management terminal receives the authenticated information and verifies the authenticated information, if the authenticated information passes the verification, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user.
In order to prevent the privacy of other people from being revealed due to the outflow of the video, the invention sends other non-interest areas except the user interest area in the video shot by the camera to the APP in the intelligent mobile equipment of the user through the control system, the interest area is an object viewed by the user, for example, the viewed object can be a face, and the area outside the face is the non-interest area. The object that the user will look over passes through according to prescribed form APP and transmits to the management end, for example, the user needs to acquire child or old man's whereabouts in real time through the video, and the region of interest in the video is child or old man promptly, and the region except child or old man in the video then carries out fuzzy processing, and the video after the processing is resent to the APP, and like this, the user can only see child or old man's head portrait through the surveillance video that the APP saw. The predetermined form may be to photograph the object to be viewed, highlight the object in the photograph, for example, a face of a child in one photograph is circled with a vivid color through a painting brush (which can be implemented by image processing software provided in the smart terminal device), so as to form a highlight region, when the management terminal processes the photograph, the management terminal recognizes the highlight region and obtains the object (face of the child) in the highlight region, processes the video with the object as shared information, and blurs a region of the video that does not include the object. As a preferred embodiment, only the person in the video may be processed, for example, only the face in the non-interest area in the video may be blurred.
In order to implement the method for sharing a surveillance camera, the embodiment further provides a sharing system for implementing the method, including: locate near surveillance camera head two-dimensional code, the intelligent Mobile device that the user used, be located the management end and the control system of remote server end, wherein, install APP in the intelligent Mobile device, the user passes through APP carries out radio communication with the management end, and management end control system sends the video that the surveillance camera head was shot to the user. The two-dimensional code comprises unique mark information of a monitoring camera, an identity authentication module is arranged in a management end and used for authenticating identity authentication information sent by a user through an APP (application), and meanwhile identity matching authentication is carried out on the identity authentication information and a head portrait image of the user.
The intelligent mobile equipment used in the invention can be an intelligent mobile phone or other intelligent equipment with the same function of the intelligent mobile phone, and the intelligent mobile equipment realizes the wireless communication of data with the management terminal through a wireless communication network, such as a 4G/5G/Wi-Fi network, which are common technical means in the technical field of wireless communication. In addition, APP (abbreviation of Application) in the present invention is software installed in the smart mobile device, and is a common technical means in the field of computer technology. The APPs obtained by programming to implement the functions of the present invention are all prior art and will not be described herein.
Claims (10)
1. A method of sharing a surveillance camera, comprising:
s1, the user sends a request for sharing the monitoring camera to the management terminal by using the APP installed in the intelligent mobile equipment;
s2, after receiving the request, the management terminal sends identity authentication information to the intelligent mobile equipment;
s3, after receiving the identity authentication information, the user side performs identity authentication through the intelligent mobile equipment, and sends the authenticated information to the management side;
and S4, the management terminal receives the authenticated information and verifies the authenticated information, if the authenticated information passes the verification, a request for using the camera by the user is sent to the control system, and the control system sends the video shot by the camera to the intelligent mobile equipment of the user.
2. The video sharing method according to claim 1, wherein the step S1 includes:
s1.1, a user scans a two-dimensional code representing unique marking information of a camera through a rear camera of intelligent mobile equipment by using the APP, and after the two-dimensional code is identified, the APP prompts the start of the front camera of the intelligent mobile equipment and provides a request for shooting a head portrait of the user;
s1.2, a user finishes shooting a head portrait of the user through a front camera of the intelligent mobile equipment;
s1.3, the user uploads a request for sharing the monitoring camera and a shot head portrait of the user to a management terminal through the APP.
3. The video sharing method according to claim 2, wherein the step S2 includes:
s2.1, receiving the request and the head portrait image of the user by a management terminal;
and S2.2, the management terminal sends identity authentication information to the APP according to the request.
4. The video sharing method according to claim 3, wherein the step S3 includes:
s3.1, the user receives the identity authentication information through the APP, then identity authentication is carried out, and the information after identity authentication is sent to a management end;
and S3.2, the management terminal receives the information after the user identity authentication, performs identity matching verification on the information after the user identity authentication and the head portrait image of the user, if the information after the identity authentication is matched with the head portrait image of the user, the management terminal sends a request for using the camera by the user to the control system, and otherwise sends authentication error information to the APP.
5. The video sharing method according to claim 4, wherein: before the step S3.2, the management end performs authenticity check on the head portrait image, where the authenticity check includes comparing the background of the head portrait image, and if the background of the head portrait image is the background that can be shot by the camera, the head portrait image is considered to be a real head portrait.
6. The video sharing method according to claim 3, wherein: the identity authentication information includes face recognition information.
7. The video sharing method according to any one of claims 1 to 5, wherein: the control system sends videos shot by the camera to the intelligent mobile equipment of the user, wherein the videos are not in the region of interest of the user and are displayed in a fuzzy mode, and the region of interest of the user is not the region of interest of the user; the interested region is an object viewed by a user, and the user transmits the viewed object to a management end through the APP in a specified form.
8. The video sharing method according to claim 7, wherein: the interested region is a person viewed by the user, and the face of the other person in the non-interested region is displayed in a fuzzy mode.
9. A system for sharing a surveillance camera, comprising: including intelligent Mobile device, management end and control system, install APP in the intelligent Mobile device, the user passes through APP communicates with the management end, and the management end control system sends the video that the surveillance camera head was shot to the user.
10. The system for sharing a surveillance camera of claim 9, further comprising:
the two-dimensional code is arranged near the monitoring camera and comprises a unique mark signal of the monitoring camera;
and the identity authentication module is used for authenticating identity authentication information sent by the user through the APP and simultaneously performing identity matching authentication on the identity authentication information and the head portrait image of the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110358371.7A CN113079161B (en) | 2021-04-01 | 2021-04-01 | Method and system for sharing monitoring camera |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110358371.7A CN113079161B (en) | 2021-04-01 | 2021-04-01 | Method and system for sharing monitoring camera |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113079161A true CN113079161A (en) | 2021-07-06 |
CN113079161B CN113079161B (en) | 2022-10-25 |
Family
ID=76614710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110358371.7A Active CN113079161B (en) | 2021-04-01 | 2021-04-01 | Method and system for sharing monitoring camera |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113079161B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114938465A (en) * | 2022-07-25 | 2022-08-23 | 广州万协通信息技术有限公司 | Encrypted data transmission method and device based on characteristic sequence |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008127194A1 (en) * | 2007-04-12 | 2008-10-23 | Yu Zhou | Network camera monitoring and data sharing system and method |
CN102789561A (en) * | 2012-06-29 | 2012-11-21 | 奇智软件(北京)有限公司 | Method and device for utilizing camera in browser |
US8832801B1 (en) * | 2012-05-11 | 2014-09-09 | Ravi Ganesan | JUBISM: judgement based information sharing with monitoring |
CN105227316A (en) * | 2015-09-01 | 2016-01-06 | 深圳市创想一登科技有限公司 | Based on mobile Internet account login system and the method for facial image authentication |
CN105809111A (en) * | 2016-02-25 | 2016-07-27 | 曹宇 | Identity authentication method, apparatus, device and system |
US20160219032A1 (en) * | 2014-12-19 | 2016-07-28 | Xiaomi Inc. | Method and apparatus for controlling access to surveillance video |
CN105933657A (en) * | 2016-05-17 | 2016-09-07 | 北京睿智荟聚科技发展有限公司 | Method and system for network real-time live broadcasting of instant frame, and camera |
CN106295522A (en) * | 2016-07-29 | 2017-01-04 | 武汉理工大学 | A kind of two-stage anti-fraud detection method based on multi-orientation Face and environmental information |
CN107105199A (en) * | 2017-04-20 | 2017-08-29 | 武汉康慧然信息技术咨询有限公司 | Smart home nurse method and system based on technology of Internet of things |
CN107862247A (en) * | 2017-10-13 | 2018-03-30 | 平安科技(深圳)有限公司 | A kind of human face in-vivo detection method and terminal device |
CN107948592A (en) * | 2017-11-22 | 2018-04-20 | 珠海格力电器股份有限公司 | Method and device for sharing camera and intelligent terminal |
CN110430348A (en) * | 2019-08-05 | 2019-11-08 | 深圳市威尔电器有限公司 | Go on patrol intelligent monitoring terminal and its working method |
CN111192007A (en) * | 2019-12-23 | 2020-05-22 | 杭州宇泛智能科技有限公司 | Information approval method, device and system and electronic equipment |
CN111193899A (en) * | 2018-11-15 | 2020-05-22 | 杭州海康威视数字技术股份有限公司 | Monitoring resource sharing method, device and system and electronic equipment |
US20200396423A1 (en) * | 2016-03-08 | 2020-12-17 | Dean Drako | Methods for sharing private video streams with first responders under facility administrator control |
-
2021
- 2021-04-01 CN CN202110358371.7A patent/CN113079161B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008127194A1 (en) * | 2007-04-12 | 2008-10-23 | Yu Zhou | Network camera monitoring and data sharing system and method |
US8832801B1 (en) * | 2012-05-11 | 2014-09-09 | Ravi Ganesan | JUBISM: judgement based information sharing with monitoring |
CN102789561A (en) * | 2012-06-29 | 2012-11-21 | 奇智软件(北京)有限公司 | Method and device for utilizing camera in browser |
US20160219032A1 (en) * | 2014-12-19 | 2016-07-28 | Xiaomi Inc. | Method and apparatus for controlling access to surveillance video |
CN105227316A (en) * | 2015-09-01 | 2016-01-06 | 深圳市创想一登科技有限公司 | Based on mobile Internet account login system and the method for facial image authentication |
CN105809111A (en) * | 2016-02-25 | 2016-07-27 | 曹宇 | Identity authentication method, apparatus, device and system |
US20200396423A1 (en) * | 2016-03-08 | 2020-12-17 | Dean Drako | Methods for sharing private video streams with first responders under facility administrator control |
CN105933657A (en) * | 2016-05-17 | 2016-09-07 | 北京睿智荟聚科技发展有限公司 | Method and system for network real-time live broadcasting of instant frame, and camera |
CN106295522A (en) * | 2016-07-29 | 2017-01-04 | 武汉理工大学 | A kind of two-stage anti-fraud detection method based on multi-orientation Face and environmental information |
CN107105199A (en) * | 2017-04-20 | 2017-08-29 | 武汉康慧然信息技术咨询有限公司 | Smart home nurse method and system based on technology of Internet of things |
CN107862247A (en) * | 2017-10-13 | 2018-03-30 | 平安科技(深圳)有限公司 | A kind of human face in-vivo detection method and terminal device |
CN107948592A (en) * | 2017-11-22 | 2018-04-20 | 珠海格力电器股份有限公司 | Method and device for sharing camera and intelligent terminal |
CN111193899A (en) * | 2018-11-15 | 2020-05-22 | 杭州海康威视数字技术股份有限公司 | Monitoring resource sharing method, device and system and electronic equipment |
CN110430348A (en) * | 2019-08-05 | 2019-11-08 | 深圳市威尔电器有限公司 | Go on patrol intelligent monitoring terminal and its working method |
CN111192007A (en) * | 2019-12-23 | 2020-05-22 | 杭州宇泛智能科技有限公司 | Information approval method, device and system and electronic equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114938465A (en) * | 2022-07-25 | 2022-08-23 | 广州万协通信息技术有限公司 | Encrypted data transmission method and device based on characteristic sequence |
CN114938465B (en) * | 2022-07-25 | 2022-10-18 | 广州万协通信息技术有限公司 | Encrypted data transmission method and device based on characteristic sequence |
Also Published As
Publication number | Publication date |
---|---|
CN113079161B (en) | 2022-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10915777B2 (en) | Communication terminal, communication system, and image processing method | |
CN103917727B (en) | Utilize the locking device adding strong security of iris image | |
US11245707B2 (en) | Communication terminal, communication system, communication control method, and recording medium | |
CN106453874B (en) | Mobile phone control method and system | |
US10419728B2 (en) | Monitoring system having personal information protection function and method thereof | |
CN109118606B (en) | Facial recognition attendance process authentication method | |
KR101946317B1 (en) | User Identification and Tracking Method Using CCTV System | |
CN104851171A (en) | Intelligent access control method, device and system | |
JP2006331048A (en) | Personal identification method and system by position information | |
JP5151931B2 (en) | Authentication system, authentication device, authentication target terminal, authentication method, authentication device program, and authentication target terminal program | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN112257124A (en) | Image processing method and device | |
EP3623974A1 (en) | Methods and systems for improved biometric identification using user devices proximity | |
US20230308881A1 (en) | System and method for encounter identity verification | |
CN113079161B (en) | Method and system for sharing monitoring camera | |
KR20220067918A (en) | Apparatus and Method for Face Authentication using Digital ID | |
CN111325065A (en) | Security management method, device, equipment and computer storage medium | |
CN113055194B (en) | Cloud conference box rapid conference entering method, cloud conference box and readable storage medium | |
KR20100116124A (en) | The remote identification method and apparatus in video phone call between computer and mobile phone | |
CN109785469A (en) | Access control equipment control method and system | |
US10387634B1 (en) | System and method for authenticating a person using biometric data | |
KR20150027462A (en) | Attendance verification system | |
CN105336020A (en) | Identity verification method and system | |
KR20200063294A (en) | Object Tracking System and method automatically gathering in vehicle black box image | |
US11582274B2 (en) | Videoconferencing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |